CH 8.1 Privacy by design Flashcards

1
Q

What is privacy by design?

A

The concept that privacy is part of the design of products, systems, software, etc. and is built in my default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data minimization

A

collect only what you need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Destruction

A

One important way to protect personal information and privacy is to destroy personal information when it is no longer needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How to best align information security and privacy teams

A

Team; don’t reinvent; stay aware; rank and prioritize problems/risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

process oriented privacy design strategy

A

Commitment to processing personal information in a privacy-friendly way and ensuring that these commitments are honored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data oriented privacy design strategy

A

Focus on technical ways that data can be processed with the maximization of privacy in mind.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Privacy by Design

A

1) Integrates privacy protections into physical stems, technology products and business processes.
2) Ensures can be assured that privacy controls are in place from the outset of a project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Privacy by Design Foundational Principles

A

1) Proactive not Reactive
2) Preventative not Remedial
3) Privacy as the Default Setting
4) Privacy Embedded into Design
5) Full Functionality- Positive-Sum, not Zero-Sum
6) End-to-End Security - Full Lifecycle Protection
7) Visibility and Transparency - Keep it Open
8) Respect for User Privacy - Keep it User-Centric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Instituting Privacy by Design

A

1) Commit to the Program
2) Create a Privacy Standard
3) Perform Privacy Reviews of Products and Services
4) Perform a data flow analysis
5) Inform consumers of your privacy practices
6) Provide privacy controls for users
7) Provide users with access to data
8) Apply data retention and destruction policies
9) Secure sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

goal setting

A

including privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

document requiremments

A

documenting what you will do and what you won’t do – useful for testing after building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

quality attributes

A

1) identifiability
2) confidentiality
3) availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

information needs

A

what is the least amount of data needed to accomplish this goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

high level design

A

comprises of:

1) quality attributes (identify, confident, available)
2) architectures: (usable front-end, compliant back-end)
3) design representation (design includes all nodes throughout system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

low level design/implementation

A
  • reuses libraries, frameworks, APIs when possible from other parts of system for consistency’s sake
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

impose controls

A

1) architecture (decentralize operations)
2) secure (using abstraction/hiding)
3) supervise (enforcement of privacy policies)
4) balance (ensuring that solutions don’t incur further risks)

17
Q

testing and validation

A

validating the requirements. comprised of:

1) unit testing
2) system testing
3) integration testing
4) manual testing

18
Q

ongoing vigilance practices against privacy and security risks

A

1) code reviews (peer to peer)
2) code audits (3rd party to organization)
3) runtime behavior monitoring (noting spikes and dips)
4) keeping software up to date with modern standards

19
Q

What are the three primary ways that data is anonymized?

A

1) Suppression
2) generalization, and
3) noise addition