Chapter 1 Flashcards

Privacy in the Modern Era

You may prefer our related Brainscape-certified flashcards:
1
Q

Who wrote ‘The Right to Privacy’ in 1890?,

A

Louis D. Brandeis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which case is noted for the dissenting opinion stating ‘the right to be left alone’?,

A

Olmstead v. United States

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does AICPA (GAPP) define privacy?,

A

The rights and obligations of individuals and organizations with respect to the collection, use, retention, disclosure, and destruction of personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is considered Personal Information (PI) according to GAPP?,

A

Information that is or can be about or related to an identifiable individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List some examples of Sensitive Personal Information (SPI) according to GAPP.,

A

Racial or ethnic origin, religious or philosophical beliefs, political opinions, trade union membership, genetic data, biometric data (used for ID purposes), health data, and data concerning sex life or sexual orientation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What isn’t considered Personal Information (PI)?,

A

Information that does not provide a way to identify the person the information is about (anonymized PI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can PI be truly anonymized according to HHS?,

A
  1. Expert determination: Anonymization analysis conducted by a trained statistician. 2. Safe Harbor: Requires the removal of 18 types of information to remove direct and indirect links to an individual.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some identifiers that need to be removed under Safe Harbor for personal information?,

A

Names, geographic divisions and zip codes containing fewer than 20,000 people, dates of birth, death, hospital admission, or discharge for individuals over the age of 89, telephone and fax numbers, VINs and serial numbers, including license plate numbers, device identifiers and serial numbers, email addresses, IP addresses, web URLs, media record numbers, SSNs, biometric identifiers, health plan beneficiary numbers, full-face photographs and any comparable images, account numbers, any other uniquely identifying numbers or codes, and certificate/license numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is data aggregation?,

A

Summarizing data about a group of individuals to make it impossible to draw conclusions about a single person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why should organizations care about privacy?,

A

Ethical obligation, laws and regulations, poor privacy practices reflect poorly on an organization’s reputation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the Generally Accepted Privacy Principles (GAPP)?,

A

Management, Notice, Choice and Consent, Collection, Use, Retention, and Disposal, Access, Disclosure to Third Parties, Security for Privacy, Quality, Monitoring and Enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the Management principle under GAPP entail?,

A

The entity defines, documents, communicates, and assigns accountability for its privacy policies and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Notice principle in GAPP?,

A

The entity provides notice about its privacy policies and practices and identifies the purposes for which personal information is collected, used, retained, and disclosed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Choice and Consent principle in GAPP?,

A

It allows individuals to retain control over the use of their personal information (PI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the Collection principle under GAPP govern?,

A

It governs the ways that organizations come into possession of personal information (PI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the Use, Retention, and Disposal principle under GAPP concern itself with?,

A

The entity limits the use of PI to purposes identified in the notice and for which the individual has provided implicit or explicit consent. The entity retains PI for only as long as necessary to fulfill the stated purposes or as required by law or regulations and then appropriately disposes of such information.

17
Q

What is the Access principle under GAPP?,

A

The entity provides individuals with access to their personal information for review and update.

18
Q

What does the Disclosure to Third Parties principle in GAPP involve?,

A

The entity discloses personal information (PI) to third parties only for the purposes identified in the notice and with the implicit or explicit consent of the individual.

19
Q

What is involved in the Security for Privacy principle under GAPP?,

A

The entity protects personal information against unauthorized access (both physical and logical).

20
Q

What does the Quality principle in GAPP state?,

A

The entity maintains accurate, complete, and relevant personal information for the purposes identified in the notice.

21
Q

What is covered under the Monitoring and Enforcement principle in GAPP?,

A

The entity monitors compliance with its privacy policies and procedures and has procedures to address privacy-related inquiries, complaints, and disputes.

22
Q

What are the components of developing a privacy program?,

A

Strategic Mission Statement, Goals, Objectives.

23
Q

Who are considered Data Subjects in privacy roles?,

A

The individuals from whom personal information is collected.

24
Q

Who are Data Controllers in privacy roles?,

A

The organizations that determine the purposes and means of collecting personal information from data subjects.

25
Q

Who are Data Processors in privacy roles?,

A

Service providers who collect or process personal information on behalf of data controllers.

26
Q

What is required after crafting strategic mission, goals, and objectives in a privacy program?,

A

Establishing accountable officials and privacy roles, and creating a comprehensive inventory of the personal information (PI) that is collected, processed, and maintained, as well as the systems, storage locations, and processes involved in these activities.

27
Q

How is the inventory information used in a privacy program?,

A

It is leveraged for conducting privacy assessments and implementing privacy controls.

28
Q

Which standard is often leveraged for privacy assessments?,

A

ISO 27701.

29
Q

What is the end result of a privacy assessment?,

A

A gap analysis.

30
Q

What happens after privacy controls are implemented to address gap analyses?,

A

The program conducts ongoing operation and monitoring.

31
Q

What does Privacy by Design aim to do?,

A

Incorporates strong privacy practices into the design and implementation of technology systems, rather than adding privacy controls after a system is already in place.

32
Q

List the foundational principles of Privacy by Design.,

A

Proactive, not reactive; preventative, not remedial. Privacy as the default setting. Privacy embedded into design. Full functionality: Positive-sum, not zero-sum. End-to-end security: Full lifecycle protection. Visibility and transparency: Keep it open. Respect for user privacy: Keep it user-centric.