Chapter 1: Foundational Principles Flashcards

1
Q

Secondary use is also referred to what when collecting data?

A

repurposing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is required when collecting data

A

consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two methods of data collection

A

active and passive data collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the four types of data collection

A

first party
surveillance
repurposing
third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is first party data collection

A

occurs when individuals provides their personal information directly to the data collectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is surveillance data collection

A
  • individuals data stream behaviour is overed through their activities, including online searches, or websites they engage with, while the individual activity is not interrupted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is repurposing data collection

A

previously collected data may be used for a different purpose other than that for which was intality collected such as mailing address collected for shipping purposes later be used for sending marketing materials
o repurposing is also sometimes referred to as secondary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is third party data collection

A

previously collected information is transferred to a third party to enable a new data collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the two forms of consent

A

implicit and explicit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is implied consent

A

Implied consent does not require the user to take an action. An example might be presenting the user with terms of service that state the individual’s use of the service means they agree with those terms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is explicit

A

Explicit consent requires the user to take an action, such as selecting an option to allow the collection of information that the application provider wants to use to improve services and functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is privacy notice?

A

statement made to data subjects that describes how an organization collects, uses, retains and discloses personal information. Notices should also indicate what information will be collected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does organization need when collecting personal information ?

A

privacy notice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the requirements developing business continuity planning?

A

sufficiently timely, relevant, accurate and complete for their purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three potential issues that impact data destruction?

A

o digital content - Disks should be appropriately formatted before use to ensure that all data placed on them eventually can be deleted.
o Portable media- Portable media, such as CDs, DVDs and flash drives, have unique challenges precisely because they are portable and therefore harder to regulate, monitor and track.
o Hard copy-the primary challenge with “hard copy” documents, such as paper records, lies in determining what documents need to be destroyed and when.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 7 privacy design?

A

Principle 1: Proactive, Not Reactive Preventative, Not Remedial Privacy
Principle 2: Privacy as the Default Setting
Principle 3: Privacy Embedded into Design
Principle 4: Full Functionality
Principle 5: End to End security
Principle 6: Visibility and Transparency
Principle 7: Respect for User Privacy; Keep it User Centric

17
Q

What is risk?

A

is defined as a potential threat or issue, along with the impact the threat or issue could cause, and the likelihood that it will occur

18
Q

What is contextual integrity?

A

as maintaining personal information in alignment with the informational norms that apply to a particular context.

19
Q

What are they key components of contextual integrity

A
  • actors: the senders and receivers of personal
  • information attributes: the types of information being shared
  • transmission principles: those that govern the flow of information
20
Q

What is the difference between subject and objective harm

A

Objective harm occurs when privacy has been violated and direct harm is known to exist. It involves the forced or unanticipated use of personal information and is generally measurable and observable while Subjective harm exists when an individual expects or perceives harm, even if the harm is not observable or measurable.

subjective privacy harms amount to discomfort and other negative feelings, while objective privacy harms involve actual adverse consequences

21
Q

What are the two dimensions of harm?

A

subjective and objective harm

22
Q

What does the value sensitive design account for?

A

morals, ethical

23
Q

What is value- sensitive design?

A

• Value-sensitive design is a design approach that accounts for moral and ethical values and should be considered when assessing the overall “value” of a design these values might include things such as trust, fairness, informed consent, courtesy or freedom from bias.

24
Q

What are the three investigations of value sensitive design? Explain

A

o Conceptual
 identifies the direct and indirect stakeholders, attempts to establish what those stakeholders might value, and determines how those stakeholders may be affected by the design.
o Empirical
 focuses on how stakeholders configure, use, or are otherwise affected by the technology.
o Technical
 examines how the existing technology supports or hinders human values and how the technology might be designed to support the values identified in the conceptual investigation

25
Q

What is the difference between direct and indirect stakeholders in value sensitive design?

A

o Direct stakeholders are those who directly interact with a system.
o Indirect stakeholders are any others who are affected by the system.