Chapter 1: Foundational Principles Flashcards
What is the defintion of risk
a potential threat or issue, along with the impact the threat or issue could cause, and the likelihood that it will occur
What is it important to identify risk early privacy models and frameworks
assist with the development of specific administrative, operational and technical measures to manage these risks
What is the Legal compliance model in privacy risk models
Statutory and regulatory mandates prescribe aspects of systems that handle personal information
To ensure compliance, both business process and system owners must understand the specific obligations and prohibitions their organizations are subject to and must work with their system design teams to relay those requirements, as well as identify and address any threats and vulnerabilities associated with the technologies that will be used.
What is the Fair Information Practice Principles model in privacy risk models
Fair Information Practice Principles (also referred to as FIPPs) are a set of long-standing privacy values that exist in various forms globally. FIPPs work alongside compliance models to mandate: notice, choice, and consent; access to information; controls on information; and how information is managed.
What is the Nissenbaum’s contextual integrity model in privacy risk models
Helen Nissenbaum’s Contextual Integrity—Privacy can be expressed as norms that should govern information access. Norms are domain specific; for example, the norms governing banking information will differ from the norms governing medical information.
Contextual integrity as maintaining personal information in alignment with the informational norms that apply to a particular context.
What is the concept of integrity
- actors: the senders and receivers of personal information attributes: the types of information being shared
- transmission principles: those that govern the flow of information
Give a example of Nissenbaum’s contextual integrity model
a patient visits a doctor with complaints (actors) and an x-ray is taken to determine the cause of their discomfort (attribute). The doctor shares results with a specialist to determine a course of action ( transmission)
Whats a challenge faced in the Nissenbaum’s contextual integrity model
considering context is that these norms do not generally have a preexisting reference point for privacy risks.
What is the Calo’s harms dimensions model in privacy risk models
Ryan Calo identified two dimensions of privacy harm: objective and subjective.
Objective harm occurs when privacy has been violated and direct harm is known to exist. It involves the forced or unanticipated use of personal information and is generally measurable and observable.
Subjective harm exists when an individual expects or perceives harm, even if the harm is not observable or measurable.
What is the relationship between objective harm and subjective harm in Calo’s model
analogous to the legal relationship between assault and battery.
subjective privacy harms amount to discomfort and other negative feelings, while objective privacy harms involve actual adverse consequences
what is the difference between objective harm and subjective harm in Calo’s model
Objective harms are measurable and observable, wherein a person’s privacy has been violated and a direct harm is known to exist. Subjective harms exist without an observable or measurable harm, but where an expectation of harm exists. Subjective harms may have the same impact on individual privacy because the individual takes similar steps to protect themselves
Subjective harm impacts individuals on a psychological and behavioral level, while objective harms can result in loss of business opportunity, consumer trust or even social detriment to the individual..
What is the The National Institute of Standards and Technology (NIST) model in privacy risk models
The National Institute of Standards and Technology (NIST) provides standards, guidelines and best practices for managing cybersecurity-related risks, including the Risk Management Framework, the Cybersecurity Framework, and the Privacy Framework.
The NIST Privacy Framework is a voluntary risk management tool alongside the NIST Cybersecurity Framework.
What is the The National Initiative for Cybersecurity Education’s Cybersecurity Workforce Framework in privacy risk models
o NICE frameworks:
The National Initiative for Cybersecurity Education’s Cybersecurity Workforce Framework (NICE Framework) is a nationally-focused resource published by NIST, which categorizes and describes cybersecurity work.
applies to all sectors
What is the Factors Analysis in Information Risk (FAIR) model in privacy risk models
The Factors Analysis in Information Risk (FAIR) model breaks down risk by its constituent parts, then further breaks down those parts to find factors that estimate the overall risk.
FAIR constructs a basic framework that breaks risk into the frequency of action and magnitude of the violations.
What does privacy by design based on?
• seven principles based on proactively incorporating privacy into all levels of operations organically, rather than viewing it as a trade off or something to add to a system, product, service or process after it has been built.
what is the Principle 1: Proactive, Not Reactive Preventative, Not Remedial Privacy
protection must be a forethought in any technology system, product, process or service development
Making privacy a consideration in the design phase—instead of reacting to privacy harms as they arise in the future—helps to mitigate potential privacy risks and violations.
Thinking about privacy when designing a system, product, service or process helps practitioners design these things with privacy considerations built in instead of trying to figure out how to address them in a design that may be less flexible when privacy is considered later