Chapter 1: Introduction to Privacy for the IT Professional Flashcards

1
Q

Who invented the concept of Contextual Integrity

A

Helen Nissenbaum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Helen Nissenbaum’s Contextual Integrity

A

Privacy concerns are not absolute but largely depend on the context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Provide an example of privacy norms being domain and context specific

A

The norms governing banking information will differ from the norms governing medical information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the 4 risk categories of privacy harm identified in Daniel Solove’s Taxonomy of Privacy

A

Information Collection
Information Processing
Information Dissemination
Invasion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List the 2 activities or mechanisms that can violate privacy related to Information Collection (Daniel Solove’s Taxonomy of Privacy)

A

Surveillance

Interrogation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the 5 activities or mechanisms that can violate privacy related to Information Processing (Daniel Solove’s Taxonomy of Privacy)

A
Aggregation
Insecurity
Secondary Use
Identification
Exclusion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List the 7 activities or mechanisms that can violate privacy related to Information Dissemination (Daniel Solove’s Taxonomy of Privacy)

A
Breach of confidentiality
Increased Accessibility
Disclosure
Exposure
Blackmail
Appropriation
Distortion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List the 2 activities or mechanisms that can violate privacy related to Invasion (Daniel Solove’s Taxonomy of Privacy)

A

Intrusion

Decisional Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe Surveillance (Daniel Solove’s Taxonomy of Privacy)

A

Watching, listening to, or recording of an individual’s activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe Interrogation (Daniel Solove’s Taxonomy of Privacy)

A

Questioning or probing for personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe Aggregation (Daniel Solove’s Taxonomy of Privacy)

A

Combining of various pieces of personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe Insecurity (Daniel Solove’s Taxonomy of Privacy)

A

Carelessness in protecting information from leaks or improper access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe Identification (Daniel Solove’s Taxonomy of Privacy)

A

Linking of information to a particular individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe Secondary Use (Daniel Solove’s Taxonomy of Privacy)

A

Using personal information for a purpose other than the purpose for which it was collected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe Exclusion (Daniel Solove’s Taxonomy of Privacy)

A

Failing to let an individual know about the information that others have about them and participate in its handling or use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe Breach of Confidentiality (Daniel Solove’s Taxonomy of Privacy)

A

Breaking a promise to keep a person’s information confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe Disclosure (Daniel Solove’s Taxonomy of Privacy)

A

Revealing truthful personal information about a person that impacts the ways others judge their character or their security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe Exposure (Daniel Solove’s Taxonomy of Privacy)

A

Revealing an individual’s nudity, grief, or bodily functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Describe Increased Accessibility (Daniel Solove’s Taxonomy of Privacy)

A

Amplifying the accessibility of personal information

20
Q

Describe Blackmail (Daniel Solove’s Taxonomy of Privacy)

A

Threatening to disclose personal information

21
Q

Describe Appropriation (Daniel Solove’s Taxonomy of Privacy)

A

Using an individual’s identity to serve the aims and interests of another

22
Q

Describe Distortion (Daniel Solove’s Taxonomy of Privacy)

A

Disseminating false or misleading information about an individual

23
Q

Describe Intrusion (Daniel Solove’s Taxonomy of Privacy)

A

Disturbing an individual’s tranquility or solitude

24
Q

Describe Decisional Interference (Daniel Solove’s Taxonomy of Privacy)

A

Intruding into an individual’s decision regarding their private affairs

25
Q

What are Ryan Calo’s 2 dimensions of privacy harm

A

Objective

Subjective

26
Q

Describe an objective harm (Ryan Calo)

A

Measurable and observable harm, wherein a person’s privacy has been violated and a direct harm is known to exist

27
Q

Describe a subjective harm (Ryan Calo)

A

Exists without an observable or measurable harm, but where an expectation or perception of harm exists

28
Q

How are privacy risks measured?

A

Likelihood and impact

29
Q

What are some common non-malicious insider threats?

A
Weak security policies
Insufficient training
Mistakes
Ineffective controls
Carelessness
30
Q

List the 8 principles included in the OECD international standard for privacy

A
Collection Limitation
Accountability 
Data Quality
Individual Participation
Security Safeguards
Openness
Use Limitation
Purpose Specification
31
Q

Describe the Collection Limitation principle (OECD international standard for privacy)

A

There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and where appropriate, with the knowledge or consent of the data subject

32
Q

Describe the Data Quality principle (OECD international standard for privacy)

A

Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date

33
Q

Describe the Purpose Specification principle (OECD international standard for privacy)

A

The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use should be limited to the fulfillment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose

34
Q

Describe Use Limitation principle (OECD international standard for privacy)

A

Personal data should not be disclosed, made available or otherwise used for purposes other than those specified, except: (a) with the consent of the data subject; or (b) by the authority of law

35
Q

Describe Security Safeguards principle (OECD international standard for privacy)

A

Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorized access, destruction, use, modification or disclosure of data

36
Q

Describe Openness principle (OECD international standard for privacy)

A

There should be a general policy of openness about developments, practices and policies with respect to personal data - Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller

37
Q

Describe Individual Participation principle (OECD international standard for privacy)

A

An individual should have the right:

(a) to obtain from a data controller, or otherwise, confirmation of whether or not the data controller has data relating to him;
(b) to have communicated to him, data relating to him within a reasonable time; at a charge, if any, that is not excessive; in a reasonable manner; and in a form that is readily intelligible to him;
(c) to be given reasons if a request made under subparagraphs (a) and (b) is denied, and to be able to challenge such denial; and
(d) to challenge data relating to him and, if the challenge is successful to have the data erased, rectified, completed or amended

38
Q

Describe Accountability principle (OECD international standard for privacy)

A

A data controller should be accountable for complying with measures which give effect to the principles stated above

39
Q

Describe first-party data collection

A

When the data subject provides data about themselves directly to the collector

40
Q

Describe third-party data collection

A

When previously collected information is transferred to a third-party

41
Q

What is the difference between active and passive data collection?

A

Active data collection occurs when a data subject is aware of the collection
Passive data collection occurs when a data subject is unaware

42
Q

How is explicit consent obtained?

A

The individual is required to expressly act to communicate consent (checking a box, clicking a button, responding to an email, etc.)

43
Q

How is passive or implied consent generally obtained?

A

By including a conspicuous link to a privacy notice that describes the collection activities - no actions are taken by the IT system to engage the individual with the notice
Use of the system is assumed to imply consent

44
Q

What is bounded rationality?

A

The idea that rationality is limited when individuals make decisions

45
Q

What type of privacy threat is behavioural advertising according to Daniel Solove?

A

Intrusion
Decisional interference
Self-representation

46
Q

What type of privacy threat is cyberbullying according to Daniel Solove?

A

Intrusion
Decisional interference
Self-representation

47
Q

What type of privacy threat is social engineering according to Daniel Solove?

A

Self-representation