Chapter 2: Engineering and Privacy Flashcards
What is the role of Project Managers in the Privacy ecosystem?
Ensure that adequate resources are available and that team members communicate effectively
What is the role of Marketing and Sales in the Privacy ecosystem?
Work with customers to establish new requirements
What is the role of Lawyers in the Privacy ecosystem?
Track regulatory issues
What is the role of Requirements Engineers in the Privacy ecosystem?
Collect, analyze and manage requirements
What is the role of Designers in the Privacy ecosystem?
Translate software requirements into an architecture or design
What is the role of Programmers in the Privacy ecosystem?
Translate software design into source code
What is the role of Testers in the Privacy ecosystem?
Validate that the software conforms to the requirements
What is the role of Users in the Privacy ecosystem?
Operate or interact with the software
What is the role of Administrators in the Privacy ecosystem?
Install and maintain the software
What is the role of the Privacy Engineer in the Privacy ecosystem?
Is the Privacy Area Specialist
Serves as a repository of knowledge and works to tailor this knowledge for the different stakeholders
What are the responsibilities of the Privacy Engineer in the Privacy ecosystem?
Collect critical regulatory requirements from lawyers
Validate that marketing requirements are consistent with laws and social norms
Meet with designers to discuss best practices when translating requirements into design specifications
Collect user feedback and monitor privacy blogs, mailing lists and newspapers for new privacy incidents
Develop a community of practice
Name the 6 activities of software developers (regardless of the process used)
Requirements Engineering Design Implementation Testing Deployment Maintenance
Name 2 privacy lifecycle models
Privacy Management Reference Model (PMRM)
PReparing Industry to Privacy-by-design by supporting its Application in REsearch (PRIPARE)
Name 2 privacy risk assessment methods
LINDDUN threat modeling method
Privacy Risk Assessment Methodology (PRAM)
What is a Defect in software engineering?
A flaw in the requirements, design or implementation that can lead to a fault
What is a Fault in software engineering?
An incorrect step, process or data definition in a computer program
What is an Error in software engineering?
The difference between a computed, observed or measured value or condition and the true, specified or theoretically correct value or condition
What is a Failure in software engineering?
The inability of a system or component to perform its required functions within specified performance requirements
What is a Harm in software engineering?
The actual or potential ill effect or danger to an individual’s personal privacy, sometimes called a hazard
What is a Functional Violation of Privacy?
When a system cannot perform a necessary function to ensure individual privacy
Provide an example of a Functional Violation of Privacy
When PI is disclosed to an unauthorized third party
Defect: lines of computer code that do not correctly check that an access attempt is properly authorized
Fault: the execution of that source code
Error: unauthorized access
Failure: unauthorized third party access
Define the term Risk
A potential adverse impact along with the likelihood that this impact will occur
How are risks calculated?
Probability x impact
What are the 4 ways of managing risk?
Accept
Transfer
Mitigate
Avoid
Provide an example of transferring a risk
Property insurance
Provide an example of mitigating a risk
Requiring users to log into a system
Provide an example of avoiding a risk
Abandoning the functionality, data use or the entire system
Name 6 privacy risk models
Compliance model
Fair Information Practice Principles (FIPPs)
Calo’s subjective/objective dichotomy
Solove’s taxonomy of privacy problems
Nissenbaum’s contextual integrity heuristic
NIST privacy risk model
Describe the Compliance privacy risk model
Based on applicable legal and policies - model relies on examining elements of the system to identify deficiencies
Describe the Fair Information Practice Principles (FIPPs) privacy risk model
Model relies on aligning with requirements described in FIPPs - often dovetail with the compliance model
Describe the Subjective/Objective Dichotomy privacy risk model
Relies on assessing the potential for subjective and objective harm - an analyst may examine elements of the system that relate to individuals’ expectations of how their information may be used, actual usage and consent or lack thereof to the collection and use of that information
Describe NIST’s privacy risk model
Vulnerabilities are problematic data actions that describe system behaviors with privacy implications that create the potential for adverse event
Problematic data actions result in one or many problems for individuals
List NIST’s catalog of 7 problematic data actions (NIST privacy risk model)
Appropriation Distortion Induced disclosure Insecurity Surveillance Unanticipated revelation Unwarranted restriction
Describe the Appropriation problematic data action in the NIST privacy risk model
Use of PI in ways beyond what is expected or authorized by the individual
Describe the Distortion problematic data action in the NIST privacy risk model
Use or dissemination of inaccurate or misleading PI
Describe the Induced disclosure problematic data action in the NIST privacy risk model
When individuals are pressured to provide PI
Describe the Insecurity problematic data action in the NIST privacy risk model
Involves lapses in data security
Describe the Surveillance problematic data action in the NIST privacy risk model
When PI is tracked or monitored out of proportion to system objectives
Describe the Unanticipated revelation problematic data action in the NIST privacy risk model
Unexpected exposure of facets of an individual as a result of processing
Describe the Unwarranted restriction problematic data action in the NIST privacy risk model
Imposition of unjustified constraints on individuals regarding access to the system and its information as it relates to them
List NIST’s catalog of 8 problems for individuals (NIST privacy risk model)
Loss of autonomy Exclusion Loss of liberty Physical harm Stigmatization Power imbalance Loss of trust Economic loss
Describe the Loss of autonomy problem for individuals in the NIST privacy risk model
Self-imposed restrictions on behaviour