Chapter 3: Violations Flashcards

1
Q

Solove’s Taxonomy of Privacy

A

1) Information Collection
2) Information Processing
3) Information Dissemination

4) Invasions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Collection Violations (2)

A
  1. Surveillance
  2. Interrogation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information Processing Violations (5)

A
  1. Aggregation
  2. Insecurity
  3. Identification
  4. Secondary Use
  5. Exclusion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information Dissemination Violations (7)

A
  1. Breach of Confidentiality
  2. Disclosure
  3. Exposure
  4. Increased Accessibility
  5. Blackmail
  6. Appropriation
  7. Distortion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Invasion - Privacy Violations (2)

A
  1. Intrusion
  2. Decisional Interference
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information Collection - Surveillance

A

Watching, listening to, or recording of an individual’s activities.

  1. Tracking mouse movements around a webpage
  2. Security cameras in a store
  3. Recording user app activity in mobile phone
  4. Tracking GPS locations of a fitness application user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information Collection - Interrogation

A

Questioning or probing individuals for personal information.

  1. Asking a female job candidate if she’s pregnant
  2. Nudging social media users to complete their profiles
  3. Probing for sensitive sources of income, such as alimony or child support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information Processing - Aggregation

A

Combining of various pieces of personal information

  1. Aggregating a user’s searches to better interpret interests
  2. Aggregating shoppers’ purchasing habits
  3. Aggregating patients’ doctor visits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information Collection - Insecurity

A

Carelessness in protecting information from leaks in improper access

  1. A web developer allowing web visitors to see customer records
  2. A company hiring an unlicensed individual with a criminal record to handle customer sensitive data
  3. A company’s developer accidentally uploading company creds on Github
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information Processing - Identification

A

Linking of information to a particular individual.

  1. Using computer device fingerprinting to tie a person to other websites or apps that do not require fingerprinting.
  2. Correlating timestamps in 2 databases, one that has been “anonymized” and the other not to re-identify individuals.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Information Processing - Secondary Use

A

Using personal information for a purpose other than for which it was collected.

  1. A company sends spam emails about all their product after you ordered 1 product.
  2. WhatsApp sharing your name and phone number to Facebook so businesses can advertise you.
  3. Facebook using phone numbers provided for two-factor authentication to spam users to use their platform.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Information Processing - Exclusion

A

Failing to let an individual know about the data that others have about them or participate in its handling or use.

  1. Using information about previous calls to constantly kick “Problem callers” to the back of the queue without them knowing
  2. Denying services or products based on information about customers without them knowing or giving them the ability to dispute it, e.g. denying a mortgage loan because of ethnicity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Invasions - Intrusion

A

Disturbing an individual’s tranquillity or solitude.

  1. A game that invites people to go to individuals’ houses without the owners’ permission.
  2. Email spam.
  3. A political surveyor calling at 6 p.m. while you’re trying to have dinner.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Invasion - Decisional Interference

A

Intruding into an individual’s decision making regarding their private affairs.

  1. A government dictating family planning decisions.
  2. Hackers/ other countries interfering in a country’s presidential elections.
  3. A payment processor preventing a user from spending money on certain products or services on moral grounds.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Information Dissemination - Breach of Confidentiality

A

Breaking a promise to keep an individual’s information confidential

  1. Disclosure of a patient’s HIV condition in a lawsuit for an unpaid bill.
  2. Doctors releasing patient information that might change how they are treated or their credibility in a court case.
  3. Banks divulging a customer’s financial information to law enforcement without following a legally proscribed process (court order, subpoena)
  4. Requesting your medical records and instead of receiving the medical records for someone with the same name.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information Dissemination - Disclosure

A

Revealing truthful information about an individual that impacts their security or the way others judge their character.

  1. Newspapers disclosing an individual’s private sexual preferences.
  2. Criminals purchasing information/addresses of domestic abuse victims
  3. Crime witness’s identities being revealed.
17
Q

Information Dissemination - Exposure

A

Revealing an individual’s nudity, grief or bodily functions.

  1. Photos of a mother grieving about a school shooting
  2. Newspaper posting pictures featuring a celebrity doing private matters in their home.
  3. Posting mature content of ex-significant others that they wouldn’t be comfortable going public.
18
Q

Information Dissemination - Increased Accessibility

A

Amplifying the accessibility of personal information

  1. Court records being put online and in searchable format.
  2. Social media accounts that include GPS meta-tag information posted photos
  3. Webcams from public locations being broadcast on the internet.
19
Q

Information Dissemination - Blackmail

A

Threatening to disclose personal information.

  1. Charging customers to delete their accounts.
  2. Recording an individual in unlawful acts to try to persuade them not to continue with the case.
  3. Threatening to disclose a celeb’s use of drugs to obtain money
20
Q

Information Dissemination - Appropriation

A

Using an individual’s identity to serve the aims and meaning of another.

  1. An individual creating a book using your life as a reference.
  2. A magazine using your image to increase their sales.
  3. A plastic surgery office using your before and after pictures without your consent to promote their servicers.
21
Q

Information Dissemination - Distortion

A
22
Q

Privacy Dark Patterns

A

Recurring solution that is used to trick individuals into giving up their privacy.

23
Q

Privacy Dark Patterns (8)

A

Privacy Zuckering

Bad Defaults

Forced Registrations

Immortal Accounts

Address Book Leeching

Shadow Profiles

Information Milking

24
Q

Privacy Zuckering

A

Making changing the default privacy settings difficult

25
Q

Bad Defaults

A

Default option in a system encourage or ease the sharing of personal info

26
Q

Forced Registration

A

One is forced to register for an account to use part of the functionality a service though the registration is technically unnecessary

27
Q

Immortal Accounts

A

Service provider prevents or complicate the deletion of user accounts.

28
Q

Hidden Stipulations

A

T&C hide malicious stipulations

29
Q

Address Book Leeching

A

A service provider urges a user to upload their contacts to provide a certain service function.

30
Q

Shadow Profiles

A

Creating hidden profiles of non-users or hidden profiles of users

31
Q

Information Milking

A

A webpage is requesting more information than necessary for providing a service.

32
Q
A