CIPT Flashcards

1
Q

Risk is defined as a potential threat or issue, along with the impact the threat or issue could cause, and the likelihood that it will occur.

Analysts make use of privacy risk models to help them identify and align threats with the system’s vulnerabilities to mitigate and plan for these risks. Risk options can include:

A
  1. accepting the risk as is;


2. transferring the risk to another entity; 


  1. mitigating the risk by applying an appropriate control or design change;


4.avoiding the risk via abandoning a functionality, data or the system itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some privacy risk models :
Risk models define the risk factors to be assessed and the relationships among those factors.

Risk factors are inputs to determining levels of risk.

A

a. Nissenbaum’s Contextual Integrity
b. Calo’s Harms Dimensions
c. Legal Compliance
d. FIPPs
e. NIST/NICE frameworks
f. FAIR (Factors Analysis in Information Risk)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain Nissenbaum’s Contextual Integrity:

provide an example

A

Privacy can be expressed as norms that should govern information access. Norms are domain specific; for example, the norms governing banking information will differ from the norms governing medical information. In addition, norms are context specific, such that each individual can have their own reasons for controlling access to their information in specific situations based on their own expectations, which govern those situations.2 This viewpoint presents a challenge to IT professionals: how to identify relevant norms and preserve norms when they introduce new or changing technology?
Consider the following illustrates the concept of contextual integrity.
Actors: The senders and receivers of personal information Attributes: The types of information being shared
Transmission principles: Those that govern the flow of information

Example: A patient visits a doctor with complaints (actors) and an x-ray is taken to determine the cause of their discomfort (attribute). The doctor shares results with a specialist to determine a course of action (transmission).
When disruptions from the informational norms occur, privacy problems arise. if the doctor were to communicate treatment options via postal mail, to either the patient’s home or work address, it could cause potential risks to privacy and the norms that govern a patient-doctor relationship, since the mail from the specialist could give away information about the type of ailment the individual may have (for example, if the envelope showed a return address for a cancer center).
One of the challenges for privacy technologists when considering context is that these norms do not generally have a preexisting reference point for privacy risks. Privacy technologists must work with organizations to identify relevant, existing norms and then determine how a system may disrupt those norms. Interpreting and designing for vulnerabilities is particularly crucial when new technology is introduced or when existing programs and practices are modified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain: Calo’s Harms Dimensions

A

Two dimensions of privacy harm: objective and subjective. Objective harm occurs when privacy has been violated and direct harm is known to exist. It involves the forced or unanticipated use of personal information and is generally measurable and observable.
Subjective harm exists when an individual expects or perceives harm, even if the harm is not observable or measurable. An individual’s perception of privacy invasion can cause fear, anxiety and even embarrassment.
Subjective privacy harms amount to discomfort and other negative feelings, while objective privacy harms involve actual adverse consequences.

example of these dimensions.

Consider a hypothetical situation where there was a large breach of personal financial information. Those individuals whose identities were stolen or whose credit was damaged by hackers are victims of objective harm (direct harm is known to exist). However, the individuals who did not experience a direct harm (there is no evidence that their personal information was lost or used by hackers) might still experience subjective harm due to their concern that they might have been impacted by the breach or because of the amount of time and money spent freezing their credit accounts and paying for credit monitoring.

To assess the potential for subjective and objective harm, a privacy technologist may examine elements of the system that relate to individuals’ expectations of how their information may be used, actual usage—including surveillance or tracking—and consent or lack thereof to the collection and use of that information. Clear privacy notices and controls can and should be used to build and retain individuals’ trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain Legal Compliance

A

Statutory and regulatory mandates prescribe aspects of systems that handle personal information. This includes the type of data collected, what the system does with that data, and how the data is protected, stored, and disposed of. To ensure compliance, both business process and system owners must understand the specific obligations and prohibitions their organizations are subject to and must work with their system design teams to relay those requirements, as well as identify and address any threats and vulnerabilities associated with the technologies that will be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the .FIPPs

A

d.FIPPs

Fair Information Practice Principles (also referred to as FIPPs) are a set of long-standing privacy values that exist in various forms globally. FIPPs work alongside compliance models to mandate: notice, choice, and consent; access to information; controls on information; and how information is managed. Many organizations around the world have adopted the FIPPs in their privacy risk management recommendations.
FIPPs are a high-level abstraction of privacy compared to legal and policy structures that are more specific. How the FIPPs are addressed varies based on the nature of the system, product, service, or process. Interpretation is necessary to determine how they should be applied when designing, building and operating a system. To illustrate this, one common principle is to restrict the collection, use and sharing of information to only that which is necessary to meet the purpose of a system. For example, when a medical provider and a payment processor need to share information for billing purposes, they may need to share an individual’s name and mailing address, but not the doctor’s notes from the patient visit.

The Collection Limitation Principle. There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject.

(2) The Data Quality Principle. Personal data should be relevant to the purposes for which they are to be used and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date.
(3) The Purpose Specification Principle. The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfillment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose.
(4) The Use Limitation Principle. Personal data should not be disclosed, made available or otherwise used for purposes other than those specified, except a) with the consent of the data subject, or b) by the authority of law.
(5) The Security Safeguards Principle. Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorized access, destruction, use, modification or disclosure of data.
(6) The Openness Principle. There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data and the main purposes of their use, as well as the identity and usual residence of the data controller.

(7) The Individual Participation Principle. An individual should have the right:
a) to obtain from a data controller, or otherwise, confirmation of whether or not the data controller has data relating to him;
b) to have data relating to him communicated to him, within a reasonable time, at a charge, if any, that is not excessive; in a reasonable manner, and in a form that is readily intelligible to him;
c) to be given reasons if a request made under subparagraphs (a) and (b) is denied and to be able to challenge such denial; and
d) to challenge data relating to him and, if the challenge is successful, to have the data erased, rectified, completed or amended;
(8) The Accountability Principle. A data controller should be accountable for complying with measures which give effect to the principles stated above.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the NIST/NICE frameworks

A

The National Institute of Standards and Technology (NIST) provides standards, guidelines and best practices for managing cybersecurity-related risks, including the Risk Management Framework, the Cybersecurity Framework, and the Privacy Framework. The NIST Privacy Framework is a voluntary risk management tool alongside the NIST Cybersecurity Framework. The NIST Privacy Framework is intended to assist organizations in communicating and organizing privacy risk, as well as rationalizing privacy to build or evaluate a privacy governance program.

The National Initiative for Cybersecurity Education’s Cybersecurity Workforce Framework (NICE Framework) is a nationally-focused resource published by NIST, which categorizes and describes cybersecurity work. The NICE Framework establishes common terminology to describe cybersecurity work and is intended to be applied in all sectors (public, private and academic).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is . FAIR (Factors Analysis in Information Risk)

A

The Factors Analysis in Information Risk (FAIR) model breaks down risk by its constituent parts, then further breaks down those parts to find factors that estimate the overall risk. The goal is not to completely eliminate risk, but rather to build a logical and defensible range of potential risk. FAIR constructs a basic framework that breaks risk into the frequency of action and magnitude of the violations. It asks, how often will a violation occur and over what period of time? And what impact will that violation have?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

wha is Privacy by Design and its principles

A

Principle 1: Proactive, Not Reactive; Preventative, Not Remedial
Privacy protection must be a forethought in any technology system, product, process or service development. Making privacy a consideration in the design phase—instead of reacting to privacy harms as they arise in the future—helps to mitigate potential privacy risks and violations. Thinking about privacy when designing a system, product, service or process helps practitioners design these things with privacy considerations built in instead of trying to figure out how to address them in a design that may be less flexible when privacy is considered later.

Principle 2: Privacy as the Default Setting
When personal information is used beyond or outside of the scope of what an individual expects, their privacy is in danger of being violated. Individuals should not be solely responsible for protecting their privacy; the default of a technology ecosystem should be that of preserving individuals’ privacy. privacy should be achieved automatically without the individual having to take explicit action. For example, many systems incorporate an opt-in feature for users to consent to future contact by an organization before the user provides any personal information. This is considered a privacy-friendly alternative to the opt-out selection, which indicates an assumption to intrude unless the user takes action, like unchecking a box.

Principle 3: Privacy Embedded into Design
Privacy should be embedded into the design and architecture of technology systems and business practices such that a system cannot operate without privacy-preserving functionality. This principle suggests that privacy is not only included in the design of a program but is integral to the design. Privacy technologists may employ mechanisms such as designing online forms to collect data in a structured format to prevent the collection of irrelevant personal information, using system logging capabilities to record access and changes to personal information, or encryption for instant messenger programs—all examples of privacy embedded into design.
Principle 4: Full Functionality — Positive Sum, Not Zero Sum
Privacy-enhancing technologies are not a trade-off for other parts of a system, but rather a synergistic win-win relationship.

Principle 5: End-to-End security — Full Life Cycle Protection
Consideration of personal information at every stage in the data life cycle—collecting, processing, storing, sharing and destroying—is essential in any system design. By assessing the potential privacy risks associated with each stage of the information life cycle, appropriate security measures can be evaluated and implemented to mitigate these risks.

Principle 6: Visibility and Transparency — Keep it Open
Since the 1970s, providing notice to individuals regarding the use of their personal information has been a cornerstone of privacy. Information that communicates how the organization uses, shares, stores and deletes personal information should not be misleading, confusing or obscured.

Principle 7: Respect for User Privacy; Keep it User Centric
The individual is the principal beneficiary of privacy and the one affected when it is violated. Privacy technologists and organizations should keep individuals’ needs, and the risks to them, at the forefront when developing data ecosystems. Designing for privacy while respecting the best interest of the individual is imperative in maintaining a balance of power between the individual and the organization that holds their personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is value sensitive design and how design effects users

A

Value-sensitive design is a design approach that accounts for moral and ethical values and should be considered when assessing the overall “value” of a design.

In addition to privacy, these values might include things such as trust, fairness, informed consent, courtesy or freedom from bias.

Value-sensitive design methods help to systematically assess the values at play in relation to specific technologies and respective stakeholders. It then assesses how the technology might meet or violate those values and strives to iteratively develop designs that are sensitive to and respectful of those values. The goal of value-sensitive design is that stakeholders should see their values reflected in the final design.

How design affects users

Value-sensitive design emphasizes the ethical values of both direct and indirect stakeholders.

Direct stakeholders are those who directly interact with a system.

Indirect stakeholders are any others who are affected by the system.

For example, a mail order company’s database system might be used by its customer service representatives and the inventory control, billing, and packing and shipping departments, all of whom would be considered direct stakeholders. The customers would be indirect stakeholders, even though it is their personal information that is contained in the database records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Value-sensitive design is an iterative process which involves conceptual, empirical and technical investigations. please elaborate

A

Conceptual. The conceptual investigation identifies the direct and indirect stakeholders, attempts to establish what those stakeholders might value, and determines how those stakeholders may be affected by the design.

Empirical. The empirical investigation focuses on how stakeholders configure, use, or are otherwise affected by the technology.

Technical. The technical investigation examines how the existing technology supports or hinders human values and how the technology might be designed to support the values identified in the conceptual investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Value-sensitive design methods
Value-sensitive design focuses not just on the design of technology but also on the co- evolution of technologies and social structures. In the case of privacy, this means considering the interplay of technological solutions, regulatory solutions, and organizational solutions when trying to resolve identified value tensions.

In their book, A Survey of Value-sensitive Design Methods, Batya Friedman, David Hendry and Alan Borning have identified 14 targeted design methods for engaging values in the context of technology, including:

A

Direct and indirect stakeholder analysis, during which direct and indirect stakeholders, as well as any potential benefits, harms or tensions that may affect them, are identified;

Value source analysis, wherein project, designer and stakeholder values are assessed and the ways in which each group’s values may be in conflict are considered;
The co-evolution of technology and social structure, which strives to engage both technology and social structure in the design space with a goal of identifying new solutions that might not be apparent when considering either alone;

Value scenarios, which are used to generate narratives, or scenarios, to identify, communicate or illustrate the impact of design choices on stakeholders and their values;

Value sketches, which make use of sketches, collages or other visual aids to elicit values from stakeholders;
Value-oriented semi-structured interviews, which use interview questions to elicit information about values and value tensions;

Scalable information dimensions, which is a values-elicitation method that uses questions to determine the scalable dimensions of information such as proximity, pervasiveness or granularity of information;

Value-oriented coding manuals, which are used to code and then analyze qualitative information gathered through one of the other methods;

Value-oriented mock-ups, prototypes, or field deployments, which can be used to elicit feedback on potential solutions or features of new technologies or systems that are still in development;

Ethnographically-informed inquiries regarding values and technology, which examine the relationships between values, technology and social structures as they evolve over time;

The model of informed consent online, which provides design principles and a value analysis method for considering informed consent in online contexts;

Value dams and flows, which are ways of both identifying design options that are unacceptable to most stakeholders (the value “dams”), and removing them from the design space, while also identifying value “flows,” which are those design options that are liked by most stakeholders;

The value-sensitive action reflection model, which uses prompts to encourage stakeholders to generate or reflect on design ideas; and,

Envisioning CardsTM, that are a set of cards developed by Friedman and her colleagues, which can be used to facilitate many of the other methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the Design Thinking process

A
The Design Thinking process
When considering value-sensitive design methods, it is important to indicate the relevance to the “Design Thinking process”. The Design Thinking process has five phases:
 Empathize,
 Define,
 Ideate, 
Prototype
 Test, 

and it also follows an iterative approach. Combining the value-sensitive design methods with a process such as this is important to understanding the integration of values with current system design methodologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the data life cycle

A

The data life cycle refers to how data flows through an organization, including business processes and technology systems.

The components of the data life cycle—collection, use, disclosure, retention and destruction— are intended to be generic and adaptable to different situations.

The data life cycle is shaped by the privacy objectives and business practices of an organization.

The organization must specify the purpose for which information will be collected and used, and maintain consistency with how it is managed between actual practices and stated practices throughout the data life cycle.

The challenge for privacy technologists is in helping their organization develop a data ecosystem that has the capability to evolve with an organization’s shifting purposes and business needs and which is designed to maximize how information is utilized while minimizing privacy risk.

Another challenge for IT professionals is that the users of the data determine the purposes, and these purposes will evolve as the organization evolves their business practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

4 types of data collection

A

(1) first-party collection, when the data subject provides data about themselves directly to the collector, e.g., in a web-based form that is only submitted when the data subject clicks a button;
(2) surveillance, when the collector observes data streams produced by the data subject without interfering with the subject’s normal behavior;
(3) repurposing, which occurs when the previously collected data is now assigned to be used for a different purpose, e.g., reusing a customer’s shipping address for marketing and
(4) third-party collection, when previously collected information is transferred to a third-party to enable a new data collection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

explain active and passive collection give examples

A

active, which occurs when a data subject is aware of the collection, or

passive, when the data subject is unaware.

Examples of explicit consent include the following:
Clicking a checkbox that appears alongside the collection disclosure statement in a web-based or other data-entry form, e.g., “By clicking this checkbox, you agree to allow us to collect…”
Clicking a button to acknowledge the receipt of a privacy notice, which may be displayed above the button or made obtainable through an additional step, such as a hyperlink or file download, e.g., “By clicking this button, you agree to the terms and conditions stated in…”
Responding to an automatically generated email or other type of private communication to indicate receipt of the privacy notice, e.g., “This notice was sent to you by email because…” and “Please click the link in this email to acknowledge…”

Passive or implied consent is generally obtained by including a conspicuous link to a privacy notice that describes the collection activities. These links may appear at the foot of a web page, for example, or embedded in installation instructions or a user manual. However, no actions are taken by the IT system to engage the individual with the notice; instead, use of the system is assumed to imply consent.

The extent to which the data subject obtains the privacy notice and infers the specific types of collections taking place determines whether the collection is overt.

For example, a privacy notice may state that collections are performed for marketing purposes (e.g., to enable third-party collection by a marketing service). Such general purposes may not lead a data subject to believe they would be the subject of online behavioral advertising through this type of collection. If collection disclosure statements are intentionally or unintentionally vague, the collection may reasonably be viewed as covert when the data subject cannot anticipate the scope of collection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IT professionals should ensure that the purposes for which data is collected trace to appropriate uses and disclosures of that data throughout their information system.

what is repurposing give example

A

The act of repurposing occurs when data is collected for one purpose and then used for an entirely different purpose.

This can be a source of privacy harms to the individual and may be illegal under some regulatory frameworks.

Examples include collecting airline passenger data directly from passengers to schedule airline travel and then reusing this information to develop a terrorist threat detection system or, alternatively, collecting a mobile user’s location to provide a route between two locations and then reusing repeated location samples to develop general profiles of traffic patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

explain Disclosure and privacy notices

A

An organization that collects personal information should have a privacy notice in place.

A privacy notice is a statement made to data subjects that describes how an organization collects, uses, retains and discloses personal information. Notices should also indicate what information will be collected.

A privacy notice may also be referred to as a privacy statement, a fair processing statement, or, sometimes, a privacy policy, although the term privacy policy is more commonly used to refer to the internal statement that governs an organization or entity’s handling of personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

retention and Offline storage

A

Data stored online can take up valuable network resources, so offline storage may make sense. Storing data off premises can guard against organizational data loss should a building be destroyed or there is a persistent power outage. Although there are advantages to storing data offline or off premises, these choices are not without risks, especially when sensitive data is involved. Risks and benefits should be weighed when deciding whether, and when, to move data off-network or off-site. Once the decision has been made to move data to offline data storage, the privacy risks associated with it may change and should be assessed to determine whether and how protections should change. For example, sensitive personal information may require encryption during transfer and offline storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

explain retention give an example

A

Data should be retained only as long as it is reasonably necessary and in compliance with legal and regulatory requirements as well as applicable standards. If new uses for collected information arise and thus require longer retention periods, some jurisdictions require data subjects to be notified, issued a new privacy notice, or in some cases, given an opportunity to update their consent. Regardless of whether or not this is mandated by law, it is good practice to ensure that individuals are aware of any changes to original policy notices or privacy expectations.

  • IT professionals should consider how long data is retained by their system and, when retention is no longer needed, how they choose to destroy the data.

Data may be retained to fulfill ongoing business needs or legal obligations.

For example, an airline must retain consumer travel information for their bookings at least until the traveler has completed their flight; however, this information may be retained longer to comply with government regulations, to fulfill the internal requirements of customer loyalty programs, to profile their customers for marketing purposes or to offer their customers improved services. However, this data may eventually have limited value to any of the company’s existing practices, at which point, the company may consider destroying the data to reduce the risks associated with retaining the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

explain Destruction

A

Privacy technologists should work with their organization to determine when and how data will be destroyed, as there are risks with retaining unnecessary data or keeping data longer than permitted, as well as risks in deleting information prematurely.

The sensitivity of information informs the strength of destruction method that should be used.

A destruction plan should be applied to an organization’s records management plan to ensure the proper removal of data.

Simply stating that the data should be destroyed is not always sufficient.

There should be clear guidelines on how to destroy the data based on its type. To aid in the destruction of expired files, a custom attribute such as “Retention Period” can be added to the Properties dialog of the files.

Once the custom attribute has been added, it is easier to retrieve the file to determine when it needs to be destroyed.

It is also possible to automate enforcement of retention schedules, such as by periodically running a program that reads the “Retention Period” value from the file and deletes the file once the retention period has passed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Digital content: potential issues that impact data destruction.

A

Disks should be appropriately formatted before use to ensure that all data placed on them eventually can be deleted. Hard drives, tapes and other magnetic media will need to be degaussed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hard copy: potential issues that impact data destruction.

A

Hard copy: The primary challenge with “hard copy” documents, such as paper records, lies in determining what documents need to be destroyed and when. Established policies and guidelines should be put in place that also include who will be responsible for the documents’ destruction, how the

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Portable media: potential issues that impact data destruction.

A

Portable media, such as CDs, DVDs and flash drives, have unique challenges precisely because they are portable and therefore harder to regulate, monitor and track. It may be more difficult to enforce deletion policies, and employees need to be trained on their appropriate use, including receiving regular reminders about established use and deletion policies. ROMs, CDs, DVDs and other “WORM” (write once, read many) media will need to be physically, and possibly professionally, destroyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Explain privacy noticed provide examples

A

privacy notice is an external instrument that informs consumers, suppliers, business partners and individuals about the organization’s information privacy practices, values and commitments.

Organizations must determine when to notify users of their agreement, for example, as soon as one enters the website, or prior to the collection of any personal information.
Additionally, organizations can communicate these notices using different methods depending on the type of information or services they are providing.

Examples include requiring users to check a box indicating agreement to the privacy notice before entering the site or purchasing a product, or simply posting a conspicuous link to the privacy notice on the website.

Prior to design, organizations must be aware of any legal and industry requirements regarding privacy notices as well as consumers’ expectations of the handling of their personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Explain Organization internal privacy policies

A

privacy policies are internal statements designed to communicate best privacy practices and what information handling guidelines to follow, and when, for those within an organization.

Policies address privacy and security, data management and data loss prevention.

Privacy policies should be documented, easily accessible, and kept up-to-date, and all employees should be familiar with them.
It is also important that these policies are endorsed and enforced by management and executives of the company.
Designing internal policies is an integral part of preventing the loss or misuse of sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Explain Organization security policies

A

Adequate privacy protection of personal information is contingent on the quality of an internal security policy.
A well-functioning internal security policy prevents unauthorized or unnecessary access to corporate data or resources, including intellectual property, financial data and personal information.
Physical security measures, such as locks, safes, cameras and fences offer further protections from both internal and external threats.
Organizations should consider going beyond their minimal requirements for security, as consumer expectations dictate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Ways in which measures are put in place to secure data.

A

Data classification policies:
Data schema
Data retention
Data deletion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a Data schema:

A

Data schema: A data schema is used to separate customer information. It formulates all the constraints to be applied on the data, defines its entities and the relationships among them. Access to database schemas are only available to those who need to see the information. For example, purchase history can be separated from personal information. Access to personal information may require a specific customer ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is Data retention:

A

Laws and regulations may require data to be stored for a specific amount of time. Establish data retention schedules early in the system development life cycle. Remove data on a periodic basis when older data is no longer of use toward a business’s objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

what is Data deletion:

A

When data is no longer needed, remove data and any derivatives from the system, ensuring that recovery methods are also removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Explain the need for contracts, agreements

A

When collected data is shared with third-party vendors, it should be handled in accordance with the commitments made to the data subject and data owner regardless of where their personal information is located or how it is used.

Third-party contracts should be detailed with clear expectations of how data is to be managed while in their possession as well as the roles and responsibilities of vendors.

Often organizations have obligations to specific compliance regulations that must be included in third-party contracts.

It should also be made clear that the organization can perform audits on third-party vendors to ensure compliance.

Penalties for breach of contract by a third-party vendor or contractor should sufficiently compensate the organization for any negative repercussions that a breach would cause.

Risk analysis can assess the vulnerabilities of personal information that is in the hands of third parties and can inform privacy technologists on what actions need to be performed in an effort to mitigate these vulnerabilities and threats.

Implementing controls such as separating collected data according to who is processing it, using data schemas, or requiring acceptance of enforcement policies when data is located in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Explain Common IT Frameworks (COBIT, ITIL, etc

A

Security is about protecting data against unauthorized access and malicious action, where privacy is about enforcing the appropriate use of the data within a secure environment. It addresses all ways that data is handled, including collection, use, sharing, maintenance and retention. Privacy professionals also address risk management.

Security and privacy both rely on similar controls and technological capabilities.

Technology frameworks such as ITIL, Information Technology Infrastructure Library and COBIT, Control Objectives for Information and Related Technology provide service, process and program management to an organization’s technology environment. Because the information organizations collect is stored within technology systems, it is important that they can demonstrate compliance with any laws or regulation that governs them.

ITIL: Governed and owned by AXELOS. Provides an overall measurable view of a technology system, service and functionality. ITIL reports on services provided by the technology system and helps organizations use technology to support change and growth. It has a limited view of risk management.

COBIT: A more comprehensive program that helps with management of a technology system which allows for technology governance. Technology governance focuses on the systems, application and support personnel that manage data within a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are data inventories

A

Keeping an inventory of data, helps to protect privacy adequately.
This means knowing what data is collected, how it is handled, where it is stored, and how it is classified.
Knowledge of data and its characteristics is a key part of the privacy technologist’s job.
Data should be regularly monitored and inventoried, and device upgrades and updates must also be performed as necessary. This includes software updates, security patches or even replacing obsolete technology.
Analyzing and interpreting data so that it can be classified and organized into information categories is an essential step.

Common categories take the form of information assets, physical assets and intellectual property.

Assets are then classified as confidential, internal use or public.

Classifying and categorizing data enables an organization to properly manage and protect the assets in its possession. It can then assign owners to specific classifications of assets.



Information assets:
Physical assets:
Intellectual property:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are Information assets:

A

Customer and employee data as well as backup copies of data stored either on-site or off-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are Physical assets

A

: Servers, workstations, laptops, portable storage devices, backup media, paper files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is Intellectual property:

A

Software code, trade secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

what are the Asset classifications

A

Confidential: Information that should remain secure and private: customer information, employee Social Security numbers, payment account information

Internal use: Business information intended for internal use only: company contact directories, business plans, sales forecasts, proprietary software codes

Public: Information that can be safely shared with the public: physical address, marketing materials, customer service information

39
Q

What is a Pia

A

A privacy impact assessment (PIA) is an analysis of how personal information is handled
throughout the data life cycle within an organization.

A PIA ensures that organizations apply legal, regulatory and policy requirements regarding privacy, assesses privacy risks, and methods of risk mitigation.

A significant goal of performing a PIA is to compel an organization to think about the choices it makes for its processes and how those choices will impact privacy.

Privacy technologists can utilize the findings of a PIA to determine whether privacy risk is appropriately addressed using the privacy policies and procedures.

40
Q

Privacy of information must be considered within both the front and back ends of technological architecture, particularly when confidential information is collected for later use.
Explain

A

The comprehensive overall organizational design of a system, also known as the enterprise architecture is designed to support the objectives of an organization.

It recognizes that there is a relationship between all elements of a system.

This includes servers, data elements, process models and data flow which describe the order of operations and data exchanges as well as the business processes of the organization.

Privacy of information must be considered within both the front and back ends of technological architecture, particularly when confidential information is collected for later use.

Privacy is affected by both viewpoints in different ways.

Privacy technologists must ensure that the front end is useable and notifies the user about the company’s privacy practices, while maintaining that the back-end design applies the privacy principles of the stored information pertaining to what data is collected, how it is used, shared and retained.

Privacy technologists may consider using different architectures to achieve this balance of privacy between the two ends.

41
Q

Explain Client-server architecture:

A

With a client-server architecture, the client refers to a program that runs on a local computer, while the server is a program that runs on a remote computer.

This architecture allows storing data on the client side for the purpose of completing a transaction.
The server side includes back-end services that respond to the client’s requests, and mechanisms can be designed to track client behavior across multiple HTTP requests via cookies. It does not maintain shared data between the client and server.

This type of architecture assumes that the client data is secure, and the storage and surveillance of the data is clear to the user. Otherwise, it poses a privacy threat

42
Q

Explain Service-oriented architecture:

A

Service-oriented architecture is similar to client- server architecture in that it decouples services from the large-scale servers. It allows designers to replicate services across multiple machines.

43
Q

Explain Plug-in-based architecture:

A

Plug-in based architecture extends a user’s experience with a website via the use of an app platform, usually owned by a third party. Apps may have the ability to interact with a user and their data including location or contact information.

Privacy technologists must ensure that privacy notices are clear to prevent misuse of information.

44
Q

Explain Breach/disclosure incident investigations and responses—security and privacy perspectives

A

Incidents do not always result in data breaches, however. An incident is any event that can affect the confidentiality, integrity or availability of the data.

When personally identifiable information is involved, then it is a privacy incident; examples include unauthorized disclosure, sharing or sale of data without consent, denial of service attacks, malware infection, hacking attempts, data exfiltration, lost or stolen devices, and misdirected emails.

Some types of incidents are security incidents, some are privacy incidents, and some are both.

It should also be noted that not all data incidents are personal data incidents.

Proprietary or confidential data breaches are separate from a personal data breach.

While many of the response actions are the same, different legal standards may apply.

Data breaches are caused when the resulting incident has exposed the data to an unauthorized third party.

Privacy technologists should understand the impact of privacy events upon data subjects and an organization’s handling of data subjects’ personal information and use that as input for identifying appropriate privacy technical measures.

Developing an incident response team along with having a breach or incident response plan in place before an incident occurs is one more action an organization can take to be adequately prepared.

45
Q

What are the elements of are the elements of an effective incident response plan.

A
discovery
containment 
Analyze and notify: 
Repercussions:
Prevention: 
Third parties:
46
Q

Explain discovery

A

Discovery: Actively monitoring system activity or suspicious changes to system activity is essential in detecting an incident that could lead to a breach. Monitoring activity on a system could detect tampering before any data is stolen. Users are also another line of defense in the detection of privacy incidents or data breaches, by reporting suspicious activity.

47
Q

Explain containment

A

Containment: A response plan should contain guidance on how to terminate an ongoing incident while preserving any evidence of the affected data and origin of the incident. Containment is key to stopping the threat before more damage is done. Do not wipe system logs. Remove and preserve affected systems from the network. Fully document your investigation and include timestamps while working through an investigation. Finally, a predetermined contingency plan should be executed that allows the organization to continue functioning at some capacity while data or resources are locked down during a privacy incident investigation.

48
Q

Explain when you have to analyze and notify

A

Analyze and notify: For data breaches and other types of privacy incidents, notification laws vary among jurisdictions. To be prepared, an organization should know what their notification obligations are in such an event. Once a privacy incident or a breach has been detected and determined, legal counsel should be involved to advise the response team regarding all legal matters, including notification—to law enforcement, individuals and/or the public.
Some organizations contract with a vendor to provide consumer breach notification services as they are up-to-date on laws surrounding breaches and can provide additional resources as needed.

49
Q

What are repercussions

A

Repercussions: Fines, lawsuits and nonmonetary repercussions often follow privacy incidents or breaches. For example, media coverage of the incident may adversely affect an organization’s reputation, resulting in decreased business and loss of consumer trust. As part of the incident response team, a security analyst would handle an incident from start to finish including reporting to senior management. A privacy technologist would act as a subject matter expert to help diagnose the incident, mitigate the issue and provide information to the security analyst.

50
Q

explain prevention

A

Prevention: Privacy incidents can be used as a learning tool to address holes in security and privacy procedures, review privacy policies to identify weaknesses and train employees as needed.

51
Q

What are third parties

A

Third parties: Personal information in the hands of a third party, still falls under the responsibility of the organization in the event of a breach, including provisions that describe the expectations and obligations of the vendor should an incident occur.

52
Q

explain the Security and privacy in the systems development life cycle (SDLC) process

A
  1. Securely provision:
  2. ) Operate and maintain:
  3. Protect and defend:
  4. ) Investigate:
53
Q

explain security provisions

A

Security provision: This phase encompasses the tasks focused on software development. To accomplish this, privacy technologists will want to utilize a systems development plan to ensure that all phases take place.

below are the phases of systems development.

Planning: Ensures that all security and regulatory and legal privacy requirements are considered.

Design: Chooses the architecture design of the system based on the technology required to meet security and privacy mandates.
Technology research and development: Explores alternatives if existing solutions do not meet those needs.

Testing and evaluation: Ensures that each component of a system meets its requirements.

Risk management: Identifies, documents and manages any risks related to the software quality, compliance with regulations, or security and privacy issues that present themselves within the system.

54
Q

what are phases of systems development.

A

phases of systems development.

Planning: Ensures that all security and regulatory and legal privacy requirements are considered.

Design: Chooses the architecture design of the system based on the technology required to meet security and privacy mandates.
Technology research and development: Explores alternatives if existing solutions do not meet those needs.

Testing and evaluation: Ensures that each component of a system meets its requirements.

Risk management: Identifies, documents and manages any risks related to the software quality, compliance with regulations, or security and privacy issues that present themselves within the system.

55
Q

when do you operate and maintain

A

ensuring that the system is installed and configured correctly initially and throughout its use, is necessary to meet security and privacy goals. Customer service and technical support are employed to further strengthen a system’s security and privacy systems that are in place. Operation and maintenance also encompass data
administration that manage large volumes of sensitive data that may be housed within a system, including analysis of an organization’s interoperation and management of the processes and tools used to keep track of systems and their operations.

56
Q

when do you Protect and defend

A

Actively protecting the system via vulnerability assessments and management tools address potential threats and vulnerabilities to a system. A cyber defense infrastructure support also protects frameworks and may include firewalls and system monitoring, as well as having incident response plans in place.

57
Q

when do you investigate

A

Investigate: In the event of a system compromise through an attack, a complete investigation is necessary. This allows for the discovery of: any specific data that was compromised, the method of compromise and may identify who may have perpetrated the attack.

58
Q

why provide feedback on policies

A

Assessing the effectiveness of a privacy policy begins with the structure of the compliance program, as it establishes the key objectives and associated internal controls to evaluate the health of the overall program.

This in turn can evaluate how controls are enforced since organizations have a better understanding of where personal data is, and how and when it is used. This understanding leads to improvements in privacy governance, allowing for a more tangible risk evaluation and sufficient technological solutions to safeguard against privacy harms.

59
Q

compliance terminology

A

Common compliance terminology engages privacy technologists and other stakeholders, and is valuable in creating a governance program and implementing the necessary privacy policies of any organization, particularly with differing privacy standards and regulations among jurisdictions.

Examples of common terms include

Reasonable assurance. This implies that requirements and objectives are not absolute and are based on criteria that is practical to implement and manage. They are flexible and continuously monitored.

Internal controls are objectives, tied to practical measurements, that are designed to evaluate privacy program components. There are two types of internal controls: preventative which stops an activity, and detective which identifies problematic activity.

Overlapping safeguards is another common term and is key to improving resiliency of compliance and assures measurability.

Compliance program - key objectives and internal controls

Control enforcement - data location , data use

Privacy governance improvement - risk evaluation , privacy safeguards

Together, these elements of compliance create structure that enables a clear and measurable framework which can be translated across varying elements of a privacy program. Building from the example in the previous slide, it is demonstrated how controls can be implemented to address both privacy and security. Privacy controls determine who the authorized personnel for data access are by looking at the type of personal information collected, its sensitivity and authorized uses.

60
Q

Reasonable assurance.

A

Reasonable assurance. This implies that requirements and objectives are not absolute and are based on criteria that is practical to implement and manage. They are flexible and continuously monitored.

61
Q

Internal controls

A

Internal controls are objectives, tied to practical measurements, that are designed to evaluate privacy program components. There are two types of internal controls: preventative which stops an activity, and detective which identifies problematic activity

62
Q

Overlapping safeguards

A

Overlapping safeguards is another common term and is key to improving resiliency of compliance and assures measurability.

63
Q

Providing feedback on contractual and regulatory requirements

A

Technology is always evolving. Similarly, privacy laws are as well. Along with laws that are already in place and have been for decades, new laws have recently emerged, such as the GDPR and the CCPA and privacy laws on the horizon like India’s Personal Data Protection Bill.

While laws and technology both continue to evolve, change and emerge, technology progresses at a much more rapid pace than laws. How then do privacy technologists design programs that are both flexible and innovative?

Privacy technologists should work closely with the organization’s legal team.

This will help to identify the core requirements of various privacy laws and any potential risks that may impact the objectives and obligations of an organization.

Not all obligations of an organization’s policy require a technical aspect, but knowing the key objectives affords a level of flexibility necessary for defining a governance program.

It allows for privacy governance and technology solutions to evolve, for example, automating processes that were once manual.

This strengthens the privacy policy of an organization and makes it more effective. Consider the following example. Comparing the objectives of different laws, an objective can be designed to meet both requirements. Privacy technologists can in turn orchestrate controls which support it.

64
Q

how Information Technology and Information Security

support information governance in an organization

A

When privacy and technology work together to meet industry standards, organizations can establish a common language of privacy controls and remain transparent. This is particularly critical when dealing with international standards. Using common and accessible terms without compromising confidentiality builds trust between organizations and stakeholders and is measurable against legal frameworks and privacy standards. Privacy determines who is authorized to access the personal information, while security implements the controls to that access. Review the example to see how privacy and security work together to meet industry standards.

65
Q

Asymmetric power relationship

A

Asymmetric power relationship: One feels compelled to answer questions posed by a person of authority
• Employer inquiring about a fellow employee or situation, and the employee feels compelled to answer so as not to jeopardize their own employment
• Authority figure, such as a police officer, asking questions in connection with an investigation
• Prospective employer posing personal questions to an interviewee in the context of an interview

66
Q

Existing relationship:

A

Existing relationship: Questions are out of context within the social norms of the relationship
• Friend asking about personal finances
• Employer asking about an employee’s personal life
• Social media site probing users to complete in-depth profiles

67
Q

Reverse flow of information:

A

Reverse flow of information: A person overshares unsolicited information
• Parents discussing their personal life with their young children
• Employee revealing too much information about their personal life to an employer
• Social media user sharing detailed information about a recent breakup

68
Q

What is surveillance and its positive and negative impacts

A

Surveillance is used in many ways. Advertisers track web surfers, store- specific loyalty cards track consumers’ buying trends. In addition to these covert surveillance techniques, overt surveillance is also prominent, such as CCTV cameras in stores and on streets, toll booth transponders, and cell phone voice-activation devices that are constantly on alert, waiting for commands.

Whether overt or covert, surveillance alters behavior, both positively and negatively.

Positive impacts:
• Deters people from cheating in casinos
• Dissuades theft from convenience stores
• Tempers behaviors in recorded conversations

Negative impacts:
• Causes self-censoring
• Silences minority viewpoints,
• Manipulates behavior to further self-interests

Privacy technologists play a role in surveillance via transparency by implementing controls that inform website visitors of the collection of their personal information and providing the choice to opt out or opt in. For example, controls on apps and loyalty cards can give users the option of what information they receive and what information is collected.
Surveillance of an individual’s online account for suspicious behavior or malicious threats may serve the purpose of protecting individual’s online accounts. When surveillance is used for navigation purposes, and not necessarily for the purpose of identifying individuals, engineers may use face recognition to blur faces captured by surveillance.

69
Q

what happens during data collection

A

Asking people to reveal personal information

surveillance

70
Q

What happens during use of data

A

.Insecurity

b. Identification
d. Secondary Use
e. Exclusion

71
Q

what is .Insecurity

A

a.Insecurity
Many people are aware of data insecurity as a privacy violation due to the wide array of media coverage when large breaches occur. Data insecurity can be the result of negligence or threat actors, such as cybercriminals or amateur hackers. Disregarding threat actors, along with failing to design a process, product or service with access prevention, leads to data insecurity. The application of risk assessment tools is useful in identifying areas of information insecurity within a system.
Privacy technologists might consider strong password-reset mechanisms or time-sensitive links for resetting passwords with additional authentication codes. When contracting with third parties, limit the amount of personal information provided—they may need customers’ email addresses, but not their passwords.

72
Q

what is Identification

A

Identification

Individuals leave digital identifiers everywhere. When these seemingly harmless or anonymous pieces of information are pieced together, this can lead to identification of the individual. Identification is linking unique identifying information to specific individuals; personally identifiable information can be pieced together with a few unique identifiers, such as zip code, date of birth, age range, weight and income level to identify an individual. Identification can also be achieved by cross-referencing timestamps on websites or databases, or the use of recurring IP addresses or cookies to identify browsing history.

Identification must be factored into designs to protect any personal information deemed necessary to collect and use. Employing encryption, de-identification, and aggregation to collected data that is sensitive in nature are techniques used to protect this information. Privacy technologists may also consider the level of identification risk to determine if employing de-identification techniques are necessary. For example, if a customer is providing a review of a product, using only their first name may minimize privacy risk. However, the cost to avoid or mitigate the risk may be too high and, therefore, the privacy technologist may accept the risk.

73
Q

what is secondary use

A

d.Secondary Use

Individuals share their information with specific people or businesses for a distinct purpose— they will get something in return. There may be little to no discussion beforehand about what will happen with that personal information because there is an expectation—based on legal, regulatory, or even social norms—that dictates the use of personal information shared between parties.

Secondary use occurs when the intended recipient of personal information shares it with another party outside of the expectations of the individual whose information was shared. All uses of personal information must be addressed in both the external privacy notice as well as the internal privacy policies. The guidelines of the privacy notice and policy should address secondary use of information, and those principles should be understood by both the individual and the party collecting the information. Adhering to the agreed-upon stan

74
Q

what is exclusion

A

e.Exclusion

Exclusion happens when an individual’s information is used without their knowledge, or they are unable to consent to the handling or use of their information. For example, when a marketing agency purchases consumer data from the collecting organization to then advertise to those individuals who provided their information only to that organization.

Exclusion can also occur in the form of discrimination; unbeknownst to an individual, a bank automatically denies their loan application based on the individual’s address

Web developers may want to ensure that an option to unsubscribe may be added to marketing emails.

Regulations are further working towards addressing these types of privacy issues. In NIST’s publication of the Privacy Control Catalog, Privacy Control IP-1 requires consent of individuals to authorize collection of personal information. If organizations are transparent about this use of information and allow individuals the option to consent to use, then a risk to the individual has been mitigated.

75
Q

what happens During Dissemination

A

a. Disclosure
b. Distortion
c. Exposure
d. Breach of Confidentiality
e. Increased accessibility
f. Blackmail
g. Appropriation

76
Q

Disclosure

A

Disclosure is revealing credible and private information about an individual that can affect how others view that person or may even impact their security.

While there is a correlation between disclosure and insecurity, insecurity is the result of negligence, while disclosure is the result of intentionally revealing information about an individual.

Performing a risk analysis can assess what potential privacy incidents may occur if personal information is disclosed, particularly via a company’s data.

Authorization access controls may need to be put in place for access to sensitive information.

When revealing another’s information, one may not be aware of the full consequences of their actions.

  • ways in which disclosure could impact an individual.
    • A person’s physical well-being, such as stalker or domestic abuse victims who are found by their offenders who located them by using disclosed information
    • A business’s finances, such as monetary loss due to theft by a threat actor who was tipped off about company security practices
    • An individual’s reputation, such as the revelation of their health status or income level
77
Q

b.Distortion

A

Distortion is when someone spreads false or inaccurate information about someone else. Unlike disclosure, which is based on the dissemination of true personal information, distortion is the dissemination of fabricated, misleading, or incorrect personal information.

Individuals’ reputations can suffer the same consequences as they would from disclosed information.

Distortion is an act against privacy, as access to and accuracy of information is imbedded within privacy models and principles, such as FIPPs and the Organisation for Economic Co- operation and Development’s (OECD) Guidelines. Privacy technologists can embed the appropriate channels for individuals to address and correct any inaccurate or false information within their designs by:
access
address
control

78
Q

c. Exposure

A

Exposing information that people normally conceal from others, such as nudity, grief or bodily functions, may open them up to judgement and cause significant harm. Individuals are also at risk of exposure if parameters are not set in advance regarding communication between health care providers, loan officers, lawyers, etc. Communication via email, for example, may lead to exposure if sent to an address that others may see, such as a work email address or an address shared by a spouse. Performing a risk analysis to identify vulnerabilities will allow privacy technologists to apply controls. Here, a way to mitigate exposure risk might be to have individuals opt-in to communication preferences upon completing a profile.

79
Q

d.Breach of Confidentiality

A

A breach of confidentiality results from the disclosure of information shared in private.

The consequence of this is a loss of trust and an unwillingness for an individual to share information in the future. This can occur on a personal level or professionally. When there is a loss of trust, particularly within a professional relationship, clients may not share all necessary information for adequate treatment or services.
Because technology systems are often shared across multiple organizations, subcontractors may be used more frequently to protect systems against breach of confidentiality harms. Privacy technologists will want to identify threats and vulnerabilities to assess where risks are likely to occur within the system; particularly analysis of the data collection, processing and dissemination practices for the organization

80
Q

.Increased accessibility

A

Access to personal information has been amplified as many organizations have moved, and are moving toward a digital format. Initially this led to the exposure of sensitive personal information. Courts had to determine how best to balance access of information and protecting the privacy of individuals. In 2014, rules requiring redaction were updated, offering better protection of personal information for online files. The EU’s General Data Protection Regulation (GDPR) mandates the right to be forgotten, also known as the right to erasure of personal data. While increased accessibility grows as a privacy problem, applying rules of redaction and legal mandates, help to mitigate that risk.

The ease of accessibility through technology can impact the obscurity that provides individuals with a sense of privacy in public.

Analysis of privacy risks would allow privacy technologists to identify areas of vulnerability where information is being collected. For example, imposing controls on collection, ensuring login for accessing personal information, limiting data collection and offering anonymity are options privacy technologists can use to keep personal data safeguarded.

81
Q

f. Blackmail

A

Blackmail is the threat to disclose someone’s information against their will. It can involve the demand for money, or it may force a person to take action, such as providing access to classified information, or stipulate some form of inaction.

In 2016, Ashley Madison, a dating site for would-be adulterers, was hacked. The personal information of 30 million site users was disclosed because of the data breach. As it turned out, when users no longer wanted to use the service, they could either deactivate their accounts or, for a fee, request a “Full Delete” (the term used by Ashley Madison) to have all their account data deleted. While the site did not threaten to disclose the information, they were selling a reduction of risk of exposure. However, the site did not fully delete all account information, retaining payment transaction history, which included real names. Cybercriminals obtained some of the information and used it to blackmail those affected, threatening to expose their use of the site to their spouses unless they were paid. This is a clear example of a privacy violation or threat that could have been prevented with better security and by a business doing what it promised to do with its customers’ data (in this case, for a fee).

An organization’s privacy notice can be employed to alert users to any risk of exposure that may lead to blackmail. Fair practices, such as scanning photos for explicit images before allowing them to be uploaded to a media site, or flagging posts for specific language, can help protect customer privacy. The organization’s practices regarding rightful dissemination and proper destruction of personal information should be transparent.

82
Q

Appropriation

A

Appropriation is using someone’s identity for someone else’s purpose or to promote a party’s own interests. A common example of this is the use of a celebrity’s image to imply or suggest their endorsement of a product or service when they were not contracted to do so.

On a broader level, social media uses appropriation in a subtler way, luring users to like pages with a tag line that reads, “12 of your Friends like this page.”

If a company is collecting purchase history for an individual and linking it to their social media site, the purchase history is now being shared with that individual’s followers and friends— who, in turn, may feel compelled to purchase the same products—which, essentially, is providing free advertising for the company at the expense of the individual’s privacy. People may not want others to know they use a particular product, and it therefore becomes a privacy harm.

Organizations must be transparent about the use and dissemination of collected information; and, before linking personal information to a specific individual, carefully consider the associated harmful effects and violations of customer privacy if they do not have explicit consent.

83
Q

interference and name types

A

A technology system is designed to keep personal information confidential. However, privacy can be threatened within the sequence of steps in that system via interference. There are three general types of interference, which can be classified by the object with which technology interferes: decisional interference, intrusion and self- representation.

Decisional interference
Intrusion
Self-representation

84
Q

Decisional interference

A

Decisional interference is an action by an external party, such as a government or commercial entity, that interferes with an individual’s decision-making regarding their personal affairs. Inaccurate data can lead to decisional interference. Including cross-checks for accuracy when information is transferred from a manual form into an electronic form, ensuring that backup storage mechanisms allow for updating information and including individuals in the review of their information are all crucial steps privacy technologists can take to ensure information is accurate and current, thus minimizing the risk of privacy harms.

85
Q

Intrusion

A

Acts of intrusion disturb an individual’s solitude or tranquility. Intrusions can be physical, psychological or informational. Often with these forms of intrusion, personal information is not used. One does not need to know a person’s name to knock on their door to try to sell them something, or to mail an advertisement to a “Local Resident.” From a privacy technologist’s standpoint, intrusion may be reduced by allowing individuals control over electronic forms of intrusion: opting out of notifications, using opt-out as the default and asking customers to opt in to receiving ads from other organizations with whom their information has been shared.

86
Q

Self-representation

A

Interference with representation of self occurs when another alters how an individual is represented or regarded. This altering of information about an individual can be in regard to their marital status, race, sexual orientation, political affiliation, etc. Whether or not the representation is accurate is irrelevant as the individual no longer has control over their self-representation. This may result in unwanted attention or other adverse consequences.

87
Q

Behavioral advertising

A

Behavioral profiling for advertising consists of several complex interactions and is a combination of interference-prone technologies: a behavior model, which represents who the person is and enables decision-making, and personalized ads that are sent and represent a person’s behavior. This can be a win for both the consumer, who is learning about new products, and advertisers, who are experiencing an increase in sales.
However, behavioral advertising can raise concerns over privacy interference. Government agencies, such as the FTC, have an interest in protecting consumers from unfair interference, noting that there needs to be a balance between the protection of consumer privacy and economic interests.

Recalling Calo’s subjective harm taxonomy from Module 1, the mere existence of behavioral profiling may impact an individual’s decision to use a website, particularly when they have no control over it. Organizations that engage in behavioral profiling should follow safe privacy practices, making users aware of the information being collected about them and for what purpose, and giving them the option to control what is collected and shared.

88
Q

Social engineering

A

Social engineering is using any means of psychology to manipulate people to do something that discloses valuable information or provides access, such as calling a company to reset a password with using easily accessible information such as first and last name, physical and/or email addresses.

Privacy technologists can use this knowledge to examine how business processes, and employees that work with personal information and sensitive data, are vulnerable to exploitation and then implement appropriate safeguards to prevent social engineering attacks.

Providing a plan and protocol for responding to customer concerns as well as malicious behavior allows support centers to respond swiftly and correctly. Implementing additional controls such as stronger password requirements and installing anti-spyware to monitor user activity, further aide in diverting would-be hackers.

89
Q

Software Security

A

Software development begins with the system requirements outlined during the planning stage. Requirements include both privacy and security regulations. These regulations are determined by the functional requirements of the organization and by the privacy and security standards mandated by the laws that govern the country or countries by which the organization does business.

90
Q

Vulnerability management

A

Vulnerability management

Vulnerability is determined by capability and probability: What skills and resources are available to a threat actor, and what may impede the threat actor from violating privacy? Controls serve as impediments that help increase difficulty and reduce vulnerability. Creating a cyber defense infrastructure support using firewalls to prevent malicious network traffic helps to manage a system’s vulnerabilities. Here, an organization’s incident response plan may be used in the event of an attack.

91
Q

Intrusion reports

A

Detection and prevention of attacks on a system require that software is monitored for threats to the security of a network. Collecting data on how much an application, system or network is used allows for privacy technologists to detect and better diagnose why a system may have not performed as expected, and a more robust design, less susceptible to attacks, can be built. Sometimes, however, collecting too much detailed information on how data is used and where vulnerabilities may lie leads to an increase in privacy risks.

92
Q

Patches

A

Patches are changes to a program that aim to fix, update or improve a system. They are also known as bug fixes to address vulnerabilities to security.

93
Q

upgrades

A

Privacy technologists will need to consider whether updates to software are necessary to fix bugs and improve the system, or if a complete upgrade is needed to replace existing software or hardware.

94
Q

Open-source vs Closed-source

A

Open-source vs Closed-source

Open-sourced software has code that is easily viewed, shared and modified. Bugs can be fixed quickly, and code is checked frequently. Closed-source software can only be fixed by the vendor, and consumers may need to wait to be assisted with issues. Closed-source software is not necessarily more resistant to attack. Risks and benefits of each should be considered, including the analysis and testing of software in development, as well as its track record and developer support.