Data Protection Flashcards
What is in Article 1 of the Universal Declaration of Human Rights (United Nation, 1948)?
Human dignity is recognized as an absolute fundamental right.
Give an Example of a Country where privacy has been regarded as an element of liberty?
The United States
What is Data Protection?
Data protection applies to any information relating to an identified or identifiable natural (living) person including names, dates of birth, photographs, video footage, email addresses, telephone numbers, and more.
What does PII stands for?
Personal Identifiable Information
Where does the notion of data protection originates from?
It originates from the right to privacy.
What are the rights of the PII principal?
Fair processing
Transparency
Certain rights to access or change PII
What are the principles of Data Protection?
PII controllers and PII processors Consent and choice Purpose legitimacy and specification Collection limitation Data minimization Use, retention, and disclosure limitation Accuracy and quality Openness, transparency, and notice Individual participation and access Accountability Information security Privacy compliance
Describe PII controllers and PII processors!
PII controllers: determine the means and purposes of processing PII. Controllers must ensure that applicable laws are adhered to, and they are obliged to demonstrate compliance.
A PII processor: follows the instructions of a PII controller in order to process PII. Under many regulations, the relationship between a controller and processor requires a written contract.
Describe Consent and choice!
PII principals should have the choice of whether their data is processed.
Describe Purpose legitimacy and specification!
All processing of PII must be compliant with applicable laws. The purpose of data processing must be communicated to the PII principals upfront, but it should be communicated again if the purpose changes over time.
Describe Collection limitation!
The collection of PII should be limited to what is strictly necessary for the purpose defined and should be within the limitations of applicable laws.
Describe Data minimization!
Data minimization is related to collection limitation but goes further, looking at the processing after the initial collection of PII. It means that the processes and systems for processing PII must limit the number of stakeholders that have access to or the ability to process data
Describe Use, retention, and disclosure limitation!
Data must not be retained forever. This principle is about retaining data for a defined purpose, but only for as long as it is required by the organization and by law. After that period, PII should be destroyed.
Describe Accuracy and quality!
The PII process has to be accurate and completed to a degree that it can be adequately used for the purpose defined. If PII is collected from a source that is not the PII principal, the reliability must be ensured. The accuracy and quality of the data should be checked regularly.
Describe Openness, transparency, and notice!
This principle means that information about the processing of PII and the purposes and means for doing so should be provided to the PII principals. In the interest of transparency, this notice should be easily readable, especially if a processing activity includes decision-making based on the PII.
Describe Individual participation and access!
Individuals have many rights, including the right to access their data, change inaccurate data, delete or lock the data, and easily assert these rights. In some legislations (e.g., GDPR and CCPA), they also have the right to portability, making the data available in an electronic, standardized form. Often CSV, JSON, or XML formats are used.
Describe Accountability!
There is a duty of due care stating that measures must be taken by an organization to ensure the protection of PII. Accountability means that an organization must be able to prove its compliance. Data privacy policies and processes are documented.
Describe Information security!
PII must be protected, and the CIA (confidentiality, integrity, and availability) of information has to be assured by the controller.