Foundational Principles Flashcards
Helen Nissenbaum’s Contextual Integrity
Norm based
norms are domain specific - IE: norms for governing banking information will differ from norms governing medical information.
Norms are context specific - IE: an individual can have their own reasons for controlling access to their information in specific situations based on their own expectations
Ryan Calo’s Harm Dimensions
Objective Harms - measurable and observable (IE: person’s privacy has been violated and direct harm exists)
Subjective Harms - expectation of harms. Subjective harms may have the same impact as objective harms because the individual has taken similar steps to protect themselves.
IE: the perception of harm is just as likely to have significantly negative impact as experienced objective harms
Security is traditionally defined as….
(1) Confidentiality - ensures that information is only accessible by unauthorized individuals
(2) Integrity - ensures that information has not been unintentionally modified
(3) Availability - ensures that information is readily available when needed
FIPs
Fair Information Practices - established by the Health, Education and Welfare Advisory Committed on Automated Data Systems in 1972
FIPPs
The Fair Information Practice Principles - US Federal Trade Commission (FTC) and used as guidance to businesses in the US
NIST
NISTIR 8062 - An Introduction to Privacy Engineering and Risk Management in Federal Systems - published by the US National Institute of Standards and Technology (NIST)
OECD
The Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980) - published by the Organization for Economic Cooperation and Development (OECD)
APEC
The Privacy Framework - published by the Asia-Pacific Economic Cooperation (APEC)
OECD Guidelines
(1) Collection Limitation - limitation of data, obtained lawfully and fair means, knowledge and consent of subject;
(2) Data Quality Principles - data should be relevant to purposes, extent necessary, accurate, complete, and up to date
(3) Purposes Specification Principle - use specified at time of collection, use is limited, specified on change of purpose
(4) Use Limitation Principle - data not disclosed, used, available for purposes outside of specific use without (1) consent or (2) authority of law
(5) Security Safeguards Principles - protected by reasonable security safeguards
(6) Openness Principle - open about development, policies and principles of data use and data controller
(7) Individual Participation Principle - individuals right to (1) obtain from data controller info about their data (2) communication re data at a reasonable time, manner and form (3) reasons if denied and challenge denial; (4) if successful, data erased
(8) Accountability Principle - data controller accountable for complying with measures
Data Life Cycle
Consent / Notice - Collection - Disclosure
Consent / Notice - Processing - Retention - Destruction
Data Collection Types
(1) First-party collection - data subject provides data directly to collector
(2) Surveillance - collector observes data streams without interfering with subject’s behavior
(3) Repurposing - data is assigned for a different use
(4) Third-party collection - data is transferred to third-party for new data collection
Explicit Consent of Data Collection
Individual is required to expressly act to communicate consent
EX: clicking a checkbox, clicking button of privacy notice, responding to automatically generated email
Passive or Complied Consent of Data Collection
IE: Inclusion of a conspicuous link on a privacy notified describing collection activities
Data Life Cycle: Maximize-Information-Utility
Views data as the basis for monetization and new revenue and seeks to collect and retain as much data as possible
Information broadly collected and shared, retention persists up to the physical limits of org’s storage devices
Data Life Cycle: Minimize-privacy-risk
Views data as potentially toxic with inherent risks that can result in significant, irreversible privacy harms