Foundational Principles Flashcards

1
Q

Helen Nissenbaum’s Contextual Integrity

A

Norm based

norms are domain specific - IE: norms for governing banking information will differ from norms governing medical information.

Norms are context specific - IE: an individual can have their own reasons for controlling access to their information in specific situations based on their own expectations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ryan Calo’s Harm Dimensions

A

Objective Harms - measurable and observable (IE: person’s privacy has been violated and direct harm exists)

Subjective Harms - expectation of harms. Subjective harms may have the same impact as objective harms because the individual has taken similar steps to protect themselves.

IE: the perception of harm is just as likely to have significantly negative impact as experienced objective harms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security is traditionally defined as….

A

(1) Confidentiality - ensures that information is only accessible by unauthorized individuals
(2) Integrity - ensures that information has not been unintentionally modified
(3) Availability - ensures that information is readily available when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FIPs

A

Fair Information Practices - established by the Health, Education and Welfare Advisory Committed on Automated Data Systems in 1972

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FIPPs

A

The Fair Information Practice Principles - US Federal Trade Commission (FTC) and used as guidance to businesses in the US

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NIST

A

NISTIR 8062 - An Introduction to Privacy Engineering and Risk Management in Federal Systems - published by the US National Institute of Standards and Technology (NIST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OECD

A

The Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980) - published by the Organization for Economic Cooperation and Development (OECD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

APEC

A

The Privacy Framework - published by the Asia-Pacific Economic Cooperation (APEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OECD Guidelines

A

(1) Collection Limitation - limitation of data, obtained lawfully and fair means, knowledge and consent of subject;
(2) Data Quality Principles - data should be relevant to purposes, extent necessary, accurate, complete, and up to date
(3) Purposes Specification Principle - use specified at time of collection, use is limited, specified on change of purpose
(4) Use Limitation Principle - data not disclosed, used, available for purposes outside of specific use without (1) consent or (2) authority of law
(5) Security Safeguards Principles - protected by reasonable security safeguards
(6) Openness Principle - open about development, policies and principles of data use and data controller
(7) Individual Participation Principle - individuals right to (1) obtain from data controller info about their data (2) communication re data at a reasonable time, manner and form (3) reasons if denied and challenge denial; (4) if successful, data erased
(8) Accountability Principle - data controller accountable for complying with measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Life Cycle

A

Consent / Notice - Collection - Disclosure

Consent / Notice - Processing - Retention - Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Collection Types

A

(1) First-party collection - data subject provides data directly to collector
(2) Surveillance - collector observes data streams without interfering with subject’s behavior
(3) Repurposing - data is assigned for a different use
(4) Third-party collection - data is transferred to third-party for new data collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explicit Consent of Data Collection

A

Individual is required to expressly act to communicate consent

EX: clicking a checkbox, clicking button of privacy notice, responding to automatically generated email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Passive or Complied Consent of Data Collection

A

IE: Inclusion of a conspicuous link on a privacy notified describing collection activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Life Cycle: Maximize-Information-Utility

A

Views data as the basis for monetization and new revenue and seeks to collect and retain as much data as possible

Information broadly collected and shared, retention persists up to the physical limits of org’s storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Life Cycle: Minimize-privacy-risk

A

Views data as potentially toxic with inherent risks that can result in significant, irreversible privacy harms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Defect, Fault, Error, Failure, and Harm

A

(1) Defect - a flaw in the requirements, designs or implementation that can lead to a fault (IE: a line of source code that does not correctly check that an access attempt is properly authorized)
(2) Fault - an incorrect step, process or data definition in a computer program (IE: execution of that source code that leads to error)
(3) Error - difference between a computed, observed or measured value or condition and the true, specified or theoretically correct value or condition (IE: unauthorized access as opposed to a notice that unauthorized access will occur)
(4) Failure - inability of a system or component to perform its required functions within specified performance requirements (IE: unauthorized third-party access)
(5) Harm - actual or potential danger to an individuals personal privacy

17
Q

Solove’s Four Risks of Privacy Harms

A

(1) Information collection
(2) Information processing
(3) information dissemination
(4) invasion

18
Q

Formulation of Risk

A

Risk is the potential adverse impact along with the likelihood that the impact will occur

Risk = probability of an adverse impact (x) impact of the event

19
Q

Risk: Compliance Model

A

Risks are delineated as the failure to do what is required or avoid what is prohibited

IE: GDPR, HIPAA, etc.

20
Q

Risk: FIPPs

A

Adopted by FTC and US Department of Homeland Security

Most FIPPs principles are relative to the purpose of the system

21
Q

Risk: Calo’s Subjective/Objective Dichotomy

A

Falls into two categories - (1) Subjective and (2) Objective

Any privacy threat that is perceivable by individuals corresponds to a subjective privacy harm

22
Q

Risk: Solove’s Taxonomy - Information Collection

A

(1) Surveillance - observation and capturing of individual’s activities (IE: Track users link clicks and pages visited)
(2) Interrogation - actively questioning an individual or probing for information (IE: requires an individual enter their phone number for registration)

23
Q

Risk: Solove’s Taxomony - Information Processing

A

(1) Aggregation - combining pieces of information to produce a whole greater than its parts (IE: retail views purchases for large tote bags, unscented lotions, prenatal vitamins = individual is pregnant)
(2) Identification - links information to specific individuals (IE: cookies for browsing histories)
(3) Insecurity - failure to protect individual’s information (IE: website fails to encrypt communications)
(4) Secondary Use -using information without consent for purposes unrelated to original use (IE: retailer uses email for marketing purposes as opposed to purchase)
(5) Exclusion - denies an individual knowledge/participation in what is done with their information (IE: marketing firm uses purchase data to advertise under a different name)

24
Q

Risk: Solove’s Taxonomy - Information Dissemination

A

(1) Breach of Confidentiality - release of PII
(2) Disclosure - revealing truthful information that negatively affects how others view the individual (IE: lifestyle member list)
(3) Distortion - spreading false and inaccurate information (IE: employment verification mistake)
(4) Exposure - information that is normally concealed, including private physical details about our bodies
(5) Increased accessibility - information more easily attainable (IE: child entertainment service allows adults to register and interact)
(6) Blackmail - threat to disclose information against their will
(7) Appropriation - using someone’s identity for another person’s purposes

25
Q

Risk: Solove’s Taxonomy - Intrusion and Decisional Interference

A

(1) Intrusion - consists of acts that disturb an individual’s solitude or tranquility (IE: mobile alerts)
(2) Decisional Interference - involves others inserting themselves into a decision-making process that affects a person’s personal affairs (IE: website limits negative reviews for bias)

26
Q

Helen Nissenbaum’s Contextual Integrity

A

Maintaining personal information in alignment with informational norms that apply to a particular context.

An analyst must establish existing informational norms and then determine how the system may disrupt those norms.

27
Q

NIST Privacy Risk Model

A

embedded in Privacy Risk Assessment Methodology (PRAM) - includes vulnerabilities (problematic data actions), adverse effects (problems for individuals) and the relative likelihood’s and impacts of those event.

28
Q

NIST Privacy Risk Model - Problematic Data Actions

A

(1) Appropriation - when PI is used in ways beyond what is expected/authorized by individual
(2) Distortion - the use of dissemination of inaccurate/misleading PI
(3) Induced disclosure - individual’s are pressured to provide PI
(4) Insecurity - lapses in data security
(5) Surveillance - PI is tracked/monitored out of proportion to system objectives
(6) Unanticipated revelation - unexpected exposure of facets of an individual as a result of processing
(7) Unwarranted restriction - imposition of unjustified constraints on individuals regarding access to the system and its information as it relates to them

29
Q

NIST Privacy Risk Model - Problems for Individuals

A

(1) Loss of Autonomy - self-imposed restrictions on behavior
(2) Exclusion - denies individuals knowledge about their PI or ability to act
(3) Loss of liberty - improperly rises the possibility of arrest/detainment
(4) Physical harm - direct bodily harm to an individual
(5) Stigmatization - links information to an identity so as to stigmatize the person associated with the identity
(6) Power imbalance - enables abusive or unfair treatment of an individual
(7) Loss of Trust - result from violations of implicit or explicit expectation or agreements regarding treatment of PI
(8) Economic loss - direct or indirect financial loss

30
Q

Privacy Risk Management Framework and 7 Steps

A

A process for applying a risk model to a specific information system in order to identify and address risks.

(1) Characterization
(2) Threat
(3) Vulnerability and event identification
(4) Risk Assessment
(5) Risk Response Determination
(6) Risk Control Implementation
(7) Monitoring and Reviewing

31
Q

Privacy Risk Management Framework - Characterization

A

Identifying the purpose of the system -> how PI flows/processed on the systems -> technologies in place to support the system

32
Q

Privacy Risk Management Framework - Risk Response Determination

A

(1) Accept the risk - if risk is low, may be reasonable and necessary to accept the risk
(2) Transfer the risk - if other entities can manage the risk better, transfer the risk (IE: payroll services)
(3) Mitigate the risk - best option when IT developer can implement privacy controls that reduce risk (IE: daily backups)
(4) Avoid the risk - avoid risk by changing the system design or business process

33
Q

Privacy Risk Management Framework - Risk Control Implementation

A

(1) Administrative Controls - business practices
(2) Technical Controls - governs software processes and data
(3) Physical Controls - governs physical access to hard copies of data and systems that process and store electronic copies

34
Q

Documenting Requirements

A

SRS - software requirement specification

(1) Functional requirements - describes a specific function of the intended information system (IE: this system shall encrypt credit card numbers)
(2) Nonfunctional requirements - describe a constraint or property of the system that an engineer can trace to functional requirements or design elements (IE: system shall not disclosure PI without consent)

35
Q

Trace Matrices

A

Trace link from a requirement to a privacy law = requirement implements the law

Trace link to a design element = requirement is implemented by the design element

Includes rationale description of the trace link (IE: X provides an exception for any disclosure that is required by law or regulation)