Information Privacy Concepts (Prelims) Flashcards

1
Q

Information privacy generally pertains to what is known as?

A

Personally Identifiable Information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This information can be used to distinguish an individual’s identity such as: birth race, religion, weight, activities, photographic images, x-rays, IP, or MAC address.

A

PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The goal of this is to take privacy requirements into account through the system development process, from the concept of a new IT system through detailed system design, implementation, and operation.

A

Privacy by Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

These are system requirements that have privacy relevance. It defines the protection capabilities provided by the system, the performance, and behavioral characteristics exhibited by the system, and the evidence used to determine that the system privacy requirements have been satisfied.

A

Privacy Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

These principles were later widely adopted as a resolution by other prominent policymakers at the 32nd Annual International Conference of Data Protection and Privacy Commissioners meeting.

A

Privacy by Design Principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PbD is an approach that anticipates privacy issues and seeks to prevent problems before they arise.

A

Proactive, not reactive; preventive, not remedial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This principle requires an organization to ensure that it only processed the data that is necessary to achieve its specific purpose and that PII is protected during collection, storage, use, and transmission.

A

Privacy as default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Privacy protections should be core, organic functions, not added on after a design is complete. Privacy should be integral both to the design and architecture of IT systems and to business practices.

A

Privacy embedded into the design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This principle encompasses two concepts. The terms end-to-end and life cycle refer to the protection of PII from the time of collection through retention and destruction.

A

End-to-end security—life cycle protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PbD seek to assure users and other stakeholders that privacy-related business practices and technical controls are operating according to state commitments and objectives.

A

Visibility and transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Designers should seek solutions that avoid requiring a trade-off between privacy and system functionality or between privacy and security.

A

Full functionality: positive-sum, not zero-sum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Its objective is to enable organization executives to determine an appropriate budget for privacy and, within that budget, implement the privacy controls that optimize the level of protection.

A

Privacy Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Are the technical, physical, and administrative (or management) measures employed within an organization to satisfy privacy requirements.

A

Privacy Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Includes a disciplined, structured, and flexible process or organizational asset valuation; security and privacy control selection, implementation, and assessment; system and control authorizations; and continuous monitoring.

A

Risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Are safeguards or countermeasures prescribed for an information system or an organization that are designed to protect the confidentiality, integrity, and availability of its information and to meet a set of defined security requirements.

A

Security Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is an expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result.

A

Security risk assessment

12
Q

It involves taking account of privacy during the entire life cycle of ICT, implementing techniques that decrease privacy risks and enable organizations to make purposeful decisions about resource allocation and effective implementation of controls in information systems.

A

Privacy Engineering

13
Q

Is an analysis of how information is handled: to ensure handling conforms to applicable legal, regularity, and policy requirements regarding privacy; to determine the risks and effects of collecting, maintaining, and to examine and evaluate protections and alternative processes for handling information to mitigated potential privacy risks.

A

Privacy Impact Assessment (PIA)

14
Q

Focuses on the types of capabilities the system needs to demonstrate the implementation of an organization’s privacy policies and system privacy requirements.

A

Privacy engineering and security objectives