Introduction to Privacy Flashcards
In 1890, the American, Louis Brandeis and Samuel Warren published which publication?
The Right to Privacy
The “Right to Privacy” publication defined privacy as _____________________?
The right to be left alone
_______________ is defined as the desire of people to freely choose the circumstances and the degree to which individuals will expose their attitudes and behavior to others.
Privacy
What are the four classes of privacy?
Information Privacy
Bodily Privacy
Territorial Privacy
Communications Privacy
_______________ Privacy are rules that govern the collection and handling of personal information.
Information Privacy
Personal information, financial information, medical information, government records and records of a person’s activities on the internet are examples of _________________ Privacy.
Information Privacy
_______________ Privacy is focused on a person’s physical being and invasion thereof.
Bodily Privacy
Drug Testing, genetic testing, body cavity searches, abortion and adoption are examples of _____________ Privacy.
Bodily Privacy
________________ Privacy refers to limitations on intruding into another individual’s environment.
Territorial Privacy
Invasion into ______________ Privacy typically takes the form of monitoring, such as video surveillance, ID checks, and use of similar technology.
Territorial Privacy
True or False?
In Territorial Privacy, another individual’s “environment” is limited to the home.
False
Environment is not limited to the home but may include the workplace or public space.
_______________ Privacy protects the means of correspondence.
Communication Privacy
Phone conversations, postal mail, email and other forms of communication are examples of ___________________ Privacy.
Communication Privacy
The industry standard in assessing risk is:
Risk = ________ X ________ X _________
Risk = Threat x Vulnerability x Expected Loss
The ________ associated with a company’s information technology is directly related to threats, vulnerabilities and expected loss.
Risk
_____________ are any circumstances that may cause an undesirable event.
Threats
Data breach is an example of a ___________.
Threat