Module 3 Flashcards
Privacy Threats and Violations
Interrogation
Is the intentional probing of information to reveal personal information about a person.
Asymmetric Power Relationship
When a person is compelled to give up personal information to a person of authority. An example would be an interviewee answering personal questions to a prospective employer.
Existing Relationship
Asking personal questions that are out of context within social norms of the relationship. An example would be an employer asking about an employee’s personal life.
Reverse Flow of Information
An individual oversharing unsolicited information. An example would be a student sharing information about their personal life during a class discussion
Covert Surveillance
Tracking that one may not be aware of being tracked (web surfers, geolocators, loyalty cards, etc.).
Overt Surveillance
Tracking that one is aware of (CCTV, Transponders, voice activations, etc.).
Identification
When information is linked to specific individuals; when a unique identifier (SSN, Driver’s License Number, etc.) is linked to other data elements (like age, weight, health info, income level, for example).
Exclusion
Information is used without an individual’s knowledge or consent. It can also occur in the form of discrimination. Privacy technologists should include unsubscribe and consent as options to avoid exclusion.
Secondary Use
Information used without consent for purposes unrelated to the original purposes. Any secondary use should be in the external privacy notice and internal privacy policies.
Data Insecurity
State or condition where data is vulnerable to unauthorized access, misuse, loss, or corruption.
Disclosure
Is revealing credible and private information about an individual that can affect how others view that person or may impact their security. Disclosure is the intentional revealing of information about an individual as opposed to insecurity, which is the result of negligence.
Distortion
Is the release of fabricated and incorrect personal information (opposite of disclosure) and can be used to harm ones reputation.
Blackmail
Is where a threat of releasing personal information against someone’s will unless paid a ransom or to perform some action.
Breach of Confidentiality
Disclosure of information shared in private.
Appropriation
Is when someone else information is use for someone else’s gain (identity theft or using another person’s identity to endorse a product).