PLS 7 Flashcards

1
Q

Privacy by Design (PbD)

A

Privacy by design houdt in dat u als organisatie al tijdens de ontwikkeling van producten en diensten (zoals informatiesystemen) ten eerste aandacht besteedt aan privacyverhogende maatregelen, ook wel privacy enhancing technologies (PET) genoemd.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Privacy By Design Principles

A
  1. Minimize Data Acquisition, minimize number of data sources, minimize raw data intake
  2. Minimize knowledge discovery
  3. Minimize data storage
  4. Minimize data retention period
    5.routing
  5. Data anonymization
  6. Encrypted data communication, data processing and data storage
    8.Reduce data granularity
  7. Query answering, Repeated query blocking
  8. Distributed data processing, Distributed data storage
  9. Knowledge discovery based aggregation, Geography based aggregation, Chain aggregation,
    Category based aggregation
  10. Information Disclosure
  11. Control, Logging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Privacy By Design Life Cycle

A

Privacy By Design Life Cycle
Consent and Data Acquisition [CDA]
Data Preprocessing [DPP]
Data Processing and Analysis [DPA]
Data Storage [DS]
Data Dissemination [DD]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two major privacy threats

A

1.Secondary usage (⊗) Secondary usage can lead to privacy violations
2.Unauthorized access (⊖)Unauthorized access is when someone gains access to data without proper authorization during any phase of the data life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Privacy By Design Principles Explained

A
  1. Minimize data acquisition
    - minimizing data types
    - minimum duration
    - minimum frequency
  2. Minimize number of data sources
    - Any piece of data that is not required to perform a certain task should be deleted.
  3. Minimize raw data intake
    - IoT applications should reduce the amount of raw data acquired by the system. Raw data could lead to secondary usage and privacy violation.
  4. Minimize knowledge discovery
    - minimize the amount of knowledge discovered within an IoT application. IoT applications should only discover the knowledge necessary to achieve their primary objectives.
  5. Hidden data routing at IoT applications should support and employ anonymous routing mechanisms (e.g., Tor).
  6. Data anonymization move personally identifiable information before the data gets used by the IoT application so that the people described by the data remain anonymous.
  7. Encrypted data communication different components in an IoT application should consider encrypted data communication wherever possible
  8. Encrypted data processing process data while encrypted.
    Encrypted data storageapplications should store data in encrypted form process data while encrypted.
  9. Repeated query blocking When answering queries, IoT applications need to make sure that they block any malicious attempts to discover knowledge that violates user privacy through repeated queries
  10. Distributed data processing process data in a distributed manner.
  11. Distributed data storage storing data in a distributed manner
  12. Knowledge discovery based aggregation Discover knowledge though aggregation and re- place raw data with discovered new knowledge.
  13. Geography based aggregation Aggregate data using geographical boundaries
    14.Chain aggregation Perform aggregation on-the-go while moving data from one node to another.
  14. Category based aggregation Categorisation based aggregation approaches can be used to reduce the granularity of the raw data
  15. Information Disclosure Data subjects should be adequately informed whenever data they own is acquired, processed, and disseminated.
  16. Control Providing privacy control mechanisms for data subjects
  17. Logging Log events during all phases
    It allows both internal and external parties to examine what has happened in the past to make sure a given system has performed as promised.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly