Privacy in the Modern Era Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is privacy?

A

The rights and obligations of individuals and organizations with respect to the collection, use, retention, disclosure and destruction of personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is personal information?

A

Information that is or can be about or related to an identifiable individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does GDPR consider “special categories of personal data”?

A
  1. Racial or ethnic origin
  2. Religious or philosophical beliefs
  3. Trade Union Membership
  4. Genetic Data
  5. Biometric Data (used for the purpose of uniquely identifying a natural person)
  6. Health Data
  7. Data concerning a natural person’s sex life or sexual orientation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is NOT Personal Information

A

Information that is not about a natural person. e.g. product development plans, military equipment lists, etc.

OR

Information that does not provide a way to identify the person the information is about.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is anonymization?

A

The process of taking personal information and making it impossible to identify the individual to whom the information relates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What two techniques does the HHS use to render information unidentifiable?

A

Expert determination and safe harbor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does “expert determination” require for rendering information unidentifiable?

A

The involvement of a trained statistician who analyzes a de-identified dataset and determines that there is very little risk that the information could be used to identify an individual, even if that information is combined with other publicly available information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does “safe harbor” require for rendering information unidentifiable?

A

Requires the removal of 18 different types of information to remove direct and indirect links to an individual. (names, geographic divisions and zip codes containing fewer than 20K people, phone numbers, VIN numbers, Fax numbers, device id/serial numbers, email addresses, URLs, SSNs, IP addresses, medical record numbers, fingerprints (and other biometrics) health plan beneficiary numbers, full-face photos, account numbers, certificate or license numbers, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does “aggregation” mean?

A

Summarizing data about a group of individuals in a matter that makes it impossible to draw conclusions about a single person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 10 GAPP principles? (What do we need to do to protect privacy?)

A
  1. Management
  2. Notice
  3. Choice & Consent
  4. Collection
  5. Use, Retention, and Disposal
  6. Access
  7. Disclosure to Third Parties
  8. Security for Privacy
  9. Quality
  10. Monitoring & Enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define “Management”

A

The entity defines, documents, communicates, and assigns accountability for its privacy policies and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What criteria should an organization follow to establish control over the management of their privacy program?

A
  1. Create written privacy policies and communicate those policies to personnel.
  2. Assign responsibility and accountability for those responsibilities to an individual or team.
  3. Establish procedures for review and approval of privacy policies and changes to those policies
  4. Ensuring that privacy policies are consistent with applicable laws and regulations
  5. Perform risk assessments no less than annually
  6. Ensure that contractual obligations to customers, vendors and partners are consistent with privacy policies
  7. Assess privacy risks when implementing or changing technology infrastructure
  8. Create and maintain a privacy incident management process
  9. Conduct privacy awareness and training and establish qualifications for employees with privacy responsibilities.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define “Notice”

A

The entity provides notice about its privacy policies and procedures and identifies the purposes for which personal information is collected, used, retained and disclosed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define “Choice & Consent”

A

The entity describes the choices available to the individual and obtains implicit or explicit consent with respect to the collection, use, and disclosure of personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define “Collection”

A

The entity collects personal information only for the purposes identified in the notice.

This governs the ways that organizations come into possession of personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define “Use, Retention, & Disposal”

A

Use: the entity limits the use of PI to the purpose identified in the notice.

Retention: The entity retains PI only as long as necessary to fulfill the stated purpose or as required by law.

Disposal: timely and appropriately disposes of the collected PI

17
Q

Define “Access”

A

The entity allows data subjects the right to access information held about them, and when necessary, to correct that information.

18
Q

Define “Disclosure to Third Parties”

A

The entity discloses PI to third parties only for the purposes identified in the notice and with the implicit or explicit consent of the individual.

19
Q

Define “Security for Privacy”

A

The entity protects personal information against unauthorized access (both physical and logical)

20
Q

Define “Quality”

A

The entity maintains accurate, complete, and relevant personal information for the purposes identified in the notice.

ie: incorrect information can be just as damaging (or more) than information improperly handled

21
Q

Define “Monitoring & Enforcement”

A

The entity monitors compliance with its privacy policies and procedures and has procedures to address privacy related inquiries, complaints and disputes.

22
Q

Define “Data Subjects”

A

the individuals about whom personal information is collected.

23
Q

Define “Data Controller”

A

The organizations who determine the purpose and means of collecting personal information from data subjects

24
Q

Define “Data Processor”

A

service providers who collect or process personal information on behalf of data controllers.

25
Q

What are the three objectives of cybersecurity programs?

A

Confidentiality, Integrity, Availability

26
Q

What is “Confidentiality” in cybersecurity?

A

Ensures that unauthorized individuals are not able to gain access to sensitive information.

27
Q

What is “Integrity” in cybersecurity?

A

Ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally.

28
Q

What is “Availability” in cybersecurity?

A

ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.

29
Q

In what Supreme Court case did the “Right to be let alone” first appear?

A

Olmstead v. United States

30
Q

Which ISO standard is best suited to designing privacy controls?

A

ISO 27701