CIPT

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Four techniques of deidentification

1. Tokens 2. Anonymization 3. Pseudonymization 4. K-anonymity, l-diversity, t-closeness

What term is used when previously collected data is used for a purpose other than that for which it was initially collected? A. Retention B. Recycling C. Repurposing D. Reuse

C. Repurposing

Vulnerability is determined by what two factors? A. Probability and confidentiality B. Capability and portability C. Confidentiality and integrity D. Capability and probability

D. Capability and probability

True or False: While monitoring and analyzing data during runtime leads to the risk of inadvertent collection of personal information, privacy technologists cannot reduce this issue

False, programmers can reduce the risk through analysis, defect-tracking, and API

The technical investigation

examines how the existing technology supports or hinders human values and how the technology might be designed to support the values identified in the conceptual investigation.

Deidentification: Pseudonymization

replacing individual identifiers (such as names) with numbers, symbols, or a combination of these, such that data points are not directly associated with a specific individual

Governed and owned by AXELOS. Provides an overall measurable view of technology system, service, and functionality. It reports on services provided by technology system and helps organizations use technology to support change and growth. Limited view of risk management

ITIL

A marketing lead has collected a large data set of personal information and stored it in a shared folder. The marketing lead controls who has access to the shared folder. The type of access control being used is: A. Discretionary B. Mandatory C. Attribute-based D. Rule-based

A. Discretionary

Action by an external party, such as govt entity, that interferes w/ an individual's decision making regarding their personal affairs. Inaccurate data can lead to decisional interference

Decisional interference

Three types of interference:

Decisional, Intrusion, Self-representation

What term refers tot he overall organizational design of a system and recognizes the relationship between all elements of a system? A. Service-oriented architecture B. Enterprise architecture C. Client-based architecture D. Plug-in architecture

B. Enterprise architecture

Objective Lost opportunity

Employment, insurance, housing, education

Privacy Engineering Objective: Predictability

Enabling reliable assumptions by individuals, owners, and operators about data and their processing by a system

Privacy Engineering Objective: Disassociability

Enabling the processing of data or events without association to individuals or devices beyond the operational requirements of the system

Validation

Ensures the requirements satisfy the needs of the intended user base

Verfication

Ensures the resultant system performs the way is its suppose to perform

Objective harm

External to individual: lost opportunity, lost liberty/life, Social detriment

Works alongside compliance models to mandate notice choice and consent, access to information, controls on information, and how information is managed. High level abstractions of privacy, interpretation is necessary to determine application

FIPPS Fair Information Privacy Principles

True or false: The most efficient and cost-effective way for orgs to address evolving privacy laws and advancing technology is to design for just the org's requirements within their jurisdiction

False

Contextual Integrity: Actors, Transmission principles, Attributes

Actors: The senders and receivers of personal information Transmission principles: Those that govern the flow of information Attributes: The types of information being shared

Process-oriented strategies

- Enforce - Demonstrate - Inform - Control

Data-oriented strategies

- Separate - Minimize - Abstract - Hide

Data Inventories, knowing where data is....

-Collected -Processed -Stored -Classified

Examples of values for value sensitive design:

-Context specific -user specific -Malleable -Difficult to define

Privacy-enhancing technology (PET)

-Mix networks -Secure multiparty computation -Differential privacy -Anonymous digital credentials -Private information retrieval -Homorphic encryption

Cross-border data transfers in compliance with the law

-the recipient is subject to a law, binding corporate rules, or binding agreement that provides an adequate level of protection; -the data subject consents to their personal data being transferred to a third party in a foreign country; -the transfer is necessary for the performance of a contract between the data subject and the controller; -the transfer is necessary for the conclusion or performance of a contract concluded in the interest of the data subject between the controller and a third party; -the transfer is for the benefit of the data subject, subject to certain restrictions.

Steps in mapping privacy risk to controls in a design methodology are?

1. Architect 2. Secure 3. Supervise 4. Balance

OWASP Top 10

1. Broken Access Control moves up from the fifth 2. Cryptographic Failures 3. Injection. 4. Insecure Design 5. Security Misconfiguration 6. Vulnerable and Outdated Components 7. Identification and Authentication Failures 8. Software and Data Integrity Failures 9. Security Logging and Monitoring Failures 10. Server-Side Request Forgery

Write Once Read Many (WORM)

A data storage device in which information, once written, cannot be modified. This protection offers assurance that the data originally written to the device has not been tampered with. The only way to remove data written to a WORM device is to physically destroy the device.

Which of the following may pose a "client side" privacy risk? A. An employee loading personal data on a company laptop B. Failure of a firewall that is protecting the company's network C. A distributed denial of service (DDoS) attack on the org D. A remote employee placing communication software on a company server

A. An employee loading personal data on a company laptop

The first step in mapping privacy risk to controls in a design methodology is? A. Architect B. Balance C. Secure D. Supervise

A. Architect

An incident response plan for a privacy breach includes notification of affected individuals, law enforcement, and other agencies. What is the first step an organization should take when approaching notification? A. Consult with your org's legal team B. Notify individuals affiliated with the org C. Alert local media that a breach has occurred D> Notify individuals affiliated with the breach

A. Consult with your org's legal team

What measures can be put in place to secure data? Choose all that apply A. Data classification Policies B. Surveillance cameras C. Log-in requirements for accessing sensitive personal information D. Opt-in controls E. Data retention policies

A. Data classification Policies B. Surveillance cameras C. Log-in requirements for accessing sensitive personal information E. Data retention policies

What type of interference occurs when false or inaccurate information on a credit application results in denial of credit? A. Decisional B. Intrusion C. Disclosure D. Appropriation

A. Decisional

In creating a registration form for a mobile app directed at grade school children, what privacy engineering objective is addressed by asking for grade level instead of data of birth? A. Disassociability B. Manageability C. Security D. Predictability

A. Disassociability

Privacy engineering addresses the challenges of translating privacy principles and harms into engineering requirements. What key concepts within an organization help realize this? Choose all that apply A. Engineering development life cycle B. Privacy design patterns C. Manageability D. Technological controls E. Data governance

A. Engineering development life cycle D. Technological controls E. Data governance

Which of the following are risks inherent with internet-of-things (IoT) devices? A. Hackers may be able to alter devices, turning them into a means of surveillance B. Household members can monitor one another's comings and goings C. Collected data from wearable health devices is not covered under health information privacy laws D. Individuals feel a loss of control or the uneasy feeling that they are being surveilled by family members

A. Hackers may be able to alter devices, turning them into a means of surveillance B. Household members can monitor one another's comings and goings C. Collected data from wearable health devices is not covered under health information privacy laws D. Individuals feel a loss of control or the uneasy feeling that they are being surveilled by family members

In what ways can privacy technologists mitigate risk of interrogation? Choose all that apply A. Implement controls that allow users to opt in to providing information B. Limit the collection of data to only that which is necessary C. Implement controls that flag for explicit language D. Use encryption when collecting sensitive personal information

A. Implement controls that allow users to opt in to providing information B. Limit the collection of data to only that which is necessary

Low-level design focuses on improving the quality of programming practices through which of the following? Choose all that apply A. Loose coupling B. Integration testing C. Information hiding D. Reusing standard APIs E. Building frameworks that can be reused

A. Loose coupling C. Information hiding D. Reusing standard APIs E. Building frameworks that can be reused

Which privacy risk model or framework is described as maintaining personal information in alignment with the informational norms that apply to a particular context? A. Nissenbaum's Contextual Integrity B. Calo's harm dimensions C. Privacy by design D. Value-sensitive design

A. Nissenbaum's Contextual Integrity

What is the difference between objective harms and subjective harms? A. Objective harms are measurable and observable; subjective harms are only expected or perceived by the individual B. Only objective harms impact an individual's decision to use a software program C. Objective harms are the primary type of harm that should be considered when determining whether a privacy harm has occurred D. Objective harms impact individuals on a psychological and behavioral level while subjective harms can result in loss of business opportunities or consumer trust

A. Objective harms are measurable and observable; subjective harms are only expected or perceived by the individual

When purchasing a product from TripeType's website, a customer must enter basic information into a purchase form. A link to TripeType's privacy statement is provided on the purchase form. However, it does not disclose that it will use personal information for other purposes. The statement provides that TT will store the customer information in its database. A month later, TT's sales team wants to generate new leads and decides to use the information collected from customers. This is an example of what? A. Secondary Use B. Involuntary use C. Disapproved Use D. Selective Use

A. Secondary Use

Which of the following technologies allows individuals to participate in a salary survey without revealing the specific salary or personal information of any of the participants? A. Secure multiparty computation B. Digital rights management C. Ciphertext D. Homomorphic encryption

A. Secure multiparty computation

What elements of a design pattern describes the components of the design, their relationships, their roles, and how they interact? A. Solution B. Consequence C. Problem description D. Pattern name

A. Solution

What activity includes an evaluation of some aspect of the system or component? A. Testing B. Supervision C. Integration D. Obfuscation

A. Testing

Examine statements below and choose all those that are examples of appropriation A. Using a celebrity's image to endorse a product without their permission B. Revealing the security code to a home alarm system to a source outside the family without permission C. A politician distorting facts about their opponent to make them appear less credible D. Social media page using the names of friends to tempt users to follow a specific page

A. Using a celebrity's image to endorse a product without their permission D. Social media page using the names of friends to tempt users to follow a specific page

Four things to do with risk:

Accept, transfer, mitigate, and avoid

Type of asset: Customer and employee data, as well as backup copies of data-stored either onsite or offsite

Assets information

Type of asset: Software code, trade secrets

Assets intellectual

Information is expressed in a summary form that reduces the value and quality of data, as well as the connection between the data and the individual

Aggregation

On demand privacy

Allow users to seek out and review privacy info or their privacy settings and opt outs at any time

Web Beacon

Also known as a web bug, pixel tag or clear GIF, a web beacon is a clear graphic image (typically one pixel in size) that is delivered through a web browser or HTML e-mail. The web beacon operates as a tag that records an end user's visit to a particular web page or viewing of a particular e-mail. It is also often used in conjunction with a web cookie and provided as part of a third-party tracking service. Web beacons provide an ability to produce specific profiles of user behavior in combination with web server logs. Common usage scenarios for web beacons include online ad impression counting, file download monitoring, and ad campaign performance management. Web beacons also can report to the sender about which e-mails are read by recipients. Privacy considerations for web beacons are similar to those for cookies. Some sort of notice is important because the clear pixel of a web beacon is quite literally invisible to the end user.

Type of asset: Servers, workstations, laptops, portable storage devices

Assets physical

Internet monitoring types:

Authoritative, Behavioral, Wi-fi eavesdropping

Anchoring

Available information creates a reference point for future decisions. Ex: Information or judgements about other's disclosure behavior. Anchoring also manifests in ordering effects: Survey participants disclose more info when a survey starts w/ intrusive questions, and gradually reduces in sensitivity compared to a survey that gradually becomes more sensitive

Under the EU's General Data Protection Regulation (GDPR), which of the following types of information would NOT require notification to a supervisory authority in the event of a personal data breach? A. Pseudonymized data B. Anonymized data C. Reidentified data D. Deidentified data

B. Anonymized data

Surveillance happens at what point in the data life cycle? A. Use B. Collection C. Destruction D. Retention

B. Collection

What type of interference occurs when advertisers track a user's online behavior to design personalized ads that represents the user's interests? A. Decisional interference B. Intrusion C. Disclosure D. Self-representation

B. Intrusion

Which of the following is NOT an example of automated decision making? A. Receiving an answer to a support question utilizing a chat bot B. Obtaining approval for insurance through an online application C. Requesting an emailed catalog from an online retailer D. Setting airfare based on browser history and date of purchase

C. Requesting an emailed catalog from an online retailer

True or False: Manageability includes allowing individuals to have access to their information to make changes to inaccurate information

False, manageability assigns appropriate stakeholders to administer changes to an individual's information to ensure security and mitigate fraud

You have been tasked with developing an incident response process for your employer, BrandEnt Company, a media entertainment company. As the senior manager of information privacy, you have been creating privacy-related procedures for the company. There has been an uptick in the number of privacy-related questions being sent to customer service through the website's generic portal, and the customer service reps are unsure of what to do with the questions. This has led to the director of privacy asking that you work with the IT department to identify, track and resolve privacy-related incidents, as well as with the Information Security team to leverage their existing incident-management process. As you review the questions, you notice that many customers are asking what personal information BrandEnt has collected about them. You grow concerned as you notice that customer service representatives are not always responding to these inquiries. The website doesn't have a portal dedicated to asking privacy-related questions, and instead a general customer service portal form is being used. This form only requests the customer's name and their email address. The site does not require authentication to get to this portal. For responses that have been processed, the customer service representatives sent compressed files containing all data collected regarding the individual and sent it to the email provided. You reach out to the Information Security team to request access to their incident ticketing system to determine if the existing process can be leveraged. As you review the incident tickets, you notice several security incidents related to data breaches. After speaking with the Information Security team lead, you learn that the tickets were closed after the vulnerabilities were patched and the system owners were notified. What follow up should be done regarding the data breaches that have already occurred? A. Review the fixes applied for the vulnerability and verify that it was applied on all affected systems. B. Review the information that was breached and determine what levels of notification are required. C. Send a notification to all customers notifying them of the breach. D. Nothing is required as the security team reviewed and closed the incident

B. Review the information that was breached and determine what levels of notification are required.

What type of privacy violation occurs when the recipient of personal information shares it outside of the expectations of the individual who provided their information? A. Surveillance B. Secondary Use C. Distortion D. Exclusion

B. Secondary Use

What is an example of a federated identity? A. National ID number B. Single sign-on credentials C. Corporate ID number D. A token

B. Single sign-on credentials

Low-level design concerns the details of the overall design of the system and focuses on improving the quality of programming practices through each of the following mechanisms EXCEPT: A. Information holding B. Threat Modeling C. Reusing existing standard API libraries D. Loose coupling

B. Threat Modeling

Which of the following circumstances would best be addressed by utilizing radio frequency identification (RFID) technology? A. An org has a high error rate for entering credit card data into POS system B. An org requires two-way communication between its discoverable devices C. An org needs to develop an encryption-supported network D. An org's inventory process is taking too long

D. An org's inventory process is taking too long

An organization wants to enter into a contract with a third-party cloud provider for storage of client personal information. The business head is entering into this agreement to eliminate risk associated with a data breach by transferring the information to the third-party processor. She asks you if this a good way to eliminate breach risk. Please choose the BEST response from the choices below: A. Third party processors have sole liability for the data they process, because the data is in their possession. We can rely on the security program of the third party since they did not report a data breach in the previous 12 months B. Under most privacy and data protection laws, following a data breach, an organization retains liability for personal data that it has collected and transferred to third party processors. Third party processors may share liability for the breach as well. We should routinely validate data protection controls of third parties we are doing business with to make sure our client data is protected properly C. Organizations can transfer data to a third party to avert all liability for damages resulting from a data breach. We can use contract language to eliminate the need for third party due diligence D. Organizations can only be liable for data breaches if an individual brings a lawsuit. A government agency is able to investigate the organization but can only issue orders to the organization to correct deficiencies in the information security program. Money penalties are only available to individual plaintiffs, or as a result of a class action

B. Under most privacy and data protection laws, following a data breach, an organization retains liability for personal data that it has collected and transferred to third party processors. Third party processors may share liability for the breach as well. We should routinely validate data protection controls of third parties we are doing business with to make sure our client data is protected properly

Objective lost liberty/life

Bodily injury, death, incarceration

In the event of an incident, what privacy attribute allows personal information to be accessed if an individual is not able to consent? A. Integrity B. Network centricity C. Availability D. Mobility

C. Availability

You are browsing the web and shopping for new furniture. You then open your favorite social media to scroll through the posts. While doing so, you start noticing ads for furniture. This is an example of what? A. Direct Marketing B. Individual advertising C. Behavioral advertising D. Indirect Marketing

C. Behavioral advertising

Vulnerability is determined by what two factors? A. Detection and prevention B. Governance and oversight C. Capability and probability D. Operation and maintenance

C. Capability and probability

This form of automated decision-making acts as a subset of machine learning in that it learns by performing a task repeatedly, adjusting along the way to deepen and improve the outcome A. Chatbots B. Context-aware computing C. Deep learning

C. Deep learning

How does employing the objective of predictability benefit an organization? Choose all that apply A. It assigns appropriate stakeholders to administer changes to an individual's information B. It increases the need for advances in techniques that disassociate individuals from their information C. It supports trusted relationships between stakeholders and individuals, thereby enabling operators to implement innovative changes to a system to provide better services D. It helps stakeholders adequately describe what is happening with the personal information in their possession from a value statement on transparency to a requirements-based program that explains how personal information is managed

C. It supports trusted relationships between stakeholders and individuals, thereby enabling operators to implement innovative changes to a system to provide better services D. It helps stakeholders adequately describe what is happening with the personal information in their possession from a value statement on transparency to a requirements-based program that explains how personal information is managed

Which of the following is an objective for privacy engineering? A. Encryption B. Anonymization C. Manageability D. Audit

C. Manageability

When creating a data inventory, it is important to include a range of detailed information on the company's data assets. This information should include how the data is accessed and by whom, how the data is managed, who owns it, where the data is stored, and the ____ that defines the individual data records and what they contain A. Structured data B. Schema C. Metadata D. Dictionary

C. Metadata

Which of the following privacy practices would be most useful to users who are not knowledgeable about protecting their personal information? A. Choice B. Control C. Notice D. Consent

C. Notice

What is NOT a data-based technique used to protect privacy? A. Encryption B. Aggregation C. Process Documentation D. Deidentification

C. Process Documentation

You have been tasked with developing an incident response process for your employer, BrandEnt Company, a media entertainment company. As the senior manager of information privacy, you have been creating privacy-related procedures for the company. There has been an uptick in the number of privacy-related questions being sent to customer service through the website's generic portal, and the customer service reps are unsure of what to do with the questions. This has led to the director of privacy asking that you work with the IT department to identify, track and resolve privacy-related incidents, as well as with the Information Security team to leverage their existing incident-management process. As you review the questions, you notice that many customers are asking what personal information BrandEnt has collected about them. You grow concerned as you notice that customer service representatives are not always responding to these inquiries. The website doesn't have a portal dedicated to asking privacy-related questions, and instead a general customer service portal form is being used. This form only requests the customer's name and their email address. The site does not require authentication to get to this portal. For responses that have been processed, the customer service representatives sent compressed files containing all data collected regarding the individual and sent it to the email provided. You reach out to the Information Security team to request access to their incident ticketing system to determine if the existing process can be leveraged. As you review the incident tickets, you notice several security incidents related to data breaches. After speaking with the Information Security team lead, you learn that the tickets were closed after the vulnerabilities were patched and the system owners were notified. Which common privacy principle is missing at BrandEnt? A. Use limitation. B. Collection limitation. C. Security safeguard. D. Data quality

C. Security safeguard.

Privacy technologists ensure that collected data is which of the following? (Choose all that apply) A. Repurposed and used in as many ways as possible B. Retained indefinitely C. Used only for the purposes for which it was collected D. Destroyed in accordance with organizational guidelines

C. Used only for the purposes for which it was collected D. Destroyed in accordance with organizational guidelines

Testing during software development generally consists of which two sets of activities? A. Implementation and deployment B. Alpha and beta testing C. Validation and verification D. Runtime monitoring and auditing

C. Validation and verification

Authentication can be accomplished by a variety of mechanisms. Which are the four main categories? A. What you know, when you know, where you are, what you are B. What you know, what you have, when you know, where you are C. What you know, what you have, where you are, what you are D. What you know, what you have, where you are, when you know

C. What you know, what you have, where you are, what you are

Destruction of portable media:

CDs, DVDs, flash drives need to physically destroyed, maybe professionally

Comprehensive program that helps with management of a technology system that allows for technology governance

COBIT

Destruction of hard copy:

Challenge lies in what needs to be destroyed and when, should have established guidelines in place for document destruction

Subjective Behavioral

Changed behavior, reclusion

Data life cycle:

Collection -> Use -> Disclosure -> Retention -> Destruction

Technology architecture Back end

Collection, Use, Disclosure, retention

Process-oriented strategy: Enforce

Commit to processing personal data in a privacy friendly way and enforce this -Create: Decide on a privacy policy that describes how you wish to protect personal data -Maintain: Maintain the privacy policy created -Uphold: Ensure that policies are adhered to by treating personal data as an asset and privacy as a goal to incentivize as a critical feature

Internet Monitoring - Behavioral

Companies may monitor browsing history and behavior for targeted advertising. History relates to the types of sites users are visiting or purchases they are making, while behavior relates to how long a user stays on a page or hovers over links before clicking

System testing

Completed portions of the whole system. This ensures that an individual's information was not exposed throughout the network traffic, files, or any part of the system

What is value-sensitive design? A. An investigative process intended to establish the ROI for each potential design option B. An iterative design process in which designers focus on the users and their needs in each phase of the design process C. A design process with a focus on the potential return on investment (monetary value) of each design feature D. An iterative investigative approach to design that takes human values into account during the design process

D. An iterative investigative approach to design that takes human values into account during the design process

What type of encryption uses one key for encryption and another key for decryption? A. Application B. Field C. Symmetric D. Asymmetric

D. Asymmetric

Which of the following explains why it is difficult to regulate what individually identifiable data is? A. Many people mistakenly expose personal information online B. Personal information means different things to different people C. Most legislative bodies are hesitant to enact laws about identifiable data D. Data that is not overly identifiable can be combined to identify individuals

D. Data that is not overly identifiable can be combined to identify individuals

Pseudonymization is a type of A. Label B. Anonymization C. Algorithm D. Deidentification

D. Deidentification

The small piece of data that controls an algorithm's execution is called a: A. Pseudo-identifier B. Label C. Token D. Key

D. Key

Which of the following privacy-related principles would be the main concern during the data usage stage of the data life cycle? A. Transparency B. Data Minimization C. Storage Limitation D. Purpose Limitation

D. Purpose Limitation

Ubiquitous computing can raise significant concerns about the sheer volume of data that can be collected by a system. Each of the following are necessary considerations when utilizing a data collection process that falls into this category EXCEPT which? A. The system should provide end-users with both feedback and control B. The system should have obvious value C. The retention of data by the system should be limited D. The data collected by system should be aggregated and made available to all users

D. The data collected by system should be aggregated and made available to all users

What is the primary purpose of a privacy by design framework? A. To outline the legal and ethical expectation of a robust privacy program B. To provide a framework of steps that should be incorporated into the creation of any new design C. To specify the technology and procedures that should be used to ensure personal information is protected D. To provide guidance for proactively incorporating privacy from the beginning to the end of the design process

D. To provide guidance for proactively incorporating privacy from the beginning to the end of the design process

Key Concepts of Privacy Engineering

Data governance, Technological Controls, Engineering Life Cycle

Knowing where data is -Collected -Processed -Stored -Classified

Data inventories

Used to separate customer information. It formulates all the constraints to be applied on the data and defines its entities and the relationships among them

Data schema

Two types of privacy by design strategies:

Data-oriented and process-oriented

Setting parameters that limits the confidence that any particular individual has contributed to an aggregated value.

Differential identifiability

The management of access to and use of digital content and devices after sale. DRM is often associated with the set of access control (denial) technologies. These technologies are utilized under the premise of defending copyrights and intellectual property but are considered controversial because they may often restrict users from utilizing digital content or devices in a manner allowable by law

Digital rights management

Deidentification: Anonymization

Direct and indirect identifiers have been removed, and mechanisms have been put in place to prevent reidentification

Direct versus Indirect design affecting users

Direct: Interact with system Indirect: How stakeholders configure, use, or are otherwise affected by the technology

Destruction for digital content:

Disks should be formatted. Hard drives, tapes, and other magnetic media will need to be degaussed

Availability heuristic

Due to uncertainty about privacy risks, people may look for other available cues to judge probability of risk and guide their behavior. Ex: Rather than read the privacy policy, people rely on readily available clues, such as store's visual design, presence of a privacy policy, vendor's reputation, or even just company name

True or False: It is illegal across all 50 states for law enforcement to use drones for search or surveillance without obtaining a search warrant prior

False

True or False: To successfully identify an individual by piecing together information from different sources, one of the identifiers must be the individual's name

False

ITIL and COBIT

Frameworks to help with security and privacy

What term is used when individuals share information such as location, emotions, opinions, and experiences via their mobile devices, which enables a better understanding of human behaviors and activities, meaningful patterns and detectable trends? A. Web tracking B. Geo tagging C. Geo social patterns D. Natural language generation

Geo social patterns

Example of privacy law

HIPAA, GDPR

Integration testing

How components interact between other groups of components. Ensures the function of one unit interacts correctly with other components

Something a privacy impact assessment (PIA) does not accomplish?

Implements controls on data collection

-Discovery -Containment -Analyze and notify -Repercussions -Prevention -Third parties

Incident Response Plan

Unit testing

Individual functions and system components. This determines whether a unit, with a predefined input, will yield an expected output

Process-oriented strategy: Inform

Inform data subjects about the processing of their personal data -Supply: Inform users when personal data is processed, including policies, processes, and potential risks -Notify: Alert data subjects whenever their personal data is being used or breached -Explain: Provide information in a concise and understandable form, and explain why processing is necessary

Subjective harm

Internal to individual: Psychological, behavioral

Disturb an individual's solitude or tranquility. Can be physical, psychological, or informational. Does not need personal information for this interference type, as you do not need someone's name to knock on their door to try to sell them something

Intrusion interference

Julie needs to securely transfer a file containing personal data to Katelyn. They decide to use asymmetric encryption. What are the correct steps they should follow?

Julie encrypts the file using Katelyn's public key, Katelyn decrypts using her private key

Disclosure of specific information practices posted, usually accompanied by a consent request, at the point of information collection.

Just-in-time-Notification

Statutory and regulatory mandates systems that handle personal information -Type of data collected -What the system does with that data -How the data is protected, stored, and disposed of

Legal compliance

Preventative Privacy Internal Control

Limit access of personal data to authorized personnel only

Preventative Security Internal Control

Limit access of sensitive data to authorized personnel only

Data-oriented strategy: Abstract

Limit as much as possible the detail in which personal data is processed -Group: Aggregate data over groups of individuals instead of processing data of each person separetely (those who bought hammers also bought nails) -Summarize: Summarize detailed information into more abstract attributes(age range 20-28) -Perturb: Add noise or approximate the real value of a data item ie -> pothole app, delay in sending information/reports

Data-oriented strategy: Minimize

Limit as much as possible the processing of personal data -Exclude: Refrain from processing a data subject's personal data (don't need it, don't collect it) -Select: Decide on a case-by-case basis to only process relevant personal data ex customer picking up or delivery, only need address for delivery -Strip: Remove, partially, unnecessary attributes. Stripping data allows the removal of unnecessary data for future processing or distribution -Destroy: Remove completely personal data as soon as they become unnecessary, three times when orgs will want to destroy ~ 1. Inadvertently collected 2. Data no longer necessary 3. Individual requests deletion

List objective harms

Loss of business opportunity, loss of consumer trust, social detriment

Subjective Psychological loss

Loss of trust, embarrassment, anxiety, suicide

Objective social detriment

Loss of trust, shunning, ostracism, banishment

Maintaining personal information in alignment with the informational norms that apply to a particular context

Nissenbaum's Contextual Integrity

Technology Architecture Front end

Notification, Consent, Tutorials

Even when a user has indicated a decision, _____ is an attempt to get them to reconsider to an alternative that may be less privacy friendly

Nudging

At setup interfaces

Often shown on initial use. However, only info and choices that are truly essential before use should be communicated at setup because users' attention is typically focused on the primary UX at this point

Example of privacy policy

Org policy

Representative heiristic

People may perceive privacy intrusions as low-probability events bc they rarely encounter privacy intrusions online. However, privacy intrusions, such as behavioral tracking and targeting, may occur frequently or continuously but may just not be visible to the individual

Privacy Engineering Objectives

Predictability, Manageability, Disassociability

The acronym PGP stands for:

Pretty Good Privacy

Informs consumers about practices, values, and commitments of privacy

Privacy Notice

Misdirected emails, denial of service, unauthorized disclosure, hacking attempts, lost devices are all examples of .......?

Privacy incidents

Internal practice to inform employees of best practices

Privacy policy

Data-oriented strategy: Hide

Protect personal data or make it unlinkable or unobservable; make sure it does not become public or known -Restrict: Prevent unauthorized access to personal data -Mix: Process data randomly within a large enough group to reduce correlation -Obfuscate: Prevent understanding of personal data; Number of different techniques, like encryption and hashing -Disassociate: Remove the correlation between data subjects and their personal data

Process-oriented strategy: Control

Provide data subjects control over the processing of their personal data

Privacy Engineering Objective: Manageability

Providing the capability for granular administration of data, including collection, alteration, deletion, and selective disclosure

Occurs when another alters how an individual is represented or regarded.

Self representation

Data-oriented strategy: Separate

Separate the processing of personal data as much as possible to prevent correlation -Distribute: Process personal data (for one task) in separate locations. Taking data from a source and either logically or physically separating data(or both) Doesn't involve further processing of data -Isolate: Processing data already distributed, process independently in separate databases or systems

Differential identifiability

Setting parameters that limits the confidence that any particular individual has contributed to an aggregated value.

Process-oriented strategy: Demonstrate

Show you are processing personal data in a privacy-friendly way -Log: Track all processing of data and reviewing this information gathered for any risks -Audit: Audit processing of personal data regularly -Report: Analyze collected information on tests, audits, and logs periodically, and report to the people responsible

Persistent privacy indicators

Shown whenever a data practice is active. Ex: A visible light when camera is on

Internet Monitoring - Authoritative

Some countries, employers, and schools monitor network traffic to enforce policies for security and appropriate behavior. Certain keywords or addresses could be monitored for and added to a blacklist or access control list to block access to websites that may be considered inappropriate

Distortion

Spreading false and inaccurate information about an individual.

Cross-border Data Transfers

The transmission of personal information from one jurisdiction to another. Many jurisdictions, most notably the European Union, place significant restrictions on such transfers. The EU requires that the receiving jurisdiction be judged to have "adequate" data protection practices.

What is the main benefit of using a private cloud? A. The ability to use a backup system for personal files. B. The ability to outsource data support to a third party. C. The ability to restrict data access to employees and contractors. D. The ability to cut costs for storing, maintaining and accessing data.

The ability to restrict data access to employees and contractors

Recognizes that data has different value, and requires approaches, as it moves through an organization from collection to deletion. The stages are generally considered to be: Collection, processing, use, disclosure, retention, and destruction.

The information life cycle

Deidentification: k-anonymity, l-diversity, t-closeness

Three techniques that have been developed to reduce the risk of anonymity of data being compromised by someone who might combine it with known information to make assumptions about individuals in a data set

Context-dependent interfaces

Triggered by certain aspects of the user's context. Example: Proximity to IoT device

True or False: Although hackers cannot readily access closed-source software, it should not be considered more resistant to attacks than open-source software

True

True or False: Dark patterns are schemes used in decisional interference

True

True or False: Natural language generation uses voice recognition to produce an executable command, such as voice to text, while natural language understanding extracts language that the computer can understand and transforms the command into an executable output

True

True or False: Privacy technologists can comply with privacy laws in their design and use those laws as a basis for implementing technological controls to align with the privacy goals of an organization

True

Internet Monitoring - Wi-fi Eavedropping

Unsecured communication that is sent over or shared wireless networks can be easily intercepted via packet sniffing and analysis tool

Periodic reminders

Useful to remind users about data practices that they agreed to previously and renew consent

Deidentification: Tokens

Uses random tokens as stand-ins for meaningful data

Components of front end

Web browser and web server

Components of back end

Web service

The components of the data life cycle

collection, use, disclosure, retention and destruction

Methods of collection

either active or passive. Active collection is when the data subject is aware that collection is taking place and takes an action to enable the collection, such as filling out and submitting an online form. Passive collection occurs without requiring any action from the participant and is not always obvious, such as background collection of a user's web browser version and IP address

The empirical investigation

focuses on how stakeholders configure, use or are otherwise affected by the technology

The conceptual investigation

identifies the direct and indirect stakeholders, attempts to establish what those stakeholders might value, and determines how those stakeholders may be affected by the design.

Relies on the creation of generalized, truncated, or reduced quasi identifiers as replacements for direct identifers

k-anonymity

The data life cycle

refers to how data flows through an organization, including business processes and technology systems

truncated

to shorten


संबंधित स्टडी सेट्स

Fundamentals of Nursing Course Point Quiz- CH. 4

View Set

The Respiratory System - Chapter 21-5 Enclosed by a pleural membrane, the lungs are paired organs containing alveoli, which permit gaseous exchange - Bronchial Tree

View Set

Psychology 19.1 How Do We Learn?

View Set

Reaction rates and Collision Theory

View Set

Coursepoint Ch 5: Cultural Diveristy

View Set

Advanced Financial Management Exam 2

View Set

CH 3: The Entrepreneurial Mind-Set in Organizations: Corporate Entrepreneurship

View Set