100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIPT Study Guide UPDATED ACTUAL Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
39
Grade
A+
Uploaded on
26-04-2025
Written in
2024/2025

CIPT Study Guide UPDATED ACTUAL Exam Questions and CORRECT Answers Nissenbaum's Contextual Integrity - CORRECT ANSWER appropriate flows of information - 1. Privacy is provided by 2. Appropriate information flows are those that conform with contextual information norms 3. Contextual informational norms refer to five independent parameters (data subject, sender, recipient, information type, transmission principle) 4. Conceptions of privacy are based on ethical concerns over time Objective harm defined in Calo's Harms Dimensions - CORRECT ANSWER harm is measurable & observable. - Objective A person's privacy is violated due to forced or unanticipated use of personal information which can be categorised as economic loss, lost opportunity, lost liberty, or social detriment.

Show more Read less
Institution
CIPT
Course
CIPT











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CIPT
Course
CIPT

Document information

Uploaded on
April 26, 2025
Number of pages
39
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CIPT Study Guide UPDATED ACTUAL
Exam Questions and CORRECT Answers
Nissenbaum's Contextual Integrity - CORRECT ANSWER - 1. Privacy is provided by
appropriate flows of information
2. Appropriate information flows are those that conform with contextual information norms
3. Contextual informational norms refer to five independent parameters (data subject, sender,
recipient, information type, transmission principle)
4. Conceptions of privacy are based on ethical concerns over time


Objective harm defined in Calo's Harms Dimensions - CORRECT ANSWER - Objective
harm is measurable & observable.


A person's privacy is violated due to forced or unanticipated use of personal information which
can be categorised as economic loss, lost opportunity, lost liberty, or social detriment.


Calo's Harms Dimensions - CORRECT ANSWER - - the perception of harm is just as
likely to have a significant negative impact on individual privacy as experienced harms
- personal information volunteered for use cannot result in a privacy harm
- IT professionals need to rely on privacy notice & privacy control to build & retain trust


Subjective harm defined by Calo in Harms Dimensions - CORRECT ANSWER -
Subjective harm is without a measurable or observable harm, but where an an expectation of
harm exists.
The perception of harm is just as likely to have a significantly negative impact on privacy as
experienced harms called psychological or behavioral harms.


Legal Compliance - CORRECT ANSWER - Legal Compliance is the alignment of
identification of threats & vulnerabilities to specific policy requirements and laws.
Organizations view themselves as compliant or non-compliant and do not take the lens of
privacy by design.

,8 Fair Information Practice Principles (FIPPs) - CORRECT ANSWER - 1. Collection
limitation
2. Data quality
3. Purpose specification
4. Use limitation
5. Security safeguards
6. Transparency
7. Individual participation
8. Accountability


Collection Limitation Principle - CORRECT ANSWER - A fair information practices
principle, it is the principle stating:
(1) there should be limits to the collection of personal data
(2) that any such data should be obtained by lawful
and (3) fair means and, where appropriate, with the knowledge or consent of the data subject.


Data Quality Principle - CORRECT ANSWER - Personal data should be relevant to the
purposes for which it is used and should be accurate, complete and up-to-date.


Purpose Specification Principle - CORRECT ANSWER - A fair information practices
principle, it is the principle stating:
(1) that the purposes for which personal data are collected should be specified no later than at the
time of data collection


(2) and the subsequent use limited to the fulfillment of those purposes or such others as are not
incompatible with those purposes and as are specified on each occasion of change of purpose.


Use Limitation Principle - CORRECT ANSWER - A fair information practices principle, it
is the principle that:

,(1) personal data should not be disclosed, made available or otherwise used for purposes other
than those specified in accordance with Paragraph 8 of the Fair Information Practice Principles
except with the consent of the data subject or by the authority of law.


Security Safeguards Principle - CORRECT ANSWER - A fair information practices
principle, it is the principle that personal data should be protected by reasonable security
safeguards against such risks as loss or unauthorized access, destruction, use, modification or
disclosure of data.


Transparency Principle - CORRECT ANSWER - A fair information practices principle
that encourages organizations to be open about personal information they collect


Individual Participation Principle - CORRECT ANSWER - A fair information practices
principle, it is the principle that an individual should have the right to access, edit or delete data


Accountability Principle - CORRECT ANSWER - A fair information practices principle
states that individuals controlling the collection or use of personal information should be
accountable for taking steps to ensure the implementation of these principles (FIPPs)


NIST framework - CORRECT ANSWER - National Institutes of Standards &
Technologies; explicitly addresses vulnerabilities, adverse events and relative likelihoods of
impacts of those events


NICE framework - CORRECT ANSWER - National Initiative for Cybersecurity
Education; divides computer security work into:
- securely provision
- operate & maintain
- protect & defend
- investigate
- analyze
- oversee & govern
- collect & operate

, Factors Analysis in Information Risk (FAIR) - CORRECT ANSWER - International
standard quantitative model for security risk;
The purpose is to find factors that can be calculated or reasonably estimated, thus building up an
estimate of the overall risk


Privacy risk - CORRECT ANSWER - The probable frequency and probable magnitude of
future privacy violations


Action frequency - CORRECT ANSWER - The probable frequency, given a time frame,
that a threat actor acts toward an individual in a way that is a potential privacy violation (attempt
frequency * vulnerability = action frequency)


Attempt frequency - CORRECT ANSWER - The probable frequency, given a time frame,
that a threat actor attempts an act toward an individual
(opportunity * probability of action = attempt frequency)


Vulnerability - CORRECT ANSWER - The probability that a threat actor's acts will
succeed
(capability * difficulty = vulnerability)


Opportunity - CORRECT ANSWER - The probable frequency, given a time frame, at
which a threat actor will come in contact with an individual or the individual's information & be
provided the opportunity to act in a way that could cause a privacy violation


Probability of action - CORRECT ANSWER - The probability that a threat actor will act
in a way that is a potential privacy violation, if given the opportunity


Capability - CORRECT ANSWER - The skills and resources available to a threat actor in
a given situation to act in a way that is a potential privacy violation

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1078
Member since
1 year
Number of followers
102
Documents
68972
Last sold
3 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

171 reviews

5
73
4
30
3
46
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions