CIPT MODULE 7; TECHNOLOGY
CHALLENGES FOR PRIVACY EXAM
Principle 1 of the seven privacy principles is proactive and preventative.
Principle 2: Privacy as a Default is one of the seven privacy principles.
Principle 3: Privacy Embedded in Design is one of the seven privacy principles.
Without privacy components, functionality cannot be implemented. For
example, a data storage system that only divulges information with
corresponding consent.
Principle 4: Full functionality "win win" technology is one of the seven privacy
principles. 1. Privacy aspects should be viewed as part of developing "win win
solutions" rather than as a trade-off.
2. Differential privacy technique that permits statistical analysis while
maintaining privacy
Principle 5 of the seven privacy principles is end-to-end security. Throughout
the data life cycle, security should remain constant. For example, thieves may
discover old copies of important data on unencrypted drives.
1. Gathering 2. Processing
3. Storage
4. Dispersal
5. Devastation
The sixth of the seven privacy principles is transparency and visibility. 1. Users
should be directly informed about the usage of their personal data, and it should
be customized to their degree of sophistication.
, Principle 7: Respect for user privacy is one of the seven privacy principles. 1.
The biggest privacy risk while using a system is to the individual. As a result,
when designing, their demands and risk should be the top priorities.
Identifyability: What is it?
the connection between a piece of data and the person who is connected to it.
Centralization: What is it?
Name the two subjective harms.
1. Mental
2. The behavioral
Objective harms: what are they?
1. A missed chance
2. Financial loss
3. Loss of freedom
4. Social harm
What are the four areas when privacy is violated?
1. Information gathering
2. Processing of information 3. Distribution of information
4. The invasion
Which privacy rights are violated when gathering information?
- Surveillance: observing, recording, or hearing someone's activities
Interrogation is the process of asking somebody questions or probing them for
information.
Which privacy rights are violated when processing information?
CHALLENGES FOR PRIVACY EXAM
Principle 1 of the seven privacy principles is proactive and preventative.
Principle 2: Privacy as a Default is one of the seven privacy principles.
Principle 3: Privacy Embedded in Design is one of the seven privacy principles.
Without privacy components, functionality cannot be implemented. For
example, a data storage system that only divulges information with
corresponding consent.
Principle 4: Full functionality "win win" technology is one of the seven privacy
principles. 1. Privacy aspects should be viewed as part of developing "win win
solutions" rather than as a trade-off.
2. Differential privacy technique that permits statistical analysis while
maintaining privacy
Principle 5 of the seven privacy principles is end-to-end security. Throughout
the data life cycle, security should remain constant. For example, thieves may
discover old copies of important data on unencrypted drives.
1. Gathering 2. Processing
3. Storage
4. Dispersal
5. Devastation
The sixth of the seven privacy principles is transparency and visibility. 1. Users
should be directly informed about the usage of their personal data, and it should
be customized to their degree of sophistication.
, Principle 7: Respect for user privacy is one of the seven privacy principles. 1.
The biggest privacy risk while using a system is to the individual. As a result,
when designing, their demands and risk should be the top priorities.
Identifyability: What is it?
the connection between a piece of data and the person who is connected to it.
Centralization: What is it?
Name the two subjective harms.
1. Mental
2. The behavioral
Objective harms: what are they?
1. A missed chance
2. Financial loss
3. Loss of freedom
4. Social harm
What are the four areas when privacy is violated?
1. Information gathering
2. Processing of information 3. Distribution of information
4. The invasion
Which privacy rights are violated when gathering information?
- Surveillance: observing, recording, or hearing someone's activities
Interrogation is the process of asking somebody questions or probing them for
information.
Which privacy rights are violated when processing information?