1/18
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Personal Data
Refers to any information, whether recorded in a material form or not, from which the identity of an individual is apparent or can be directly ascertained by the entity holding the information.
Privacy
Concerns the collection and use of data about individuals
Protects the identity
Accuracy (Privacy Issues)
Relates to the responsibility of those who collect data to ensure that the data is correct.
Property (Privacy Issues)
Relates to who owns the data.
Access (Privacy Issues)
Relates to the responsibility of those who have data to control who can use that data.
Data Privacy
A part of the data protection area that deals with the proper handling of data, with the focus on compliance with data protection regulations.
Focuses on the rights of individuals, the purpose of data collection and processing, privacy preferences, and the way organizations govern the personal data of data subjects
Data Security
Includes a set of standards and different safeguards and measures that an organization is taking to prevent any third party from unauthorized access to digital data or any intentional or unintentional alteration, deletion, or data disclosure
Data Breach
An unauthorized or unintentional disclosure of confidential information.
Cyberattack
The stealing of data or confidential information by electronic means, including ransomware and hacking.
CIA Triad
A model designed to guide an organization’s policies on information security. The elements of the triad are considered the three most crucial components of security.
Confidentiality
(3 Elements of CIA Triad)
Ensures that data is accessed only by authorized individuals.
Integrity
(3 Elements of CIA Triad)
Ensures that information is reliable as well as accurate.
Availability
(3 Elements of CIA Triad)
Ensures that data is both available and accessible to satisfy business needs.
Elements of Data Privacy
Right of an individual to be left alone and have control over their data
Procedures for proper handling, processing, collecting, and sharing of personal data
Compliance with data protection laws
Data Management
The process of ingesting, storing, organizing, and maintaining the data created and collected by an organization.
This is at the heart of privacy.
Information Privacy
Considered an important aspect of information sharing as personal information vulnerabilities have increased
May be applied in numerous ways, including encryption, authentication, and data masking, each attempting to ensure that information is available only to those with authorized access
Internet Privacy
All personal data shared over the Internet is subject to privacy issues. Most websites publish a privacy policy that details the website's intended use of collected online and/or offline collected data.
Financial Privacy
Financial information is particularly sensitive, as it may easily use to commit online and/or offline fraud.
Medical Privacy
All medical records are subject to stringent laws that address user access privileges. By law, security and authentication systems are often required for individuals that process and store medical records.