Privacy and Civil Liberties Overview — Vocabulary Flashcards

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key terms and concepts from the Privacy and Civil Liberties Overview lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

Insider Threat Program

Programs at federal agencies, DoD components, and industry to deter, detect, and mitigate insider threats while protecting privacy and civil liberties.

2
New cards

Privacy and Civil Liberties Overview

A course outlining how privacy laws, regulations, and policies affect insider threat actions and mission success.

3
New cards

FOIA

Freedom of Information Act; gives the public the right to request records from federal agencies; has nine exemptions.

4
New cards

FOIA Exemptions

Nine categories that protect interests such as national security, privacy, and law enforcement from disclosure.

5
New cards

Privacy Act of 1974

Laws governing federal agencies’ collection, maintenance, and disclosure of personal information to protect privacy and provide access and correction rights.

6
New cards

System of Records Notice (SORN)

Public notice describing the nature of collection, retention, and dissemination of records by an agency.

7
New cards

PII

Personally Identifiable Information; data that can identify an individual (e.g., name, SSN, biometrics).

8
New cards

PHI

Protected Health Information; health data regulated under HIPAA; subset of PII.

9
New cards

HIPAA Privacy Rule

Standards governing the use and disclosure of PHI by covered entities and individuals’ privacy rights.

10
New cards

Consent Rule (Privacy Act)

Rule requiring consent to disclose information from a Privacy Act system, with listed exceptions.

11
New cards

Consent Rule Exceptions

Twelve listed exceptions (e.g., legitimate need to know, FOIA, routine uses, census, statistical research, law enforcement, court orders).

12
New cards

First Amendment

Protects freedoms of speech, religion, press, assembly, and petition; limits on government actions regarding these rights.

13
New cards

Fourth Amendment

Protects against unreasonable searches and seizures; requires probable cause and reasonable expectation of privacy.

14
New cards

Fifth Amendment

Protects against self-incrimination and guarantees due process; prohibition against double jeopardy.

15
New cards

Ninth Amendment

States that the enumeration of rights in the Constitution is not exhaustive; other rights exist.

16
New cards

Fourteenth Amendment

Citizenship, due process, and equal protection under the law; basis for many privacy rights through due process.

17
New cards

Reasonable Expectation of Privacy

Test used to determine Fourth Amendment privacy rights: actual expectation and societal recognition of reasonableness.

18
New cards

O'Connor v. Ortega (1987)

Fourth Amendment rights apply to public employees; workplace realities affect reasonable privacy expectations.

19
New cards

Garrity v. New Jersey (1967)

Public employees cannot be compelled to incriminate themselves; Garrity warnings in internal investigations.

20
New cards

Pickering v. Board of Education (1968)

Public employees have First Amendment free speech rights on matters of public importance, absent false statements.

21
New cards

DOD EO 13587

Executive Order establishing reforms to safeguard classified information while protecting privacy and civil liberties.

22
New cards

PCLOB

Privacy and Civil Liberties Oversight Board; analyzes privacy and civil liberties implications of government actions.

23
New cards

OPSEC

Operations Security; process to protect critical information and prevent inadvertent disclosures.

24
New cards

OPSEC Five-Step Process

Identify critical information, analyze threats, assess risks, apply countermeasures, and evaluate impact.

25
New cards

Protected Information

Personally Identifiable Information (PII) and Protected Health Information (PHI) that must be safeguarded.

26
New cards

PHI

Protected Health Information; health data covered under HIPAA protections.

27
New cards

Even-Handedness Approach

Focus on conduct, not individuals; ensure triggers are lawful and standards-based; avoid bias.

28
New cards

Collaborative Roles

Team members (Legal Counsel, HR, Behavioral Science, Security, Cyber, Counterintelligence, Law Enforcement) who support privacy and civil liberties.

29
New cards

Unauthorized Disclosure vs. Whistleblowing

Unauthorized disclosure is a crime; whistleblowing is protected reporting through approved channels.

30
New cards

Whistleblower Protections

Legal protections (e.g., 10 USC 1034, No Fear Act) for reporting fraud or abuses via proper channels.

31
New cards

Threats of Violence

Not protected speech; threats may be restricted to protect safety; R.A.V. v. City of St. Paul outlines rationale.

32
New cards

Balancing Institutional Protections and Rights

Reconciling security needs with individual privacy and civil liberties through governance and collaboration.

33
New cards

Public Trust in Government

Essential to insider threat work; privacy protections help maintain trust while addressing national security needs.

34
New cards

SORN vs. Privacy Act

SORN describes records systems; Privacy Act governs access, corrections, and disclosures of those records.

35
New cards

NISPOM

National Industrial Security Program Operating Manual; relates to safeguarding sensitive information in industry contexts.

36
New cards

15-Word Summary of Civil Liberties in Insider Threat

Civil liberties, privacy, and lawful handling of information are essential in insider threat work.