1/28
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
What does “privacy” mean in the context of technology?
The ability to control personal information and limit who can access, use, and share it, especially as new technologies create new risks.
Name two privacy risks introduced by search engines or smartphone apps.
Tracking via cookies, unauthorized data collection, profiling, data resale, and location tracking.
What is “informed consent” in data privacy?
When users are fully aware of what data is collected, how it will be used, and they voluntarily agree.
Define “secondary use of data.”
Using data for a purpose different from the one for which it was originally collected.
Give an example of “data mining” or “matching.”
Combining shopping history with demographic data to predict purchases; linking databases to profile users.
What is “profiling”?
Building a digital profile of an individual based on their behaviors, purchases, and online activities.
How do companies make money from consumer information?
Selling or sharing data to advertisers, marketers, and other businesses for targeted ads or analytics.
What are the responsibilities of “free services” like social media?
To handle data ethically, protect user privacy, and clearly disclose how information is used.
What privacy issue do location tracking and implanted chips raise?
Loss of anonymity and potential government or corporate surveillance.
What does the Fourth Amendment protect?
People’s right to be secure against unreasonable searches and seizures; requires probable cause and warrants.
Why are new technologies challenging for the Fourth Amendment?
Laws were written before mobile tracking, drones, and mass surveillance — courts must reinterpret protections.
Give an example of government overreach in privacy.
Secret surveillance programs, warrantless wiretapping, or excessive data collection from private companies.
Name two risks of government use of private sector data.
Privacy violations (e.g., data leaks), misuse for surveillance or profiling.
What is the difference between SSN and Real ID systems?
SSN is not designed for identification; Real ID creates a standardized national ID system.
What is encryption’s role in protecting privacy?
It secures data so unauthorized parties cannot read or tamper with it.
What is the debate between free market view vs. consumer protection view of privacy?
Free market: people choose how much data to share; Consumer protection: laws must safeguard privacy regardless.
What is the “right to be forgotten”?
The ability to have certain personal data removed from search results or databases.
How do EU privacy regulations differ from U.S. regulations?
EU has stronger, comprehensive protections (e.g., GDPR), U.S. has sector-specific and less uniform privacy laws.
What is “opt-in” vs. “opt-out”?
Opt-in: users must actively agree to data collection. Opt-out: data is collected by default unless users disable it.
How does informed consent relate to browser “Do Not Track”?
Users must be aware of tracking and have a choice to allow or reject it.
What ethical issue is raised when attorneys search jurors’ social media?
Potential manipulation of arguments and invasion of jurors’ privacy.
When might posting someone’s photo online require permission?
When it could harm reputation, disclose private information, or violate their consent (ethical obligation).
Should drones over private backyards require warrants?
Many argue yes — it raises Fourth Amendment issues and property rights concerns.
What are benefits of RFID and facial recognition?
Security, convenience, faster identification.
What are risks of RFID and facial recognition?
Tracking without consent, data breaches, misuse by governments or hackers.
Name three major privacy-related U.S. regulations.
FERPA (student records), HIPAA (medical data), COPPA (children’s online data).
Which privacy regulation is most effective and why?
HIPAA — strong penalties and clear rules for safeguarding medical data (or answer can vary if argued well).
Give one pro and one con of businesses providing “free” services in exchange for tracking data.
Pro: Access to useful services without paying. Con: Exploits privacy, especially for low-income users.
What are guidelines for emotion-detection systems?
Use only with informed consent, restrict manipulative use, ensure transparency and data protection.