Set #1-Privacy by Principles & Laws (Video Notes)

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

flashcard set

Earn XP

Description and Tags

Vocabulary-style flashcards covering key privacy principles, laws, techniques, and terminology from the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

Obfuscation

To make information more difficult to understand; to hide the true meaning.

2
New cards

OECD Guidelines

Eight privacy principles: Collection Limitation, Data Quality, Purpose Specification, Use Limitation, Security Safeguards, Openness, Individual Participation, and Accountability; a data controller should be accountable for complying with measures giving effect to these principles.

3
New cards

Omnibus Laws

Laws that define requirements across the entire economy, covering public-sector, private-sector, and health-sector activities.

4
New cards

Online Behavioral Advertising

Websites or online advertising services track and analyze search terms, browser or user profiles, preferences, demographics, online and offline activity, location data, etc., to serve targeted ads.

5
New cards

Online Data Storage

Storage of data by a third-party vendor accessible over the Internet (cloud storage); an alternative to local hard drive storage.

6
New cards

Opt-In

An active affirmative indication of choice, such as checking a box signaling a desire to share information with third parties.

7
New cards

Opt-Out

A lack of action implies a choice; unless the box is checked/unchecked, the individual's information may be shared with third parties.

8
New cards

Organization for Economic Cooperation and Development (OECD)

International organization promoting policies to achieve sustainable economic growth, employment, and rising living standards in member and non-member countries, contributing to the world economy.

9
New cards

Passive Collection

Collecting data from a data subject without their awareness.

10
New cards

Perimeter Controls

Technologies and processes designed to secure an entire network by preventing external penetration.

11
New cards

PCI Security Standards Council

Body responsible for developing and managing the PCI Data Security Standard; members include American Express, Discover, JCB, MasterCard, Visa and affiliate members.

12
New cards

Persistent Storage

Storage of data in non-volatile media (e.g., hard drive); without it data would reside only in RAM and be lost when power is lost.

13
New cards

Personal Information

Could be a generic term or an EU term; in the U.S. it is often referred to as PII.

14
New cards

Pharming

Redirecting a valid internet request to a malicious website by modifying a Hosts file or corrupting DNS.

15
New cards

Plan-Driven Development Model

A software development strategy that concentrates on designing the entire system before creation; example: Spiral model.

16
New cards

Spear Phishing

Phishing tailored to an individual user (e.g., an email appearing to come from the user’s boss) to obtain information.

17
New cards

Phishing

Emails or other communications designed to trick a user into providing passwords or other sensitive information.

18
New cards

Platform for Privacy Preferences Project (P3P)

Project aimed at designing web protocols with user privacy in mind; produced protocols including XACML.

19
New cards

Premium Advertising

The most expensive and most visible web advertising, typically on the homepage, used by big-name brands.

20
New cards

POST Method

HTML form submission method that sends data to a web page; considered more secure than GET.

21
New cards

Privacy by Design

Concept of embedding privacy into technology, systems and practices from the design phase; includes seven foundational principles.

22
New cards

Privacy Notice

A statement describing how an organization collects, uses, retains, and discloses personal information.

23
New cards

Privacy Nutrition Label

A standard-form label intended to make privacy policies easily understandable; developed by Cylab Usable Privacy and Security Laboratory (CUPS) at Carnegie Mellon University.

24
New cards

Privacy Officer

Official responsible for privacy coordination and implementation within a department; may be statutorily mandated and/or appointed; related to privacy statements, notices, or policies; special notices mandated by GLBA and COPPA in the U.S.

25
New cards

Privacy Patterns

A set of design-pattern-like solutions to common privacy problems in software; each pattern describes a privacy concern and a uniform approach to address it.

26
New cards

Privacy Policy

Internal statement governing how an organization handles personal information; directed at users and instructing employees on data collection, use, and rights.

27
New cards

Privacy Review

Analysis of all new projects for compliance with an organization’s privacy standards and policies; should occur multiple times from early project stages.

28
New cards

Privacy Risk

A formula to assess a project’s privacy impact: likelihood of threat × potential impact; difficult to quantify, often compared across projects.

29
New cards

Privacy Standard

Minimum level at which privacy should be protected in new projects, applications, and services; based on internal policy and external regulations.

30
New cards

Protected Health Information (PHI)

Individually identifiable health information transmitted or maintained by a covered entity or business associate; relates to health condition, provision of healthcare, or payment for healthcare.