Chapter 25 - Privacy

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/57

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards

Privacy

The power to control what others know about you and how they use the information they have about you.

2
New cards

Data Retention

Determines which records need to be stored and for how long; keeping records longer than necessary can introduce risk.

3
New cards

Data Breach

Occurs when a company loses data stored on its network, indicating a failure in security measures.

4
New cards

Reputation Damage

The harm done to a company’s brand following a data breach.

5
New cards

Identity Theft

The use of stolen personal information to impersonate someone, typically for fraudulent financial gain.

6
New cards

Fines

Monetary penalties imposed by regulatory bodies (e.g., FTC, GDPR) for non-compliance; can reach up to 4% of a company's global revenue under GDPR.

7
New cards

Intellectual Property Theft

Using someone else’s work without permission, including copyrighted materials.

8
New cards

Data Sensitivity

Classification of data based on its required protection levels, defining handling protocols.

9
New cards

Public Data

Data intended for public use, such as research data, where integrity must be maintained.

10
New cards

Private Data

Personal data such as passwords, not meant for public access.

11
New cards

Sensitive Data

Data with restricted access and not intended for public release.

12
New cards

Confidential Data

Data that must not be disclosed to unauthorized individuals, as it could harm an organization.

13
New cards

Critical Data

Data whose loss or disclosure can cause extreme harm, such as trade secrets or proprietary code.

14
New cards

Proprietary Data

Business-owned data that offers a competitive advantage and should remain confidential.

15
New cards

PII (Personally Identifiable Information)

Any data that can identify an individual; mishandling can lead to severe consequences.

16
New cards

Notice

Principle that informs individuals that their PII is being collected and how it will be used.

17
New cards

Choice

Principle that gives users options to opt in or out of data collection and use.

18
New cards

Consent

Users’ agreement to data use, typically after reading the organization's privacy notice.

19
New cards

HIPAA ( Health Insurance Portability and Accountability Act.)

protects personal health information (PHI).

20
New cards

GLBA (Gramm-Leach-Bliley Act)

requires disclosure of data collection and sharing practices.

21
New cards

FERPA (

protects student education records.

22
New cards

FOIA

allows public access to government records with exceptions.

23
New cards

CFAA

prevents unauthorized access to protected systems.

24
New cards

COPPA

protects children under 13 and requires parental consent for PII collection.

25
New cards

VPPA

prevents unauthorized disclosure of video rental history and related data.

26
New cards

California Privacy Laws

Requires notification to Californians when their PII is lost or exposed.

27
New cards

PCI DSS

Payment Card Industry Data Security Standard; protects credit card transaction data.

28
New cards

FCRA

ensures privacy and accuracy in consumer credit reporting.

29
New cards

FACTA

enhances consumer protections and mandates secure data disposal.

30
New cards

EU GDPR

Regulation that grants broad privacy rights, requiring consent to be opt-in by default.

31
New cards

OECD Privacy Guidelines

Framework of fair information practices for handling personal data globally.

32
New cards

PIPEDA

mandates data collection for appropriate purposes only.

33
New cards

PCPD

oversees compliance and privacy protection in places like Hong Kong.

34
New cards

Data Owner

Defines data security, privacy, and retention policies for an organization.

35
New cards

Data Controller

Determines the purposes and means of processing personal data.

36
New cards

Data Processor

Processes data on behalf of the data controller.

37
New cards

Data Custodian/Steward

Manages day-to-day data handling to ensure policies are followed.

38
New cards

Data Protection Officer

Senior official responsible for overseeing privacy strategy and legal compliance.

39
New cards

Wiping

Overwriting data to prevent recovery; typically used for data reuse.

40
New cards

Purging

Removing data to reclaim storage space, such as with a circular buffer.

41
New cards

Degaussing

Using magnetic fields to erase data on magnetic media.

42
New cards

Pulverizing

Physically destroying data media into unrecoverable pieces.

43
New cards

Pulping

Converts shredded paper into slurry; removes ink and renders data unreadable.

44
New cards

Shredding

Cuts documents into small pieces to prevent data reconstruction.

45
New cards

Burning

Most secure method for data destruction physically on physical media.

46
New cards

Data Lifecycle

Stages of handling data: Collection, Use, Storage, Sharing, Protection, Destruction.

47
New cards

Encryption

Protects data by converting it into an unreadable format.

48
New cards

Data Minimization

Collecting only necessary information to reduce exposure.

49
New cards

Data Masking

Obscures data, replacing sensitive items with placeholders (e.g., credit card numbers as ****).

50
New cards

Tokenization

Replaces sensitive data with random tokens to protect information.

51
New cards

Anonymization

Removes identifiers from data, making individuals untraceable.

52
New cards

Pseudonymization

Replaces identifiers with fake data for safer processing.

53
New cards

Cookie Cutters

Tools that block or limit cookie tracking from web servers.

54
New cards

Privacy Policy

Company’s official stance on handling personal data.

55
New cards

Privacy Notice

Communicates to users how their data is collected and used.

56
New cards

Terms of Agreement

A binding agreement between parties on conditions of service.

57
New cards

Privacy Impact Assessment (PIA)

Analyzes risks to PII during its lifecycle to ensure proper safeguards.

58
New cards

Cookies

Small text files stored on a user’s device to track sessions and preferences; if containing personal data, they are considered PII.