ias(prelim)

5.0(2)
Studied by 30 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:25 AM on 12/1/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

37 Terms

1
New cards

Personal data

refers to any information, whether recorded in a material form or not, from which the identity of an individual is apparent or can be directly ascertained by the entity holding the information.

2
New cards

Privacy

concerns the collection and use of data about individuals.

3
New cards

Accuracy

relates to the responsibility of those who collect data to ensure that the data is correct.

4
New cards

Property

relates to who owns the data.

5
New cards

Access

relates to the responsibility of those who have data to control who can use that data.

6
New cards

Data privacy

is a part of the data protection area that deals with the proper handling of data, with the focus on compliance with data protection regulations

7
New cards

Data security

includes a set of standards and different safeguards and measures that an organization is taking to prevent any third party from unauthorized access to digital data or any intentional or unintentional alteration, deletion, or data disclosure.

8
New cards

Data breach

an unauthorized or unintentional disclosure of confidential information.

9
New cards

Cyberattack

the stealing of data or confidential information by electronic means, including ransomware and hacking.

10
New cards

CIA Triad

is a model designed to guide an organization’s policies on information security.

11
New cards

Confidentiality

ensures that data is accessed only by authorized individuals.

12
New cards

Integrity

ensures that information is reliable as well as accurate.

13
New cards

Availability

ensures that data is both available and accessible to satisfy business needs.

14
New cards

Data management

the process of ingesting, storing, organizing, and maintaining the data created and collected by an organization.

15
New cards

Internet privacy

All personal data shared over the Internet is subject to privacy issues. Most websites publish a privacy policy that details the website's intended use of collected online and/or offline collected data.

16
New cards

Financial privacy

Financial information is particularly sensitive, as it may easily use to commit online and/or offline fraud.

17
New cards

Medical privacy

All medical records are subject to stringent laws that address user access privileges. By law, security and authentication systems are often required for individuals that process and store medical records.

18
New cards

Information privacy

generally pertains to what is known as personally identifiable information (PII).

19
New cards

Personally Identifiable Information (PII)

is information that can be used to distinguish or trace an individual’s identity

20
New cards

Privacy by Design

to take privacy requirements into account throughout the system development process, from the conception of a new IT system through detailed system design, implementation, and operation.

21
New cards

Privacy requirements

These are system requirements that have privacy relevance.

22
New cards

Proactive, not reactive; preventive, not remedial:

PbD is an approach that anticipates privacy issues and seeks to prevent problems before they arise. In this approach, designers must assess the potential vulnerabilities in a system and the types of threats that may occur and then select technical and managerial controls to protect the system.

23
New cards

Privacy as the default

This principle requires an organization to ensure that it only processes the data that is necessary to achieve its specific purpose and that PII is protected during collection, storage, use, and transmission.

24
New cards

Privacy embedded into the design

Privacy protections should be core, organic functions, not added on after a design is complete. Privacy should be integral both to the design and architecture of IT systems and to business practices.

25
New cards

Full functionality: positive-sum, not zero-sum

Designers should seek solutions that avoid requiring a trade-off between privacy and system functionality or between privacy and security.

26
New cards

End-to-end security—life cycle protection

refer to the protection of PII from the time of collection through retention and destruction. During this life cycle, there should be no gaps in the protection of the data or accountability for the data. The term security highlights that security processes and controls are used to provide not just security but privacy.

27
New cards

Visibility and transparency

PbD seeks to assure users and other stakeholders that privacy-related business practices and technical controls are operating according to state commitments and objectives.

28
New cards

Respect for user privacy

The organization must view privacy as primarily being characterized by personal control and free choice.

29
New cards

Privacy Risk Assessment

to enable organization executives to determine an appropriate budget for privacy and, within that budget, implement the privacy controls that optimize the level of protection.

30
New cards

Security controls

are safeguards or countermeasures prescribed for an information system or an organization that are designed to protect the confidentiality, integrity, and availability of its information and to meet a set of defined security requirements

31
New cards

Privacy controls

are the technical, physical, and administrative (or management) measures employed within an organization to satisfy privacy requirements.

32
New cards

Privacy engineering

focuses on implementing techniques that decrease privacy risks and enables organizations to make purposeful decisions about resource allocation and effective implementation of controls in information systems

33
New cards

Security risk assessment

is an expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result.

34
New cards

Risk management

includes a disciplined, structured, and flexible process for organizational asset valuation; security and privacy control selection, implementation, and assessment; system and control authorizations; and continuous monitoring.

35
New cards

Privacy requirements

are system requirements that have privacy relevance. They are derived from various sources, including laws, regulations, standards, and stakeholder expectations.

36
New cards

Privacy impact assessment (PIA)

is an analysis of how information is handled.

37
New cards

Privacy engineering and security objectives

focus on the types of capabilities the system needs to demonstrate the implementation of an organization’s privacy policies and system privacy requirements.