Random Flashcards

(72 cards)

1
Q

Calo’s Harm Dimensions

A

Defines risks on whether they are
- measure & objective
- perceived & subjective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Solove’s Taxonomy of Privacy

A
  • Identifies risk based activities on specific activies involved
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Niseembaums Conceptual Integrity

A

Identifieis risk based on whether processing is in alignment with norms of a partifular context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Jurisdictional Nexus

A

Reason why a places is allowed to have power over you/your situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vail Letter

A
  • employer led 3rd party investigations could be considered “consumer report” > could trigger/invoke FCRA notice
  • FACTA added exception that made 3rd investigations into misconduct no longer treated as “consumer report”
  • rendered Vail letter Null
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Qualfied Protective Order (QPO)

A
  • special kind of court order that allows sharing of PHI, while tightly limited what can be done with it
  • Applies to STATE courts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protective Order

A

prevents access to sensitive information through:
- redaction
- restrict electronic access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rule 5.2 (of Federal Rules of Civil Procedure 2007)

A

“Privacy protection for filings made with the court”
- required redactions to limit information provided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Budapest Convention (Council of Europe Convention on Cybercrime 2004)

A

60+ countries
mandates participating countries:
- outlaw certain cybercrime
- enact evidence gathering rules
- cooperate with cross border investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2nd Additional Protocol (2022)

A

Objective - Assist with global evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OECD

A

“Guidelines on the protection of privacy and transborder flows of personal data”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Convention 108

A

Council of Europe
Convention on the Protection of Individuals with regard to Automatic Processing of Personal Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Madrid Resolution

A

42 Country DPA
International Standards on the Protection of Personal Data and Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARPAnet

A

Military computer 1969
Stanford/UCLA
Precurssor to Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mosaic

A

foudation for Netscape
created by Marc Andreesen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Nexus

A

first web browser
created by Tim Berners- Lee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cellular/ SMS

A

160 limit
needs cell service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OTT

A

need wifi
E2E encryption
no character limit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Packet

A

1500 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Deep packet inspection

A

nodes inspect packets as they cross network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Primary cause of security incidents

A

humans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

EU Cookie Directive

A

under GDPR
- requires consent
- info stored in cookie considered personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Two categories of PETs

A

1- Data altering /deidentification
2- data shielding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Deidentification

A

1- supression = removes identifiers
2- generalization = detailed data element replaced by general (DOB replaced by year only)
3- noise addition = data replaced with similar but different data (objective = preserve statistical properties)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Data shielding types
1 - encryption 2 - hashing
26
Encryption types
1 - symmetrical (1 key aka private key) 2 - assymetrical (2 key aka public key)
27
Differential privacy
desired level of privacy determines NOISE addition * mathematical guarantee about peoples indistinguishability
28
Data sanitation
process of permanently/irreversibly removing/destroying data from storage
29
Encryption requirements
1- algorithim 2- cipher 3- code 4- encryption key
30
One Way Principle
should be computationally infeasible to find any input that maps to any NEW pre-defined output
31
Collision Resistence
should be computationally infeasible to find any 2 distinct inputs that map to the same output
32
Public Key Infrastructure
System of digital cert authorities and other registration entities that verifies the authenticity of each party involved in an electronic transaction through the use of cryptography
33
Privacy Incident
an adeverse event/aaction that is unplanned/unusual/unwanted that happened as a a result of non-compliance with policy/procedures
34
Data Breach
- when data is accessed WITHOUT authorization - legal term of art - defined by a statute (legal definition must be met) - can be caused by human error
35
Threat modeling
process of analyzing representations of a system to highlight concerns about security and privacy characteristics
36
Privacy Mission
concise delcaration of company's core purpose, focus and how it will achieve it's goals
37
Privacy Vision
inspirational description of company's lng term aspirations and desired future state - 1st step/short statement
38
Accountability Principle
dictates that an org take responsibility for protecting personal info - demonstrating compliance - inherently flexible
39
Judicial Redress Act 2015
qualifiying NON US citizens may use civil actions against US gov agencies to gain access to covered records
40
EO 14086
surveillance need comply with ncecessity and proportionality
41
Surprise Minimization Rule
no one should be suprised by having their info processed in a particular way prohibitied by local law because their info was transferred to another jurisdiction
42
EO14036
urged FTC to address unfair data collection/surveillance practices
43
Major Questions Doctrine
agencies cannot issue rules withou clear/express authorization from congress
44
Who regulates MedTech
Section 5 of FTC Food, Drug Cosmetic Act of FDA
45
CPNI notification timeline
7 days
46
Puerto Rico Breach timeline
10 days
47
FISA section 702
Authorizes targeting Non-US persons reasonably believed to be located outside US to acquire foreign intelligence
48
FISA “Lone Wolf” Provision
Defines an “agent of a foreign power” to include non us persons who engage in international terrorism, regardless of affiliation with a specific foreign power
49
FISA section 205
Granted Foreign Intelligence Surveillance Court (FISC) the authority to compensate by amicus curiae (individual or org not directly involved in lawsuit to offer info/expertise/insight via an amicus brief)
50
Key Points of Title 7 of Civil Rights Act
Prohibits employment discrimination based on - race/color - sex (includes pregnancy) - religion - national origin EXCLUDES Martial Status Applies to 15+ employees private or gov.
51
Does anything Preempt states in data disposals?
FACTA PREEMPTS most states in FACTA Data Disposal
52
What act followed 9/11?
USA PATRIOT ACT
53
What state does ECDIS most apply?
Colorado
54
What fields are not considered under CPNI?
Name and Phone Number
55
What are the NIST Steps?
Identify Protect Monitor Respond Recover
56
When is a notification NOT required under GDPR when…?
DATA IS ENCRYPTED controller has taken steps to protect data subjects (close accounts) Unreasonable burden & public notice is given
57
How long do companies under GDPR have to respond to DSAR?
“Without undue delay and within 1 Month from RECEIPT of request
58
What states have adopted PCI-DSS?
Minnesota Nevada Washington
59
What is a biometric “Identifier” under BIPA?
- Retina - Iris - Fingerprint - Voiceprint - Scan of hand/face geometry
60
What is biometric “information” under BIPA?
Any info based on individual’s biometric identifiers used to identify an individual
61
What is a biometric “identifier” Washington Biometric Privacy Law (RCW 19.375)
Data generated from automatic measurements of an individual’s biological characteristics (Same as BIPA)
62
What is a biometric “identifier” Washington Biometric Privacy Law (RCW 19.375)
Data generated from automatic measurements of an individual’s biological characteristics (Same as BIPA)
63
What is OMB M 17-12?
Office of Business Management, Memorandum 17-12 “Preparing for and responding to a Breach of PII”
64
What are the key points of OMB 17-12?
- identify stakeholders for PIRT (Privacy Incident Response Team) - identify compliance documentation - collaborate across business functions - determine scope of breach/ required reporting - assess impact on affected individuals - mitigate risk - notify affect individuals
65
How many states have breach notification laws?
- All 50 states - DC - Puerto Rico - Virgin Islands
66
What is an AEDT?
- computational processes derived from machine learning, statistical modeling, data analytics or AI - issues simplified outputs (scores, classifications, recommendations) - substantially assists or replaced discretionary decision making
67
What is said in Section 702 of FISA?
- permits broad US Intelligence surveillance of foreign persons - not limited to what is "strictly necessary and proportionate" - allows compelled cooperation from electronic service providers if they fall under 702 authority - major reason why Privacy Shield was invalidated
68
What is surveillance economics?
- Companies or governments make money or gain power by collecting a lot of data about people. - collecting people’s data because it’s profitable or useful.
69
Stages of Privacy Operational Lifecycle
- Access (baselines/training/assessments) - Sustain (monitoring) - Respond
70
What is cookie deprecation?
phasing out third‑party cookies so companies can no longer track people across websites the same way they used to.
71
72
What is deterministic tracking?
Method of identifying and following a user across sessions, channels, and/or devices using exact, know identifiers rather than statistical guesses