LATEST UPDATE (ALREADY GRADED A+.)
Active collection
Data directly from subject
Passive collection
Data without the participant Knowing
First Party
Providing information directly to collector
Surveillance
Collecting data through observed behaviors like online searches or websites
Repurposing
Previously collected data used for a different purpose
Third Party
Previously collected data is transferred to a third party
Explicit Consent
User takes an action
Implicit Consent
Does not require user permission
Privacy by design
1. Proactive not reactive, 2. Privacy by Default, 3. Privacy Embedded in Design, 4. Full Functionality
(Positive Sum, not zero sum, 5. End to End Securty, 6. Visibility and Transparency, 7. Respect for privacy
Fair Information Principles (FIPPS)
A privacy risk model that restricts collection of data to only what is needed or for its intended purpose.
Do not collect additional data that is not needed for intended purpose.
Calo's Subjective/Objective Dichotomy
A privacy risk model that focuses on privacy harms based on two categories: Subjective Harm (perceives
a harm that may not be observable or measure and can cause fear and anxiety) and Objective Harm
(privacy has been violated or direct harm is known and is measurable and observable).
interrogation
, Actively questioning an individual or otherwise probing for information
Aggregation
combining multiple pieces of information about an individual to produce a whole that is greater than the
sum of its parts.
Contextual Integrity
A risk model that states that privacy problems arise out of disruption of informational norms. More
specifically, personal information should be in alignment with informational norms that apply to the
particular context.
Solove's Taxanomy
Model that attempts to order different harms that may arise from infringements in privacy. The
taxonomy is split into four categories: 1) Information Collection, 2) Information processing, 3)
Information dissemination and 4) Invasion.
NIST Privacy Risk Model
A risk model that is embedded in its Privacy Risk Assessment Methodology (PRAM) and explicitly
addrssees vulnerabilities, adverse events and the relative likelihoods and impacts of those events.
NICE Framework
Divides computer security into the following categories: Securely provision (Tasks to develop software to
be secure), Operate and Maintain, Protect and Defend and Investigate (plan for investigating an attack).
Factors Analysis in Information Risk (FAIR)
Model that breaks down risk by its constituent parts and then breaks it down further to estimate risk.
The model asks how often a violation occurs and over what time period and what impact will that
violation have?
Design Thinking Process
Five stages: Empathize (Research user's needs), Define (state users needs and problems, Ideate
(challenge assumptions and create ideas), prototype (create solutions) and Test (try out solution).
Value-Sensitive Design
Design approach that accounts for ethical values, such as privacy, in addition to usability-oriented design
goals. Here are the steps for Value-sensitive design: 1) Clarify project values, 2) Identify the direct and
Indirect stakeholders, 3) Identify the benefits and hams for stakeholders, 4) Identify and elicit potential
values 5) Develop working definistions of key values, 6) Identify potential value tensions and 7) Value-
oriented design and development.
Privacy Notices
External documents that informs users of an organizations practices, values and commitments
concerning their personal data.