Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CITP EXAM QUESTIONS AND ANSWERS: LATEST UPDATE (ALREADY GRADED A+.)

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
20-02-2025
Written in
2024/2025

CITP EXAM QUESTIONS AND ANSWERS: LATEST UPDATE (ALREADY GRADED A+.) Nissenbaum's Contextual Integrity Ties adequate protection for privacy to norms of specific contetexts, demanding that information gathering and dissemination be appropriate to that context and obey the governing norms of distribution within it. This viewpoint presents a challenge to IT professionals: how to identify relevant norms and preserve norms when they introduce new or changing technology? Helen Nissenbaum's framework of contextual integrity ties privacy expectations to context-dependent norms of information flow. Information collection, processing and transmission practices that are in accordance with those norms are likely to be perceived as acceptable, whereas practices that do not follow those norms are perceived as privacy violations because they violate contextual integrity. Solove's Taxonomy A work by Daniel Solve and attempts to order the different harms that may arise from infringements in privacy. The taxonomy is split into four categories: 1) Information Collection, 2) Information Processing, 3) Dissemination of Information, and 4) Invasion. Calo's Harms Dimensions Objective harms are measurable and observable, wherein a person's privacy has been violated and a direct harm is known to exist. Subjective harms exist without an observable or measurable harm, but where an expectation of harm exists. Westin's Four States of Privacy The states include: Solitude: The individual stands by themselves, separate from the group and remains free from the observations of others. Intimacy: The individual is part of a small unit; information sharing and the rules of secrecy are negotiated with members of the unit. anonymity: While the individual is in public, they still maintain freedom from identification and surveillance. reserve: While the individual is in a large group, they maintain the ability to withold communication or disengage from others to create a psychological barrier agains t unwanted intrusion. Fair Information Practice Principles (FIPPs) Published in 1977 by the U.S. Federal Trade Commission (FTC) and provides guidance to businesses in the United States. FIPPs is a collection of widely accepted principles that agencies use when evaluating information systems, processes, programs, and activities that affect individual privacy. FIPPs are not a requirement; rather, they are principles that should be applied by each agency according to the agency's particular mission and privacy program requirements. Collection Limitation Principle

Show more Read less
Institution
Course

Content preview

CITP EXAM QUESTIONS AND ANSWERS:
LATEST UPDATE (ALREADY GRADED A+.)
Nissenbaum's Contextual Integrity

Ties adequate protection for privacy to norms of specific contetexts, demanding that information
gathering and dissemination be appropriate to that context and obey the governing norms of
distribution within it. This viewpoint presents a challenge to IT professionals: how to identify relevant
norms and preserve norms when they introduce new or changing technology? Helen Nissenbaum's
framework of contextual integrity ties privacy expectations to context-dependent norms of information
flow. Information collection, processing and transmission practices that are in accordance with those
norms are likely to be perceived as acceptable, whereas practices that do not follow those norms are
perceived as privacy violations because they violate contextual integrity.

Solove's Taxonomy

A work by Daniel Solve and attempts to order the different harms that may arise from infringements in
privacy. The taxonomy is split into four categories: 1) Information Collection, 2) Information Processing,
3) Dissemination of Information, and 4) Invasion.

Calo's Harms Dimensions

Objective harms are measurable and observable, wherein a person's privacy has been violated and a
direct harm is known to exist. Subjective harms exist without an observable or measurable harm, but
where an expectation of harm exists.

Westin's Four States of Privacy

The states include:
Solitude: The individual stands by themselves, separate from the group and remains free from the
observations of others.
Intimacy: The individual is part of a small unit; information sharing and the rules of secrecy are
negotiated with members of the unit.
anonymity: While the individual is in public, they still maintain freedom from identification and
surveillance.
reserve: While the individual is in a large group, they maintain the ability to withold communication or
disengage from others to create a psychological barrier agains t unwanted intrusion.

Fair Information Practice Principles (FIPPs)

Published in 1977 by the U.S. Federal Trade Commission (FTC) and provides guidance to businesses in
the United States. FIPPs is a collection of widely accepted principles that agencies use when evaluating
information systems, processes, programs, and activities that affect individual privacy. FIPPs are not a
requirement; rather, they are principles that should be applied by each agency according to the agency's
particular mission and privacy program requirements.

Collection Limitation Principle

, FIPPS Principle: There should be limits to the collection of personal data and any such data should be
obtained by lawful and fair means and where appropriate, with the knowledge or consent of the data
subject.

Data Quality Principle

FIPPS Principle: Personal data should be relevant to the purposes for which they are to be used, and, to
the extent necessary for those purposes, should be accurate, complete and kept up-to-date.

Purpose Specification Principle

FIPPS Principle: The purposes for which personal data are collected should be specified not later than at
the time of data collection and the subsequent use should be limited to the fulfillment of those purposes
or such others as are not incompatible with those purposes and as are specified on each occasion of
change of purpose.

Use Limitation Principle

FIPPS Principle: Personal data should not be disclosed, made available or otherwise used for purposes
other than those specified, except: (a) with the consent of the data subject; or (b) by the authority of
law.

Security Safeguards Principle

FIPPS Principle: Personal data should be protected by reasonable security safeguards against such risks
as loss or unauthorized access, destruction, use, modification or disclosure of data
Openness Principles—There should be a general policy of openness about developments, practices and
policies with respect to personal data. Means should be readily available of establishing the existence
and nature of personal data, and the main purposes of their use, as well as the identity and usual
residence of the data controller.

Individual Participation Principle

FIPPS Principle: An individual should have the right: (a) to obtain from a data controller, or otherwise,
confirmation of whether or not the data controller has data relating to him; (b) to have communicated
to him, data relating to him within a reasonable time; at a charge, if any, that is not excessive; in a
reasonable manner; and in a form that is readily intelligible to him; (c) to be given reasons if a request
made under subparagraphs (a) and (b) is denied, and to be able to challenge such denial; and (d) to
challenge data relating to him and, if the challenge is successful to have the data erased, rectified,
completed or amended.

Accountability Principle

FIPPS Principle: A data controller should be accountable for complying with measures which give effect
to the principles stated above observes data streams produced by the data subject without interfering
with the subject's normal behavior; (3) repurposing, which occurs when the previously collected data is
now assigned to be used for a different purpose, e.g., reusing a customer's shipping address for
marketing and (4) third-party collection, when previously collected information is transferred to a third-
party to enable a new data collection

Written for

Course

Document information

Uploaded on
February 20, 2025
Number of pages
5
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SOLUTIONSCORE School of Pharmacy
Follow You need to be logged in order to follow users or courses
Sold
13
Member since
1 year
Number of followers
4
Documents
1742
Last sold
5 months ago
SOLUTIONSCORE

I Focus on creating high-quality, well-organized documents that accurately reflect the course content. I'm passionate about helping others succeed in their studies, and I create comprehensive summaries, study guides,Questions and answers and flashcards based on my class notes and lectures. My materials are designed to be clear, concise, and effective, so you can focus on understanding the material and ace your exams! Feel free to message me if you have any questions.

Read more Read less
4.9

295 reviews

5
268
4
26
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions