Pre
STUDY MATERIAL: IAPP CIPT - Exam Study Notes With Questions And 100% SURE
ANSWERS
Terms in this set (234)
Ties adequate protection for privacy to norms of specific contetexts, demanding that information
gathering and dissemination be appropriate to that context and obey the governing norms of
distribution within it. This viewpoint presents a challenge to IT professionals: how to identify relevant
norms and preserve norms when they introduce new or changing technology? Helen Nissenbaum's
Nissenbaum's Contextual Integrity
framework of contextual integrity ties privacy expectations to context-dependent norms of
information flow. Information collection, processing and transmission practices that are in
accordance with those norms are likely to be perceived as acceptable, whereas practices that do
not follow those norms are perceived as privacy violations because they violate contextual integrity.
A work by Daniel Solve and attempts to order the different harms that may arise from infringements
Solove's Taxonomy in privacy. The taxonomy is split into four categories: 1) Information Collection, 2) Information
Processing, 3) Dissemination of Information, and 4) Invasion.
, 8/6/24, 11:54 AM
Objective harms are measurable and observable, wherein a person's privacy has been violated and a
Calo's Harms Dimensions direct harm is known to exist. Subjective harms exist without an observable or measurable harm, but
where an expectation of harm exists.
The states include:
Solitude: The individual stands by themselves, separate from the group and remains free from the
observations of others.
Intimacy: The individual is part of a small unit; information sharing and the rules of secrecy are
Westin's Four States of Privacy negotiated with members of the unit.
anonymity: While the individual is in public, they still maintain freedom from identification and
surveillance.
reserve: While the individual is in a large group, they maintain the ability to withold communication or
disengage from others to create a psychological barrier agains t unwanted intrusion.
Published in 1977 by the U.S. Federal Trade Commission (FTC) and provides guidance to businesses in
the United States. FIPPs is a collection of widely accepted principles that agencies use when
Fair Information Practice Principles (FIPPs) evaluating information systems, processes, programs, and activities that affect individual privacy.
FIPPs are not a requirement; rather, they are principles that should be applied by each agency
according to the agency's particular mission and privacy program requirements.
FIPPS Principle: There should be limits to the collection of personal data and any such data should
Collection Limitation Principle be obtained by lawful and fair means and where appropriate, with the knowledge or consent of the
data subject.
FIPPS Principle: Personal data should be relevant to the purposes for which they are to be used, and,
Data Quality Principle
to the extent necessary for those purposes, should be accurate, complete and kept up-to-date.
FIPPS Principle: The purposes for which personal data are collected should be specified not later
than at the time of data collection and the subsequent use should be limited to the fulfillment of
Purpose Specification Principle
those purposes or such others as are not incompatible with those purposes and as are specified on
each occasion of change of purpose.
FIPPS Principle: Personal data should not be disclosed, made available or otherwise used for
Use Limitation Principle purposes other than those specified, except: (a) with the consent of the data subject; or (b) by the
authority of law.
FIPPS Principle: Personal data should be protected by reasonable security safeguards against such
risks as loss or unauthorized access, destruction, use, modification or disclosure of data
Openness Principles—There should be a general policy of openness about developments, practices
Security Safeguards Principle
and policies with respect to personal data. Means should be readily available of establishing the
existence and nature of personal data, and the main purposes of their use, as well as the identity and
usual residence of the data controller.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Queenstin. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.