Study sets, textbooks, questions
Upgrade to remove ads
Terms in this set (30)
refers to who has access to the information systems and the data that they hold.
When data are what they are supposed to be and do not include errors.
Children's Internet Protection Act of 2001 (CIPA)
law that regulates access to offensive content over the Internet on school and public library computers.
Children's Online Privacy Protection Act of 1998 (COPPA)
law that prevents websites from collecting personally identifiable information from children without parental consent.
tracking of online browsing behaviors.
software application that allows you to view which cookies are stored on your computer, what's in them, and gives you the ability to delete them.
small text files located on your computer, to store information about you, your accounts and your computer.
Data collection threat
privacy threat resulting from the fact that data can be collected, aggregated and analyzed at a faster pace and in larger volume than ever, and without the individual's awareness.
Data Protection Directive
law that regulates how personal data is processed and protected in the European Union.
Electronic Communication Privacy Act of 1986 (ECPA)
law that regulates access, use, disclosure, interception, and privacy protections of electronic communication.
Errors in data
privacy threat where there are inaccuracies in data.
Fair Information Practices principles (FIP)
guidelines for how to deal with personal information, which include notice/awareness; choice/consent; access/participation; integrity/security; and enforcement/redress.
Family Education Rights and Privacy Act (FERPA)
law that protects the privacy of student education records.
Federal Trade Commission (FTC)
government agency responsible for (among other things) ensuring that privacy policies are respected.
Gramm-Leach-Bliley Financial Services Modernization Act of 1999 (GLBA)
A law that provides regulations to protect consumers' personal financial information held by financial institutions.
Health Insurance Portability and Accountability Act (HIPPA)
law that provides regulations to protect personal health information held by covered entities and gives patients an array of rights with respect to that information.
using another person's personal information for fraudulent activities.
Improper access to data
A privacy threat where unauthorized individuals have access to one's private information.
A privacy option where individuals state they agree that their data can be shared with others or used for other purposes, often to receive special deals or information from partner companies.
A privacy option where individuals must state that they do not want their data to be shared with others or used for other purposes.
framework that identifies four major categories of concerns about the use of information: privacy, accuracy, property, and accessibility.
statement that describes what the organization's practices are with respect to the privacy of its customers.
seal that businesses can post on their website to show their commitment to privacy,.
one's ability to control information about oneself.
refers to who has ownership of the data.
seal that businesses can post on their website to show their commitment to trustworthiness.
program offered by an organization, which post a set of rules that companies must follow to be a part of the seal program.
seal that businesses can post on their website to show their commitment to security.
attempt by industry leaders to avoid government regulations by suggesting (rather than requiring) that companies have privacy policies, for example with privacy seals and privacy policies.
Unauthorized secondary use of information
privacy threat resulting from the use of data for purposes other than those for which they were originally collected.
Sets with similar terms
Chapter 9 - Vocab
Other sets by this creator
Recommended textbook solutions
Fundamentals of Engineering Economic Analysis
David Besanko, Mark Shanley, Scott Schaefer
Chemistry for Engineering Students
Lawrence S. Brown, Thomas A. Holme
Chemical Reaction Engineering
Advanced Engineering Mathematics
Other Quizlet sets
Psychology Ch 1
Module 5 Psychology Terms and Retrieval Practice
Chapter 2 PowerPoints - Quiz (Part 2)
Professor Broccoli's students are evaluating a book by offering opinions and praising or condemning the author's writing style. This is an example of
What may happen if only a narrow range of examples is presented to students during a rule lesson? What may happen if only a narrow range of non-examples is presented?
An NOS centralizes resources and security and provides services such as file and print services to clients.
In which type of journal, do students assume the role of a book character and write journal entries from that persons viewpoint?