INFORMATION PROCESSING Decisional Interference Intruding into an individual’s decision regarding their private affairs A payment processor declining transactions for contraceptives. INFORMATION DISSEMINATION Increased Accessibility Amplifying the accessibility of personal information A court making proceeding searchable on the Internet without redacting personal information. Blackmail Threatening to disclose personal information An dating service for adulters charging customers to delete their accounts. Appropriation Using an individual’s identity to serve the aims and interests of another A social media site using customer's images in advertisingBreach of Confidentiality Breaking a promise to keep a person’s information confidential A doctor revealing patient information to friends on a social media website. Disclosure Revealing truthful personal information about a person that impacts the ways others judge their character or their security A government agency revealing an individual’s address to a stalker, resulting in the individual’s murder.Surveillance Watching, listening to, or recording of an individual's activities A website monitoring cursor movements of a visitor while visiting the website. Interrogation Questioning or probing for personal information An interviewer asking an inappropriate question, such as marital status, during a employment interview. INFORMATION COLLECTIONA TAXONOMY OF PRIVACY Invasion Intrusion Decisional Interference Information Processing Aggregation Insecurity Identification Secondary Use Exclusion Information Dissemination Breach of Confidentiality Disclosure Exposure Increased Accessibility Blackmail Appropriation DistortionInformation Collection Surveillance InterrogationIdentification Linking of information to a particular individual A researcher linking medical files to the Governor of a state using only date of birth, zip code and gender. Insecurity Carelessness in protecting information from leaks or improper access An ecommerce website allowing others to view an individual's purchase history by changing the URL (e.g. enterprivacy.com?id=123)Secondary Use Using personal information for a purpose other than the purpose for which is was collected The U.S. Government using census data collected for the puprose of apportioning Congressional districts to identify and intern those of Japanese descent in WWII.Exclusion Failing to let an individual know about the information that others have about them and participate in its handling or use A company using customer call history, without the customer's knowledge, to shift their order in a queue (i.e. "Your call will be answer in the order [NOT] receivied") REC INVASION Intrusion Disturbing an individual’s tranquility or solitude An augmented reality game directing players onto private residential property. Exposure Revealing an individual’s nudity, grief, or bodily functions A store forcing a customer to remove clothing revealing a colostomy bag. Distortion Disseminating false or misleading information about an individual A creditor reporting a paid bill as unpaid to a credit bureau. Aggregation Combining of various pieces of personal information A credit bureau combining an individual’s payment history from multiple creditors. Provided by Enterpri vacy Consulting Group www.enterprivacy.comBased on Dan Solove’s A Taxonomy of Privacy https://papers.ssrn.com/sol3/papers. cfm?abstract_id=667622

pdf文档 A-Taxonomy-of-Privacy

安全标准 > 法律 > 文档预览
中文文档 1 页 50 下载 1000 浏览 0 评论 0 收藏 3.0分
温馨提示:本文档共1页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
A-Taxonomy-of-Privacy 第 1 页 A-Taxonomy-of-Privacy 第 2 页 A-Taxonomy-of-Privacy 第 3 页
本文档由 思安2023-10-19 06:00:41上传分享
给文档打分
您好可以输入 255 个字符
网站域名是多少( 答案:github5.com )
评论列表
  • 暂时还没有评论,期待您的金玉良言
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。