Term
|
Definition
refers to who has access to the information systems and the data that they hold |
|
|
Term
|
Definition
When data is what it is supposed to be. It does not include errors |
|
|
Term
Childeren's Internet Protection Act of 2001 (CIPA) |
|
Definition
Law that regulates access to offensive content over the Internet on school and library computers |
|
|
Term
Children's Online Privacy Protection Act of 1998 (COPPA) |
|
Definition
Law that prevents websites from collecting personally identifiable information from children without parental consent |
|
|
Term
|
Definition
Tracking of online browsing behaviors |
|
|
Term
|
Definition
Software application that allows you to view which cookies are stored on your computer, what's in them, and gives you the ability to delete them. |
|
|
Term
|
Definition
Small text files located on your computer, to store information about you, your accounts, and your computer. |
|
|
Term
|
Definition
Privacy threat resulting from the fact that data can be collected, aggregated, and analyzed at a faster pace and in larger volume than ever, and without the individuals' awareness |
|
|
Term
Data Protection Directive |
|
Definition
Law that regulates how personal data is processed and protected in the European Union |
|
|
Term
Electronic Communications Privacy Act of 1986 (ECPA) |
|
Definition
Law that regulates access, use, disclosure, interception, and privacy protections of electronic communications |
|
|
Term
|
Definition
Privacy threat where there are inaccuracies in data |
|
|
Term
Fair Information Practices Principles |
|
Definition
Guidelines for how to deal with personal information, which include notice/awareness; choice/consent; access/participation; integrity/security; and enforcement/redress |
|
|
Term
Family Education Rights and Privacy Act (FERPA) |
|
Definition
law that protects the privacy of student education records |
|
|
Term
Federal Trade Commision (FTC) |
|
Definition
government agency responsible for (among other things) ensuring that privacy policies are respected |
|
|
Term
Gramm-Leach-Bliley Financial Services Modernization Act of 1999 (GLBA) |
|
Definition
law that provides regulations to protect consumers' personal financial information held by financial institutions |
|
|
Term
Health Insurance Portability and Accountability Act (HIPPA) |
|
Definition
law that provides regulations to protect personal health information held by covered entities and gives patients an array of rights with respect to that information |
|
|
Term
|
Definition
using another person's personal information for fraudulent activities |
|
|
Term
|
Definition
privacy threat where unauthorized individuals have access to one's private information. |
|
|
Term
|
Definition
privacy option where individuals state they agree that their data can be shared with others or used for other purposes, often to receive special deals or information from partner companies. |
|
|
Term
|
Definition
privacy option where individuals must state to companies they do not want their data shared with others or used for other purposes. |
|
|
Term
|
Definition
framework that identifies four major categories of concerns about the use of information: privacy, accuracy, property, and accessibility. |
|
|
Term
|
Definition
one's ability to control information about oneself. |
|
|
Term
|
Definition
statement that describes what the organization's practices are with respect to the privacy of its customers. |
|
|
Term
|
Definition
seal that businesses can post on their website to show their commitment to privacy. |
|
|
Term
|
Definition
refers to who has ownership of the data |
|
|
Term
|
Definition
seal that businesses can post on their website to show their commitment to trustworthiness |
|
|
Term
|
Definition
program offered by an organization, which post a set of rules that companies must follow to be a part of the seal program |
|
|
Term
|
Definition
seal that businesses can post on their website to show their commitment to security |
|
|
Term
|
Definition
attempt by industry leaders to avoid government regulations by suggesting (rather than requiring) that companies have privacy policies, for example with privacy seals and privacy policies. |
|
|
Term
Unauthorized Secondary Use of Information |
|
Definition
privacy threat resulting from the use of data for purposes other than those for which they were originally collected |
|
|