Term
|
Definition
| refers to who has access to the information systems and the data that they hold |
|
|
Term
|
Definition
| When data is what it is supposed to be. It does not include errors |
|
|
Term
| Childeren's Internet Protection Act of 2001 (CIPA) |
|
Definition
| Law that regulates access to offensive content over the Internet on school and library computers |
|
|
Term
| Children's Online Privacy Protection Act of 1998 (COPPA) |
|
Definition
| Law that prevents websites from collecting personally identifiable information from children without parental consent |
|
|
Term
|
Definition
| Tracking of online browsing behaviors |
|
|
Term
|
Definition
| Software application that allows you to view which cookies are stored on your computer, what's in them, and gives you the ability to delete them. |
|
|
Term
|
Definition
| Small text files located on your computer, to store information about you, your accounts, and your computer. |
|
|
Term
|
Definition
| Privacy threat resulting from the fact that data can be collected, aggregated, and analyzed at a faster pace and in larger volume than ever, and without the individuals' awareness |
|
|
Term
| Data Protection Directive |
|
Definition
| Law that regulates how personal data is processed and protected in the European Union |
|
|
Term
| Electronic Communications Privacy Act of 1986 (ECPA) |
|
Definition
| Law that regulates access, use, disclosure, interception, and privacy protections of electronic communications |
|
|
Term
|
Definition
| Privacy threat where there are inaccuracies in data |
|
|
Term
| Fair Information Practices Principles |
|
Definition
| Guidelines for how to deal with personal information, which include notice/awareness; choice/consent; access/participation; integrity/security; and enforcement/redress |
|
|
Term
| Family Education Rights and Privacy Act (FERPA) |
|
Definition
| law that protects the privacy of student education records |
|
|
Term
| Federal Trade Commision (FTC) |
|
Definition
| government agency responsible for (among other things) ensuring that privacy policies are respected |
|
|
Term
| Gramm-Leach-Bliley Financial Services Modernization Act of 1999 (GLBA) |
|
Definition
| law that provides regulations to protect consumers' personal financial information held by financial institutions |
|
|
Term
| Health Insurance Portability and Accountability Act (HIPPA) |
|
Definition
| law that provides regulations to protect personal health information held by covered entities and gives patients an array of rights with respect to that information |
|
|
Term
|
Definition
| using another person's personal information for fraudulent activities |
|
|
Term
|
Definition
| privacy threat where unauthorized individuals have access to one's private information. |
|
|
Term
|
Definition
| privacy option where individuals state they agree that their data can be shared with others or used for other purposes, often to receive special deals or information from partner companies. |
|
|
Term
|
Definition
| privacy option where individuals must state to companies they do not want their data shared with others or used for other purposes. |
|
|
Term
|
Definition
| framework that identifies four major categories of concerns about the use of information: privacy, accuracy, property, and accessibility. |
|
|
Term
|
Definition
| one's ability to control information about oneself. |
|
|
Term
|
Definition
| statement that describes what the organization's practices are with respect to the privacy of its customers. |
|
|
Term
|
Definition
| seal that businesses can post on their website to show their commitment to privacy. |
|
|
Term
|
Definition
| refers to who has ownership of the data |
|
|
Term
|
Definition
| seal that businesses can post on their website to show their commitment to trustworthiness |
|
|
Term
|
Definition
| program offered by an organization, which post a set of rules that companies must follow to be a part of the seal program |
|
|
Term
|
Definition
| seal that businesses can post on their website to show their commitment to security |
|
|
Term
|
Definition
| attempt by industry leaders to avoid government regulations by suggesting (rather than requiring) that companies have privacy policies, for example with privacy seals and privacy policies. |
|
|
Term
| Unauthorized Secondary Use of Information |
|
Definition
| privacy threat resulting from the use of data for purposes other than those for which they were originally collected |
|
|