INFORMATION PROCESSING
Decisional
Interference
Intruding into an
individual’s decision
regarding their private
affairs
A payment processor
declining transactions for
contraceptives. INFORMATION DISSEMINATION
Increased Accessibility
Amplifying the accessibility of personal information
A court making proceeding searchable on the Internet without redacting
personal information.
Blackmail
Threatening to disclose personal information
An dating service for adulters charging customers to delete their
accounts.
Appropriation
Using an individual’s identity to serve
the aims and interests of another
A social media site using customer's images in advertisingBreach of Confidentiality
Breaking a promise to keep a person’s information
confidential
A doctor revealing patient information to friends
on a social media website.
Disclosure
Revealing truthful personal information about a person that
impacts the ways others judge their character or their security
A government agency revealing an individual’s address to a stalker, resulting
in the individual’s murder.Surveillance
Watching, listening
to, or recording of an
individual's activities
A website monitoring cursor
movements of a visitor while
visiting the website.
Interrogation
Questioning or probing
for personal information
An interviewer asking an
inappropriate question, such
as marital status, during a
employment interview. INFORMATION COLLECTIONA TAXONOMY OF PRIVACY
Invasion
Intrusion
Decisional Interference Information Processing
Aggregation
Insecurity
Identification
Secondary Use
Exclusion
Information
Dissemination
Breach of Confidentiality
Disclosure
Exposure
Increased Accessibility
Blackmail
Appropriation
DistortionInformation Collection
Surveillance
InterrogationIdentification
Linking of information
to a particular
individual
A researcher linking
medical files to the
Governor of a state using
only date of birth, zip code
and gender. Insecurity
Carelessness in protecting
information from leaks or
improper access
An ecommerce website
allowing others to view an
individual's purchase history
by changing the URL
(e.g. enterprivacy.com?id=123)Secondary Use
Using personal information for
a purpose other than the purpose
for which is was collected
The U.S. Government using census
data collected for the puprose of
apportioning Congressional districts to
identify and intern those of Japanese
descent in WWII.Exclusion
Failing to let an individual know
about the information that others
have about them and participate in
its handling or use
A company using customer call history,
without the customer's knowledge, to shift
their order in a queue (i.e. "Your call will be
answer in the order [NOT] receivied")
REC
INVASION
Intrusion
Disturbing an individual’s
tranquility or solitude
An augmented reality game
directing players onto private
residential property. Exposure
Revealing an individual’s nudity, grief, or bodily functions
A store forcing a customer to remove clothing
revealing a colostomy bag.
Distortion
Disseminating false or misleading
information about an individual
A creditor reporting a paid bill as unpaid to a credit bureau. Aggregation
Combining of
various pieces of
personal information
A credit bureau
combining an individual’s
payment history from
multiple creditors.
Provided by Enterpri vacy Consulting Group www.enterprivacy.comBased on Dan Solove’s
A Taxonomy of Privacy
https://papers.ssrn.com/sol3/papers.
cfm?abstract_id=667622
A-Taxonomy-of-Privacy
文档预览
中文文档
1 页
50 下载
1000 浏览
0 评论
0 收藏
3.0分
温馨提示:本文档共1页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
本文档由 思安 于 2023-10-19 06:00:41上传分享