Join Michelle Dennedy for an in-depth discussion in this video What you should know, part of Understanding and Prioritizing Data Privacy.
(gentle music) - I am the worst culprit of using and overusing jargons and acronyms, and I detest it when it happens to me, Every time I've started a new tech company, they all come up with a three-letter acronym for a meeting, and it drives me nuts. So throughout the course, you're going to hear jargon, it just is what it is. There are things like personally identifiable information, that people know as PII. Some people use PI to cover that same acronym, some people call it personal information. You'll hear data subject again and again, the individual described by data. You'll hear user as a euphemism for someone who is either being watched, observed, has access to, or some other interaction with the system. So I think it's really critical to understand that this is a field, like any other, where terms are starting to come together into industry jargon. Knowing this jargon will A, give you credibility with people leading in privacy and security. B, it'll make your visit to your lawyer cheaper, because you'll understand what you're asking and what they're telling you, and it also will help to unify the discussion between IT security, IT operations, legal, privacy, marketing, HR, gluing together all of these disparate specialties that all have their own jargon with a common set of terms in data protection. It's the maturing process of the entire industry, and it's very valuable as a shorthand to just get things done and said more efficiently over time.
- Relate the concept of data as intellectual property.
- Examine the ways in which moral, legal, and ethical concerns apply to data privacy.
- Explain how context applies to personal private information.
- Recognize the motivations of individuals accessing data they are not authorized to access.
- Define the implications of moral crumple zones.