Ethical/Social Issues Around Data Collection - AP Computer Science A
Card 1 of 30
What is the role of a data protection officer (DPO)?
What is the role of a data protection officer (DPO)?
Tap to reveal answer
A DPO oversees data protection strategy and compliance within an organization. Ensures organizational compliance with data protection regulations.
A DPO oversees data protection strategy and compliance within an organization. Ensures organizational compliance with data protection regulations.
← Didn't Know|Knew It →
What is ethical hacking?
What is ethical hacking?
Tap to reveal answer
Ethical hacking involves legally breaking into computers to test a system's defenses. Authorized testing helps identify vulnerabilities before malicious attacks.
Ethical hacking involves legally breaking into computers to test a system's defenses. Authorized testing helps identify vulnerabilities before malicious attacks.
← Didn't Know|Knew It →
What is data privacy?
What is data privacy?
Tap to reveal answer
Data privacy is the protection of personal information from unauthorized access. Ensures individuals control access to their personal information.
Data privacy is the protection of personal information from unauthorized access. Ensures individuals control access to their personal information.
← Didn't Know|Knew It →
What is informed consent in data collection?
What is informed consent in data collection?
Tap to reveal answer
Informed consent is the process of obtaining permission before collecting personal data. Ensures users understand what data is being collected and how it's used.
Informed consent is the process of obtaining permission before collecting personal data. Ensures users understand what data is being collected and how it's used.
← Didn't Know|Knew It →
Identify an ethical issue related to data mining.
Identify an ethical issue related to data mining.
Tap to reveal answer
Privacy invasion is a significant ethical issue in data mining. Data mining can reveal personal patterns without user awareness.
Privacy invasion is a significant ethical issue in data mining. Data mining can reveal personal patterns without user awareness.
← Didn't Know|Knew It →
What does data anonymization mean?
What does data anonymization mean?
Tap to reveal answer
Data anonymization is the process of removing personally identifiable information from data sets. Helps protect privacy while preserving data utility for analysis.
Data anonymization is the process of removing personally identifiable information from data sets. Helps protect privacy while preserving data utility for analysis.
← Didn't Know|Knew It →
Define data bias.
Define data bias.
Tap to reveal answer
Data bias occurs when a dataset is not representative of the population it is meant to reflect. Unrepresentative data leads to skewed conclusions and unfair outcomes.
Data bias occurs when a dataset is not representative of the population it is meant to reflect. Unrepresentative data leads to skewed conclusions and unfair outcomes.
← Didn't Know|Knew It →
What is the purpose of a privacy policy?
What is the purpose of a privacy policy?
Tap to reveal answer
A privacy policy informs users about how their data is collected, used, and protected. Creates transparency between organizations and users about data practices.
A privacy policy informs users about how their data is collected, used, and protected. Creates transparency between organizations and users about data practices.
← Didn't Know|Knew It →
What is a data breach?
What is a data breach?
Tap to reveal answer
A data breach is an incident where unauthorized individuals gain access to sensitive data. Can expose personal information leading to identity theft or misuse.
A data breach is an incident where unauthorized individuals gain access to sensitive data. Can expose personal information leading to identity theft or misuse.
← Didn't Know|Knew It →
Identify a consequence of a data breach.
Identify a consequence of a data breach.
Tap to reveal answer
Loss of consumer trust is a significant consequence of a data breach. Users lose confidence in organizations that fail to protect their data.
Loss of consumer trust is a significant consequence of a data breach. Users lose confidence in organizations that fail to protect their data.
← Didn't Know|Knew It →
What does GDPR stand for?
What does GDPR stand for?
Tap to reveal answer
GDPR stands for General Data Protection Regulation. EU regulation governing data protection and privacy rights.
GDPR stands for General Data Protection Regulation. EU regulation governing data protection and privacy rights.
← Didn't Know|Knew It →
What is the aim of the GDPR?
What is the aim of the GDPR?
Tap to reveal answer
The GDPR aims to protect the privacy and personal data of individuals within the EU. Gives EU residents greater control over their personal data.
The GDPR aims to protect the privacy and personal data of individuals within the EU. Gives EU residents greater control over their personal data.
← Didn't Know|Knew It →
Identify an ethical concern with facial recognition technology.
Identify an ethical concern with facial recognition technology.
Tap to reveal answer
Potential invasion of privacy is an ethical concern with facial recognition. Technology can track individuals without explicit consent.
Potential invasion of privacy is an ethical concern with facial recognition. Technology can track individuals without explicit consent.
← Didn't Know|Knew It →
What is data ownership?
What is data ownership?
Tap to reveal answer
Data ownership refers to having legal rights and control over a particular set of data. Establishes who can access, modify, and make decisions about data.
Data ownership refers to having legal rights and control over a particular set of data. Establishes who can access, modify, and make decisions about data.
← Didn't Know|Knew It →
What is the principle of data minimization?
What is the principle of data minimization?
Tap to reveal answer
Data minimization involves collecting only the data that is necessary for a specific purpose. Reduces privacy risks by limiting data collection scope.
Data minimization involves collecting only the data that is necessary for a specific purpose. Reduces privacy risks by limiting data collection scope.
← Didn't Know|Knew It →
What are cookies in the context of web data?
What are cookies in the context of web data?
Tap to reveal answer
Cookies are small text files stored on a user's device to track and record online activity. Enable personalized experiences but raise privacy concerns.
Cookies are small text files stored on a user's device to track and record online activity. Enable personalized experiences but raise privacy concerns.
← Didn't Know|Knew It →
What is the right to be forgotten?
What is the right to be forgotten?
Tap to reveal answer
The right to be forgotten allows individuals to have their personal data deleted upon request. Gives individuals control over their digital footprint.
The right to be forgotten allows individuals to have their personal data deleted upon request. Gives individuals control over their digital footprint.
← Didn't Know|Knew It →
Identify an ethical issue with predictive analytics.
Identify an ethical issue with predictive analytics.
Tap to reveal answer
Potential discrimination is an ethical issue with predictive analytics. Algorithms may perpetuate or amplify existing societal biases.
Potential discrimination is an ethical issue with predictive analytics. Algorithms may perpetuate or amplify existing societal biases.
← Didn't Know|Knew It →
What is data retention?
What is data retention?
Tap to reveal answer
Data retention is the continued storage of data for compliance or business reasons. Balances business needs with privacy and storage costs.
Data retention is the continued storage of data for compliance or business reasons. Balances business needs with privacy and storage costs.
← Didn't Know|Knew It →
Define data transparency.
Define data transparency.
Tap to reveal answer
Data transparency refers to openness in how data is collected, used, and shared. Builds trust by making data practices visible to users.
Data transparency refers to openness in how data is collected, used, and shared. Builds trust by making data practices visible to users.
← Didn't Know|Knew It →
What is a data ethics framework?
What is a data ethics framework?
Tap to reveal answer
A data ethics framework provides guidelines to ensure ethical data collection and use. Helps organizations make responsible decisions about data use.
A data ethics framework provides guidelines to ensure ethical data collection and use. Helps organizations make responsible decisions about data use.
← Didn't Know|Knew It →
Identify a risk of algorithmic decision-making.
Identify a risk of algorithmic decision-making.
Tap to reveal answer
Algorithmic bias is a significant risk of algorithmic decision-making. Automated decisions may unfairly disadvantage certain groups.
Algorithmic bias is a significant risk of algorithmic decision-making. Automated decisions may unfairly disadvantage certain groups.
← Didn't Know|Knew It →
Define the term 'data subject'.
Define the term 'data subject'.
Tap to reveal answer
A data subject is an individual whose personal data is collected and processed. The person whose data rights are protected under privacy laws.
A data subject is an individual whose personal data is collected and processed. The person whose data rights are protected under privacy laws.
← Didn't Know|Knew It →
What is data profiling?
What is data profiling?
Tap to reveal answer
Data profiling is analyzing data attributes to summarize information about it. Helps understand data quality and structure for better analysis.
Data profiling is analyzing data attributes to summarize information about it. Helps understand data quality and structure for better analysis.
← Didn't Know|Knew It →
What is a privacy impact assessment (PIA)?
What is a privacy impact assessment (PIA)?
Tap to reveal answer
A PIA is a process to evaluate the effects of a project on privacy and data protection. Identifies potential privacy risks before implementation.
A PIA is a process to evaluate the effects of a project on privacy and data protection. Identifies potential privacy risks before implementation.
← Didn't Know|Knew It →
Identify the primary goal of data protection laws.
Identify the primary goal of data protection laws.
Tap to reveal answer
The primary goal is to safeguard personal information from misuse and unauthorized access. Protects individuals from harm caused by data misuse.
The primary goal is to safeguard personal information from misuse and unauthorized access. Protects individuals from harm caused by data misuse.
← Didn't Know|Knew It →
What is data accuracy?
What is data accuracy?
Tap to reveal answer
Data accuracy refers to the correctness and completeness of the data collected. Essential for making reliable decisions and maintaining trust.
Data accuracy refers to the correctness and completeness of the data collected. Essential for making reliable decisions and maintaining trust.
← Didn't Know|Knew It →
What does data portability mean?
What does data portability mean?
Tap to reveal answer
Data portability allows individuals to obtain and reuse their data across different services. Prevents vendor lock-in and promotes user autonomy.
Data portability allows individuals to obtain and reuse their data across different services. Prevents vendor lock-in and promotes user autonomy.
← Didn't Know|Knew It →
Identify a key principle of ethical data collection.
Identify a key principle of ethical data collection.
Tap to reveal answer
Respect for privacy is a key principle of ethical data collection. Fundamental to building trust and following legal requirements.
Respect for privacy is a key principle of ethical data collection. Fundamental to building trust and following legal requirements.
← Didn't Know|Knew It →
What is the purpose of encryption in data security?
What is the purpose of encryption in data security?
Tap to reveal answer
Encryption protects data by converting it into a secure format unreadable without a key. Makes data unreadable to unauthorized parties during storage or transmission.
Encryption protects data by converting it into a secure format unreadable without a key. Makes data unreadable to unauthorized parties during storage or transmission.
← Didn't Know|Knew It →