Data Privacy

Home > Journalism > Data journalism > Data Privacy

Understanding the legal and ethical considerations around data privacy, including how to keep sources safe.

Data collection: Refers to the process of gathering information related to individuals, including personal, sensitive, and demographic data.
Data protection and security: Refers to the measures put in place to ensure the safety of data stored on systems, including encryption, firewalls, and access control measures.
Data processing: Refers to the way in which data is analyzed, manipulated, and used to derive insights to support decision-making.
Data retention and storage: Refers to the policies that dictate how long data should be kept and how and where it should be stored.
Data sharing: Refers to the type of data that can be shared, how it can be shared, and with whom it can be shared.
Data anonymization: Refers to the process of removing personal identifiers from data to ensure that individuals cannot be identified from the data.
Data ownership: Refers to the underlying legal rights and obligations associated with data, including the right to control, access, and use data.
Data regulation and legislation: Refers to the legal frameworks and guidelines that govern how data is handled, including privacy and cybersecurity laws and regulations.
Data ethics: Refers to the moral principles and considerations surrounding data management, including transparency, fairness, and accountability.
Investigative techniques: Refers to the investigative methods and tools used to uncover hidden connections and links in data, including network analysis and data visualization techniques.
Data Collection: It involves the process of gathering data from various sources, including public or private sources with an active or passive approach.
Data Storage: Storage and management of personal data by organizations, including the types of data stored, the length of time for storage, accessibility, and management protocols.
Data Protection: Covers the measures and tactics that companies take to protect the data from theft or damage, such as authorization, access control, encryption, and firewall software.
Data Sharing: The sharing of personal data among different organizations and the circumstances under which it is legal or appropriate.
Data Use: Refers to how private data is used by organizations and how it is related to the specific provisions set out in the privacy-policy statement.
Data Disposal: It refers to the process of securely removing data stored on various data storage devices from the organization's system.
Anonymization and pseudonymization: Methods employed to protect the privacy of individuals in large datasets by either eliminating identifiable information or replacing it with fake information.
Data Retention: It involves the rules guiding how long an organization may keep sensitive data and the conditions for disposing of the retained data.
Consent and notification: The policies put in place by organizations, including notifications and consent to data use, collection, and sharing, seek to obtain explicit consent from individuals before their personal data is processed.
Data Breach Response: Involves the protocols and procedures that organizations implement for immediate and effective responses to data breaches, and crisis management techniques that must continue for data privacy issues.
"Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them."
"It is also known as data privacy or data protection."
"Data privacy is challenging since it attempts to use data while protecting an individual's privacy preferences and personally identifiable information."
"The fields of computer security, data security, and information security all design and use software, hardware, and human resources to address this issue."
"Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them."
"Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them."
"The collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them."
"The fields of computer security, data security, and information security all design and use software, hardware, and human resources to address this issue."
"It is also known as data privacy or data protection."
"It attempts to use data while protecting an individual's privacy preferences and personally identifiable information."
"Data privacy is challenging since it attempts to use data while protecting an individual's privacy preferences and personally identifiable information."
"The fields of computer security, data security, and information security all design and use software, hardware, and human resources to address this issue."
"Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them."
"It is also known as data privacy or data protection."
"The collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them."
"The fields of computer security, data security, and information security all design and use software, hardware, and human resources to address this issue."
"Information privacy is challenging since it attempts to use data while protecting an individual's privacy preferences and personally identifiable information."
"Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them."
"The fields of computer security, data security, and information security all design and use software, hardware, and human resources to address this issue."
"Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them."