Please enable JavaScript.
Coggle requires JavaScript to display documents.
3-VIOLATIONS (Solove's Taxonomy) - Coggle Diagram
3-VIOLATIONS
(Solove's Taxonomy)
INFORMATION COLLECTION
interrogation
occurs when questions breach the parties social boundaries/context
often when there is NO historical relationship/foundation of trust
OR asymmetric power relation
surveillance
altering people behaviour
distorting reality
INFORMATION
PROCESSING
aggregation
revealing things abt individuals that are not apparent from a single interaction
insecurity
often precursor of another violation
by another threat actor
often the result of the failure to
consider other threat actors
identification
issue where data allows an individual
to be singled out (even if he can't be named)
secondary use
using sharer's PD outside of
his contextual expectations,
or of contractual terms
exclusion
using one's data without his knowledge and
without him being able to participate in its use
INFORMATION
DISSEMINATION
breach of
confidentiality
disclosure of information shared
in secret, causing loss of trust
provoking reluctance to
share info in the future
disclosure
intentional
:red_cross:
insecurity
(unintentional)
impacting on one's well-being, causing financial loss,
or impacting the way society views the individual
exposure
related to
disclosure
exposing one's nudity,
grief or bodily functions
increased accessibility
ease of access and
discovery of one's PD
e.g. court records being put
online in a searchable format
:check: right to be forgotten
blackmail
threatening to disclose PD
appropriation
using one's identity to serve
the interests of another
e.g. a magazine using one's
image to increase their sells
distortion
disseminating false/misleading
info about an individual
:check: accuracy of data
INVASION
intrusion
disturbing one's tranquility/solitude
unsolicited calls or direct marketing
i. doesn't require the use of PD
decisional
interference
intruding into one's decision making
regarding their private affairs
it can be facilitated by
power imbalances
:check: GDPR automated
decision making rules
e.g.
decisional interference
through dark patterns
privacy pattern
privacy dark pattern
system I thinking
need to belong
to a social group
nudging
persuasion