๐ CISSP Study Note: Privacy
๐ CISSP Study Note: Privacy
๐ Definition
Privacy is the right of an individual to control how their personal information is collected, used, disclosed, and shared. It reflects an individual’s autonomy over their digital and physical identity, and it is considered a fundamental human right in many legal systems and international standards.
๐ฏ Key Point
Privacy cannot be achieved without security.
You cannot claim to protect privacy if the underlying systems and data are not secure.
Security provides the technical and operational foundation that makes privacy protections real.
๐ฅ MindMap Reference
๐ Note: Privacy is such a critical concept that it warrants its own MindMap or visual breakdown, covering:
-
Data Subject Rights
-
Global Privacy Regulations (GDPR, CCPA, HIPAA)
-
Privacy by Design
-
Legal vs. Ethical Obligations
-
Security Controls for Privacy Enforcement
Ask if you'd like me to build or export this MindMap for you.
๐ง Why Privacy Matters in Cybersecurity
In the CISSP framework, privacy is about protecting people, not just data.
It’s the security professional’s responsibility to ensure that:
-
Individuals are informed of how their data is used
-
Consent is obtained when required
-
Data is only collected and retained as necessary
-
Rights to access, correct, and delete data are respected
⚖️ Legal & Regulatory Foundations of Privacy
| Region / Law | Highlights |
|---|---|
| GDPR (EU) | Right to be forgotten, data portability, explicit consent |
| CCPA (California) | Right to know, right to delete, opt-out of sale |
| HIPAA (USA) | Protects personal health information (PHI) |
| PIPEDA (Canada) | Requires meaningful consent and accountability |
| LGPD (Brazil) | Modeled after GDPR, includes data subject rights and legal bases for processing |
๐ง Security Controls That Enable Privacy
| Control | Function |
|---|---|
| Encryption | Protects data confidentiality in transit and at rest |
| Access Control | Ensures only authorized users can access personal data |
| Data Masking | Hides or redacts sensitive information in logs or test environments |
| Auditing & Logging | Tracks who accessed what, when, and why |
| Retention Policies | Enforce lawful limits on how long personal data is kept |
✅ Example (CISSP-Style)
An online retailer collects customer information during checkout. To protect privacy, the company enforces TLS encryption, requires user consent, applies data minimization, and enables users to request deletion of their data.
✅ This demonstrates both privacy protection and the security infrastructure that supports it.
๐ Found In CISSP Domains
| Domain | Focus |
|---|---|
| ๐ Domain 1: Security and Risk Management | Covers privacy principles, legal frameworks, ethical obligations, and data subject rights. |
| ๐ Domain 2: Asset Security | Focuses on data classification, handling, and protection of personal and sensitive information. |
| ๐ Domain 5: Identity and Access Management (IAM) | Supports privacy through identity verification, role-based access, and consent management systems. |
๐ Memory Hook
“Privacy protects people. Security protects the data that protects the people.”
You can have security without privacy—but you can’t have privacy without security.
Comments
Post a Comment