Close Menu
  • Home
  • Higher ED
  • News
  • Regulations
    • U.S. State Privacy Legislation
    • General Data Protection Regulation
    • New York Privacy Act
    • California Privacy Rights Act/California Consumer Privacy Act
  • AI
    • AI – Info Tech News
    • Fordham Artificial Intelligence for Faculty and Staff
    • How Emory University Accelerated AI Research in the Cloud
  • Secure IT News
  • Info Tech News
  • Resources
    • Privacy Glossary of Terms
    • Privacy Policy
    • Your Privacy Questions Answered
    • NIST Privacy Framework
    • US State Privacy Legislation Tracker
    • Safeguarding Data and Student Privacy: A Handbook for Higher Education
    • Privacy Field Guides
    • Access Now Blog
    • Fordham CLIP
  • About
Facebook X (Twitter) Instagram
Trending
  • U.S. Lawmakers Push Back Against UK’s Demand for an Apple Encryption Backdoor
  • Beyond Goodbye: Safeguarding Employee Data Privacy After Death
  • AI Notetakers in Meetings: Balancing Efficiency with Privacy and Risk
  • Are You Ready for Web 3?
  • Stay Ahead of Scammers in 2025
  • What are VPNs?
  • LinkedIn Accused of Using Private Messages to Train AI Models
  • Your Data, Your Decision: How to Control Your Data Privacy
Facebook X (Twitter) Instagram
Privacy at Fordham University
  • Home
  • Higher ED

    Strengthening Website Security in Higher Education: Lessons from the FTC’s GoDaddy Settlement

    January 21, 2025

    Merging AI Innovation with IT Expertise in Risk Management

    January 6, 2025

    Staff Highlight – Marc Herzog

    January 3, 2025

    Staff Highlight – Shannon Ortiz

    January 2, 2025

    AI Guidance in Schools

    October 4, 2024
  • News
  • Regulations
    1. U.S. State Privacy Legislation
    2. General Data Protection Regulation
    3. New York Privacy Act
    4. California Privacy Rights Act/California Consumer Privacy Act
    Featured

    Reauthorized Section 702 of the Foreign Intelligence Surveillance Act

    By Josephine Law, FIP, CIPP/US, CIPMApril 22, 20242 Mins Read
    Recent

    U.S. Lawmakers Push Back Against UK’s Demand for an Apple Encryption Backdoor

    February 21, 2025

    Beyond Goodbye: Safeguarding Employee Data Privacy After Death

    February 19, 2025

    Opt-In or Opt-Out, Does it Matter?

    January 20, 2025
  • AI
    1. AI – Info Tech News
    2. Fordham Artificial Intelligence for Faculty and Staff
    3. How Emory University Accelerated AI Research in the Cloud
    Featured

    Merging AI Innovation with IT Expertise in Risk Management

    By Josephine Law, FIP, CIPP/US, CIPMJanuary 6, 20251 Min Read
    Recent

    AI Notetakers in Meetings: Balancing Efficiency with Privacy and Risk

    February 19, 2025

    LinkedIn Accused of Using Private Messages to Train AI Models

    January 30, 2025

    Opt-In or Opt-Out, Does it Matter?

    January 20, 2025
  • Secure IT News
  • Info Tech News
  • Resources
    • Privacy Glossary of Terms
    • Privacy Policy
    • Your Privacy Questions Answered
    • NIST Privacy Framework
    • US State Privacy Legislation Tracker
    • Safeguarding Data and Student Privacy: A Handbook for Higher Education
    • Privacy Field Guides
    • Access Now Blog
    • Fordham CLIP
  • About
Privacy at Fordham University
You are at:Home»Your Privacy Questions Answered

Your Privacy Questions Answered

What is Privacy?

When something is private to a person, it usually means that something is inherently special or sensitive to them.[i] Privacy is a nebulous philosophical, legal, social, and technological concept that means different things to different observers. In an influential 1890 Harvard Law Review article, Samuel Warren and Louis Brandeis, who later became a Supreme Court Justice, famously defined privacy as “a right to be let alone.”[ii]

Privacy and Security Terms

The privacy domain overlaps with security, including the concepts of appropriate use and protection of information. Some terms are insightful in bridging the understanding of privacy and security. Here are a few of those terms:

Authentication is how an entity (such as a person or computer system) determines whether another entity is who it claims to be.

Authorization, in the context of information security, determines if the end-user is permitted to have access to the desired resource, such as the information asset or the information system containing the asset. Authorization criteria may be based on organizational role, level of security clearance, applicable law, or a combination of factors.

Accountability is implementing appropriate technical and organizational measures to ensure and demonstrate that personal data handling is performed per relevant law. Accountability is a fair information practices principle. Due diligence and reasonable steps are taken to ensure that personal information will be protected and handled consistently with relevant law and other fair use principles.[iii]

Data Breaches are the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by a data collector.[iv] Breaches do not include good faith acquisitions of personal information by an employee or agent of the data collector for the data collector’s legitimate purpose. The personal information is not used for a purpose unrelated to the data collector’s business or subject to further unauthorized disclosure.

Information Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.[v]

A Security Breach occurs when an unauthorized party bypasses security measures to reach protected areas of a system. A security breach can put the intruder within reach of valuable information such as company accounts, intellectual property, and personal information that might include names, addresses, Social Security numbers, and credit card information.[vi]

Privacy, Security, and Intellectual Property

Some regard privacy and security as the same thing. The two sometimes overlap in a connected world, even though the specific differences are complex. They are not the same. Knowing how they differ may help protect individuals in an increasingly connected world.

Security is about the safeguarding of data, whereas privacy is about the safeguarding of user identity. Security refers to how personal information is protected. An individual’s data and personal details may be stored in many places. That can challenge both individual privacy and security.

Although security and privacy concepts are interwoven, it is possible to have security without privacy, but impossible to have privacy without security.

Intellectual property is akin to the amorphous concept of a work product that is not depleted when taken. Intellectual property conveys ownership and rights of ownership. Privacy is about the authorization of individuals to access information. Privacy is not absolute and has caveats at Fordham and in the world at large. Refer to the Intellectual Property Policy for details on how the University defines intellectual property.

An Illustration of the Difference between Privacy and Security

Individuals might share personal information with banks when opening a checking account. What happens after that? Here are three possible outcomes related to personal information (not the money deposited in the checking account).

  1. Privacy and security are maintained. The bank uses an individual’s information to open an account and provides that individual with products and services. The bank protects that data.
  2. Privacy is compromised, and individual security is maintained. The bank sells some of the information to a marketer. It is important to note; that the individual may have agreed to this in the bank’s privacy disclosure. The result? The personal information is in more hands than intended.
  3. Both privacy and security are compromised. The bank has a data breach. Cybercriminals penetrate a bank database, a security breach. The information is exposed and could be sold on the dark web. An individual’s privacy is gone. The individual could become the victim of cyber fraud and identity theft.

Personal information is everywhere in the connected world — in government offices, healthcare providers, stores, restaurants, and many individual online accounts. Personal information is in enough places that it is out of an individual’s control.

[i] Privacy – Wikipedia. https://en.wikipedia.org/wiki/Privacy

[ii] Privacy. https://iapp.org/resources/article/privacy-2/

[iii] Accountability in Security | Handling People’s Data – xMatters. https://www.xmatters.com/blog/security/accountability-in-security-starts-with-leadership-practices/

[iv] HB3025 97TH GENERAL ASSEMBLY. https://www.ilga.gov/legislation/97/HB/09700HB3025.htm

[v] Privacy Infusion in Ubiquitous Computing. http://www.ics.uci.edu/~projects/295d/papers/Privacy-Infusion-in-Ubiquitous-Computing.pdf

[vi] What is a security breach? | Norton. https://us.norton.com/internetsecurity-privacy-security-breach.html

Privacy
  • Data Privacy FAQs
  • Your Privacy Questions Answered
  • Visions of Privacy
Search
Categories
  • AI (77)
  • CCPA (9)
  • GDPR (20)
  • Higher ED (25)
  • New Jersey Privacy (2)
  • New Jersey Privacy Law (2)
  • New York Privacy Act (7)
  • News (187)
  • Privacy (173)
  • Regulations (65)
Archives

Fordham University - The Jesuit University of New York

Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.
Copyright © Fordham University
Facebook X (Twitter) Instagram YouTube LinkedIn
© 2025 ThemeSphere. Designed by ThemeSphere.

Type above and press Enter to search. Press Esc to cancel.