Tools designed to protect personal data and minimize the collection of data.
What are privacy-enhancing technologies?
These two fruits are known as the best fruits.
What are: any answers except for mangoes and cherries are wrong, but I'll take them anyway (except for bananas, that one is simply too far gone)?
The US government almost sued them for releasing their privacy technology to the public.
Who is Philip Zimmermann?
These track user activity and were introduced in 1994.
What are cookies?
He was the first president of the United States.
Who is George Washington?
(50 more points if you name Samuel Huntington; 100 more points if you name John Hanson)
This design principle pushes for PETs to only collect essential data.
What is data minimization?
This PET is also known as a safe room in the processor.
What is the Trusted Execution Environment?
This British scientist is known for introducing the Internet to the public.
Who is Tim Berners-Lee?
In ____ Christopher Columbus sailed the ocean blue.
What is 1492?
U.S. law that protects personal health information.
What is HIPAA?
This design principle puts privacy at the forefront of any PET design.
What is privacy by design?
Tor and VPNs are examples of this PET.
What are anonymous communication networks?
Andrew Yao contributed this to PETs.
What is the theory of secure multi-party computation?
The term “Privacy Enhancing Technology” was coined when.
What is around 1997?
The Target breach occurred at this incredibly convenient time.
What is during the Black Friday of 2013?
Spongebob Squarepants is an example of this object and lives inside this fruit.
What is a sponge and a pineapple?
This PET works well to ensure secure transactions.
What is zero-knowledge proofs?
Credited for their work in creating a PET that hides individual data in large datasets.
Who is Cynthia Dwork?
This law granted citizens access to their personal information.
What is the Privacy Act of 1974?
Two industries/systems where PETs are needed to ensure sensitive data is protected.
What are [choose two: finance/banking, healthcare, insurance, education, entertainment, law enforcement, governments]?
The categories of PETs are Cryptographic tools, Distributed Analytics tools, and tools for this.
What is Pseudonymization and Anonymization?
This PET prevents your information from being traced back to you even if your information is used in a large dataset.
What is differential privacy?
Pretty Good Privacy (PGP) uses this encryption tool.
What is end-to-end encryption?
Andrew Yao publicized his theory for a PET in this year.
What is in 1982?
This company had to pay $16 million due to possible HIPAA violations caused by a security breach.
Who is Anthem?