ELI5: What is Privacy?

You know how your diary is yours, and nobody should read it without your permission? Privacy in the computer world means people get to control who sees their personal information — like their name, address, or health records. Companies that collect this information have to follow rules about how they use it, store it, and who they share it with. It’s about respecting that your personal stuff belongs to you.

Overview

Privacy in information security refers to an individual’s right to control how their personal information is collected, used, shared, and disposed of. Organizations must implement technical and administrative controls to protect personally identifiable information (PII) and comply with privacy regulations. Privacy is distinct from security: security protects data from unauthorized access, while privacy governs how authorized parties handle personal data.

Key Concepts

  • PII (Personally Identifiable Information) — data that can identify an individual (name, SSN, email, biometrics)
  • PHI (Protected Health Information) — health-related PII governed by HIPAA
  • Privacy principles:
    • Purpose limitation — collect data only for a stated purpose
    • Data minimization — collect only what is necessary
    • Consent — obtain permission before collecting personal data
    • Right to be forgotten (erasure) — GDPR grants individuals the right to request data deletion
    • Data portability — individuals can request their data in a usable format
  • Privacy Impact Assessment (PIA) — evaluates how a project or system will affect individual privacy
  • Privacy by design — embedding privacy controls into systems from the beginning, not as an afterthought
  • Anonymization vs. pseudonymization — anonymization is irreversible; pseudonymization replaces identifiers but can be reversed with a key
  • Data breach notification — regulations often require notifying affected individuals and authorities within a set timeframe
  • Data sovereignty — data is subject to the laws of the country where it is stored
  • Tokenization — substituting sensitive data elements with non-sensitive tokens
  • Data masking — obscuring specific data within a database to protect it in non-production environments

Exam Tips

Remember

Anonymization cannot be reversed; pseudonymization can. GDPR requires data breach notification within 72 hours. Privacy by design = build it in from the start, not bolted on later.

Connections

  • Governed by regulations-and-frameworks such as GDPR, HIPAA, and GLBA which define privacy requirements
  • Closely related to data-classification which identifies and labels personal data requiring privacy protections
  • See also compliance for how privacy requirements are monitored and enforced

Practice Questions

Scenario

See case-privacy for a practical DevOps scenario applying these concepts.