Private and public spaces
Across
- 3. - Malicious software collecting data.
- 5. - The state of being unidentified.
- 6. - Using body traits for identification.
- 8. - A set of rules used in computing.
- 9. - A person or company selling data.
- 10. - Security cameras used for surveillance.
- 12. - Unauthorized release of information.
- 13. - Gaining unauthorized access to data.
- 16. - Securing data by coding it.
- 17. - The right to control personal information.
- 18. - Identifying someone based on features.
- 19. - Control over information sharing.
Down
- 1. - Someone who exposes secrets.
- 2. - Classifying people based on behavior.
- 4. - A system of total surveillance.
- 7. - Monitoring of individuals or groups.
- 11. - Following a person’s online actions.
- 14. - Tracking a person’s location.
- 15. - Power to restrict or influence actions.