Data Privacy!

1234567891011121314
Across
  1. 3. Some stores and other locations use this to track movements while you are within range.
  2. 5. Criminal activities carried out by means of computers or the Internet.
  3. 6. The obligation of an individual, organization or business to protect personal information and not misuse or wrongfully disclose that information.
  4. 8. Unsolicited commercial e-mail.
  5. 9. Series of words used as a password
  6. 10. The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.
  7. 11. Any person other than - (a) the data subject, (b) the data controller, or (c) any data processor or other person authorised to process data for the data controller or processor.
  8. 12. A small text file stored on a client machine that may later be retrieved by a web server from the machine.
  9. 14. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Down
  1. 1. Computer-mediated technologies that allow the creating and sharing of information via virtual communities and networks
  2. 2. Information collected and maintained by a government entity and available to the general public.
  3. 4. The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  4. 6. May be Explicit (i.e. opt-in) or Implicit (i.e. the individual didn’t opt out)
  5. 7. The conversion of digital information into a format unreadable to anyone except those possessing a “key”
  6. 13. Enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.