Ethical Online Teaching and Data Management

123456789101112131415
Across
  1. 7. Making sure information is only accessible to those authorized
  2. 8. Hiding information so only authorized users can see it
  3. 11. An incident when sensitive information is exposed or stolen
  4. 12. Trail of data users leave behind online
  5. 14. Document explaining how a website collects and uses data
  6. 15. Rules that users must agree to for online tools or access
Down
  1. 1. An extra layer of security beyond a password
  2. 2. Collecting only the data that is necessary
  3. 3. Guidelines for responsible technology use in schools or workplaces
  4. 4. Fraudulent attempt to obtain sensitive information, usually via email or text
  5. 5. U.S. Law protecting the privacy of students and their educational records
  6. 6. A U.S. law protecting children under 13 years old in online environments
  7. 9. Stealing someone's personal information for fraud
  8. 10. Malicious software like viruses or spyware
  9. 13. Steps taken to protect digital data