Law BB30 8.01
Across
- 5. The practice of protecting systems, networks, and programs from digital attacks, which is crucial for maintaining the integrity and confidentiality of data.
- 8. The moral principles that govern the use of computer technology and the internet, particularly concerning issues of privacy, security, and behavior online.
- 10. The trail of data left by a person's online activity, which can impact their online reputation and how they are perceived by businesses and other individuals.
Down
- 1. The exchange of information through digital platforms, such as emails, social media, and instant messaging, which can raise ethical considerations regarding privacy and professionalism.
- 2. The use of digital technology to harass or intimidate individuals, particularly in a workplace setting, which can lead to serious ethical and legal issues.
- 3. An incident where unauthorized access to confidential data occurs, compromising sensitive information and posing risks to customer privacy and business integrity.
- 4. The practice of monitoring and influencing how an individual or organization is perceived online, especially in response to negative incidents or feedback.
- 6. The right of individuals to control their personal information and the expectation that their data will be kept secure and confidential by businesses.
- 7. Information collected from clients that can include personal, financial, and behavioral data, which businesses must protect to maintain trust and compliance with regulations.
- 9. The perception of a company in the eyes of consumers, influenced by its actions, communications, and ethical practices, particularly in the digital realm.