RU ITEC411 - Privacy
Across
- 3. Matching The act of combining and comparing information from different databases, often using a common identifier like a social security number to match records.
- 5. Specification The principle that data should be collected for specific, explicit, and legitimate purposes.
- 7. Files a website stores on a visitor's computer to track user behavior.
- 9. Information Any information relating to an individual person.
- 11. Use The use of personal information for a purpose other than the one for which it was originally provided.
- 13. Information Gathering The collection of personal information about a user without the user's knowledge.
- 14. Minimization The practice of collecting only the data that is necessary for the stated purpose.
- 15. Guidelines The guidelines of the Organization for Economic Co-operation and Development that serve as the basis for many privacy laws worldwide.
- 16. The National Institute of Standards and Technology, which provides security and privacy standards and guidelines.
- 17. Risks Potential threats to the confidentiality and security of personal information.
Down
- 1. Information Practices A set of principles that guide the responsible handling of personal information.
- 2. Data Protection Directive A comprehensive European Union directive governing data protection and privacy.
- 3. Profiling The analysis of data to determine characteristics of people who are most likely to engage in a particular behavior.
- 4. Measures Safeguards and controls put in place to protect personal information from unauthorized access or disclosure.
- 6. The requirement to inform individuals about data collection practices, purposes, and policies.
- 7. The voluntary agreement given by individuals for the collection and use of their personal information.
- 8. Mining The process of searching and analyzing vast amounts of data to discover patterns and generate new information or knowledge.
- 10. The Personal Information Protection and Electronic Documents Act, a Canadian privacy law.
- 12. The principle of being responsible for ensuring the protection of personal information.
- 13. Consent Users being aware of what information is collected and how it is used before giving permission.