RU ITEC411 Social, Legal, and Ethical Issues for Computing Technology
Across
- 1. was written for the rules and requirement
- 3. Mining uses data to find patterns and knowledge
- 6. out person does not want their information to be used
- 8. Union has businesses outside of the Union and it has requirements
- 14. Profiling determining characteristics of people by their behavior
- 16. Information data about a individual
- 17. Consent being aware of how the data is being used and collect
- 19. Use Using someone's information for something else other than the reason you had it in the first place
- 20. it is stored on a person computer when it visits a web site
Down
- 2. Matching gathering information form different databases and and matching them according to the records given
- 4. Protection View it uses classified information from people
- 5. knows where someone is at that exact time
- 7. Communication act did not allow to send messages in 1934
- 9. This act was passed in 1994
- 10. looks over the government's policies
- 11. in person gives permission to go through their information
- 12. This act established rules for the NSA to oversight
- 13. information gathering gathering information about someone without permission from the source
- 15. having your own space from being targeted by anyone
- 18. Amendment gives peoples there equal rights from the government