Unlocking Privacy: Navigating the Maze of Data Protection

123456789101112
Across
  1. 2. Malicious software, including but not limited to viruses, trojan horse applications, rootkits, and backdoors.
  2. 4. A small piece of data sent from a website and stored in your web browser as a record of browser activity.
  3. 6. Cyber attackers use fraudulent messages or websites to get information from unsuspecting users.
  4. 8. Consent that requires you to act.
  5. 9. Snippets of code used on web pages to gather information about website visitors and track their activity.
  6. 10. Locking your credit data until you give permission for it to be released.
  7. 12. Data such as fingerprint, DNA or handwriting.
Down
  1. 1. Automated processing of personal data to analyze personal preferences, activity, and so on.
  2. 3. A process by which personal data is irreversibly altered in such a way that a person can no longer be identified.
  3. 5. Software that selectively blocks incoming or outgoing network communications based on security rules
  4. 7. Any event that has resulted in (or could result in) unauthorized use, access, or disclosure of personal data.
  5. 11. The process of transforming readable data (clear text) into a form that is unreadable.