Across
- 2. Everything on the storage medium is encrypted
- 4. Rights of individuals and companies to control how information about them is collected and used
- 7. use of computers or other types of digital equipment to make illegal copies documents
- 8. hardware is stolen from an individual or an organization
- 11. complete malfunction of a computer system
- 12. Provide continuous power to a computer system
- 13. State of being concealed or free from unauthorized intrusion
- 14. Dictates how supplied information may be used, but can be changed without notice
- 15. Sellers install unlicensed copies on computers sold to consumers
Down
- 1. Using electronic means to collect a variety of in-depth information about an individual
- 3. Unauthorized copying of a computer program
- 5. Collection of data about people, used for marketing purposes
- 6. Used to monitor employees
- 9. Unsolicited, bulk e-mail sent over the Internet
- 10. Technology that causes the device to self-destruct
