Across
- 1. A principle that consumers must approve in advance what information they receive from a company or allow a company to share their information with third parties.
- 4. __________ is one the IT technologies to ensure that all information communicated over the network is being translated into cipher text.
- 8. One of the methods to fake news in huge amount without intervention of humans.
- 9. Internet _________ in the workplace refer to the actual time wasted and productivity losses due to employees spending time on the Web during working hours are very high.
- 11. One of the privacy protection principles that concerns about an individual's ability both to access data and view the data.
- 13. _________ law protects original work of authorship, such as music and literacy works.
- 16. _________ law protects inventions and discoveries.
- 18. _________ rights management is a system of protecting the copyrights of data circulated over the Internet or digital media.
- 19. _________ secret law protects proprietary business information.
- 20. One of the privacy protection principles that concerns whether customers are given notice on how the collection of information is being practiced.
Down
- 2. _________ law is used to protect logos.
- 3. ___________ is bullying that takes place electronically.
- 5. Restrictions on what can be seen, published, or accessed on the Internet.
- 6. A method that gives consumers the choice to refuse to share information about themselves or to avoid receiving unsolicited information.
- 7. Internet __________ refers to a member of an online social community who deliberately tries to disrupt, attack, offend, or generally cause trouble within the community.
- 10. a set of moral principles or rules of how people are expected to conduct themselves.
- 12. _________ property law protects the creative work of people.
- 14. Site __________ logs show what users are doing on the Internet.
- 15. refers to the limited use of copyrighted material, without paying a fee or royalty for certain purposes only.
- 17. Content __________ can be based on a blacklist of offensive website content providers or by other methods.
