Across
- 5. the process of converting information or data into a code, especially to prevent unauthorized access.
- 6. an individual, group, or application that receives data in the form of a collection. The data is used for query, analysis, and reporting.
- 7. a random string of bits generated specifically to scramble and unscramble data. Is created with algorithms designed to ensure that each key is unique and unpredictable.
- 8. assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the information.
- 11. a process in which organizations assess the data that they hold and the level of protection it should be given.
- 12. a senior stakeholder within your organisation who is accountable for the quality of one or more data sets.
- 13. a computer network that is optimized to process a very high volume of data messages with minimal delay
Down
- 1. a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
- 2. a central or distributed university unit or computer system administrator responsible for the operation and management of systems and servers which collect, manage and provide access to institutional data.
- 3. a person responsible for the organization's Privacy Program including but not limited to daily operations of the program, development, implementation, and maintenance of policies and procedures.
- 4. a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
- 9. a user interface, service or device that collects data that is relevant to a business. In many cases, multiple systems and processes may produce data for the same data entity.
- 10. a form of encryption where a pair of keys are responsible for encrypting and decrypting data.