Across
- 1. Series of words used as a password
- 3. Information collected and maintained by a government entity and available to the general public.
- 5. A small text file stored on a client machine that may later be retrieved by a web server from the machine.
- 7. The conversion of digital information into a format unreadable to anyone except those possessing a “key”
- 9. Some stores and other locations use this to track movements while you are within range.
- 10. Unsolicited commercial e-mail.
- 11. The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
Down
- 2. Computer-mediated technologies that allow the creating and sharing of information via virtual communities and networks
- 4. The obligation of an individual, organization or business to protect personal information and not misuse or wrongfully disclose that information.
- 5. Criminal activities carried out by means of computers or the Internet.
- 6. Enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
- 8. May be Explicit (i.e. opt-in) or Implicit (i.e. the individual didn’t opt out)
