Across
- 3. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- 4. A small text file stored on a client machine that may later be retrieved by a web server from the machine.
- 6. The obligation of an individual, organization or business to protect personal information and not misuse or wrongfully disclose that information.
- 7. Enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
- 9. The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.
- 10. Any person other than - (a) the data subject, (b) the data controller, or (c) any data processor or other person authorised to process data for the data controller or processor.
- 11. Computer-mediated technologies that allow the creating and sharing of information via virtual communities and networks
- 12. Unsolicited commercial e-mail.
- 13. The conversion of digital information into a format unreadable to anyone except those possessing a “key”
Down
- 1. Criminal activities carried out by means of computers or the Internet.
- 2. Some stores and other locations use this to track movements while you are within range.
- 3. Information collected and maintained by a government entity and available to the general public.
- 4. May be Explicit (i.e. opt-in) or Implicit (i.e. the individual didn’t opt out)
- 5. The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
- 8. Series of words used as a password
