Data Privacy!

12345678910111213
Across
  1. 3. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  2. 4. A small text file stored on a client machine that may later be retrieved by a web server from the machine.
  3. 6. The obligation of an individual, organization or business to protect personal information and not misuse or wrongfully disclose that information.
  4. 7. Enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
  5. 9. The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.
  6. 10. Any person other than - (a) the data subject, (b) the data controller, or (c) any data processor or other person authorised to process data for the data controller or processor.
  7. 11. Computer-mediated technologies that allow the creating and sharing of information via virtual communities and networks
  8. 12. Unsolicited commercial e-mail.
  9. 13. The conversion of digital information into a format unreadable to anyone except those possessing a “key”
Down
  1. 1. Criminal activities carried out by means of computers or the Internet.
  2. 2. Some stores and other locations use this to track movements while you are within range.
  3. 3. Information collected and maintained by a government entity and available to the general public.
  4. 4. May be Explicit (i.e. opt-in) or Implicit (i.e. the individual didn’t opt out)
  5. 5. The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  6. 8. Series of words used as a password