Datafication and Digital Trust

12345678910
Across
  1. 2. Information _________ is the right to have some control over how your personal information is collected and used.
  2. 5. The method by which information is converted into secret code that hides the information's true meaning
  3. 7. Data as processed, stored, or transmitted by a computer
  4. 9. A privacy ________ is a statement or a legal document (in privacy law) that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. It fulfills a legal requirement to protect a customer or client's privacy
  5. 10. Common unit of measurement of symbol rate, which is one of the components that determine the speed of communication over a data channel
Down
  1. 1. Intrusive software that is designed to damage and destroy computers and computer systems
  2. 3. The practice of deploying people, policies, processes, and technologies to protect organizations, their critical systems, and sensitive information from digital attacks
  3. 4. When somebody sends an e-mail with a link to a bogus website it is called ___________
  4. 6. An organized collection of structured information, or data, typically stored electronically in a computer system
  5. 8. Smallest unit of data