Across
- 7. Making sure information is only accessible to those authorized
- 8. Hiding information so only authorized users can see it
- 11. An incident when sensitive information is exposed or stolen
- 12. Trail of data users leave behind online
- 14. Document explaining how a website collects and uses data
- 15. Rules that users must agree to for online tools or access
Down
- 1. An extra layer of security beyond a password
- 2. Collecting only the data that is necessary
- 3. Guidelines for responsible technology use in schools or workplaces
- 4. Fraudulent attempt to obtain sensitive information, usually via email or text
- 5. U.S. Law protecting the privacy of students and their educational records
- 6. A U.S. law protecting children under 13 years old in online environments
- 9. Stealing someone's personal information for fraud
- 10. Malicious software like viruses or spyware
- 13. Steps taken to protect digital data
