Across
- 2. Limited legal use of copyrighted materials
- 3. Moving business operations to another country
- 5. Legal protection for creators of original works
- 9. Identification using unique physical characteristics
- 10. Unsolicited mass electronic messages
- 11. Small file stored by websites to track users
- 12. Redirecting users to fake websites through DNS manipulation
- 14. Tool used to hide a user’s identity online
- 16. Program that secretly records keystrokes
- 18. Spoken defamation
- 19. Analyzing data to predict behavior
- 20. Security system designed to attract hackers
- 21. Written defamation
- 24. Equal treatment of internet traffic
Down
- 1. Analyzing large datasets to find patterns
- 4. Hacking used to promote political or social causes
- 6. Converting data into unreadable form for security
- 7. Fraudulent messages used to steal personal information
- 8. Working remotely using computer networks
- 11. Law against unauthorized computer access
- 13. Monitoring activity or communications
- 15. The right of individuals to control how their personal information is used
- 17. Overloading a system with traffic to shut it down
- 22. Software designed to damage or infiltrate computers
- 23. Technology that controls use of digital content
