RU ITEC411 Social, Legal, and Ethical Issues for Computing Technology

1234567891011121314151617181920
Across
  1. 1. was written for the rules and requirement
  2. 3. Mining uses data to find patterns and knowledge
  3. 6. out person does not want their information to be used
  4. 8. Union has businesses outside of the Union and it has requirements
  5. 14. Profiling determining characteristics of people by their behavior
  6. 16. Information data about a individual
  7. 17. Consent being aware of how the data is being used and collect
  8. 19. Use Using someone's information for something else other than the reason you had it in the first place
  9. 20. it is stored on a person computer when it visits a web site
Down
  1. 2. Matching gathering information form different databases and and matching them according to the records given
  2. 4. Protection View it uses classified information from people
  3. 5. knows where someone is at that exact time
  4. 7. Communication act did not allow to send messages in 1934
  5. 9. This act was passed in 1994
  6. 10. looks over the government's policies
  7. 11. in person gives permission to go through their information
  8. 12. This act established rules for the NSA to oversight
  9. 13. information gathering gathering information about someone without permission from the source
  10. 15. having your own space from being targeted by anyone
  11. 18. Amendment gives peoples there equal rights from the government