RU ITEC411 (Social, Legal, and Ethical Issues for Computing Technology)

1234567891011121314151617181920
Across
  1. 4. 1994 saw the passage of this legislation.
  2. 5. This act created guidelines for the NSA's supervision.
  3. 8. written with the requirements and rules in mind.
  4. 10. Protection View It makes advantage of individuals' classified information.
  5. 11. consent while understanding the purpose and collection of the data.
  6. 14. profiling identifying traits in individuals based on their actions.
  7. 15. In 1934, the Communication Act prohibited sending communications.
  8. 17. Union has standards and operates enterprises outside of the Union.
  9. 19. is aware of someone's actual location at that moment.
  10. 20. in-person grants authorization to review their data.
Down
  1. 1. Details regarding a certain person.
  2. 2. information gathering collecting data about an individual without the source's consent.
  3. 3. Make use of utilizing someone else's information for purposes other than the original purpose for which you obtained it.
  4. 6. being protected by your personal space from outside threats.
  5. 7. considers the policies of the government.
  6. 9. information from several databases is gathered and matched in accordance with the provided records.
  7. 12. Amendment grants citizens equal rights from the state.
  8. 13. it is kept on an individual's computer upon accessing a webpage.
  9. 16. mining looks for trends and information in the data.
  10. 18. The individual objects to the usage of their information.