Across
- 3. Discrimination resulting from biased algorithms
- 7. Software with freely available source code
- 9. Legislation ensuring privacy of personal information
- 11. Artificial intelligence technique for pattern recognition
- 12. Privately owned and restricted access to software
- 14. Copies of data for safekeeping or recovery
- 17. Legal protection for creative works
Down
- 1. Malware that holds data hostage for payment
- 2. Online scam to trick users into revealing information
- 4. Legal framework to combat unauthorized computer access
- 5. Discarded electronic devices
- 6. Exclusive rights granted for an invention
- 8. Malicious software that replicates itself
- 10. Unauthorized access or manipulation of computer systems
- 13. Field of engineering dealing with robots
- 15. Software updates to fix vulnerabilities
- 16. Securing data by encoding it
