1 | 15 | 17 | |||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | 4 | ||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | 16 | ||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
1. Discomfort or vision problems resulting from prolonged screen use, often leading to headaches and fatigue.
2. Protecting computer systems, networks, and data from unauthorized access, attacks, and breaches is the practice of safeguarding digital assets.
3. the degree to which data correctly represents the real-world scenario or situation
4. Online harassment that can severely affect an individual's mental well-being.
5. Evidence-based therapeutic interventions delivered through software to prevent, manage, or treat medical conditions.
6. The collection of data and information created from an individual's online activities and engagements that are left as evidence.
7. A statement or document that illustrates the methods by which an organization gathers, utilizes, and safeguards the personal information of its users or customers.
8. Access to information and resources about health and wellness via the internet, empowering individuals to make informed decisions about their health.
9. A set of regulations and guidelines that govern the handling and safeguarding of personal data to ensure the privacy and security of individuals.
10. A person or organization that collects, determines the purposes of, and is responsible for the processing of personal data.
11. Disruptions to normal sleep patterns, frequently caused by screen exposure before bedtime.
12. The process of removing personally identifiable information from data, making it impossible to associate with a specific individual.
13. The process of encoding information in a manner that permits access and comprehension solely by authorized parties.
14. Incidents where unauthorized individuals gain access to data, often resulting in potential harm or privacy violations.
15. An incident where unauthorized individuals gain access to confidential or sensitive data, potentially leading to privacy violations.
16. Reducing the amount of personal data collected and processed to only what is necessary for a specific purpose.
17. the practice of keeping and storing data for a specific period of time, as legally required or for business purposes