1 | 16 | ||||||||||||||||||||||||
18 | |||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | 15 | ||||||||||||||||||||||||
7 | 17 | ||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | 10 | ||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
1. The practice of collecting, analyzing, and preserving electronic evidence in a way that is legally admissible in court.
2. A type of software license that allows users to use the software for free, but may have restrictions on distribution or modification.
3. The fraudulent acquisition and use of another person's personal information, typically for financial gain.
4. Software that is freely available, allowing users to access, use, modify, and distribute it without restrictions.
5. Software that is developed and sold for profit.
6. A type of software license that allows only one user to access and use the software.
7. The set of laws and regulations that protect individuals' right to privacy, including personal information, communications, and data.
8. Confidential or proprietary information that provides a competitive advantage to a company and is kept secret from the public, such as a software algorithm.
9. The state of being unknown or unidentifiable online, often used to protect privacy or facilitate malicious activities.
10. Laws that deal with offenses committed using computers or the internet, such as hacking, identity theft, and online fraud.
11. Software that is provided for free for a limited time or with limited functionality, with the option to purchase a full version.
12. A novel and useful creation, usually in the form of a product or process, resulting from human creativity and ingenuity.
13. The act of engaging in abusive, threatening, or distressing behavior towards others through online platforms or communication channels.
14. The malicious act of redirecting internet traffic from its intended destination to a different IP address, usually for fraudulent purposes.
15. Using someone else's identity or pretending to be someone else online to deceive or harm others.
16. The area of law that governs the rights and duties between employers and employees, including issues such as hiring, wages, working conditions, and termination.
17. Refers to the practice of safeguarding information from corruption, loss, unauthorized access, or destruction.
18. The system of rules, practices, and processes by which a company is directed and controlled, including the relationships among stakeholders and the goals for which the corporation is governed.