1/12 | 17 | |||||||||||||||||||||||
2 | 19 | |||||||||||||||||||||||
14 | ||||||||||||||||||||||||
3 | ||||||||||||||||||||||||
4 | 18 | |||||||||||||||||||||||
5 | ||||||||||||||||||||||||
15 | ||||||||||||||||||||||||
6 | ||||||||||||||||||||||||
7 | ||||||||||||||||||||||||
16 | ||||||||||||||||||||||||
8/13 | ||||||||||||||||||||||||
9 | ||||||||||||||||||||||||
10 | ||||||||||||||||||||||||
11 | ||||||||||||||||||||||||
1. A set of regulations and guidelines that govern the handling and safeguarding of personal data to ensure the privacy and security of individuals.
2. A deceitful online method that dupes individuals into divulging their personal or sensitive information is known as a fraudulent activity.
3. An individual's entitlement to govern and safeguard their personal information as well as monitor their activities carried out on the internet.
4. the practice of keeping and storing data for a specific period of time, as legally required or for business purposes
5. Small text files are stored on a user's device, which are utilized for monitoring and storing information regarding their browsing activities.
6. Protecting computer systems, networks, and data from unauthorized access, attacks, and breaches is the practice of safeguarding digital assets.
7. The condition of being anonymous is characterized by the absence or concealment of a person's identity or personal information.
8. Reducing the amount of personal data collected and processed to only what is necessary for a specific purpose.
9. Any information that can identify an individual, such as their name, address, phone number, or social security number.
10. The collection of data and information created from an individual's online activities and engagements that are left as evidence.
11. The process of removing personally identifiable information from data, making it impossible to associate with a specific individual.
12. The protection of personal information and sensitive data from unauthorized access, use, or disclosure.
13. Unauthorized individuals gain access to and exploit sensitive or confidential data when they gain entry to information intended to be kept private or classified.
14. The voluntary granting of permission by an individual for the collection, use, and sharing of their personal data.
15. A statement or document that illustrates the methods by which an organization gathers, utilizes, and safeguards the personal information of its users or customers.
16. The process of encoding information in a manner that permits access and comprehension solely by authorized parties.
17. The fraudulent acquisition and use of an individual's personal information, usually for financial gain, without their consent.
18. A person or organization that collects, determines the purposes of, and is responsible for the processing of personal data.
19. An individual who can be identified by their personal data and has certain rights over its processing and protection.