Privacy Flashcards

1
Q

___________ concerns the collection and use of data about individuals

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three primary privacy issues:

A
  1. Accuracy
  2. Property
  3. Access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___________ relates to the responsibility of those who collect data to ensure that the data is correct

A

Accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_________ relates to who owns the data

A

Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

________ relates to the responsibility of those who have data to control who is able to use that data

A

Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Stored information is often refered to as _________

A

big data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Collection of data can be searched to find all the action of one person creating a ____________ that reveals highly detailed account of your life.

A

digital footprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A vast industry of data gatherers known as __________ or ______________ now exists that collects, analyzes, and sells such personal data.

A
  • information resellers
  • information brokers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Many businesses search employees’ electronic mail and computer files using ________________. These programs record virtually everything you do on your computer.

A

employee-monitoring software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Many people believe that, while using the web, little can be done to invade their privacy. This is called the ______________.

A

illusion of anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Some websites are designed to be hidden from standard search engines. These websites make up the _________ and allow communication in a secure and anonymous manner.

A

deep web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

One part of the deep web is hidden websites that make up the __________. These websites use special software that hides a user’s IP address and makes it nearly impossible to identify who is using the site.

A

dark web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_______ includes the locations, or addresses, of sites that you have recently visited.

A

History files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____________ also known as the ________ contain web page content and instruction for displaying this content.

A
  • temporary internet files
  • browser cache
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Another way web activity can be monitored is with _______. Small data files that are deposited on your hard disk from websites visited.

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__________ is one that is generated (and then read) only by the website you are currently visiting.

A

first-party cookie

17
Q

__________ is usually generated by an advertising company affiliates with website you are currently visiting. Often referred to as ________.

A
  • third party cookie
  • tracking cookies
18
Q

Most browsers also offer a ________ which ensures that your browsing activity is not recorded on your hard disk ex) Chrome: incognito mode/ Safari: private browsing

A

privacy mode

19
Q

________ are invisible images or HTML code hidden within a web page or e-mail message, can be used to transmit information without your knowledge.

A

Web bugs

20
Q

________ is used to describe a wide range of programs designed to secretly record and report an individual’s activities on the Internet.

A

spyware

21
Q

_____________ is perhaps the most invasive and dangerous type of spyware.

A

computer monitoring software

22
Q

One type of computer monitoring software, known as ________, records every activity and keystroke made on your computer system, including credit card numbers, passwords, and e-mail messages.

A

keylogger

23
Q

Defense involves using a category of software known as _________ or ___________ which are designed to detect and remove various types of privacy threats.

A
  • antispyware
  • spy removal programs
24
Q

Another aspect of Internet privacy comes from ________, the information that people voluntairly post about themselves online.

A

online identity

25
Q

Privacy matter laws

A
  1. Gramm-Leach-Bliley Act (protects personal financial information)
  2. Health Insurance Portability and Accountability Act (HIPPA) (protects medical records)
  3. Family Education Rights and Privacy Act (FERPA) (restricts disclosure of educational records)