a non-physical, intangible creation that has value
intellectual property
having control over our personal information and who has access to it
Privacy
malicious software that harms computers and systems
Malware
the data that are intentionally released onto the web by an individual
active digital footprint
when information is kept private or secret
confidentiality
a license that gives the holder the exclusive right over selling, making, or using an invention
patent
We have the right to keep our bodily functions, characteristics, biometrics, and genetic codes private.
Privacy of the person
type of malware that secretly monitors and records users’ activities
spyware
the benefit and interests of all
common good
a legal contract whereby an employee agrees not to go into direct or indirect competition with their employer either during or after being employed by them
noncompete agreement
the legal right given to organizations to exclusively use names, brands, and signs that identify their products, services, and companies
Our data should not be automatically available to others. Individuals must have control over their data and how their data are used.
privacy of data and image:
type of malware that locks users out of their system or device, and forces them to pay the attacker a ransom to gain access
ransomware
the data that are unintentionally released onto the web by an individual
passive digital footprint
also referred to as a non-disclosure agreement (NDA); a legal contract that prevents parties from disclosing certain information
confidentiality agreement
the economy that is based on the online connections among businesses, people, devices, data, systems, and processes
digital economy
Our communications should not be intercepted.
Privacy of Communication
type of malware that tricks the user into allowing access to the system or computer, by posing as a different type of file
trojan horse
the rights and responsibilities of technology users to experience and promote positive online experiences for the common good
Digital Citizenship
information that an organization wants to keep secret or private
proprietary information
property rights that are assigned to the holder or owner that gives the holder a monopoly over the property and prevents others from using, copying, imitating, or duplicating the intellectual property unfairly
intellectual property rights
These include our habits and personal, religious, and political beliefs and practices
Privacy of Behavior and Action
type of malware that infects a system, similar to a virus, but it acts independently and does not need to be triggered
worm
the data that are unintentionally released onto the web by an individual; also referred to as a passive digital footprint
data exhaust
a secret about processes, formulae, devices, or tools that give a company a competitive edge because they provide economic value
trade secret
type of malware that infects a computer or system, and then replicates itself after being triggered by the host
virus
These protect creative and intellectual works, such as art, literary works, and source codes of software programs
Copyrights
weakness that puts a system or computer at risk
vulnerability
software used to identify and remove malware from computers and systems
anti-malware