Intellectual Property Rights
Privacy Concerns
Malware
Digital Citizenship
Ethics
100

a non-physical, intangible creation that has value

intellectual property

100

having control over our personal information and who has access to it

Privacy

100

malicious software that harms computers and systems

Malware

100

the data that are intentionally released onto the web by an individual

active digital footprint

100

when information is kept private or secret

confidentiality

200

a license that gives the holder the exclusive right over selling, making, or using an invention

patent

200

We have the right to keep our bodily functions, characteristics, biometrics, and genetic codes private.

Privacy of the person

200

type of malware that secretly monitors and records users’ activities

spyware

200

the benefit and interests of all

common good

200

a legal contract whereby an employee agrees not to go into direct or indirect competition with their employer either during or after being employed by them

noncompete agreement

300

the legal right given to organizations to exclusively use names, brands, and signs that identify their products, services, and companies

trademark
300

 Our data should not be automatically available to others. Individuals must have control over their data and how their data are used.

privacy of data and image:

300

type of malware that locks users out of their system or device, and forces them to pay the attacker a ransom to gain access

ransomware

300

the data that are unintentionally released onto the web by an individual

passive digital footprint

300

also referred to as a non-disclosure agreement (NDA); a legal contract that prevents parties from disclosing certain information

confidentiality agreement

400

the economy that is based on the online connections among businesses, people, devices, data, systems, and processes

digital economy

400

Our communications should not be intercepted.

Privacy of Communication

400

type of malware that tricks the user into allowing access to the system or computer, by posing as a different type of file

trojan horse

400

the rights and responsibilities of technology users to experience and promote positive online experiences for the common good

Digital Citizenship

400

information that an organization wants to keep secret or private

proprietary information

500

property rights that are assigned to the holder or owner that gives the holder a monopoly over the property and prevents others from using, copying, imitating, or duplicating the intellectual property unfairly

intellectual property rights

500

These include our habits and personal, religious, and political beliefs and practices

Privacy of Behavior and Action

500

type of malware that infects a system, similar to a virus, but it acts independently and does not need to be triggered

worm

500

the data that are unintentionally released onto the web by an individual; also referred to as a passive digital footprint

data exhaust

600

a secret about processes, formulae, devices, or tools that give a company a competitive edge because they provide economic value

trade secret

600

type of malware that infects a computer or system, and then replicates itself after being triggered by the host

virus

700

These protect creative and intellectual works, such as art, literary works, and source codes of software programs

Copyrights

700

weakness that puts a system or computer at risk

vulnerability

800

software used to identify and remove malware from computers and systems

anti-malware