"The sale of consumer information to marketers or other businesses" is an example of this kind of use of personal information.
Secondary use
This amendment guarantees protection of offensive and/or controversial speech and ideas
The First Amendment
This term refers to intentional, unauthorized access to computer systems.
Hacking
What is the term that describes people who oppose technological progress?
Luddite
This term refers to the act of working from home via the internet, email, and other means of digital communications.
Telecommuting
This kind of policy is one in which a user must take action to withdraw consent (for an organization to use their information in a particular way).
Opt-out policy
The protection of websites and social media companies is called?
Safe Harbor
This term refers to an individual who, in the early days of computing, wrote clever or elegant programs.
Hacker
What is the term that refers to the fact that some groups of people regularly use the various forms of modern information technology, while others do not and cannot?
Digital Divide
This term refers to the phenomenon where a company pays other companies to build parts for its products or provide services instead of performing those tasks itself.
Outsourcing
In Tampa, Florida, police used technology to scan the faces of nearly 100,000 individuals who entered this event without their knowledge or consent.
2001 Super Bowl
Freedom of speech is protection from?
Government censorship
This term refers to software that attaches itself to other software, often times compromising one's computer.
Virus
What is the term that refers to the point at which artificial intelligence or some combined human-machine intelligence advances so far that we cannot comprehend what lies on the other side?
Technological Singularity
Individuals such as Independent Contractors are described as this type of worker.
Gig worker
The _______ of the US Constitution "sets limits on the government’s rights to search our homes and businesses and to seize documents and other personal effects", but does not automatically apply to new technologies.
Fourth Amendment
Name one guideline when setting up a website with sensitive information.
Consider potential risks.
Consider unintended readers or users.
Consider ways to prevent access by unintended users.
Remember that it can be difficult to withdraw material once released.
These 3 types of hackers possess the ability to hack in ways that are destructive, beneficial, or a little of both.
Black Hat, White Hat, and Gray Hat
What does Google and Apple perform to remove illegal or malicious software that the company discovers in an app after users have downloaded it?
Remote Deletion
Modern communications, power, medical, financial, retail, and transportation systems depend heavily on this type of system.
Computer system
This 1967 Supreme Court case restricted wiretapping by law enforcement by ruling that “the Fourth Amendment does apply to conversations and that it applies in public places..”.
Katz v. United States
Name the three categories of modern communications technology.
Print Media (newspapers, books, magazines, and pamphlets)
Broadcast (television and radio)
Common Carriers (telephone, telegraph, and the postal system)
In 2014, hackers gained access to personal information, including 40 million credit card numbers and 70 million names, mailing addresses and phone numbers of members of this retail store chain.
Target
What nonprofit organization developed a computer specially designed for elementary school children in developing countries?
One Laptop per Child (OLPC)
This airline switched to a new reservation system a month before Thanksgiving. Its website and check-in kiosks did not work properly for weeks.
Virgin America