-
adware
may display unwanted pop-up advertisements on your monitor; it may be related to the sites you search on the web or even the content of your email
-
biometric keyboards
a keyboard that can identify a typist by fingerprints
-
biometric methods
ways of identifying a user by some physical characteristic; include fingerprints, hand prints, retina or iris scans, lip prints, facial termography, and body odor sensors.
-
body odor sensors
a biometric device enabling the identification os user by odor
-
-
data accuracy
correstness and currency of information
-
database
a large organized collection of information that is easy to maintain, search, and sort
-
DNA (deoxyribonucleic acid)
a nucleic acid molecule containing genetic instrctions for living things
-
Electronic communications Privacy Act of 1986
prohibits government agencies from intercepting electronic communctions without a search warrant. It also prohibits indiviuals from intercepting email. However, there are n umerous expetions, and the courts have interpreted this to allow employers to access employees email. This law does not apply to communications within an organization.
-
encryption
used to protect information from unauthorized users; involves encoding of messages.
-
facial structure scans
a biometric method that identifies users by facial structure
-
facial thermography
a biometric method that identifies users by the heat generated by their faces
-
Fair Credit Reporting Act of 1970
a federal low that regulates credit agencies; it allows you to see your credit reports to check the accuracy of information and to challenge inaccuracies
-
fingerprints
biometric method of identification
-
firewalls
software used to protect LANs from unathorized access through the Internet
-
fraud
includes such crimes as using a computer program to illegally transfer money from one bank account to another or printing payroll checks to oneself.
-
fraudulent dialer
can connect the user with numbers without the users knowlege; the dialer may connect the users computer to an expensive 900 number. The user will be toally unaware until he or she recives the telephone bill
-
hackers
a proficient computer user without authorized access to systems
-
Health Insurance Portability and Accountabllity Act (HIPAA)
In 1996 Congress passed the Health Insurance Porablitity and Accountablity Act (HIPAA). Guidelines to protect electronic medical records were developed by the department of health and human services. by encouraging the use of the electronic medical record and facilitating the shsaring of medical records among health care providers, it can assure continuity of care and thus save lives.
-
Homeland Security Act
expands and centralizes the data gathering allowed under the patriot act
-
identity theft
involves someone using your private information to assume your identity
-
iris scans
a biometric method of identification used to restrict access to computers.
-
keylogging
can be used by anyone to track anyones else's keystokes
-
lip prints
biometric method of identification used to restrict access to computers
-
malware
includes different forms of malicious hardware, software and firmware
-
medical information bureau
composed of 650 insurance companies. Its database contains health histories of 15 million people; used by medical insuraers to help determine insurance rates and where to grant or deny someone medical coverage; not protected by doctor-patient privilege and, at present, not protect by any federal law; may be available to your employer without your consent.
-
passwords
a secret code assigned to (or chosen by) an authorized user
-
personal identification numbers (PINs)
a secret code assigned to (or chosen by) an authorized user
-
privacy
the ability to control personal information and the right to keep it from misuse
-
Real ID act of 2005
directly imposes prescriptive federl drivers license standards by the federal government on the states. This low requires every American to have an electronic identification card
-
retina scans
a biometric method of identifying users
-
security
measures attempting to protect computer systerms (including hardware, software and information) from harm and abuse; the threarts may stem from many sources including natural disaster, human error or crime
-
software piracy
unauthorized copying of copyrighted software
-
spybot search and destroy software
can remove malware, adware, spyware, fraudulent dialers, and keyloggers from your computer
-
spyware
software that can be installed without the users knowledge to track their actions on a computer
-
theft of information
unauthorized access to use of informaition
-
theft of services
unauthorized use of services such as cable TV
-
USA patriot act (2001)
gives laow enforcement agencies greater power to monitor electronic and ot her communications, with fewere checks.
-
verichips
radio transmitters that give off a unique signal, which can be read by a receiver
-
viruses
a program, attached to another file, which replicates itself and may do damage to your computer system
-
|
|