Term
|
Definition
The theft of computer hardware. |
|
|
Term
|
Definition
The complete malfunction of a computer system. |
|
|
Term
|
Definition
A technology that encrypts everything stored on a storage medium automatically, without any user interaction. |
|
|
Term
Self-encrypting hard drive |
|
Definition
A hard drive that uses full disk encryption (FDE). |
|
|
Term
|
Definition
A device (such as a portable computer or mobile phone) that is designed to withstand much more physical abuse than a conventional device. |
|
|
Term
|
Definition
A device that protects a computer system from damage due to electrical fluctuations. |
|
|
Term
Uninterruptible power supply (UPS) |
|
Definition
A device containing a built-in battery that provides continuous power to a computer and other connected components when the electricity goes out. |
|
|
Term
|
Definition
A written plan that describes the steps a company will take following the occurrence of a disaster. |
|
|
Term
|
Definition
The unauthorized copying of a computer program. |
|
|
Term
|
Definition
The use of computers or other types of digital equipment to make illegal copies of currency, checks, collectibles, and other items. |
|
|
Term
|
Definition
The state of being concealed or free from unauthorized intrusion. |
|
|
Term
|
Definition
The rights of individuals and companies to control how information about them is collected and used. |
|
|
Term
|
Definition
A collection of data about people that is stored in a large database and used for marketing purposes. |
|
|
Term
|
Definition
A collection of data about people that is collected and maintained by the government. |
|
|
Term
|
Definition
Using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits. |
|
|
Term
|
Definition
A policy, commonly posted on a company’s Web site, that explains how personal information provided to that company will be used. |
|
|
Term
|
Definition
Unsolicited, bulk e-mail sent over the Internet. |
|
|
Term
Throw-away e-mail address |
|
Definition
An e-mail address used only for nonessential purposes and activities that may result in spam; the address can be disposed of and replaced if spam becomes a problem. |
|
|
Term
|
Definition
A tool that automatically sorts your incoming e-mail messages based on specific criteria. |
|
|
Term
|
Definition
An e-mail filter used to redirect spam from a user’s Inbox. |
|
|
Term
|
Definition
To request that you be removed from marketing activities or that your information not be shared with other companies. |
|
|
Term
|
Definition
To request that you be included in marketing activities or that your information be shared with other companies. |
|
|
Term
Computer monitoring software |
|
Definition
Software that can be used to record an individual’s computer usage, such as capturing images of the screen, recording the actual keystrokes used, or creating a summary of Web sites and programs accessed. |
|
|
Term
|
Definition
The use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes. |
|
|
Term
|
Definition
Observing or reviewing employees’ actions while they are on the job. |
|
|
Term
|
Definition
Technology that enables one computing device (such as a computer or mobile phone) to locate and identify the current status of another device on the same network. |
|
|