Term
|
Definition
| The theft of computer hardware. |
|
|
Term
|
Definition
| The complete malfunction of a computer system. |
|
|
Term
|
Definition
| A technology that encrypts everything stored on a storage medium automatically, without any user interaction. |
|
|
Term
| Self-encrypting hard drive |
|
Definition
| A hard drive that uses full disk encryption (FDE). |
|
|
Term
|
Definition
| A device (such as a portable computer or mobile phone) that is designed to withstand much more physical abuse than a conventional device. |
|
|
Term
|
Definition
| A device that protects a computer system from damage due to electrical fluctuations. |
|
|
Term
| Uninterruptible power supply (UPS) |
|
Definition
| A device containing a built-in battery that provides continuous power to a computer and other connected components when the electricity goes out. |
|
|
Term
|
Definition
| A written plan that describes the steps a company will take following the occurrence of a disaster. |
|
|
Term
|
Definition
| The unauthorized copying of a computer program. |
|
|
Term
|
Definition
| The use of computers or other types of digital equipment to make illegal copies of currency, checks, collectibles, and other items. |
|
|
Term
|
Definition
| The state of being concealed or free from unauthorized intrusion. |
|
|
Term
|
Definition
| The rights of individuals and companies to control how information about them is collected and used. |
|
|
Term
|
Definition
| A collection of data about people that is stored in a large database and used for marketing purposes. |
|
|
Term
|
Definition
| A collection of data about people that is collected and maintained by the government. |
|
|
Term
|
Definition
| Using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits. |
|
|
Term
|
Definition
| A policy, commonly posted on a company’s Web site, that explains how personal information provided to that company will be used. |
|
|
Term
|
Definition
| Unsolicited, bulk e-mail sent over the Internet. |
|
|
Term
| Throw-away e-mail address |
|
Definition
| An e-mail address used only for nonessential purposes and activities that may result in spam; the address can be disposed of and replaced if spam becomes a problem. |
|
|
Term
|
Definition
| A tool that automatically sorts your incoming e-mail messages based on specific criteria. |
|
|
Term
|
Definition
| An e-mail filter used to redirect spam from a user’s Inbox. |
|
|
Term
|
Definition
| To request that you be removed from marketing activities or that your information not be shared with other companies. |
|
|
Term
|
Definition
| To request that you be included in marketing activities or that your information be shared with other companies. |
|
|
Term
| Computer monitoring software |
|
Definition
| Software that can be used to record an individual’s computer usage, such as capturing images of the screen, recording the actual keystrokes used, or creating a summary of Web sites and programs accessed. |
|
|
Term
|
Definition
| The use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes. |
|
|
Term
|
Definition
| Observing or reviewing employees’ actions while they are on the job. |
|
|
Term
|
Definition
| Technology that enables one computing device (such as a computer or mobile phone) to locate and identify the current status of another device on the same network. |
|
|