| A | B |
| copyright laws | these protect against stealing a person’s artistic work to sell or give away |
| third party | Sharing information with an individual or a company other than you (the visitor) and the company you are signing the agreeement with |
| plagiarism | using the exact phrases, pictures, or graphs of another person and not given credit to the person creating them |
| virus | a computer program that can multiply and spread (ususally with a USB or attachment) from computer to computer |
| trojan | Virus hidden inside a useful game or software that can open new back doors giving access to your computer |
| worm | spread automatically via computers connected in a network through a backdoor tricking a network into letting them in |
| digital identity | the trail left about a person that defines who they are through technological sources |
| private information | Details given online that can lead to identity theft |
| personal information | Details given online about yourself that cannot be used to identify you |
| identity theft | someone uses your private information and pretends they are you in order to get money or buy things or services for themselves |
| cookie | small computer files placed in your computer by the sites you visit that identify your browser, operating system, and Internet service provider |
| aggregate data | information collected, usually by cookies, from many visitors to a site. Web owners can use this information to make generalizations about their visitors. |