| A | B |
| Computer Ethics | applied professional ethics dealing with ethical problems aggravated, transformed or created by computer technology |
| ACM | Association for Computing Machinery |
| Information Age | Due to the computer’s ability to store and manipulate large amounts of information |
| Netiquette | Do not attempt to access the account of another user without authorization |
| Privacy | Ethical issue Computers record transactions, calls, etc. These records can be used to learn a lot about you. Because of privacy issues, many laws have been passed |
| Online profiling | Marketing technique where data is collected about customers visiting a website |
| Cookie | Text file created by the server computer when a user enters information into a website. |
| Web beacons | Tiny, transparent graphics located on web pages or in e-mail message that are used in combination with cookies to collect data about web page users or email senders |
| Privacy Policy | Legally binding document that explains how any personal information will be used. |
| Identity Theft Penalty Act of 2004 | Establishes penalties for aggravated identity theft Prohibits a court from giving parole, reducing any sentence or for providing for concurrent terms of imprisonment |
| FISMA | Federal Information Security Management Act of 2002 Requires federal agencies to develop, document and implement an agency-wide program to provide information security. |
| Consumer Credit Reporting Reform Act | Amended the Fair Credit Reporting Act (FCRA) of 1970 Addresses data collection by credit, insurance and employment agencies Gives individuals the right to see information maintained about them Restricts who may access credit files to only those with a court order or the written permission of the individual whose credit is being checked. |
| Privacy Act of 1974 | Restricts the way in which personal data can be used by federal agencies Individuals must be permitted access to information stored about them and may correct any information that is incorrect. Agencies must insure both the security and confidentiality of any sensitive information. |
| Right to Financial Privacy Act of 1978 | Requires government authorities have a subpoena, summons or search warrant to access an individual’s financial records When records are released, the financial institution must notify the individual of who has had access to them. |
| ECPA | Electronic Communications Privacy Act of 1986 . Makes it a crime to access electronic data without authorization Prohibits unauthorized release of such data |
| Electronic Freedom of Information Act of 1996 | Requires federal government agencies to make certain agency information available for public inspection Designed to improve public access to agency records |
| COPPA | Children’s Online Privacy Protection Act of 1988 .Requires commercial websites that collect personal information from children under the age of 13 to obtain parental consent. |
| SAFE | Safety and Freedom through Encryption Act of 1999. Gives Americans the freedom to use any type of encryption to protect their confidential information. Prohibits the government from monitoring people’s communications without their knowledge or consent. |
| PATRIOT | Provide Appropriate Tools Required to Intercept and Obstruct Terrorism. |
| Ergonomics | The science that studies safe work environments. Repetitive stress injuries, eye strain, etc. |
| Copyright | Protection of digital information NET (No Electronic Theft) Act of 1997 Protects against copyright infringement |
| Piracy | Illegal copies being distributed |
| Virus | Program or series of instruction that can replicate without the user’s knowledge |
| Trojan Horse | Appears as something else |
| Worm | Program that is able to reproduce itself over a network |
| Antivirus programs | Install on computers to detect and remove code before it can replicated or damage data |
| Crackers or Hackers | Illegal act to gain access to large computer systems to perform acts of vandalism. Electronic Communications Privacy Act of 1986 makes it a federal offense. Most networks have a firewall to prevent this type of access. |
| Phishing | Act of sending an email to a user falsely claiming to be a legitimate business in an attempt to trick the user into revealing personal information that could be used for crimes like identity theft. |