IT Fundamentals - Chapter 30
Expectation of privacy
A legal test used in the USA to determine how the US Constitution protections against unreasonable search apply to a issues of privacy.
VPN (virtual private network)
A way of connecting to the network that allows for a secure private connection over a public network, using an encrypted 'tunnel'.
Metadata
Data that describes other data. Some of this information can be personally identifiable information that should be removed.
Personally identifiable information (PII)
Data that identifies a person, including a Social Security number, email address, physical address, birthdate, birth place, phone numbers, and biometric data.
Customer information
Information held by an organization about its current, former, and prospective customers, including contact information, address, phone numbers, email addresses, purchasing history, current proposals.
Company confidential information
Information that a business uses to conduct its business, such as trade secrets, processes, sales, purchases, customer lists, accounting data and more.
Apple Pay
Mobile payments service and digital wallet app from Apple that utilizes Near Field Communication (NFC) to initiate secure payment transactions.
Google Pay
Mobile payments service and digital wallet app from Google that utilizes Near Field Communication (NFC) to initiate secure payment transactions.
Cookies
Small text files that are sent to your computer from certain websites. They track your behavior and can be used by malware to send your browsing history to hackers.
Permissions
The access level assigned to a folder or file and given to a user account or user group. Access can include full control, write and read-only.
Peer-to-peer file sharing
The online sharing of music or other files directly from individual computer users' hard drives, rather than through posting the files on central servers. It is often used for illegal downloads.
Single-use credit card
Virtual credit card that can be used for more secure online shopping.
Social networking sites
Websites such as Facebook and Twitter on which users can create content, share ideas, and interact with friends. Content posted on social media can be viewed, read and shared by others, so there is no legal expectation of privacy.