More cards in this set

Card 6

Front

governs the use of this data and details the actions that can be taken by data subjects if their data is abused.

Back

Preview of the front of card 6

Card 7

Front

makes it illegal to hack into a computer system and steal the data stored on it.

Back

Preview of the front of card 7

Card 8

Front

allow different access rights to each area of the premises

Back

Preview of the front of card 8

Card 9

Front

monitor and record what employees are doing.

Back

Preview of the front of card 9

Card 10

Front

hardware or software which records the real time activity of a computer user, including the keyboard keys they press, or collects screen captures (prints)

Back

Preview of the front of card 10

Card 11

Front

obtaining of the current position of a mobile phone

Back

Preview of the front of card 11

Card 12

Front

a ‘text file’ which usually contains two pieces of information: a site name and unique user ID.

Back

Preview of the front of card 12

Card 13

Front

usually involves a loyalty card scheme

Back

Preview of the front of card 13