Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
5 views

INF1505 - Module 4 - Study notes

Module 4 covers personal, legal, ethical, and organizational issues related to information technology, focusing on privacy, GDPR, ethical behavior, and the impact of technology in the workplace. It discusses methods for improving information privacy, ethical dilemmas in technology use, and the importance of green computing practices. Additionally, it highlights the significance of intellectual property rights and the digital divide in society.

Uploaded by

SurethaErasmus
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

INF1505 - Module 4 - Study notes

Module 4 covers personal, legal, ethical, and organizational issues related to information technology, focusing on privacy, GDPR, ethical behavior, and the impact of technology in the workplace. It discusses methods for improving information privacy, ethical dilemmas in technology use, and the importance of green computing practices. Additionally, it highlights the significance of intellectual property rights and the digital divide in society.

Uploaded by

SurethaErasmus
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Module 4: Personal, Legal, Ethical, and Organizational Issues

Learning Objectives
After studying this module, you should be able to:
1. Discuss information privacy and methods for improving the privacy of information.
2. Explain the General Data Protection Regulation (GDPR).
3. Explain the privacy issues of e-mail and data collection in a business setting.
4. Examine ethical issues and censorship in information technology.
5. Discuss the principles of intellectual property and issues related to the infringement of
intellectual property.
6. Discuss information system issues that affect organizations, including the digital divide,
electronic publishing, and the connection between the workplace and employees' health.
7. Describe green computing and the ways it can improve the quality of the environment.

Section 4-1: Privacy Issues


Key Concepts
• Defining Privacy: Privacy is the ability to keep personal affairs private and to be informed
about how information about oneself is being used.
• Methods for Improving Privacy:
• Conduct business only on websites with clear, easy-to-understand privacy policies.
• Limit access to personal information to authorized individuals or entities.
• Ensure that any organization collecting personal data has a stated purpose and retains
the data only as long as necessary.
• People must have the ability to prevent their personal information from being used for
purposes other than those disclosed without consent.
General Data Protection Regulation (GDPR)
• Purpose: Protects EU citizens' personal data, including genetic data, health records, racial or
ethnic origin, and religious beliefs.
• Key Components:
• User consent is required for processing personal information.
• Collected data must be anonymized to protect privacy.
• Users must be notified of data breaches within 72 hours of discovery.
• Data transfer across borders must be secure.
• Certain companies must appoint a data protection officer to oversee GDPR
compliance.
E-Mail Privacy Issues
• Junk E-Mail (Spam): Unsolicited emails sent for advertising purposes.
• Privacy Concerns:
• E-mails are easily accessible by others, whether distributed through the web or a
company network.
• Many organizations consider emails sent on company-owned computers as
organizational property.
• Recommendations:
• Encrypt sensitive emails.
• Avoid sending corporate information via personal (unsecured) email accounts.
• Train employees to consider every email as potentially public.
Data Collection on the Web
• Technologies:
• Cookies: Small text files embedded in browsers that save user preferences and track
activities.
• Log Files: Records generated by web server software to log user actions on a website.
• Privacy Concerns:
• Misuse of collected data for unauthorized purposes.
• Supercookies are more challenging to remove and track users even in privacy modes.

Section 4-2: Ethical Issues of Information Technologies


Ethics vs. Legality
• Ethics: Doing the "right" thing, which can vary across cultures and individuals.
• Grid Analysis:
• Legal and Ethical: Actions that comply with both laws and ethical standards.
• Legal but Unethical: Actions that are legal but considered unethical.
• Illegal but Ethical: Actions that may violate laws but are ethically justified.
• Illegal and Unethical: Actions that violate both laws and ethical standards.
Unethical Behaviour
• Examples:
• Making unauthorized copies of software.
• Using client information for personal gain.
• Selling customer data to competitors without consent.
Codes of Ethics
• ACM Code of Ethics:
• Contribute to society and human well-being.
• Avoid harm.
• Be honest and trustworthy.
• Be fair and avoid discrimination.
• Respect intellectual property.
• Respect privacy.
• Honor confidentiality.
Computer Network Ethics
• Social Media Networking Ethics:
• Advocates open access and respectful treatment of all users.
• Business Networking Ethics:
• Ensures networking is truthful, empathetic, and based on good faith.
Censorship
• Internet Neutrality: The principle that all data on the internet should be treated equally
without discrimination.
• Censorship Practices:
• Some countries restrict or censor parts of the web for political or social reasons.
• Public information can be censored if deemed offensive or harmful.

Section 4-3: Impact of Information Technology in the Workplace


Telecommuting
• Benefits:
• Better work-life balance.
• Reduced commuting time and costs.
• Increased productivity.
• Drawbacks:
• Lack of regulated work routines.
• Potential for isolation and reduced interaction with coworkers.
• Security and privacy concerns.
Virtual Organizations
• Definition: Networks of independent companies connected via IT to share skills, costs, and
markets.
• Advantages:
• Focus on core competencies.
• Reduced hiring costs due to shared skills.
• Faster response to customer needs.
• Customization of products to meet specific customer requirements.
Health Issues
• Physical Problems:
• Repetitive strain injuries (RSI) from typing or using touchscreens.
• Text neck: Neck pain caused by frequent smartphone use.
• Psychological Issues:
• Internet addiction, classified into types like cybersexual, gaming, and information
seeking.
• Distracted walking: Injuries caused by using smartphones while walking.

Section 4-4: Green Computing


Definition
• Green computing involves designing, manufacturing, using, and disposing of computers and
other devices to minimize environmental impact.
Strategies
1. Green Design: Create energy-efficient devices with modular designs for easy upgrades.
2. Green Manufacturing: Minimize waste during production.
3. Green Use: Optimize energy consumption and promote eco-friendly usage.
4. Green Disposal: Recycle or remake old devices responsibly.
Implementation Techniques
• Replace multiple small servers with one large server using virtualization.
• Use cloud computing platforms to reduce energy consumption.
• Encourage telecommuting to reduce carbon emissions.
• Utilize video conferencing and collaboration tools to reduce travel.

Key Terms
• Acceptable Use Policies: Rules specifying the legal and ethical use of systems.
• Accountability: Responsibility and liability of users and organizations.
• Cheap Fakes: Manipulated audiovisual content created with inexpensive software.
• Cookies: Small files stored on users' devices to track browsing activities.
• Cybersquatting: Registering domain names to profit from others' trademarks.
• Deepfakes: Fake videos or audio recordings that appear authentic.
• Digital Citizenship: Safe, ethical, and responsible use of information technology.
• Digital Divide: Gap between information-rich and information-poor populations.
• Disinformation: False information knowingly distributed.
• Fake News: Intentionally misleading stories.
• Green Computing: Environmentally friendly computing practices.
• Intellectual Property: Legal protections for creations of the mind.
• Log Files: Records of user actions on websites.
• Misinformation: False information distributed regardless of intent.
• Nonrepudiation: Binding parties to contracts or agreements.
• Social Media Networking Ethics: Principles for respectful online interactions.
• Spam: Unsolicited bulk emails.
• Virtual Organizations: Networks of companies sharing resources.
Review Questions
1. What are three recommendations for improving the privacy of your information?
• Use encryption, limit access to personal data, and ensure websites have strong privacy
policies.
2. What are four key components of GDPR?
• User consent, anonymization, breach notification, and secure data transfer.
3. What are three recommendations for improving e-mail privacy?
• Encrypt sensitive emails, avoid unsecured accounts, and train employees on privacy
best practices.
4. What are the 10 commandments of computer ethics?
• Avoid harm, respect privacy, avoid theft, respect intellectual property, etc.
5. What are three examples of intellectual property?
• Copyrights, trademarks, patents.
6. What are four health-related issues of information technology?
• RSI, text neck, internet addiction, distracted walking.
7. What are three strategies for implementing a green computing program?
• Green design, green manufacturing, green disposal.
8. Define digital divide. Offer three recommendations for bridging the gap.
• Digital divide refers to disparities in access to technology. Recommendations include
increasing broadband availability, providing affordable devices, and offering digital
literacy programs.
Central Node:
Module 4: Personal, Legal, Ethical, and Organizational Issues

Branch 1: Privacy Issues


• Sub-Branch 1.1: Information Privacy
• Methods for improving privacy:
• Conduct business only on websites with clear privacy policies.
• Limit access to personal information.
• Ensure organizations retain data only as long as necessary.
• Importance of privacy policies.
• Sub-Branch 1.2: General Data Protection Regulation (GDPR)
• Protects EU citizens' personal data.
• Key components:
• User consent for processing personal information.
• Anonymization of collected data.
• Notification of breaches within 72 hours.
• Secure data transfer across borders.
• Appointment of data protection officers.
• Sub-Branch 1.3: E-Mail Privacy
• Junk e-mail (spam): Unsolicited emails sent for advertising purposes.
• Employers may consider work emails as organizational property.
• Recommendations:
• Encrypt sensitive emails.
• Avoid sending corporate info via unsecured accounts.
• Train employees about email privacy.
• Sub-Branch 1.4: Data Collection on the Web
• Technologies:
• Cookies: Small files that track user activity.
• Log files: Records generated by web servers.
• Concerns:
• Misuse of collected data.
• Supercookies: Harder to remove and track users even in privacy mode.

Branch 2: Ethical Issues of Information Technology


• Sub-Branch 2.1: Ethics vs. Legality
• Ethical behaviour varies across cultures and individuals.
• Ethical grid analysis:
• Legal & Ethical
• Legal but Unethical
• Illegal but Ethical
• Illegal & Unethical
• Sub-Branch 2.2: Codes of Ethics
• ACM Code of Ethics:
• Contribute to society.
• Avoid harm.
• Be honest and trustworthy.
• Respect intellectual property.
• Honor confidentiality.
• Sub-Branch 2.3: Computer Network Ethics
• Social Media Networking Ethics:
• Open access and fair treatment of all users.
• Avoid aggressive marketing.
• Business Networking Ethics:
• Utilitarian, emotional, and virtuous networking principles.
• Sub-Branch 2.4: Censorship
• Internet neutrality: Equal treatment of all data on the internet.
• Censorship practices vary by country.
• Risks of offensive content online.

Branch 3: Intellectual Property


• Sub-Branch 3.1: Types of Intellectual Property
• Copyrights: Protect original works.
• Trademarks: Protect brand names and logos.
• Patents: Protect inventions and processes.
• Trade secrets: Protect confidential business information.
• Sub-Branch 3.2: Infringement Issues
• Software piracy: Unauthorized copying and distribution of software.
• Cybersquatting: Registering domain names to profit from trademarks.
• Typosquatting: Redirecting traffic through misspelled URLs.

Branch 4: Impact of Information Technology on Society


• Sub-Branch 4.1: Digital Divide
• Gap between information-rich and information-poor populations.
• Solutions:
• Increase funding for computer equipment in schools.
• Provide more computers in public places (e.g., libraries).
• Sub-Branch 4.2: Workplace Impacts
• Telecommuting:
• Benefits: Flexibility, reduced commute time.
• Drawbacks: Lack of interaction, potential legal issues.
• Virtual Organizations:
• Networks of independent companies sharing resources.
• Advantages: Faster response to customer needs, cost reduction.
• Sub-Branch 4.3: Health Issues
• Repetitive strain injuries (RSI): Caused by typing or using touchscreens.
• Text neck: Neck pain from frequent smartphone use.
• Internet addiction: Includes cybersexual, gaming, and social media addictions.
• Distracted walking: Injuries caused by using smartphones while walking.

Branch 5: Green Computing


• Sub-Branch 5.1: Definition
• Minimizes environmental impact through design, manufacturing, use, and disposal of
computing devices.
• Sub-Branch 5.2: Strategies
• Green Design: Energy-efficient products with modular designs.
• Green Manufacturing: Minimize waste during production.
• Green Use: Optimize energy consumption.
• Green Disposal: Recycle or remake old devices responsibly.
• Sub-Branch 5.3: Implementation Techniques
• Replace multiple small servers with one large server using virtualization.
• Encourage telecommuting to reduce carbon emissions.
• Use video conferencing to reduce business travel.
Module 4 – INF1505

Privacy is the ability to keep personal affairs


What is the definition of privacy in the context of private and to be informed about how
electronic information? information about oneself is being used.

1. Conduct business only on websites with


clear, easy-to-understand privacy
policies.
What are three recommendations for improving 2. Limit access to personal information to
the privacy of your information? authorized individuals or entities.
3. Ensure organizations retain data only as
long as necessary.
GDPR stands for General Data Protection
Regulation. It aims to protect EU citizens'
What does GDPR stand for, and what does it aim personal data, including genetic data, health
to protect? records, racial or ethnic origin, and religious
beliefs.
1. User consent must be given for
processing personal information.
2. Collected data must be anonymized to
protect privacy.
What are four key components of GDPR? 3. Users must be notified of data breaches
within 72 hours.
4. Data transfer across borders must be
secure.
1. Fake news: Intentionally misleading
stories created to deceive readers.
What are two ethical concerns related to social 2. Deepfakes: Fake videos or audio
media? recordings that look real, often used to
misrepresent individuals.

Spam refers to unsolicited emails sent for


advertising purposes. It is a concern because it
What is spam, and why is it a concern? can clog inboxes, spread malware, and contain
offensive content.

Cookies are small text files embedded in


browsers that save user preferences and track
What are cookies, and how do they work? activity. They help websites remember user
information but can also raise privacy concerns.

Cybersquatting is registering, selling, or using a


domain name to profit from someone else's
What is cybersquatting, and why is it unethical? trademark. It is unethical because it exploits
others' intellectual property for financial gain.
1. Copyrights: Protect original works like
books and software.
2. Trademarks: Protect brand names and
What are three types of intellectual property? logos.
3. Patents: Protect inventions and
processes.

Misinformation is false information spread


without intent to mislead, while disinformation
What is the difference between misinformation
is false information spread knowingly to
and disinformation?
deceive.

The digital divide refers to the gap between


information-rich and information-poor
What is the digital divide, and why is it populations. It is significant because it affects
significant? access to education, employment, and
economic opportunities.

Telecommuting is working remotely, often from


home. Benefits include reduced commuting
What is telecommuting, and what are its
time, improved work-life balance, and lower
benefits?
environmental impact.

Green computing involves designing,


manufacturing, using, and disposing of
What is green computing, and why is it computers to minimize environmental impact. It
important? is important for sustainability and reducing
energy consumption
1. Green design: Create energy-efficient
products.
2. Green manufacturing: Minimize waste
What are three strategies for implementing
during production.
green computing?
3. Green disposal: Recycle or remake old
devices responsibly.
1. Repetitive strain injuries (RSI) from
typing.
2. Text neck: Neck pain from frequent
What are three examples of health issues
smartphone use.
caused by excessive use of technology?
3. Internet addiction: Excessive online
activity affecting mental health.

Net neutrality is the principle that all data on the


internet should be treated equally. It ensures fair
What is net neutrality, and why is it important? access and prevents discrimination based on
content or user.
1. Do not harm others with a computer.
2. Do not interfere with others' work.
3. Do not snoop in others' files.
4. Do not steal using a computer.
5. Do not bear false witness using a
computer.
6. Do not copy software without
What are the 10 commandments of computer
permission.
ethics?
7. Do not use others' resources without
authorization.
8. Respect intellectual output.
9. Consider social consequences of
programs.
10. Use computers responsibly.

AUPs specify the legal and ethical use of


systems and outline consequences for
What is the role of acceptable use policies
noncompliance. They help prevent misuse and
(AUPs)?
protect organizations.

A virtual organization is a network of


independent companies sharing resources and
What is a virtual organization, and what are its markets. Advantages include faster response to
advantages? customer needs, cost reduction, and
customization of products.

1. Encrypt sensitive emails.


2. Avoid sending corporate information via
What are three recommendations for minimizing unsecured personal accounts.
corporate data leakage via email? 3. Train employees to consider every email
as potentially public.
Test: Module 4 - Personal, Legal, Ethical, and Organizational Issues

Section 1: Multiple-Choice Questions (20 Questions)


Question 1:
What does GDPR stand for?
A) General Data Privacy Regulation
B) Global Data Protection Regulation
C) General Data Protection Regulation
D) Global Data Privacy Rule
Question 2:
Which of the following is NOT a key component of GDPR?
A) User consent must be given for processing personal information.
B) Collected data must be anonymized to protect privacy.
C) Users must be notified of data breaches within 72 hours.
D) Companies must pay a fixed fine of $1 million for violations.
Question 3:
What is spam?
A) A type of computer virus.
B) Unsolicited emails sent for advertising purposes.
C) A method for encrypting sensitive emails.
D) A software tool used to monitor employee activity.
Question 4:
Which of the following is NOT an ethical issue discussed in the module?
A) Deepfakes
B) Software piracy
C) Employee monitoring
D) Cloud computing
Question 5:
What is cybersquatting?
A) Registering, selling, or using a domain name to profit from someone else’s trademark.
B) Using cookies to track user behaviour online.
C) Sending unsolicited emails to users.
D) Creating fake news to mislead readers.
Question 6:
Which of the following best describes intellectual property?
A) A legal umbrella covering protections such as copyrights, trademarks, and patents.
B) A set of rules for acceptable use of computers in organizations.
C) A method for encrypting sensitive information.
D) A type of software used for data collection.
Question 7:
What is the digital divide?
A) The gap between people who have access to technology and those who do not.
B) The difference in speed between broadband and dial-up internet connections.
C) The divide between ethical and unethical behaviour in IT.
D) The separation between private and public networks.
Question 8:
Which of the following is NOT a health-related issue caused by excessive use of smartphones?
A) Text neck
B) Smartphone thumb
C) Green computing syndrome
D) Distracted walking
Question 9:
What is green computing?
A) A method for reducing the environmental impact of computing devices.
B) A technique for improving email privacy.
C) A strategy for increasing employee productivity.
D) A way to enhance cybersecurity.
Question 10:
Which of the following is NOT one of the 10 Commandments of Computer Ethics?
A) Thou shalt not use a computer to harm other people.
B) Thou shalt not interfere with other people’s computer work.
C) Thou shalt always prioritize profit over ethics.
D) Thou shalt not copy software for which you have not paid.
Question 11:
What is the role of an acceptable use policy (AUP)?
A) To outline the legal and ethical use of systems and the consequences of noncompliance.
B) To provide guidelines for creating strong passwords.
C) To ensure employees take regular breaks from their computers.
D) To regulate the amount of time employees spend on social media.
Question 12:
Which of the following is NOT a principle of business networking ethics?
A) Utilitarian networking
B) Emotional networking
C) Virtuous networking
D) Aggressive networking
Question 13:
What is net neutrality?
A) A principle that all data on the internet should be treated equally.
B) A method for encrypting sensitive emails.
C) A technique for blocking spam emails.
D) A tool for monitoring employee activity.
Question 14:
Which of the following is NOT a recommendation for improving email privacy?
A) Encrypt sensitive emails.
B) Avoid sending corporate information via unsecured accounts.
C) Use the "Reply All" option for all responses.
D) Train employees to consider every email as potentially public.
Question 15:
What is a supercookie?
A) A small text file used to store user preferences.
B) A type of cookie that is difficult to remove and tracks users even in privacy mode.
C) A program used to monitor employee activity.
D) A secure encryption method for protecting emails.
Question 16:
Which of the following is NOT a benefit of GDPR compliance?
A) Improved consumer confidence.
B) Better data security.
C) Increased carbon emissions.
D) Better decision-making using customer information effectively.
Question 17:
What is deepfake?
A) Fake videos or audio recordings that look real.
B) A method for improving network security.
C) A type of software used for data collection.
D) A legal framework for protecting personal data.
Question 18:
Which of the following is NOT an example of intellectual property?
A) Copyrights
B) Trademarks
C) Patents
D) Spam emails
Question 19:
What is the main goal of green computing?
A) To minimize the environmental impact of computing devices.
B) To increase the speed of data processing.
C) To maximize employee productivity.
D) To enhance network security.
Question 20:
Which of the following is NOT a strategy for implementing green computing?
A) Designing energy-efficient products.
B) Replacing several small servers with one large server using virtualization.
C) Encouraging employees to use more paper instead of digital documents.
D) Using video conferencing to reduce business travel.

Section 2: True or False Questions (20 Questions)


Question 1:
Digital citizenship means using information technology safely, ethically, and responsibly.
True / False
Question 2:
Repetitive typing with thumbs or continual navigation through various pages and apps can cause a
condition known as "smartphone thumb."
True / False
Question 3:
Public information posted by an organization or public agency cannot be censored for public policy
reasons.
True / False
Question 4:
Telecommuting allows employees to work from home, reducing the need for physical office space.
True / False
Question 5:
Cybersquatting refers to registering, selling, or using a domain name to profit from someone else’s
trademark.
True / False
Question 6:
Cookies are small text files embedded in a Web browser and saved on the user’s hard drive.
True / False
Question 7:
The Fair and Accurate Credit Transaction Act (FACTA) aims to protect consumers’ credit information
from data theft.
True / False
Question 8:
Deepfakes are fake videos or audio recordings that look and sound just like real events.
True / False
Question 9:
Green computing involves designing, manufacturing, using, and disposing of computers to minimize
environmental impact.
True / False
Question 10:
Misinformation is fake information distributed intentionally to deceive others.
True / False
Question 11:
Employees often have no right to privacy when using company-owned computers.
True / False
Question 12:
Fake news refers to stories created to intentionally misinform or deceive readers.
True / False
Question 13:
GDPR applies only to companies located within the European Union.
True / False
Question 14:
Log files are generated by Web server software to record a user’s actions on a website.
True / False
Question 15:
Intellectual property includes protections such as copyrights, trademarks, and patents.
True / False
Question 16:
Cheap fakes are audiovisual manipulations of events created with cheap software.
True / False
Question 17:
Virtual organizations are networks of independent companies sharing resources and markets.
True / False
Question 18:
Disinformation is fake information distributed without intent to mislead.
True / False
Question 19:
The Children's Online Privacy Protection Act (COPPA) protects the privacy of children under the age of
13.
True / False
Question 20:
Text neck is a condition caused by frequently looking down at smartphones or tablets.
True / False
Section 3: Fill in the Missing Word Questions (20 Questions)
Question 1:
______ is the invasion of privacy where someone registers a domain name to profit from another’s
trademark.
Question 2:
The _______ covers a series of laws that protect EU citizens’ personal data, including genetic data and
health records.
Question 3:
Spam is an unsolicited email sent for ______ purposes.
Question 4:
Cookies are small text files with unique ID tags embedded in a Web browser and saved on the user’s
_______.
Question 5:
To avoid corporate data leakage, employees should avoid using the ______ option for all email
responses.
Question 6:
An _______ is a set of rules specifying the legal and ethical use of a system and the consequences of
noncompliance.
Question 7:
The Health Insurance Portability and Accountability Act (HIPAA) protects the confidentiality of a
patient’s ______ information.
Question 8:
The Children's Online Privacy Protection Act (COPPA) requires parental consent before collecting
information from children under the age of ______.
Question 9:
Green computing promotes a ______ environment and consumes the least amount of energy.
Question 10:
_______ is a type of identity theft where thieves alter business information online to apply for credit
cards or make payments to criminals.
Question 11:
The digital divide refers to the gap between the ______-rich and the ______-poor populations.
Question 12:
Nonrepudiation is a method for binding all parties to a ______.
Question 13:
Social media networking ethics advocates that social media should be open and provide fair access
to all of its ______.
Question 14:
The ACM Code of Ethics includes principles such as avoiding ______ and respecting privacy.
Question 15:
Netiquette refers to good ______ on the Internet.
Question 16:
A ______ is a variation of cybersquatting that relies on typographical errors made by users when typing
a Web address.
Question 17:
Intellectual property is a legal umbrella covering protections such as ______, trademarks, and
patents.
Question 18:
The World Health Organization classified ______ disorder as a disease in 2018.
Question 19:
Employers can use software tools to monitor employees’ ______, text messages, and Web site visits.
Question 20:
______ computing involves designing products that last longer and are modular in design so certain
parts can be upgraded without replacing the entire system.
Answers
Multiple-Choice Answers
1. C
2. D
3. B
4. D
5. A
6. A
7. A
8. C
9. A
10. C
11. A
12. D
13. A
14. C
15. B
16. C
17. A
18. D
19. A
20. C
True or False Answers
1. True
2. True
3. False
4. True
5. True
6. True
7. True
8. True
9. True
10. False
11. True
12. True
13. False
14. True
15. True
16. True
17. True
18. False
19. True
20. True
Fill in the Missing Word Answers
1. Cybersquatting
2. General Data Protection Regulation (GDPR)
3. advertising
4. hard drive
5. Reply All
6. acceptable use policy
7. medical
8. 13
9. sustainable
10. Business identity theft
11. information; information
12. contract
13. users
14. harm
15. manners
16. Typosquatting
17. copyrights
18. gaming
19. photos, call logs
20. Green

You might also like