My Crossword Maker Logo
Powered by BrightSprout
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

OIPC NL Data Privacy Day 2024

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Across
3
Fingerprints or facial recognition data are an example of this kind of data
4
_______ recognition
7
You need this to collect, use or disclose PI or PHI
8
Secret sending
12
Breach response stage 1
14
This kind of person should get not be allowed access to PHI or PI
15
Information used must be the ____ amount required for the legally authorized purpose
18
Usually found at the end of a Commissioner's report
19
The first example of [13 Down] AI to be used on a mass scale
20
How data to train large AI models is sometimes collected
21
The source of numerous email breaches
23
OIPC's investigation may end in one of these
25
Breach FYI
27
Notification of a breach should occur at the earliest ______ opportunity
28
Like a good ensemble film, this should have eight or more characters - and some should be special
Down
1
You might try this with an email gone astray - though it often doesn't work.
2
What cybercriminals do this, you could get hooked
5
Usually the trigger for an OIPC investigation
6
An unauthorized release or access of PI or PHI
9
Report privacy violations to this person
10
OIPC may launch one about a breach... but public bodies and custodians should also do one themselves
11
How PI and PHI should be held and disposed of
12
Should be informed and meaningful
13
This kind of AI, which can produce text, images or more, is taking the world by storm - with privacy and ethical implications
16
[19 Across] is an example of a Large Language _____
17
Information should only be collected if it is _______ for the legally authorized purpose
22
Doing one of these can help you determine the privacy effects of a program (abbr)
24
You should have a schedule for records _____ and disposal
26
More than one is best to authenticate