Unit 10 - Lesson 3 Data Policies and Privacy
Enter one number per line. Add as many responses as you would like.
Pick a website or app of your own and complete the front page of the activity guide. Some apps / services to consider: Education: Code.org, Khan Academy, Codecademy.com Social media: Facebook, Twitter, Instagram, Snapchat, Tik Tok Online store: Amazon, Target, Walmart Search: Google, Bing Maps: MapQuest, Yahoo Maps, Google Maps Productivity: MS Office Online, Google Docs Mail & communication: Gmail, Hotmail, Yahoo Mail, Skype, Google Hangouts Streaming sites: Netflix, Spotify, Pandora Gaming sites: Steam, Xbox Live Banks and financial institutions: Chase, Citibank
Activity Guide Q1- Q4
Do you believe the benefits of the website/app you researched outweigh the privacy concerns? Why or why not?
Do you believe the privacy risks posed by facial recognition technology outweigh the benefits/convenience? Why?
Do you agree with the Supreme Court’s ruling? Do you think it should apply to other kinds of data?
Personally Identifiable Information (PII): information about an individual that identifies, links, relates, or describes them. Technology enables the collection, use, and exploitation of information about, by and for individuals, groups, and institutions. Geolocation, cookies, and browsing history can all be used to create knowledge about an individual. Most digital technology needs some kind of PII to work (for example street navigation needs to know your location or PII stored online to simplify making online purchases). Other times websites collect more data to improve their services. Many services and websites collect information (like your browser history) that can be used to advertise to you by creating detailed profiles of who you are and what you like. Search engines also can record and maintain a history of searches made by users. This information can be used to suggest websites or for for targeted marketing. Once data is made digital, and especially once it's shared online, it's much harder to control. PII can be used to steal the identity of a person, or stalk them online. Information that is often posted on social media can be combined to create a profile on you.
Key Takeaways
Our private data powers a lot of computing innovations in ways we like. It makes products that are convenient, interesting, personal, useful, and often “free” because we “pay” with our data. Not every effect of a computing innovation is anticipated in advance. This data can also be used by companies, governments, or criminals in ways that we didn’t intend or that threatens our privacy. The balance between innovation, privacy, and security is continually being debated. You’re part of the next generation that will decide what kind of digital society we live in. Legal and Ethical Concerns are raised by: Computing innovations that harm people Computing innovations that play a role in social and political issues Examples: software that allows access to digital media downloads and streaming algorithms with bias devices that collect and analyze data by continuously monitoring activities
Key Takeaways