Unit 3. Information and the InternetRevision Date: Sep 28, 2019 (Version 3.0)
This is the second of three lessons where students will research a computing innovation.
This lesson will focus on:
Identify data privacy, security, or storage concern
Say: In this lesson, we are going to work individually to investigate a computing innovation. All computing innovations use data and to some degree expose the data to risk. In this lesson, you will identify a computing innovation and describe a privacy, storage or cybersecurity concern.
All computing innovations have a purpose, a purpose that guided the developers in its production. Some privacy, data security or data storage concerns about the innovations may have been known by the developers. Others may have become known only after the innovation was in use.
With elbow partners, list five or so kinds of information that most people want to remain private. Create a class list of these a list of these.
Say. Some personally identifiable information is protected by law is PII. Have students visit this website for a definition of PII. (https://github.com/ca-cwds/Information-Security/wiki/Definition-of-PII-(Personally-Identifiable-Information))
Provide the list below and ask students to identify what elements in our list are also listed as proteced by law.
Personally identifiable information (PII) is information about an individual that identifies, links, relates, or describes them. Examples of PII include:
Select one of the three concerns from activity 1 to focus upon.
Research and prepare a report assessing the risk and providing guidance on how to protect against that risk. The report must include citations of at least two references assessing the concern and two reference for protecting against the risk.
Prepare a one minute report about the concern you wrote about in the last sessions.
Computing Innovation data concern presentations.