Copy of U10L3&4 -Privacy, Security, and Innovation

pdf

School

The University of Sydney *

*We aren’t endorsed by this school

Course

301

Subject

Information Systems

Date

Dec 6, 2023

Type

pdf

Pages

3

Uploaded by BailiffIron12678

Report
Unit 10 Lesson 3 Name(s) Sydney Biondo Period ______ Date ___________________ Activity Guide - Privacy, Security, and Innovation Choose a Website and Find the Data Privacy Policy Choose an app, website, or other online service you are familiar with to research their data policy. The easiest way to find a data policy, if it exists, is to search for the company name followed by the terms “data policy” or “privacy policy.” Your website or app: code.org - https://code.org/privacy What Is Their Data Policy? Respond to the questions below. Even if you can’t find information, you should record where you looked and the fact that you can’t find it. If there isn’t a policy or it’s hard to find, that can be just as interesting as seeing the policy itself. Question 1: What kinds of data is collected? Display name Account passwords Secret words/pictures Age (Not birthdate) One-way hash of student email address Parent or guardian email address Account Identifiers Login time, IP address, and other technical data Gender Race Progress in the course Student projects Student-uploaded images, sounds, or videos Data collected by Student-created apps Written comments in response to curricular/educational prompts within Code.org courses Student-provided responses to surveys (e.g., multiple choice and free response questions) Question 2: How is the data you listed above being used? What features are enabled by the data? Code.org uses this information above to gather info about the user to successfully retain their progress throughout using this application Question 3: Does the company share the data with anyone else? Who? No, according to the website, “Code.org does not share information with such services.” This proves that code.org does not share private information with other companies Question 4: Can you get access to your own data? Can you modify what is collected, or delete your data if you wish? Yes, you can unless it is teacher controlled and only then do you not have full access to your account. Privacy vs. Security Tradeoffs Question 5: Do you believe the benefits of the innovation you researched outweigh the privacy concerns? Explain why or why not making explicit connections to responses 1-4 above. Computer Science Principles 1
Unit 10 Lesson 3 Yes, because even through the privacy policy this application is still a create useful source for newly upcoming coders it can provide education services to students and the data collected is not hurting you. For example, “Code.org does not share information with such services.” This proves that code.org does not share private information with other companies Question 6 1 - Totally Comfortable "Have my data! It makes the technology I love work and keeps me safe!” 2 - Mostly Comfortable "I want tech innovations and stronger security. Let's make sure we take care of the most damaging privacy concerns." 3 - Mixed "There's a lot of this that makes me uncomfortable, but I'm still going to use technology." 4 - Mostly Uncomfortable "Privacy is more important than empowering innovations or ensuring security. I would give up on some tech innovations to ensure my privacy" 5 - Totally Uncomfortable "I'd give up most technology and would like to see much stronger limits on what kind of data can be collected and stored, even if it limits the introduction of new technology" Which of the above categories best describes your overall comfort with using data to drive innovations or ensure security? Write a paragraph below explaining your response and tying it to either the information in this activity guide or discussions shared in class. My rank is 3 because I feel, even through the conderns, I would rather be able to have access to multiple applications even if it means giving the website some of my information. I also understand feeling uncomfortable knowing that my information is just floating around the internet for any application and/or hacker to steal so that is why I have chosen rank 3. There are different sides to the story. Computer Science Principles 2
Unit 10 Lesson 3 Rubric Category Extensive Evidence Convincing Evidence Limited Evidence No Evidence Data Collection and Use Response 1 include many examples of data collected by the company that are clearly tied to the examples in Response 2 indicating how that data is used. Both responses include many examples but there may not always be connections between the kinds of data collected and the way it is used. One or both responses is either missing significant information or there is no clear connection between the responses. Both responses are either incomplete or missing. Data Sharing and Control Response 3 and 4 clearly describe how users data is shared externally and whether and if users have any controls over their data. There are clear ties between the way data is used and the controls users have over that use. Response 3 and 4 include examples of how data is shared and controlled but there many not always be clear ties between the responses 1-3 and the data controls mentioned in response 4. One of response 3 and 4 is significantly lacking in clarity over how the data is shared or how the data is controlled. Both responses are either incomplete or missing. Evaluating Your Innovation The response provides a clear opinion on the tradeoffs based on the information provided on the first page. The response states a clear opinion but some portions may not be tied to responses 1-4. The response states an opinion but it is not at all tied to the responses 1 - 4. The response is missing or unrelated to the prompt. Evaluating the Privacy Tradeoffs Overall The response provides a clear opinion on the overall privacy tradeoffs based on the information in this activity guide and covered in class. The response states a clear opinion but some portions may not be tied to responses 1-4 or information covered in class. The response states an opinion but it is not at all tied to the responses 1 - 4 or other information covered in class. The response is missing or unrelated to the prompt. Computer Science Principles 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help