Copy of U10L3&4 -Privacy, Security, and Innovation

.pdf

School

The University of Sydney *

*We aren’t endorsed by this school

Course

301

Subject

Information Systems

Date

Dec 6, 2023

Type

pdf

Pages

3

Uploaded by BailiffIron12678

Report
Unit 10 Lesson 3 Name(s) Sydney Biondo Period ______ Date ___________________ Activity Guide - Privacy, Security, and Innovation Choose a Website and Find the Data Privacy Policy Choose an app, website, or other online service you are familiar with to research their data policy. The easiest way to find a data policy, if it exists, is to search for the company name followed by the terms “data policy” or “privacy policy.” Your website or app: code.org - https://code.org/privacy What Is Their Data Policy? Respond to the questions below. Even if you can’t find information, you should record where you looked and the fact that you can’t find it. If there isn’t a policy or it’s hard to find, that can be just as interesting as seeing the policy itself. Question 1: What kinds of data is collected? Display name Account passwords Secret words/pictures Age (Not birthdate) One-way hash of student email address Parent or guardian email address Account Identifiers Login time, IP address, and other technical data Gender Race Progress in the course Student projects Student-uploaded images, sounds, or videos Data collected by Student-created apps Written comments in response to curricular/educational prompts within Code.org courses Student-provided responses to surveys (e.g., multiple choice and free response questions) Question 2: How is the data you listed above being used? What features are enabled by the data? Code.org uses this information above to gather info about the user to successfully retain their progress throughout using this application Question 3: Does the company share the data with anyone else? Who? No, according to the website, “Code.org does not share information with such services.” This proves that code.org does not share private information with other companies Question 4: Can you get access to your own data? Can you modify what is collected, or delete your data if you wish? Yes, you can unless it is teacher controlled and only then do you not have full access to your account. Privacy vs. Security Tradeoffs Question 5: Do you believe the benefits of the innovation you researched outweigh the privacy concerns? Explain why or why not making explicit connections to responses 1-4 above. Computer Science Principles 1
Unit 10 Lesson 3 Yes, because even through the privacy policy this application is still a create useful source for newly upcoming coders it can provide education services to students and the data collected is not hurting you. For example, “Code.org does not share information with such services.” This proves that code.org does not share private information with other companies Question 6 1 - Totally Comfortable "Have my data! It makes the technology I love work and keeps me safe!” 2 - Mostly Comfortable "I want tech innovations and stronger security. Let's make sure we take care of the most damaging privacy concerns." 3 - Mixed "There's a lot of this that makes me uncomfortable, but I'm still going to use technology." 4 - Mostly Uncomfortable "Privacy is more important than empowering innovations or ensuring security. I would give up on some tech innovations to ensure my privacy" 5 - Totally Uncomfortable "I'd give up most technology and would like to see much stronger limits on what kind of data can be collected and stored, even if it limits the introduction of new technology" Which of the above categories best describes your overall comfort with using data to drive innovations or ensure security? Write a paragraph below explaining your response and tying it to either the information in this activity guide or discussions shared in class. My rank is 3 because I feel, even through the conderns, I would rather be able to have access to multiple applications even if it means giving the website some of my information. I also understand feeling uncomfortable knowing that my information is just floating around the internet for any application and/or hacker to steal so that is why I have chosen rank 3. There are different sides to the story. Computer Science Principles 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help