Day 12 - Data Privacy and Security
Day 12: Data Privacy and Security
Learning Objectives
- DAT-2.E: Explain how programs can be used to gain insight and knowledge from data.
Essential Questions
- What privacy concerns arise from data collection and analysis?
- How do data breaches impact individuals and organizations?
- How can we balance the benefits of data use with privacy protection?
Materials Needed
- Presentation slides on data privacy and security
- Case study handouts
- Discussion prompts
- Position paper guidelines
- News articles about recent data breaches
Vocabulary
- Data privacy
- Data security
- Data breach
- Personally identifiable information (PII)
- Anonymization
- De-identification
- Consent
- Data minimization
- Encryption
Procedure (50 minutes)
Opening (8 minutes)
-
Review and Connection (3 minutes)
- Review metadata concepts from previous lesson
- Connect to today's focus on privacy and security concerns
-
Warm-up Activity (5 minutes)
- Ask students to list all the data they've shared online in the past 24 hours
- Discuss: "Who has access to this data? What could they learn about you?"
Main Activities (32 minutes)
-
Lecture: Privacy Concerns with Data Collection and Analysis (12 minutes)
- Explain key privacy concerns:
- Collection of personal information without informed consent
- Secondary use of data beyond original purpose
- Data aggregation revealing sensitive patterns
- Re-identification of supposedly anonymous data
- Surveillance and tracking of behavior
- Algorithmic decision-making based on personal data
- Discuss data security issues:
- Data breaches and unauthorized access
- Insider threats
- Insecure data storage and transmission
- Inadequate data disposal
- Explain privacy protection approaches:
- Data minimization
- Anonymization and de-identification
- Encryption
- Access controls
- Transparency and consent
- Explain key privacy concerns:
-
Case Studies: Examples of Data Breaches and Privacy Issues (10 minutes)
- Present 2-3 real-world case studies of data privacy incidents
- For each case, discuss:
- What happened?
- What types of data were compromised?
- How did it affect individuals and organizations?
- What could have been done to prevent it?
- What lessons can be learned?
- Connect case studies to broader privacy principles
-
Debate: Balancing Data Utility with Privacy Protection (10 minutes)
- Divide class into small groups
- Assign each group a scenario involving data collection and use
- Health data for medical research
- Location data for traffic optimization
- Shopping habits for personalized recommendations
- Social media data for targeted advertising
- Groups discuss and prepare arguments addressing:
- Benefits of the data use
- Privacy concerns
- Potential compromises or solutions
- Groups share their perspectives with the class
Closing (10 minutes)
-
Discussion and Reflection (5 minutes)
- Facilitate whole-class discussion on key questions:
- Who should own or control personal data?
- What responsibility do organizations have to protect data?
- How can individuals protect their own privacy?
- How might privacy concerns and protections evolve in the future?
- Facilitate whole-class discussion on key questions:
-
Position Paper Assignment and Preview (5 minutes)
- Introduce position paper assignment on a data privacy issue
- Provide guidelines and expectations
- Preview that next class will focus on bias in data
Assessment
- Formative: Quality of participation in debate and discussion
- Position Paper: Depth of analysis, quality of arguments, and understanding of privacy concepts
Differentiation
For Advanced Students
- Research privacy laws and regulations in different countries
- Analyze technical aspects of data protection methods
- Explore ethical frameworks for evaluating data privacy issues
For Struggling Students
- Focus on more familiar privacy scenarios
- Provide structured templates for position paper
- Use visual aids to illustrate privacy concepts
Homework/Extension
- Write a 1-2 page position paper on a data privacy issue
- Create a personal data privacy audit and protection plan
- Research a recent data breach and analyze its causes and impacts
Teacher Notes
- Keep discussions balanced between benefits of data use and privacy concerns
- Be sensitive to students who may have been affected by data breaches
- Make connections to students' everyday experiences with privacy
- Consider inviting a guest speaker with expertise in data privacy
- Emphasize that privacy concerns are not just theoretical but affect real people