Lesson 10: Privacy and Security
45 minutes
Overview
What are the tradeoffs between the utility of data collection and safeguarding privacy and security?
Students recall how their data is collected then think through how they would use that data as software engineers. They read case studies on privacy and security breaches and debate about the tradeoffs between the utility of data collection and safeguarding privacy and security.
Standards
IOC-1 - While computing innovations are typically designed to achieve a specific purpose, they may have unintended consequences.
IOC-1.B - Explain the risks to privacy from collecting and storing personal data on computer systems.
- IOC-1.B.1 - When using the computer, personal privacy is at risk. Programmers should attempt to safeguard personal privacy
- IOC-1.B.2 - Computer use and the creation of programs have an impact on personal security. These impacts can be beneficial and/or harmful.
Agenda
Objectives
Students will be able to:
- Evaluate case studies on privacy and security breaches
- Weigh the tradeoffs between the utility of data collection and safeguarding privacy and security
Preparation
- Print copies of the Data, Privacy, and Security handout (one for each student)
- Print copies of the Unit 8 Study Guide (one for each student)
- Check the Teacher's Lounge for verified teachers on the CSA Forum to find additional strategies or resources shared by fellow teachers
Links
Heads Up! Please make a copy of any documents you plan to share with students.
For the students
- Data, Privacy, and Security - Handout
- U8L10 Extra Practice - Handout
- Unit 8 Study Guide - Resource
Teaching Guide
Warm Up (5 minutes)
Data Collection
Remarks
In a previous lesson, we discussed different scenarios where your data was collected as a consumer of technology.
Discuss: Use the Retrieve-Pair-Share strategy to discuss the prompt.
- What data is being collected in each scenario - Home, School, and Hobbies?
Discussion Goal: Students share what data is being collected in each scenario, such as their name, address, and other personal information.
Activity (35 minutes)
Data, Privacy, and Security (20 minutes)
Remarks
When using the computer, personal privacy is at risk. Programmers should attempt to safeguard personal privacy. Let's think about what you would do if you were a software engineer in those scenarios as a producer of technology.
Do This: Review the lesson objectives.
Group: Place students in pairs.
Distribute: Give each student a copy of the Data, Privacy, and Security handout.
Do This: Review the instructions for the Data, Privacy, and Security activity.
Do This: Have students complete the Data, Privacy, and Security handout.
Debate (15 minutes)
Remarks
Computer use and the creation of programs have an impact on personal security. These impacts can be beneficial or harmful. Let's think about the tradeoffs between data collection and privacy and security.
Do This: Review the instructions for the Data Collection vs Privacy and Security activity.
Discuss: What do you think is more important: the utility of data collection or safeguarding privacy and security?
Discussion Goal: Students share tradeoffs between collecting more data and the risk of impacts on privacy and security, such as an unauthorized individual gaining access to their information or companies sharing their information with another company without their knowledge.
Wrap Up (5 minutes)
Show What You Know Week
Remarks
The next five lessons are an opportunity to Show What You Know! We complete our unit project, then spend a day practicing answering AP-style free-response questions and wrapping up the unit with a multiple-choice assessment. You've learned so much in this unit, and now you're ready to show what you know!
Distribute: Give each student a copy of the Unit 8 Study Guide.
Do This: Introduce the Show What You Know week.
Do This: Explain the goals of the project workdays.
Do This: Have students update their Project Planning Board and Project Backlog with any tasks they completed, changed, or added.
Do This: Review the concepts covered in this lesson.
Assessment: Check for Understanding
Check For Understanding Question(s) and solutions can be found in each lesson on Code Studio. These questions can be used for an exit ticket.
AP Classroom Topic Questions
To assign questions from the AP Classroom Question Bank that align with this lesson, create a custom quiz in AP Classroom by searching the Question Bank for the Essential Knowledge statements listed at the top of this lesson plan. You can find instructions and video demonstrations to do this on AP Central.
The following Topic Questions in AP Classroom can be assigned as a formative assessment for this lesson:
- Topic Questions 7.7
Note: Some Learning Objectives and Essential Knowledge statements in the suggested Topic Questions are covered in later units.
This work is available under a Creative Commons License (CC BY-NC-SA 4.0).
If you are interested in licensing Code.org materials for commercial purposes contact us.