100% found this document useful (1 vote)
2K views

Activity Guide - Privacy, Security, and Innovation - Unit 10 Lesson 3

The document summarizes a student activity where they researched the privacy policy of EA Sports. It finds that EA collects personal information like name, payment details, and gameplay data. This data is used for account validation, identifying trends, and targeted advertising. EA may share data with third parties for offers. Users can access and update some personal data through their account but not delete it entirely due to legal restrictions. While innovation benefits from data, the student expresses concern about privacy and IP extraction, placing themselves in the "Mostly Uncomfortable" category regarding data use.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views

Activity Guide - Privacy, Security, and Innovation - Unit 10 Lesson 3

The document summarizes a student activity where they researched the privacy policy of EA Sports. It finds that EA collects personal information like name, payment details, and gameplay data. This data is used for account validation, identifying trends, and targeted advertising. EA may share data with third parties for offers. Users can access and update some personal data through their account but not delete it entirely due to legal restrictions. While innovation benefits from data, the student expresses concern about privacy and IP extraction, placing themselves in the "Mostly Uncomfortable" category regarding data use.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Unit 10 Lesson 3

Name(s)_______________________________________________
Javier Vega Period ______ Date ___________________

Activity Guide - Privacy, Security, and Innovation

Choose a Website and Find the Data Privacy Policy


Choose an app, website, or other online service you are familiar with to research their data policy. The easiest way to
find a data policy, if it exists, is to search for the company name followed by the terms “data policy” or “privacy policy.”

Your website or app: _______________________________________________________


Ea Sports

What Is Their Data Policy?


Respond to the questions below. Even if you can’t find information, you should record where you looked and the fact
that you can’t find it. If there isn’t a policy or it’s hard to find, that can be just as interesting as seeing the policy itself.

Question 1: What kinds of data is collected?


Your EA Account information, including your email address, username, real name, country, date of birth,

telephone number and password; Security questions and answers; Information you provide in response to surve

about their Services; Information you provide when seeking help from them, such as your name, telephone

number, and records (including call recordings) of the issues you experience; and Billing information, such as

your name, payment card number, payment account details, and shipping address.
Question 2: How is the data you listed above being used? What features are enabled by the data?

It is used to help them validate their decisions, identify the next great thing, and pursue the

unknown through experimentation.

Question 3: Does the company share the data with anyone else? Who?
They may share your information with third parties to serve you offers for EA products and services,

or offers from their third-party advertising partners.

Question 4: Can you get access to your own data? Can you modify what is collected, or delete your data if you
wish?

Yes, you have access to your data by logging in. You can update all account information (like your

email address, name, date of birth, and more), but there could be restrictions based on your country's

laws, and your ID can only be changed once every 72 hours.

Computer Science Principles 1


Unit 10 Lesson 3

Privacy vs. Security Tradeoffs

Question 5: Do you believe the benefits of the innovation you researched outweigh the privacy concerns?
Explain why or why not making explicit connections to responses 1-4 above.

I believe that the benefits of innovation definitely outweigh privacy concerns mainly because of how

technology advances as time goes on. I think that eventually even though EA Sports

keeps secure your information, people may eventually find a way to get that information no

matter what, for example, people may create an IP extracting tool to use when playing some of

EA Sport's games .

Question 6

● 1 - Totally Comfortable "Have my data! It makes the technology I love work and keeps me safe!”
● 2 - Mostly Comfortable "I want tech innovations and stronger security. Let's make sure we take care of the
most damaging privacy concerns."
● 3 - Mixed "There's a lot of this that makes me uncomfortable, but I'm still going to use technology."
● 4 - Mostly Uncomfortable "Privacy is more important than empowering innovations or ensuring security. I
would give up on some tech innovations to ensure my privacy"
● 5 - Totally Uncomfortable "I'd give up most technology and would like to see much stronger limits on what
kind of data can be collected and stored, even if it limits the introduction of new technology"

Which of the above categories best describes your overall comfort with using data to drive innovations or
ensure security? Write a paragraph below explaining your response and tying it to either the information in
this activity guide or discussions shared in class.
Categorie number 4 best describes my overall comfort, this is because i've not yet gotten an

information extraction or exposure, however, I have heard of many situations who've gotten things

such as their names used by other people, without their knowledge and most of all the biggest

problem for me is IP exctraction, I have heard of way too many people getting their IP extracted

because of how easy it is,specially because of how many ways people can extract IP's and it

happened to me once, but luckily when I was not in my home. Also, what i've recently liked is that

many companies are using many verifications method to ensure the right person is logging in, such as

EA Sports and Amazon.

Computer Science Principles 2


Unit 10 Lesson 3

Rubric

Category Extensive Evidence Convincing Limited Evidence No Evidence


Evidence

Data Collection and Response 1 include Both responses One or both Both responses are
Use many examples of include many responses is either either incomplete or
data collected by the examples but there missing significant missing.
company that are may not always be information or there
clearly tied to the connections between is no clear
examples in the kinds of data connection between
Response 2 collected and the the responses.
indicating how that way it is used.
data is used.

Data Sharing and Response 3 and 4 Response 3 and 4 One of response 3 Both responses are
Control clearly describe how include examples of and 4 is significantly either incomplete or
users data is shared how data is shared lacking in clarity over missing.
externally and and controlled but how the data is
whether and if users there many not shared or how the
have any controls always be clear ties data is controlled.
over their data. between the
There are clear ties responses 1-3 and
between the way the data controls
data is used and the mentioned in
controls users have response 4.
over that use.

Evaluating Your The response The response states The response states The response is
Innovation provides a clear a clear opinion but an opinion but it is missing or unrelated
opinion on the some portions may not at all tied to the to the prompt.
tradeoffs based on not be tied to responses 1 - 4.
the information responses 1-4.
provided on the first
page.

Evaluating the The response The response states The response states The response is
Privacy Tradeoffs provides a clear a clear opinion but an opinion but it is missing or unrelated
Overall opinion on the some portions may not at all tied to the to the prompt.
overall privacy not be tied to responses 1 - 4 or
tradeoffs based on responses 1-4 or other information
the information in information covered covered in class.
this activity guide in class.
and covered in class.

Computer Science Principles 3

You might also like