0% found this document useful (0 votes)
3 views

Activity Guide - Privacy, Security, an

The document is an activity guide for researching data privacy policies, specifically focusing on Google's data practices. It outlines the types of data collected, how it is used, sharing practices, and user control over data, while also prompting students to evaluate the trade-offs between privacy and innovation. Students are encouraged to express their comfort level with data usage in technology and reflect on the implications of privacy concerns.

Uploaded by

herdociavir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Activity Guide - Privacy, Security, an

The document is an activity guide for researching data privacy policies, specifically focusing on Google's data practices. It outlines the types of data collected, how it is used, sharing practices, and user control over data, while also prompting students to evaluate the trade-offs between privacy and innovation. Students are encouraged to express their comfort level with data usage in technology and reflect on the implications of privacy concerns.

Uploaded by

herdociavir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Unit 8 Lesson 3
Name(s)_______________________________________________
Virginia Herdocia Period ______
11A Date ___________________

Activity Guide - Privacy, Security, and Innovation

Choose a Website and Find the Data Privacy Policy


Choose an app, website, or other online service you are familiar with to research their data policy. The easiest way to
find a data policy, if it exists, is to search for the company name followed by the terms “data policy” or “privacy policy.”

Your website or app: _______________________________________________________


Google

What Is Their Data Policy?


Respond to the questions below. Even if you can’t find information, you should record where you looked and the fact
that you can’t find it. If there isn’t a policy or it’s hard to find, that can be just as interesting as seeing the policy itself.

Question 1: What kinds of data is collected?

Google collects data you directly provide, such as contact details and content, as well as data automatically gathered during
service use, like browsing history and device information. This comprehensive collection aims to personalize user experiences
and improve their services.

Question 2: How is the data you listed above being used? What features are enabled by the data?

Google uses collected data to personalize services and improve functionality, such as tailoring search results and enabling
location-based features. This data also helps in showing relevant ads, measuring performance, and ensuring security across their
platforms.

Question 3: Does the company share the data with anyone else? Who?

Google shares data with affiliates within Alphabet, service providers for processing tasks, and partners like website owners. They
also share data with legal authorities when legally required.

Question 4: Can you get access to your own data? Can you modify what is collected, or delete your data if you
wish?

Google allows users to access and review their stored data through their Google Account. Furthermore, users can modify or
delete specific data types, including personal information and activity history, as well as their entire account if desired.

Computer Science Principles​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ 1



Unit 8 Lesson 3

Privacy vs. Security Tradeoffs

Question 5: Do you believe the benefits of the innovation you researched outweigh the privacy concerns?
Explain why or why not making explicit connections to responses 1-4 above.

For many, the benefits of personalized experiences and useful features enabled by Google's data collection outweigh privacy concerns, especially
with user controls over their data. However, the extensive amount of data collected can still be a significant privacy issue for some individuals,
making the trade-off a personal decision.

Question 6

●​ 1 - Totally Comfortable "Have my data! It makes the technology I love work and keeps me safe!”
●​ 2 - Mostly Comfortable "I want tech innovations and stronger security. Let's make sure we take care of the
most damaging privacy concerns."
●​ 3 - Mixed "There's a lot of this that makes me uncomfortable, but I'm still going to use technology."
●​ 4 - Mostly Uncomfortable "Privacy is more important than empowering innovations or ensuring security. I
would give up on some tech innovations to ensure my privacy"
●​ 5 - Totally Uncomfortable "I'd give up most technology and would like to see much stronger limits on what
kind of data can be collected and stored, even if it limits the introduction of new technology"

Which of the above categories best describes your overall comfort with using data to drive innovations or
ensure security? Write a paragraph below explaining your response and tying it to either the information in
this activity guide or discussions shared in class.

I identify as "Mostly Comfortable" with data use for innovation, appreciating the enhanced user experience from personalized features. My comfort
stems from the provided transparency and user controls over collected data, despite acknowledging potential privacy risks.

Computer Science Principles​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ 2



Unit 8 Lesson 3

Rubric

Category Extensive Evidence Convincing Limited Evidence No Evidence


Evidence

Data Collection and Response 1 include Both responses One or both Both responses are
Use many examples of include many responses is either either incomplete or
data collected by the examples but there missing significant missing.
company that are may not always be information or there
clearly tied to the connections between is no clear
examples in the kinds of data connection between
Response 2 collected and the the responses.
indicating how that way it is used.
data is used.

Data Sharing and Response 3 and 4 Response 3 and 4 One of response 3 Both responses are
Control clearly describe how include examples of and 4 is significantly either incomplete or
users data is shared how data is shared lacking in clarity over missing.
externally and and controlled but how the data is
whether and if users there many not shared or how the
have any controls always be clear ties data is controlled.
over their data. between the
There are clear ties responses 1-3 and
between the way the data controls
data is used and the mentioned in
controls users have response 4.
over that use.

Evaluating Your The response The response states The response states The response is
Innovation provides a clear a clear opinion but an opinion but it is missing or unrelated
opinion on the some portions may not at all tied to the to the prompt.
tradeoffs based on not be tied to responses 1 - 4.
the information responses 1-4.
provided on the first
page.

Evaluating the The response The response states The response states The response is
Privacy Tradeoffs provides a clear a clear opinion but an opinion but it is missing or unrelated
Overall opinion on the some portions may not at all tied to the to the prompt.
overall privacy not be tied to responses 1 - 4 or
tradeoffs based on responses 1-4 or other information
the information in information covered covered in class.
this activity guide in class.
and covered in class.

Computer Science Principles​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ 3

You might also like