With the exponential decrease in the cost of storage and individuals’ increasing use of digital services, privacy is increasingly important: simply aggregating data is often sufficient to uniquely identify individuals and to reveal sensitive personal information about them. What policies currently govern the collection and use of data? What responsibilities do organizations (and even software developers) have to safeguard their users’ data? Who ultimately controls that data, and what limitations should exist on its use?

Learning Objectives

  • Describe the privacy protections provided by the Privacy Act of 1974
  • Describe the privacy protections provided by the Health Insurance Portability and Accountability Act of 1996 (HIPAA)
  • Discuss privacy issues that arise from Web 2.0 technologies

How to Complete this Lesson

  1. Complete the course evaluation if you have not done so already (5–10 minutes)
  2. Read “Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications(15–30 minutes)
    • Note: The prior link is to the list of references for the site; click on the paper title in that list to access the full text of the paper (or “copy” at the end of the citation if the publisher’s version requires authentication).
  3. Read “Get to Know US Privacy Law(15 minutes)
  4. Respond to one of the prompts in the discussion forum (30 minutes)
  5. Work on the project’s web application (120 minutes)

Due

As a reminder, the following is due this lesson:

Resources

Learn Privacy and Data Protection Law (Salesforce Trailhead)