With the exponential decrease in the cost of storage and individuals’ increasing use of digital services, privacy is increasingly important: simply aggregating data is often sufficient to uniquely identify individuals and to reveal sensitive personal information about them. What policies currently govern the collection and use of data? What responsibilities do organizations (and even software developers) have to safeguard their users’ data? Who ultimately controls that data, and what limitations should exist on its use?

Learning Objectives

  • List the privacy protections provided by the Privacy Act of 1974
  • Recognize the privacy protections provided by HIPAA, FERPA, and COPRA
  • Discuss privacy issues that arise from Web 2.0 technologies

How to Complete this Lesson

Complete the following learning activities: (2.5–3.25 hours total)

  1. Read “Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications(15–30 minutes)
    • Note: The prior link is to the list of references for the site; click on the paper title in that list to access the full text of the paper (or “copy” at the end of the citation if the publisher’s version requires authentication).
  2. Attend the class meeting (60 minutes)
  3. Take the quiz (10 minutes)
  4. Work on the project’s web application (60–90 minutes)

Due

As a reminder, the following is due this lesson:

Resources

Learn Privacy and Data Protection Law (Salesforce Trailhead)