Section 3.1

Analyze Personally Identifiable Information

Learning Goals

IOC-2.A.1: Personally identifiable information (PII) is information about an individual that identifies, links, relates, or describes them. Examples of PII include:

IOC-2.A.2: Search engines can record and maintain a history of searches made by users. 

IOC-2.A.4: Devices, websites, and networks can collect information about a user’s location.

IOC-2.A.5:  Technology enables the collection, use, and exploitation of information about, by, and for individuals, groups, and institutions.

IOC-2.A.7:  Disparate personal data, such as geolocation, cookies, and browsing history, can be aggregated to create knowledge about an individual.

IOC-2.A.8: PII and other information placed online can be used to enhance a user’s online experiences. 

IOC-2.A.10: Commercial and governmental curation of information may be exploited if privacy and other protections are ignored.

IOC-2.A.11: Information placed online can be used in ways that were not intended and that may have a harmful impact. For example, an email message may be forwarded, tweets can be retweeted, and social media posts can be viewed by potential employers.

IOC-2.A.13: Once information is placed online, it is difficult to delete.

IOC-2.A.15:  Information posted to social media services can be used by others. Combining information posted on social media and other sources can be used to deduce private information about you.


Objectives and General Description

The objective of this section is to learn what Personally Identifiable Information (PII) is and how that relates to internet privacy. The goal is for students to understand the importance of storing information properly and the repercussions of stolen information.


Activities

Activity 3.1.1 (outside assignment)

Reflections and Guided Reading Questions Second Edition from the Summer Reading page.


Activity 3.1.2 (budget 55 minutes)

7.  Watch this video, "Is Facial Recoginition Invading our Privacy?" by Above the Noise from PBS Learning Media and have a class discussion about who should get our information, how our information is used, and how we can protect ourselves.

8.  Watch this video, "Cops Need a Warrant To Search Your Cell Phone's Location History, Supreme Court Rules." by Vice News.  Have a class discussion about cell phones in school.  Should parents be allowed to search their children's cell phones?  What exactly are your 4th Amendment rights?

Activity 3.1.3 (10 minutes)

Students should have already read  "Blown to Bits" - Chapter 3 , "Who Owns Your Privacy?" Second Edition

Activity 3.1.4 (2 hours)