Join Michelle Dennedy for an in-depth discussion in this video Privacy overview, part of Understanding and Prioritizing Data Privacy.
- Data privacy and security is one of those threads that ties together every industry and really, every individual. If you think about data in its most personal sense, the data about your healthcare, your medical conditions, the number of children you have, their ages, your family members, your geography, all of these things obviously make a big deal of difference to each individual person. Now, moving out from that circle, how we find each other in space and time, who's allowed to meet with us and know where we are at what time. How do we have a space so that we can just go and be quiet and creative and turn everything off? All of those things are aspects of authorized sharing of information. What do I decide to share, with whom, and when? These foundational principles that are incredibly personal and individual extend out as you get to bigger and bigger groups of people. Whether we are people within a classroom, deciding what we need to learn and what the agenda is, whether we are people who are students who are all sitting and learning from content and trying to judge the veracity of the speaker or the quality of the information, whether we are citizens grappling with very difficult issues deciding how many people should be saved by coming into our borders when they really need help and how many should stay apart because we need our own jobs and we fear for national security reasons, whether that's valid or not. All of these decisions are based upon the data stories and the individual stories that come together that really form a basis of all of humanity. So I think that's why we all have a very big interest in understanding, at the least, and really getting in and innovating and thinking about data.
- Relate the concept of data as intellectual property.
- Examine the ways in which moral, legal, and ethical concerns apply to data privacy.
- Explain how context applies to personal private information.
- Recognize the motivations of individuals accessing data they are not authorized to access.
- Define the implications of moral crumple zones.