[DLIT] (8) 20 :
14) Analyze current events related to computing and their effects on education, the workplace, individuals, communities, and global society.
[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.
a. Recognize user tracking methods and hazards.
Examples: Cookies, WiFi packet sniffing.
b. Understand how to apply techniques to mitigate effects of user tracking methods.
c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.
d. Explain the relationship between online privacy and personal security.
Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.
e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.
Examples: Cyberbullying/harassment, inappropriate sexual communications.
f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.