Last updated on January 17th, 2022 at 01:35 am

Protection of Information and Ethical Technology Use

A woman with long red hairt sits at a computer on a yellow chair. On the wall are two frames containing the BrightBel Guide to Ethical Technology Use.

Image description:  A woman with long, red hair sits at a computer on a yellow chair. On the wall are two frames containing the BrightBel Guide to Ethical Technology Use.

Protection of Information and Ethical Technology Use Project Details:

Three silhouettes in a triangle shape (each of a different color - coral, blue, and green) have a yellow line in the center branching in the three directions. The logo is meant to signify clients.

Client:

Western Governors University

Green hands on a keyboard to signify tools used.

Tools Used:

Canva, Microsoft Word

Three silhouettes have a red and yellow bullseye with an arrow beneath them. The graphic is meant to signify the target audience.

Target Audience:

Fellow learners and educators

A yellow spiral bound calendar with blue sqares and a checkmark in the center.

Year:

2021

During course TET1, Issues in Technology Integration, at Western Governors University, the second task topic centered on information protection and using technology ethically.  The task was twofold:  to write a paper on the protection of information and to produce a creative element on the ethical use of technology in education.

For the topic of information protection, my paper discussed safeguarding participants in my research study, which would be the focus of my capstone and final project of my M.Ed.  I chose to create an infographic highlighting tips for the ethical use of technology by BrightBel – the website and brand I created where I would be teaching the course in my capstone.  

I also received an award of excellence in recognition for my work submitted.  According to WGU: “You can achieve this award throughout your degree journey by submitting outstanding work.  If an evaluator identifies the work as exemplary, he or she may nominate an exceptional performance task submission that is passed on the first attempt with the highest available score on each aspect of the assessment.” 

Feedback:

Yellow star perched on a blue trophy base.

I also received an Excellence Award for exemplary work submitted on this project.  According to WGU: 

“You can achieve this award throughout your degree journey by submitting outstanding work.  If an evaluator identifies the work as exemplary, he or she may nominate an exceptional performance task submission that is passed on the first attempt with the highest available score on each aspect of the assessment.” 

Image description: A certificate from WGU for January 2021, Issues in Technology Integration Excellence Award presented to Bela Gaytan”. 

Ethical Technology Use

BrightBel’s Guide to Ethical Technology Use infographic. The words are in white letters with an orange background. The document is color-blocked with information on virus and malware protection, dodging phishin attacks, avoiding plagiarism, playing it safe online, and being empathetic.

Image description:  BrightBel’s Guide to Ethical Technology Use infographic. The words are in white letters with an orange background. The document is color-blocked with information on virus and malware protection, dodging phishin attacks, avoiding plagiarism, playing it safe online, and being empathetic.

Protection of Information

Instructional Setting, Learners, and Content

The lesson will be delivered via an online teaching platform utilizing audio, video, graphics, and file downloads.  As this course is self-paced, fully online, and asynchronous, learners will participate on their own, as well as with the option to actively engage in the course forum.  They may choose to attend a live webinar for synchronous participation and feedback.  Offering the course completely online and asynchronously offers flexibility and accessibility to the learners.  This will especially be helpful for those with differing abilities and health issues or those with work or home schedules that would typically conflict with standard hours.

The learners are adults of all ages (though typically will be aged 18-65) and are not restricted to a specific gender.  The learners will be diverse and inclusive of various cultures, abilities, socioeconomic status, and marginalized groups.  The motivating force behind the learners will be the opportunity to improve their chances of applying for jobs.  I think the learner attitudes will vary towards the topics of resume optimization, due to lack of understanding on the topic and Applicant Tracking Systems, to having an outdated view on resumes and the older model of job application practices.

The course content will teach learners to create ATS-friendly master resumes and cover letters targeted to specific jobs and job types.  They will learn the purpose of resumes, gather and organize relevant resume content, and create master resume and cover letter templates.  They will further learn how to customize their resumes and cover letters for specific jobs or job types and how to optimize their resumes using an online resume scanning tool.

Ethical Reasons for Maintaining Confidentiality

            As the course is focused on resume optimization, it is likely that the learners are considering a new job at some point.  It could be extremely problematic if their participation in the course was not kept confidential, especially to their current employers.  This could cause issues with their job, confrontations with management or other employees, and an uncomfortable work environment.

            When the learners submit assignments and projects within the course, they will be sharing a lot of personal information.  This will include their address, phone number, e-mail, education, places and dates of employment, and so on.  All this information, if left unprotected, could make the individual very vulnerable to hacking, phishing, and identity theft.

Legal Reasons for Maintaining Confidentiality

Most websites collect personal data from users who visit the site.  Information may be gathered by newsletter opt-in, surveys or questionnaires, or more so behind the scenes.  Various plug-ins and third-party apps on websites gather personal details for the purpose of relevant ad offerings, analysis of traffic, and more.  Although the U.S. does not have a federal law mandating the need for privacy policies to be in place, there are several laws at both the federal and state levels that require websites to have and use a privacy policy (Free Privacy Policy, 2020).  The California Consumer Privacy Act (CaCPA) is one such law.  The European Union abides by the stricter General Data Protection Regulation (GDPR) for its privacy laws.  To cover all bases legally, it is best to have a privacy policy in place to ensure that all users and learners are aware of how their data may be used and so they may legally opt-out.

The financial information of learners must also be kept confidential for legal reasons.  Students paying for courses must enter their payment information, such as debit cards, credit cards, checking accounts, or PayPal information.  Breeches of this confidential information could be used to steal the identity of learners or for fraudulent spending on their accounts.  The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards that all companies, regardless of size, must adhere to when accepting, processing, and transmitting credit card information (ControlScan, n.d.).  Ensuring PCI compliance is not required under federal law, but several states directly reference in in their laws, such as Nevada (Justia Law, n.d.).

Confidentiality Maintenance

            In my instructional setting, BrightBel, we will have a very clear privacy policy on the website.  It will be updated anytime new technology is added to the site or any information changes.  Using SSL encryption, we will securely handle all data coming in and out of the site.  We will only utilize payment processing systems that are PCI compliant to ensure secure handling of all financial information.  Student records will be managed to make every attempt at protecting student data.  Security measurements such as limiting access to sensitive information, using encrypted cloud service providers, staying on top of routine maintenance, and layering network security will be in place and continuously reviewed (Nichols, 2019).

References

A., Maria. (2020, December 28). Privacy policies are legally required. Free Privacy Policy. https://www.freeprivacypolicy.com/blog/privacy-policy-legally-required

Calonia, J. (2019, August 21). How to avoid plagiarism. Grammarly.
https://www.grammarly.com/blog/5-most-effective-methods-for-avoiding-plagiarism

ControlScan. (n.d.). PCI compliance guide frequently asked questions: PCI DSS FAQs. PCI Compliance Guide. https://www.pcicomplianceguide.org/faq

Forcepoint. (n.d.). What is spoofing? https://www.forcepoint.com/cyber-edu/spoofing

Kaspersky. (n.d.). Malware & computer virus facts & FAQs. https://www.kaspersky.com/resource-center/threats/computer-viruses-and-malware-facts-and-faqs

McAfee. (2020, May 19). Protect yourself against phishing scams with these security tips. https://www.mcafee.com/blogs/consumer/consumer-threat-notices/protect-yourself-against-phishing-scams-with-these-security-tips

Nichols, J. (2019, April 9). 5 tips for keeping client data secure. Zegal. https://zegal.com/blog/post/5-tips-for-keeping-client-data-secure

NRS 603A.215 – Security measures for data collector that accepts payment card; use of encryption; liability for damages; applicability. Justia Law. (n.d.). https://law.justia.com/codes/nevada/2013/chapter-603a/statute-603a.215

Zook, C. (2019, December 10). What is digital citizenship & how do you teach it? Applied Educational Systems. https://www.aeseducation.com/blog/what-is-digital-citizenship

Scroll to top