Last updated on January 17th, 2022 at 01:35 am
Protection of Information and Ethical Technology Use
Image description: A woman with long, red hair sits at a computer on a yellow chair. On the wall are two frames containing the BrightBel Guide to Ethical Technology Use.
Protection of Information and Ethical Technology Use Project Details:
Western Governors University
Canva, Microsoft Word
Fellow learners and educators
During course TET1, Issues in Technology Integration, at Western Governors University, the second task topic centered on information protection and using technology ethically. The task was twofold: to write a paper on the protection of information and to produce a creative element on the ethical use of technology in education.
For the topic of information protection, my paper discussed safeguarding participants in my research study, which would be the focus of my capstone and final project of my M.Ed. I chose to create an infographic highlighting tips for the ethical use of technology by BrightBel – the website and brand I created where I would be teaching the course in my capstone.
I also received an award of excellence in recognition for my work submitted. According to WGU: “You can achieve this award throughout your degree journey by submitting outstanding work. If an evaluator identifies the work as exemplary, he or she may nominate an exceptional performance task submission that is passed on the first attempt with the highest available score on each aspect of the assessment.”
I also received an Excellence Award for exemplary work submitted on this project. According to WGU:
“You can achieve this award throughout your degree journey by submitting outstanding work. If an evaluator identifies the work as exemplary, he or she may nominate an exceptional performance task submission that is passed on the first attempt with the highest available score on each aspect of the assessment.”
Image description: A certificate from WGU for January 2021, Issues in Technology Integration Excellence Award presented to Bela Gaytan”.
Ethical Technology Use
Image description: BrightBel’s Guide to Ethical Technology Use infographic. The words are in white letters with an orange background. The document is color-blocked with information on virus and malware protection, dodging phishin attacks, avoiding plagiarism, playing it safe online, and being empathetic.
Protection of Information
Instructional Setting, Learners, and Content
The lesson will be delivered via an online teaching platform utilizing audio, video, graphics, and file downloads. As this course is self-paced, fully online, and asynchronous, learners will participate on their own, as well as with the option to actively engage in the course forum. They may choose to attend a live webinar for synchronous participation and feedback. Offering the course completely online and asynchronously offers flexibility and accessibility to the learners. This will especially be helpful for those with differing abilities and health issues or those with work or home schedules that would typically conflict with standard hours.
The learners are adults of all ages (though typically will be aged 18-65) and are not restricted to a specific gender. The learners will be diverse and inclusive of various cultures, abilities, socioeconomic status, and marginalized groups. The motivating force behind the learners will be the opportunity to improve their chances of applying for jobs. I think the learner attitudes will vary towards the topics of resume optimization, due to lack of understanding on the topic and Applicant Tracking Systems, to having an outdated view on resumes and the older model of job application practices.
The course content will teach learners to create ATS-friendly master resumes and cover letters targeted to specific jobs and job types. They will learn the purpose of resumes, gather and organize relevant resume content, and create master resume and cover letter templates. They will further learn how to customize their resumes and cover letters for specific jobs or job types and how to optimize their resumes using an online resume scanning tool.
Ethical Reasons for Maintaining Confidentiality
As the course is focused on resume optimization, it is likely that the learners are considering a new job at some point. It could be extremely problematic if their participation in the course was not kept confidential, especially to their current employers. This could cause issues with their job, confrontations with management or other employees, and an uncomfortable work environment.
When the learners submit assignments and projects within the course, they will be sharing a lot of personal information. This will include their address, phone number, e-mail, education, places and dates of employment, and so on. All this information, if left unprotected, could make the individual very vulnerable to hacking, phishing, and identity theft.
Legal Reasons for Maintaining Confidentiality
The financial information of learners must also be kept confidential for legal reasons. Students paying for courses must enter their payment information, such as debit cards, credit cards, checking accounts, or PayPal information. Breeches of this confidential information could be used to steal the identity of learners or for fraudulent spending on their accounts. The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards that all companies, regardless of size, must adhere to when accepting, processing, and transmitting credit card information (ControlScan, n.d.). Ensuring PCI compliance is not required under federal law, but several states directly reference in in their laws, such as Nevada (Justia Law, n.d.).
Calonia, J. (2019, August 21). How to avoid plagiarism. Grammarly.
ControlScan. (n.d.). PCI compliance guide frequently asked questions: PCI DSS FAQs. PCI Compliance Guide. https://www.pcicomplianceguide.org/faq
Forcepoint. (n.d.). What is spoofing? https://www.forcepoint.com/cyber-edu/spoofing
Kaspersky. (n.d.). Malware & computer virus facts & FAQs. https://www.kaspersky.com/resource-center/threats/computer-viruses-and-malware-facts-and-faqs
McAfee. (2020, May 19). Protect yourself against phishing scams with these security tips. https://www.mcafee.com/blogs/consumer/consumer-threat-notices/protect-yourself-against-phishing-scams-with-these-security-tips
Nichols, J. (2019, April 9). 5 tips for keeping client data secure. Zegal. https://zegal.com/blog/post/5-tips-for-keeping-client-data-secure
NRS 603A.215 – Security measures for data collector that accepts payment card; use of encryption; liability for damages; applicability. Justia Law. (n.d.). https://law.justia.com/codes/nevada/2013/chapter-603a/statute-603a.215
Zook, C. (2019, December 10). What is digital citizenship & how do you teach it? Applied Educational Systems. https://www.aeseducation.com/blog/what-is-digital-citizenship