Standard 3.4 | Criterion 11 - Model responsible use, including protection of digital identity & personal data.
Model and promote management of personal data and digital identity and protect student data privacy. (PSC-IT 3.4/ISTE-E 3d)
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------
To address Criterion 11, use the assignment developed in ITEC 7455 titled Digital Citizenship Project.
[Upload the assignment to a cloud-based folder called ITEC 7455 as you will need it later in the ITEC program.]
Criteria Focus
This criteria focuses on instructing learners to protect their personal data and manage their digital identity when online.
Model: Being transparent with how you protect your own digital identity and personal data.
Checklist Criteria
Write notes below on the contextualization of the artifact and a description of its implementation by addressing the criteria focus and checklist criteria above.
**Be sure to take pictures/capture evidence of you implementing the assignment noted here and put that evidence in the folder you created.**
Model and promote management of personal data and digital identity and protect student data privacy. (PSC-IT 3.4/ISTE-E 3d)
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------
To address Criterion 11, use the assignment developed in ITEC 7455 titled Digital Citizenship Project.
[Upload the assignment to a cloud-based folder called ITEC 7455 as you will need it later in the ITEC program.]
Criteria Focus
This criteria focuses on instructing learners to protect their personal data and manage their digital identity when online.
Model: Being transparent with how you protect your own digital identity and personal data.
Checklist Criteria
- My artifact specifically showcases the learning experiences I provide to learners on how to keep their digital identity and their personal data safe.
- I show how I model this in my own practice.
- If I am using a 3rd party lesson, I show how I customized and/or adapted it.
Write notes below on the contextualization of the artifact and a description of its implementation by addressing the criteria focus and checklist criteria above.
**Be sure to take pictures/capture evidence of you implementing the assignment noted here and put that evidence in the folder you created.**