Please enable JavaScript to use CodeHS

KS 9-12: L2.IC.SLE.03

CodeHS Lessons

Evaluate the social and economic consequences of how law and ethics interact with digital aspects of privacy, data, property, information, and identity.

Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
7.4 Level 4: Data and Licenses
Standard
9.3 Internet Safety
9.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.6 Internet Safety
1.7 Privacy & Security
1.11 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
4.3 Hacking Ethics
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
12.3 Internet Safety
12.4 Privacy & Security
12.7 Hacking Ethics
Standard
11.4 Level 4: Data and Licenses
21.7 Hacking Ethics
21.4 Privacy & Security
21.3 Internet Safety
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
8.4 Privacy & Security
8.3 Internet Safety
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Internet Safety
1.4 Privacy & Security
1.7 Hacking Ethics
Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
2.1 Privacy & Security
2.6 Level 4: Data and Licenses
Standard
5.5 Internet Safety
5.6 Privacy & Security
5.13 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
5.7 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Internet Safety
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
19.4 Level 4: Data and Licenses
Standard
1.3 Internet Safety
2.4 Hacking Ethics
Standard
10.3 Internet Safety
10.4 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
14.4 Level 4: Data and Licenses
Standard
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
7.4 Level 4: Data and Licenses
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
3.5 Internet Safety
3.6 Privacy & Security
3.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security