Please enable JavaScript to use CodeHS

PA 3A: 3A-IC-29

CodeHS Lessons

Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.

2.2 What is Cybersecurity?
2.2 What is Cybersecurity?
2.3 Impact of Cybersecurity
2.3 Impact of Cybersecurity
2.4 The CIA Triad
2.4 The CIA Triad
3.1 Digital Footprint and Reputation
3.1 Digital Footprint and Reputation
3.3 Internet Safety
3.3 Internet Safety
3.4 Privacy & Security
3.4 Privacy & Security
3.8 Project: Public Service Announcement
3.8 Project: Public Service Announcement
4.2 History of Cryptography
4.2 History of Cryptography
4.10 Project: Classic Cipher Newscast
4.10 Project: Classic Cipher Newscast
6.9 Common Security Problems
6.10 SQL Injection Overview
6.11 Types of SQLi and Prevention
6.12 Cross-site Scripting
10.1 Project: Security Assessment Report
7.8 Impact of the Internet
7.9 Network Attacks
7.11 Project: Secure the Company's Network
6.9 Common Security Problems
6.10 SQL Injection Overview
6.11 Types of SQLi and Prevention
6.12 Cross-site Scripting
10.1 Project: Security Assessment Report
7.8 Impact of the Internet
7.9 Network Attacks
7.11 Project: Secure the Company's Network
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.2 History of Cryptography
5.1 Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
6.9 Common Security Problems
6.9 Common Security Problems
6.10 SQL Injection Overview
6.10 SQL Injection Overview
6.11 Types of SQLi and Prevention
6.11 Types of SQLi and Prevention
6.12 Cross-site Scripting
6.12 Cross-site Scripting
7.8 Impact of the Internet
7.8 Impact of the Internet
7.9 Network Attacks
7.9 Network Attacks
8.1 Project: Secure the Company's Network
8.1 Project: Secure the Company's Network
11.1 Project: Security Assessment Report
11.1 Project: Security Assessment Report
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
13.8 The CIA Triad
13.7 Network Attacks
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
13.8 The CIA Triad
13.7 Network Attacks
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Privacy & Security
1.3 Privacy & Security
9.1 Digital Footprint and Reputation
9.1 Digital Footprint and Reputation
9.3 Internet Safety
9.3 Internet Safety
9.4 Privacy & Security
9.4 Privacy & Security
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
15.4 The CIA Triad
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
15.4 The CIA Triad
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
10.1 Digital Footprint and Reputation
10.1 Digital Footprint and Reputation
10.3 Internet Safety
10.3 Internet Safety
10.4 Privacy & Security
10.4 Privacy & Security
10.7 Project: Public Service Announcement
10.7 Project: Public Service Announcement
14.2 What is Cybersecurity?
14.3 Impact of Cybersecurity
14.4 The CIA Triad
14.2 What is Cybersecurity?
14.3 Impact of Cybersecurity
14.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
8.4 The CIA Triad
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
8.4 The CIA Triad
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
2.2 History of Cryptography
2.2 History of Cryptography
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.3 What is Cybersecurity?
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
1.4 Impact of Cybersecurity
1.5 The CIA Triad
1.5 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.2 History of Cryptography
7.6 Application Security
7.7 Browser Configuration
8.6 Common Security Problems
8.6 Common Security Problems
8.7 SQL Injection Overview
8.7 SQL Injection Overview
8.8 Types of SQLi and Prevention
8.8 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
10.10 Impact of the Internet
10.10 Impact of the Internet
13.2 Assessing Risks
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Common Security Problems
1.12 Common Security Problems
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
8.7 Network Attacks
8.7 Network Attacks
21.2 History of Cryptography
21.10 Project: Classic Cipher Newscast
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
21.2 History of Cryptography
21.10 Project: Classic Cipher Newscast
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.6 Application Security
4.7 Browser Configuration
5.10 Common Security Problems
5.10 Common Security Problems
5.11 SQL Injection Overview
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
8.2 History of Cryptography
8.2 History of Cryptography
9.10 Impact of the Internet
9.10 Impact of the Internet
13.2 Assessing Risks
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.2 History of Cryptography
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast
6.6 Application Security
6.7 Browser Configuration
9.9 Common Security Problems
9.9 Common Security Problems
9.10 SQL Injection Overview
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
10.1 Project: Security Assessment Report
12.2 Assessing Risks
21.1 Digital Footprint and Reputation
21.3 Internet Safety
21.4 Privacy & Security
22.1 Project: Public Service Announcement
24.10 Impact of the Internet
21.1 Digital Footprint and Reputation
21.3 Internet Safety
21.4 Privacy & Security
22.1 Project: Public Service Announcement
24.10 Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.4 Digital Footprint and Reputation
1.6 Internet Safety
1.6 Internet Safety
1.7 Privacy & Security
1.7 Privacy & Security
1.10 Data Collection & Limitations
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
1.8 Application Security
2.7 Impact of the Internet
2.7 Impact of the Internet
4.1 What is Cybersecurity?
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.2 Impact of Cybersecurity
4.4 The CIA Triad
4.4 The CIA Triad
4.5 Privacy & Security
4.5 Privacy & Security
5.1 Project: Public Service Announcement
5.1 Project: Public Service Announcement
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.2 History of Cryptography
5.1 Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
6.6 Application Security
6.7 Browser Configuration
7.4 Common Security Problems
7.4 Common Security Problems
7.5 SQL Injection Overview
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
8.1 Project: Security Assessment Report
9.11 Impact of the Internet
9.11 Impact of the Internet
14.5 Cross-site Scripting
14.5 Cross-site Scripting
16.2 Assessing Risks
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
7.6 Application Security
7.7 Browser Configuration
8.9 Common Security Problems
8.9 Common Security Problems
8.10 SQL Injection Overview
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
10.11 Impact of the Internet
10.11 Impact of the Internet
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.5 Privacy & Security
1.5 Privacy & Security
12.1 Project: Public Service Announcement
12.1 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.8 Project: Public Service Announcement
4.8 Project: Public Service Announcement
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.8 Impact of the Internet
5.8 Impact of the Internet
5.9 Network Attacks
5.9 Network Attacks
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
5.7 Privacy & Security
5.7 Privacy & Security
5.5 Cross-site Scripting
5.5 Cross-site Scripting
8.2 Assessing Risks
1.6 Application Security
1.7 Browser Configuration
2.11 Impact of the Internet
2.11 Impact of the Internet
7.13 Ethical Issues Around Data Collection
4.1 Collecting and Storing Data
10.3 Data Collection & Limitations
16.3 Data Collection & Limitations
13.3 Data Collection & Limitations
13.3 Data Collection & Limitations
6.8 Browser Configuration
14.7 Ethical Issues Around Data Collection
7.8 Browser Configuration
13.7 Ethical Issues Around Data Collection
5.13 Ethical Issues Around Data Collection
7.7 Ethical Issues Around Data Collection