|
|
|
|
|
|
|
|
|
|
|
|
Privacy Protections for information in the public domain
|
|
|
that are based on the difficulty and expense of
|
|
|
collecting and manipulating information are
|
|
|
diminished
|
|
|
Data collected for one purpose is readily available and
|
|
|
can be used for other purposes
|
|
|
|
* |
Student computer use to “identify” student effort
|
|
|
Data collection can occur “invisibly”, without the
|
|
|
person’s knowledge
|
|
|
|
* |
Cookies, video cameras, web logs of pages visited, etc.
|