Career and Technical Education (2022) Grade(s): 10-12 - Information Technology
CTE22.IT.C3.16
Describe the consequences of applying security protocols related to Internet privacy and sensitive data.
Describe the consequences of applying security protocols related to Internet privacy and sensitive data.
COS Examples
Examples: avoiding reputation damage, identity theft, IP theft, and fines; preventing privilege escalation, public disclosures, and data breaches