Instructional Video14:25
TED Talks

TED: How to practice safe sexting | Amy Adele Hasinoff

12th - Higher Ed
* Viewer discretion advised. This video includes discussion of mature topics and may be inappropriate for some audiences. Sexting, like anything that's fun, runs its risks -- but a serious violation of privacy shouldn't be one of them....
Instructional Video11:01
MinutePhysics

Protecting Privacy with MATH (Collab with the Census)

12th - Higher Ed
This video was made in collaboration with the US Census Bureau and fact-checked by Census Bureau scientists. Any opinions and errors are my own. For more information,
Instructional Video2:49
The Business Professor

Invasion of Privacy - Tort

Higher Ed
This Video Explains Invasion of Privacy - Tort
Instructional Video3:14
Curated Video

The Prime Number Code

6th - 12th
Why prime numbers are the building blocks of encryption, used for information security, in cash machines and to hide your identity online. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Instructional Video6:46
Curated Video

A Detailed Guide to the OWASP Top 10 - API9:2023 Improper Inventory Management

Higher Ed
In this session, we will address the challenges of Improper Inventory Management in API ecosystems and propose solutions for better management.
Instructional Video7:17
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Professional Communication, Part 2

Higher Ed
This video explains seeing the results in action.
<
br/>
This clip is from the chapter "Safety and Professionalism" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section introduces you to Safety and...
Instructional Video3:12
Curated Video

Unintended Consequences from Technology

3rd - Higher Ed
Unintended Consequences from Technology describes how the use of technology can have unintended consequences on society and the environment.
Instructional Video7:09
Seven Dimensions

Understanding Confidentiality in Human Resources

Higher Ed
This video discusses the importance of confidentiality in human resources and the challenges faced by HR professionals in maintaining it. It highlights the different types of information that should be kept confidential and the...
Instructional Video20:06
Institute for New Economic Thinking

Amir Herzberg: Cyber Security & Centralized Data, What Could Go Wrong?

Higher Ed
A global watchdog has sounded the alarm about the growing danger of cyber attacks, on financial markets, warning that firms and regulators around the world need to address the “uneven” response to the threat of online...
Instructional Video3:24
Curated Video

Internet Safety- Knock, Knock, Who's There?-1

K - 8th
This program helps children to understand they need to beware of engaging online with people you don't know or recognize. Through a series of short videos, viewers will learn to be cautious of online offers that are free, or seem too...
Instructional Video3:22
All In One Social Media

Google+ is DEAD - Google To Close Google Plus Social Network in 2019

Higher Ed
Google+ is DEAD - Google To Close Google Plus Social Network in 2019 // Google will be closing Google Plus, the company’s long-struggling answer to Facebook’s giant social network, after it discovered a security vulnerability that...
Instructional Video21:45
IDG TECHtalk

How the California Consumer Privacy Act (CCPA) will affect you and your business | TECH(talk)

Higher Ed
The California Consumer Privacy Act (CCPA) is, in some ways, similar to Europe's GDPR. This rule, which goes into effect in 2020, gives individual users more ownership over their own data. Users can even refuse to allow companies to sell...
Instructional Video3:06
The Business Professor

Invasion of Privacy - Tort

Higher Ed
This Video Explains Invasion of Privacy - Tort
Instructional Video3:37
Curated Video

Internet Safety- Keep Private Information Private

K - 8th
Through short live-action vignettes, viewers learn the importance of not posting private information to social media sights in order to keep you and your family safe from predators and scammers.
Instructional Video3:49
Mazz Media

Internet Safety- Keep Private Information Private

6th - 8th
Through short live-action vignettes, viewers learn the importance of not posting private information to social media sights in order to keep you and your family safe from predators and scammers.
News Clip8:48
Curated Video

ChatGPT and mental health

Higher Ed
Sophie Rottenberg died by suicide after ChatGPT sessions; her mother says the bot offered no “beneficial friction” to avert tragedy. (Scripps News)
News Clip3:07
Curated Video

Facebook Canada executive gets grilled by parliamentary committee

9th - Higher Ed
It was Facebook Canada's head of public policy Kevin Chan's turn to get grilled by a parliamentary committee — and he didn't get a much warmer welcome in Ottawa, than Mark Zuckerberg did in Washington. MPs took Chan and other executives...
News Clip9:19
Curated Video

Don't Touch My Data: What Does the Future of AI Regulation Look Like?

9th - Higher Ed
Matt Calkins, CEO of Appian, breaks down the recent bipartisan report on AI safety and shares thoughts on future privacy enhancements needed in the space.
News Clip2:31
Curated Video

Lawmakers scrutinize the privacy implications of selling genetic testing service 23andMe

Higher Ed
Lawmakers raised questions and concerns about the sale of genetic-testing company 23andMe during a hearing on Tuesday. (Scripps News)
News Clip12:24
Bloomberg

Senator Warren on Fed Policy, Banking Industry, Military

Higher Ed
US Senator Elizabeth Warren discusses Federal Reserve Chairman Jerome Powell, the banking industry and the readiness of the US military. She speaks exclusively on Bloomberg Television.
News Clip4:36
The Recount

Supreme Court Hears Challenge to Roe v. Wade

Higher Ed
A big day at the Supreme Court, a bombshell Trump revelation, and Twitter introduces new rules. Here are The Recount’s Top Stories for December 1, 2021.
News Clip0:53
The Recount

Twitter to Remove Images of People Posted Without Consent

Higher Ed
Twitter unveiled new rules that prohibit users from sharing images or videos of private individuals without their consent. How do they plan to enforce this? Your guess is as good as ours.
News Clip5:40
Bloomberg

Big Tech Should Welcome Regulation, Former FCC Chair Wheeler Says

Higher Ed
Feb.26 -- Former Federal Communications Commission Chairman Tom Wheeler discusses the tech regulation landscape and the global 5G rollout race with Bloomberg's Emily Chang on "Bloomberg Technology."