Peer Review for material titled "Data Security"
User Rating for material titled "Data Security"
Member Comments for material titled "Data Security"
Bookmark Collections for material titled "Data Security"
Course ePortfolios for material titled "Data Security"
Learning Exercises for material titled "Data Security"
Accessibility Info for material titled "Data Security"
Please enter a Bookmark title
Please limit Bookmark title to 65 characters
Please enter a description
Please limit Bookmark title to 4000 characters
A Bookmark with this title already existed.
Please limit a note about this material to 2048 characters
Search all MERLOT
Select to go to your profile
Select to go to your workspace
Select to go to your Dashboard Report
Select to go to your Content Builder
Select to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
Select OK to launch help window
Cancel help


Advanced Search


Search > Material Results >

Data Security


Data Security

Logo for Data Security
Basic tips for protecting electronic data at work.
Material Type: Tutorial
Technical Format: HTML/Text
Date Added to MERLOT: April 26, 2012
Date Modified in MERLOT: August 11, 2015
Send email to
Submitter: C L


  • Reviewed by members of Editorial board for inclusion in MERLOT.
    Editor Review (not reviewed)
  • User review 5 average rating
  • User Rating: 5 user rating
  • Discussion (2 Comments)
  • Learning Exercises (none)
  • Bookmark Collections (1)
  • Course ePortfolios (none)
  • Accessibility Info (none)

  • Rate this material
  • Create a learning exercise
  • Add accessibility information
  • Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
    Name the Bookmark Collection to represent the materials you will add
    Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
    Edit the information about the material in this {0}
    Submitting Bookmarks...


Primary Audience: College General Ed, Professional
Mobile Compatibility: Not specified at this time
Technical Requirements: PC, Internet Connection, PowerPoint
Language: English
Material Version: 1.0
Cost Involved: unsure
Source Code Available: unsure
Accessiblity Information Available: unsure
Creative Commons: unsure


QR Code for this Page

Users who viewed this material also viewed...


Discussion for Data Security

Log in to participate in the discussions or Sign up if you are not already a MERLOT member.

Return to Top of Page
Avatar for Darren Hood
3 years ago

Darren Hood (Student)

Awesome presentation. Great use of Power Point. In addition to providing an indication of the file's size when downloading, the only way to improve the course would be to add sound. Otherwise, this is a fantastic presentation. I learned something about how to better construct more secure passwords.

Total time: 25-30 minutes

Avatar for Guy Larcom
3 years ago

Guy Larcom (Content Developer/Author)

Cory, this is an excellent StAIR. Leaners go through multiple levels of direct instruction, interactive learning and assessment. The format is a superb example of instructional design principles at work.

I love the interactive email activity. I think you keep the learners engaged throughout the entire demonstraction with things like that.

The pacing of this was great. Assessments came at great intervals, which keeps the student from forgetting or feeling overwhelmed. I also like that when a wrong answer is clicked the student is redirected to the content for review.

I think one thing that may help this StAIR is to have audio, perhaps optional audio. 

Technical Remarks:

I noticed just two technical problems:

The animations on slide 18 did not play. So I had to leave the presentation in order to move on, and I missed that content.

The email activity, where the user clicks on each email and is given a reason to open or not, looped and I had to leave the presentation and reenter at the next slide. 

Those are all the problems I noticed!

Time spent reviewing site: 30 minutes