Tags

    Capstone Email and Meeting Notes

    Comments

    Misc.
    An additional course of action that I could take to further increase my audience’s interest of action is to provide them with an interactive experience. I can distribute 8GB USB Drives to students and faculty containing my Skit, PSA, and a link to my article/blog, along with a free trial to a premium VPN.
    I have already completed most of my note collection/organization and able to start working on my media immediately.

    CyberGhost was always a solid VPN choice. It's strict no-logging policy and Romanian jurisdiction keep your information safe and secure. If provides all of the essential functions of a VPN with a great user experience. Plus, it's a leak-free system that works with Netflix, TOR, and torrenting services. Cyber Ghost is founded and located in Bucharest, Romania, a non-member of the 14-eyes jurisdiction, meaning your data (if they had any) wouldn’t be shared with intelligence agencies from other countries around the world.


    Some obscure methods of third party taking advantage of your information are: Buying and selling Credit/Debit Card info. People who buy those credit card information can then put your info a dummy card(fake card) and use that card to buy things.

    Information privacy law or data protection laws prohibit the disclosure or misuse of information about private individuals. Over 80 countries and independent territories, including nearly every country in Europe and many in Latin America and the Caribbean, Asia, and Africa, have now adopted comprehensive data protection laws.[1] The European Union has the General Data Protection Regulation[2], in force since May 25, 2018. The United States is notable for not having adopted a comprehensive information privacy law, but rather having adopted limited sectoral laws in some areas[citation needed].

    These laws are based on Fair Information Practice guidelines developed by the U.S. Department for Health, Education and Welfare (HEW), by a Special Advisory Committee on Automated Personal Data Systems, under the chairmanship of computer pioneer and privacy pioneer Willis H. Ware. The report submitted by the Chair to the HHS Secretary titled "Records, Computers and Rights of Citizens (07/01/1973)"[3][4], proposes universal principles for the privacy and protection of consumer and citizen data:

    For all data collected there should be a stated purpose.
    Information collected from an individual cannot be disclosed to other organizations or individuals unless specifically authorized by law or by consent of the individual
    Records kept on an individual should be accurate and up to date
    There should be mechanisms for individuals to review data about them, to ensure accuracy. This may include periodic reporting
    Data should be deleted when it is no longer needed for the stated purpose
    Transmission of personal information to locations where "equivalent" personal data protection cannot be assured is prohibited
    Some data is too sensitive to be collected, unless there are extreme circumstances (e.g., sexual orientation, religion)

    -----------------------------------------------------------------------------

    1. What is the cause and effect?
    2. What is driving this situation? Money? Something else?
    3. Wherever possible create a case study to contrast your topic

    Anson
    who is the target of your PSA and article?
    can you come up with three case studies around privacy: someone who does not care, someone who cares but is clueless, and someone who cares and takes steps to secure their work (e.g. using Signal for IM, and a trusted corporate VPN?)

    https://www.researchgate.net/publication/329116150_Privacy_Issues_and_Data_Protection_in_Big_Data_A_Case_Study_Analysis_under_GDPR - A big case study goes over the current state of the legal regulations and analyze different data protection and privacy-preserving techniques in the context of big data analysis by organizations. In addition, presenting and analyze two real-life research projects as case studies dealing with sensitive data and actions for complying with the data regulation laws.


    ----------------------------------------------------------------------


    Capstone Mentors: Protocols and Communication

    Guidelines For Internal and External Mentors


    HOW TO FIND POSSIBLE MENTORS

    The best approach is to cast a very wide net and tap all of your resources at once rather than

    exploring one possible lead at a time. Here are some ideas about where to look:

    ● Ask family members, teachers, classmates, and friends if they know anyone who might

    help you.

    ○ If you can get a referral or introduction to someone through a mutual friend or

    acquaintance, it’s often much easier to “get your foot in the door” than if you cold

    call or “cold email” them.

    ○ You sometimes need to follow a “bread crumb trail”, in which one possible

    contact leads you to another and then to another.


    ● Reach out to professionals and experts whose work has inspired you.

    ● Post what you’re looking for on social media, Reddit, web boards devoted to the topic,

    local Meetup groups, etc.

    ● Visit local businesses and organizations related to your topic.

    EMAIL PROTOCOLS AND TEMPLATE

    ● First a student must share who they want to connect with and the goals and purpose of

    the connection with Capstone Teacher and in turn Capstone Coordinator

    ○ This information will go into a spreadsheet for updating and ensuring that mentor

    burnout does not occur

    ○ The purpose is to determine if the student has done enough research, project

    management, and understanding of the area they are working in. This can be a

    mentor specific, meaning different mentors could be brought in at different

    stages.


    ● After receiving a go-ahead from the teacher the student crafts an email to the mentor

    ccing Capstone teacher and Capstone Coordinator. Student responds within two

    business days of return email clarifying next steps (ccing Capstone teacher and

    Capstone Coordinator).

    ○ Intro Email format:

    ■ Subject: Captures the what and who of the Capstone and student

    ■ First section: Purpose


    ● A sentence or two (max) on who the student is and what they are

    working on in the context of their senior Capstone, and most

    importantly their why behind the Capstone (Heart, Head, Hustle)


    ■ Second section: Clear Ask

    ● A sentence that asks the mentor for a meeting or further email

    exchange,

    ○ Set possible times, length, and reinforce the purpose of the

    conversation

    ■ Closing Sentence

    ● Thanking the mentor for their time and consideration and ending

    with a sign off (Mahalo; Warm regards; Cheers; etc.


    ■ Example:

    ● [Subject] Insight Around Retail Fashion In Hawai’i For an HPA

    High School Senior

    ● First section:

    Aloha e Ane,

    My name is Aaron Schorn and for my high school senior Capstone

    at HPA I am creating a line of handbags inspired by youth art

    [hyperlink to slide deck, website, and/or social media]. As an artist

    and budding entrepreneur who is passionate about my home in

    Hawai'i, storytelling through fashion and the evolution of Kealopiko

    has been a major inspiration for my own Capstone work this year.

    ● It would be wonderful to connect over the phone in the upcoming

    weeks and discuss how you created your brand and design

    library. I am free Mondays’ at 8:30 am, Tuesdays’ between 1-3

    pm, and Fridays’ between 9-11 am.

    ● Closing Sentence:

    Mahalo for inspiring me and others around the world, and for your

    possible time.

    Warm regards,

    Aaron Schorn

    HPA Student


    LIABILITY AND PARENT WAIVER FORMS

    ● Had been working with Erin Morgan, but have now transitioned into working with Mark

    Noetzel on a few blanket forms for work with mentors and off campus Capstone work.

    Should have documents by February 15.


    °Snap chat, facebook, instagram, we chat


    Focus on 4 age groups, older people, middle age, millennials, gen x and younger


    Explain beginning of capstone, shocking examples, explain how organizations use this info, personal info and demographic, then illegal


    Look for quote “If CIA asked for the same information from people that volunteered information to facebook, there would be a mass revolt”