Students visualize the invisible trail of data they leave behind when using technology and learn how to protect their personal information.

Similar Lessons