Privateness Pursuit: Shielding Your Privateness

[ad_1]

Grades: 4-5

Period: 1 ½ to 2 hours

About the Writer: Matthew Johnson, Director of Education, MediaSmarts

This lesson plan was made by MediaSmarts for the Information and Privacy Commissioner of Ontario, to be applied with the IPC’s Privacy Pursuit! activity booklet.

This lesson is component of USE, UNDERSTAND & ENGAGE: A Digital Media Literacy Framework for Canadian Educational facilities.

Overview

In this lesson, college students evaluation what the term “privacy” suggests in an on line context and study vital privacy-similar vocabulary. They investigate unique privateness dangers and then discover useful methods and tactics to take care of and protect their privateness. Pupils then display their understanding of these procedures by illustrating them. Ultimately, college students revisit content from previously in the lesson and think about how their actions could possibly put other people’s privateness at risk.

Learning Outcomes

Students will have an understanding of the subsequent essential ideas/big ideas:

Digital media are networked

  • Products that are related to the internet send info to each other

Electronic media are shareable and persistent

  • After you publish anything it can remain on line or be shared with other people without end and can be copied, altered, and utilized in techniques you don’t like

Electronic media have unanticipated audiences

  • Matters that you do with products connected to the online may possibly be observed by people you do not know about

Interactions by electronic media can have a real impact

  • Our actions and conclusions online can have an affect on our and others’ privacy

Learners will discover the following essential domain knowledge:

Privateness and Security:

  • Critical vocabulary related to online privacy
  • Privacy threats include things like ripoffs, humiliation, hurting people’s feelings, cyberbullying and threats to property or personal safety
  • Using proactive actions to manage your privateness can restrict privacy risks
  • Be mindful what private data you share online
  • Privacy settings can regulate who sees what you post
  • Passwords are an critical tool to guard your privacy
  • Some web sites, applications and products and services should really be previewed by trusted older people, or not utilized by little ones at all
  • Generate pseudonymous usernames and avatars (i.e. types that mask your id) for online gaming
  • Trustworthy grownups are significant means for support-seeking prior to and following privateness risks occur
  • Do not click on on unidentified links or down load information from unknown senders

Ethics and Empathy:

  • What you do on the web can also have an impact on other people’s privacy

Students will understand how to:

  • Use: Deal with privateness risks by proactively using privacy strategies
  • Understand: Identify the privacy pitfalls of distinctive equipment, applications and online activities
  • Engage: Make good possibilities about others’ privacy

Personal Info Protection Competencies:

Personal Data:

  • I understand what is associated in the notion of personalized details, described as any data—whether or not it was made public—about an identifiable individual
  • I know and recognize the principle of pseudonymity and masking one’s identity
  • I can give illustrations of private data that can instantly establish folks (civil/household status, image of a student in the class, and many others.) and specialized data that can keep an eye on the activities of a man or woman and determine them (cookies, geolocation data, etc.)

Understanding the Digital Environment

  • I know what the online and its companies are (social networks, cell applications, the cloud, etc.)
  • I know the key IT pitfalls and the significance of digital safety and realize the want to ensure the physical and sensible safety of a digital environment.
  • I am thorough to only share the particular facts that is certainly necessary to register for a service
  • I know that there are methods to guard myself online

Running my Data

  • I know that, to use certain on the web expert services, my consent or consent of my mothers and fathers/legal guardians is required
  • I use strategies available to defend my personal data

This lesson and all affiliated paperwork (handouts, overheads, backgrounders) are obtainable in an uncomplicated-print, pdf kit version.

[ad_2]

Source website link