Privacy Pursuit: My Privacy, Your Privacy

[ad_1]

Grades: 7-8

Period: 1 to 1 ½ hours

About the Creator: Matthew Johnson, Director of Education, MediaSmarts

This lesson approach was produced by MediaSmarts for the Data and Privacy Commissioner of Ontario, to be utilised with the IPC’s Privateness Pursuit! activity booklet.

This lesson is section of USE, UNDERSTAND & ENGAGE: A Electronic Media Literacy Framework for Canadian Schools.

Overview

In this lesson, learners get started by looking at the permanence of online content material. They evaluation privacy methods and privateness threats and assess how very likely and serious distinct privateness risks are. They then take into account how their steps and selections can impact others’ privacy and acquire a listing of “Dos and Don’ts” for handling both equally their personal and others’ privacy.

Learning Outcomes

College students will fully grasp the adhering to key ideas/big ideas:

Digital media are networked

  • Information on a connected community can reach any part of that network

Electronic media are shareable and persistent

  • At the time you submit a little something it can keep on line or be shared endlessly and can be copied, altered, and applied in strategies you don’t like

Interactions via digital media can have a real impact

  • Our steps and choices online can influence our and others’ privacy

Digital media activities are formed by the equipment we use

  • Structure functions of apps and platforms can affect use to share more online

Pupils will study the subsequent critical domain knowledge:

Privateness and Security:

  • Privacy dangers involve frauds, embarrassment, hurting people’s emotions, cyberbullying and threats to home or personal safety
  • Getting proactive ways to take care of your privacy can limit privacy risks
  • Be thorough what personal information you share online
  • Privateness options can management who sees what you post
  • Passwords are an significant tool to protect your privacy
  • Trusted grownups are critical assets for help-trying to get just before and following privacy risks occur
  • Don’t click on not known inbound links or down load files from unknown senders
  • It’s significant to comprehend how Conditions of Services and Privateness Insurance policies affect your privacy when working with an application or service

Ethics and Empathy

  • What you do on-line can also have an effect on other people’s privacy

Reading Media

  • Style attributes of apps and platforms can influence consumers to share more online

College students will master how to:

  • Use: Manage privateness pitfalls by proactively utilizing privacy strategies
  • Recognize:
    • Evaluate the privateness risks of distinctive products, applications and online activities
    • Assess the structure capabilities of a media tool
  • Interact: Develop rules and rules for making great possibilities about others’ privacy

Individual Data Protection Competencies:

Personal Data:

  • I understand what is included in the strategy of personalized facts, described as any data—whether or not it was manufactured public—about an identifiable individual
  • I know and realize the notion of pseudonymity and masking one’s identity
  • I can give examples of personal data that can instantly recognize persons (civil standing, image of a pupil in the class, and many others.) and complex knowledge that can keep track of the things to do of a particular person and identify them (cookies, geolocation data, etc.)

Privateness, Civil Liberties and Safety of Personal Data

  • I fully grasp how my steps may influence the privacy of others
  • I understand how the defense of privateness is not just about everyone’s personal life, but can also be used in the general public space, specially on the internet

Comprehension the Digital Environment

  • I know what the net and its products and services are (social networks, mobile programs, the cloud, etc.)
  • I know the crucial IT risks I know the value of digital safety and realize the have to have to be certain the actual physical and reasonable security of a digital environment.
  • I know that there are ways to guard myself online

Managing my Data

  • I know that, to use sure online solutions, my consent of the consent of my parents/legal guardians is required
  • I use processes out there to secure my personal data

This lesson and all associated paperwork (handouts, overheads, backgrounders) are out there in an quick-print, pdf kit version.

[ad_2]

Supply website link