Privateness Pursuit: The Worth of Privacy

[ad_1]

Grades: 6-7

Duration: 1 to 1 ½ hours

About the Author: Matthew Johnson, Director of Education, MediaSmarts

This lesson program was made by MediaSmarts for the Facts and Privateness Commissioner of Ontario, to be used with the IPC’s Privacy Pursuit! activity booklet.

This lesson is portion of USE, UNDERSTAND & ENGAGE: A Digital Media Literacy Framework for Canadian Educational facilities.

Overview

In this lesson, pupils study how their personalized details is important to how most of the “free” applications and platforms they use make dollars. They find out sensible approaches and applications for handling their privacy and program how these can be made use of to restrict what audiences have accessibility to their personal information.

Learning Outcomes

College students will comprehend the next essential concepts/big ideas:

Media have commercial considerations

  • Media will work these as applications and websites that look to be free of charge are normally paid out for with your consideration, your personal information, or both

Electronic media are networked

  • Details on a connected community can achieve any portion of that network

Digital media are shareable and persistent

  • When you submit some thing it can remain on line or be shared for good and can be copied, altered, and used in techniques you don’t like

Digital media have unanticipated audiences

  • Issues you article on line – and info gathered about you – may be seen by individuals you didn’t expect and may perhaps not even know about

Students will master the next crucial domain knowledge:

Privateness and Security:

  • Privateness threats contain scams, humiliation, hurting people’s feelings, cyberbullying and threats to home or personal safety
  • Getting proactive measures to control your privateness can limit privacy risks
  • Be cautious what personal information and facts you share online
  • Privacy configurations can regulate who sees what you post
  • Passwords are an significant device to secure your privacy
  • Some web-sites, apps and solutions must be previewed by trusted adults, or not used by youngsters at all
  • Create pseudonymous usernames and avatars for online gaming
  • Dependable older people are crucial resources for assist-searching for before and right after privacy risks occur
  • Never click on unidentified one-way links or download files from unknown senders

Consumer Awareness

  • Most “free” apps make income from selling advertising, and in some scenarios by gathering and advertising personal information
  • Advertisers will pay more if ads are qualified to you using your personal information
  • Platforms also use your personalized details to display or recommend written content that will continue to keep you intrigued and viewing ads

Students will study how to:

  • Use: Regulate privateness threats by proactively using privacy strategies
  • Comprehend: Analyze the privateness pitfalls of diverse equipment, applications and online activities
  • Engage: Establish methods for restricting the influence of data collection on their online experience

Own Information Protection Competencies:

Personal Data:

  • I comprehend what is involved in the principle of particular facts, described as any data—whether or not it was produced public—about an identifiable individual
  • I know and realize the strategy of pseudonymity and masking one’s identity
  • I can give illustrations of personal information that can specifically discover individuals (civil/family members position, image of a college student in the class, and many others.) and technological data that can monitor the activities of a human being and recognize them (cookies, geolocation knowledge, etc.)

Understanding the Digital Environment

  • I know what the online and its expert services are (social networks, cellular apps, the cloud, etc.)
  • I know the essential IT threats I know digital security is important and fully grasp the want to ensure the actual physical and logical stability of a digital environment.
  • I am very careful to only share the own data that is certainly vital to sign up for a service
  • I know that there are ways to protect myself online
  • I evaluate my techniques and build difficulty-fixing and discovering reflexes— namely about security—by identifying methods (consumer communities and forums, tutorials, etc.)
  • I know who the important participant groups in the electronic financial state are (e.g., ISPs, assistance suppliers, developers, curators, etc.)
  • I comprehend the methods utilised to market products and solutions and present free companies (loyalty cards, targeted advertising and marketing through cookies, setting up user accounts, subscribing to newsletters, and so forth.), for the function of establishing personalised user profiles
  • I can give illustrations of digital companies whose economic product requires — or does not entail — the selection of personal data

Running my Data

  • I know that I can take care of the configurations of the on the net applications and services that I use.
  • I know that, to use selected on the internet products and services, my consent  or consent of my dad and mom/lawful guardians is required
  • I use procedures out there to secure my personal data

This lesson and all associated paperwork (handouts, overheads, backgrounders) are accessible in an uncomplicated-print, pdf kit version.

[ad_2]

Source link