[ad_1]
Grades: 6-7
Length: 1 to 1 ½ hours
About the Author: Matthew Johnson, Director of Education, MediaSmarts
This lesson program was formulated by MediaSmarts for the Information and Privacy Commissioner of Ontario, to be utilized with the IPC’s Privateness Pursuit! activity booklet.
This lesson is element of USE, UNDERSTAND & ENGAGE: A Electronic Media Literacy Framework for Canadian Universities.
Overview
In this lesson, students discover how their own details is vital to how most of the “free” apps and platforms they use make dollars. They discover functional methods and resources for running their privateness and plan how these can be used to restrict what audiences have obtain to their personal information.
Learning Outcomes
Students will recognize the subsequent key principles/big ideas:
Media have commercial considerations
- Media performs this kind of as applications and sites that feel to be absolutely free are usually paid out for with your focus, your own data, or both
Electronic media are networked
- Data on a connected network can achieve any component of that network
Digital media are shareable and persistent
- After you post a thing it can stay on the web or be shared forever and can be copied, altered, and applied in approaches you don’t like
Electronic media have unanticipated audiences
- Items you put up on the internet – and information gathered about you – might be found by men and women you did not hope and may not even know about
Learners will discover the subsequent important domain knowledge:
Privateness and Security:
- Privacy challenges incorporate scams, humiliation, hurting people’s feelings, cyberbullying and threats to assets or personal safety
- Getting proactive actions to regulate your privateness can limit privacy risks
- Be very careful what private data you share online
- Privateness options can regulate who sees what you post
- Passwords are an important software to protect your privacy
- Some web sites, applications and companies should really be previewed by trustworthy adults, or not used by little ones at all
- Build pseudonymous usernames and avatars for online gaming
- Dependable grown ups are essential assets for enable-trying to get just before and soon after privateness risks occur
- Never simply click on mysterious back links or obtain information from unknown senders
Consumer Awareness
- Most “free” apps make revenue from advertising promotion, and in some circumstances by gathering and advertising personal information
- Advertisers will spend a lot more if adverts are qualified to you using your personal information
- Platforms also use your own information and facts to present or suggest material that will preserve you fascinated and viewing ads
Students will learn how to:
- Use: Handle privateness dangers by proactively employing privacy strategies
- Understand: Analyze the privacy dangers of distinct gadgets, apps and online activities
- Have interaction: Build procedures for limiting the influence of data assortment on their online experience
Individual Data Protection Competencies:
Personal Data:
- I realize what is associated in the concept of private info, defined as any data—whether or not it was built public—about an identifiable individual
- I know and realize the notion of pseudonymity and masking one’s identity
- I can give examples of private details that can instantly determine people (civil/spouse and children status, picture of a pupil in the class, etcetera.) and technical details that can keep track of the things to do of a human being and establish them (cookies, geolocation data, etc.)
Knowing the Digital Environment
- I know what the world wide web and its solutions are (social networks, cellular programs, the cloud, etc.)
- I know the crucial IT dangers I know electronic protection is important and understand the will need to make certain the bodily and logical stability of a digital environment.
- I am watchful to only share the personal info that is unquestionably required to sign-up for a service
- I know that there are techniques to shield myself online
- I evaluate my techniques and acquire dilemma-solving and discovering reflexes— specifically about security—by identifying sources (consumer communities and boards, tutorials, etc.)
- I know who the vital participant teams in the digital economic system are (e.g., ISPs, assistance providers, builders, curators, etc.)
- I recognize the programs utilized to sector products and solutions and give totally free companies (loyalty cards, qualified marketing by way of cookies, environment up user accounts, subscribing to newsletters, and many others.), for the reason of setting up individualized user profiles
- I can give illustrations of electronic providers whose financial product will involve — or does not require — the collection of personal data
Managing my Data
- I know that I can handle the configurations of the online programs and providers that I use.
- I know that, to use particular on the internet solutions, my consent or consent of my dad and mom/authorized guardians is required
- I use methods obtainable to defend my personal data
This lesson and all associated paperwork (handouts, overheads, backgrounders) are readily available in an easy-print, pdf kit version.
[ad_2]
Source backlink