Privateness Pursuit: Protecting Your Privateness

Privateness Pursuit: Protecting Your Privateness

[ad_1]

Grades: 4-5

Length: 1 ½ to 2 hours

About the Writer: Matthew Johnson, Director of Education, MediaSmarts

This lesson program was designed by MediaSmarts for the Information and facts and Privateness Commissioner of Ontario, to be made use of with the IPC’s Privateness Pursuit! activity booklet.

This lesson is aspect of USE, UNDERSTAND & ENGAGE: A Digital Media Literacy Framework for Canadian Educational institutions.

Overview

In this lesson, college students critique what the word “privacy” signifies in an on the internet context and find out crucial privateness-relevant vocabulary. They check out various privacy risks and then understand realistic procedures and methods to regulate and shield their privateness. Students then show their knowledge of these tactics by illustrating them. Ultimately, college students revisit substance from earlier in the lesson and take into consideration how their steps might set other people’s privacy at risk.

Learning Outcomes

Students will fully grasp the subsequent critical concepts/big ideas:

Electronic media are networked

  • Units that are related to the online send information and facts to each other

Electronic media are shareable and persistent

  • The moment you submit a little something it can keep on the net or be shared with other folks for good and can be copied, altered, and utilized in techniques you don’t like

Electronic media have unanticipated audiences

  • Items that you do with products related to the net may possibly be witnessed by people today you never know about

Interactions via digital media can have a real impact

  • Our actions and decisions on the web can impact our and others’ privacy

College students will learn the next vital domain knowledge:

Privacy and Security:

  • Critical vocabulary associated to online privacy
  • Privateness dangers incorporate frauds, embarrassment, hurting people’s inner thoughts, cyberbullying and threats to home or personal safety
  • Getting proactive ways to regulate your privacy can restrict privacy risks
  • Be thorough what individual information you share online
  • Privateness configurations can command who sees what you post
  • Passwords are an vital resource to guard your privacy
  • Some sites, apps and solutions need to be previewed by trusted grownups, or not utilized by small children at all
  • Make pseudonymous usernames and avatars (i.e. types that mask your id) for online gaming
  • Trusted grown ups are crucial resources for assistance-trying to find in advance of and immediately after privacy risks occur
  • Do not simply click on mysterious links or obtain files from unknown senders

Ethics and Empathy:

  • What you do online can also affect other people’s privacy

Learners will learn how to:

  • Use: Regulate privateness risks by proactively employing privacy strategies
  • Recognize: Determine the privacy threats of distinctive equipment, applications and online activities
  • Engage: Make great alternatives about others’ privacy

Personal Info Protection Competencies:

Personal Data:

  • I recognize what is associated in the thought of private information, defined as any data—whether or not it was made public—about an identifiable individual
  • I know and recognize the strategy of pseudonymity and masking one’s identity
  • I can give examples of individual details that can directly establish folks (civil/family members standing, image of a scholar in the class, and so forth.) and complex details that can monitor the activities of a man or woman and recognize them (cookies, geolocation knowledge, etc.)

Knowledge the Digital Environment

  • I know what the world wide web and its solutions are (social networks, cellular apps, the cloud, etc.)
  • I know the essential IT risks and the importance of electronic protection and recognize the need to assure the bodily and reasonable stability of a digital environment.
  • I am watchful to only share the individual data that is definitely important to sign up for a service
  • I know that there are ways to secure myself online

Managing my Data

  • I know that, to use specific on line solutions, my consent or consent of my dad and mom/lawful guardians is required
  • I use methods available to guard my personal data

This lesson and all linked documents (handouts, overheads, backgrounders) are obtainable in an uncomplicated-print, pdf kit version.

[ad_2]

Supply url