Privacy
Cyber Choices is an interactive game designed to help students in grades 3 to 5 develop the skills and habits they need to make safe and responsible choices online. Cyber Choices lets students explore four different stories that cover key issues such as making good choices about their own and others’ personal information, dealing with cyberbullying (as both a target and a witness) and managing online conflict.
If you are a parent and you’ve been thinking of starting a blog, writing for parenting magazines, or becoming a social media influencer in the parent sphere, keep reading.
Guest blog by Patricia Kosseim, Information and Privacy Commissioner of Ontario
Whether it’s a video doorbell, a speaker with a built-in voice assistant, or even “smart socks” for your baby, these things all have one thing in common: they collect information about you and your family.
How much information they collect, though, is at least partially up to you. Here are some steps you can take to manage your privacy when using smart devices.
In this lesson, students draw connections between their existing concepts of privacy and how it applies to the internet and networked devices, then learn essential vocabulary relating to privacy. They then consider some scenarios in which children encounter privacy risks and draw on those to develop a list of “dos” and “don’ts” for using networked devices.
In this lesson, students review what the word “privacy” means in an online context and learn key privacy-related vocabulary. They explore different privacy risks and then learn practical techniques and strategies to manage and protect their privacy. Students then demonstrate their understanding of these strategies by illustrating them. Finally, students revisit material from earlier in the lesson and consider how their actions might put other people’s privacy at risk.
In this lesson, students start by considering the permanence of online content. They review privacy strategies and privacy risks and analyze how likely and severe different privacy risks are. They then consider how their actions and decisions can affect others’ privacy and develop a list of “Dos and Don’ts” for managing both their own and others’ privacy.