In this lesson, students examine a fictional social network profile to learn how online platforms collect data about their users. They then read an article that explains how platforms use this data and explores some of the issues this raises. Finally, they create a mind map of their own online data profile and reflect on how the data they post may be collected and used by others.
Privacy
I read an interesting Facebook post the other day, written by a teenaged girl. She said quite firmly that it was important for parents to not have their children’s passwords, for their phone or social media accounts. She talked about building trust and how insisting on knowing your kids’ passwords is the first step to them sneaking around online and getting involved in things you wish they wouldn’t.
I admit I was hoping to never get an email like this from the school:
“Some students in your child’s class have been involved in inappropriate online behaviour. Our Student Resource Officer will be doing a presentation on cyberbullying and leading a discussion about responsible actions on the internet. Please speak to your child about his/her activity online.”
Recently, my nephew, age 12, received a letter in the mail. It was addressed to him personally, by name. Inside was a photocopied article about the powers of a new virility medicine, complete with the usual graphic promises for pleasuring the ladies. The article mentioned a specific “doctor” by name, but other than that, there was no contact information or order form or any other action request. It appeared to just be spam but in paper form.
My three kids all know the password to my phone.
It’s because I rely on them to play secretary for me when I’m driving. If the phone rings or there is a bing of a text, 99% of the time it’s a member of my immediate family trying to get in touch with something relatively pressing.
In this lesson, students watch a short video that compares getting rid of personal information online to getting toothpaste back into a tube. After a short discussion of how visual analogies like this work, students discuss the meaning of the video (that information online is permanent.) They then read a series of short scenarios that help them identify four further principles of information online: that it can be copied, that it can be seen by unintended audiences, that it can be seen by larger audiences than intended, and that it becomes searchable. Finally, students create a simple animation that illustrates one of these principles.
In this lesson, students are introduced to the idea that privacy is a fundamental human right and that their personal information is valuable. The lesson focuses on the “economics” of personal information and that most "free" apps and online services make some or all of their revenue by collecting (and in some cases reselling) users' personal information. Students will watch a video that illustrates the idea that they may be paying with their privacy and then discuss some of the ramifications of this. They will learn about tools and techniques for minimizing the personal information they share and create a public service announcement that helps them and their peers "know the deal" about the value of privacy.
In this lesson, students are introduced to the privacy principles that inform the Alberta and BC Personal Information Protection Acts, Québec’s An Act Respecting the Protection of Personal Information in the Private Sector and the students’ federal Personal Information Protection and Electronic Documents Act (PIPEDA) relating to personal information collection online. They learn ways to find out what personal information may or has been collected by platforms that they use, how to limit data collection about themselves, and the various forms of recourse that are available to them if they feel an organization is not respecting their rights.
When we bought a cellphone for our son, we worried. We worried about how it would affect his brain to be hooked into social media all the time. We worried about online bullying and if he’d be respectful and responsible. We worried that he’d become a video screen monster who never looked up and only grunted in response to our questions about his day at the dinner table.
In this lesson, students explore the concepts relating to data collection that are introduced in the educational game Data Defenders. The lesson will underscore for students the idea that their data is valuable and worthy of careful management by analyzing the platforms, applications and websites they use through the lens of the five privacy tools (which address the five principal ways data is collected online) introduced in Data Defenders. Finally, students consider how to apply these tools to their own online activities.