Resources for Teachers - Privacy

Pay For Play

In this lesson, students discuss their experiences playing free online games and then learn the costs of these “free” games in the form of paying with money, sharing personal information or providing attention to advertising or branded content. Students then learn a variety of techniques for mitigating the risks and drawbacks of online games and communicate their learning by describing one of these techniques in video-game terms.

Privacy Pursuit: The Value of Privacy

In this lesson, students learn how their personal information is key to how most of the “free” apps and platforms they use make money. They learn practical strategies and tools for managing their privacy and plan how these can be used to limit what audiences have access to their personal information.

The Invisible Machine: Big Data and You

In this lesson, students examine a fictional social network profile to learn how online platforms collect data about their users. They then read an article that explains how platforms use this data and explores some of the issues this raises. Finally, they create a mind map of their own online data profile and reflect on how the data they post may be collected and used by others.

Privacy Pursuit: Protecting Your Privacy

In this lesson, students review what the word “privacy” means in an online context and learn key privacy-related vocabulary. They explore different privacy risks and then learn practical techniques and strategies to manage and protect their privacy. Students then demonstrate their understanding of these strategies by illustrating them. Finally, students revisit material from earlier in the lesson and consider how their actions might put other people’s privacy at risk.

Privacy Pursuit: My Privacy, Your Privacy

In this lesson, students start by considering the permanence of online content. They review privacy strategies and privacy risks and analyze how likely and severe different privacy risks are. They then consider how their actions and decisions can affect others’ privacy and develop a list of “Dos and Don’ts” for managing both their own and others’ privacy.