Resources for Teachers - Privacy

On The Loose: A Guide to Life Online For Post-Secondary Students

On the Loose: A Guide to Online Life for Post-Secondary Students supports young adults who are experiencing both new freedoms and challenges in their post- secondary life.

The Privacy Dilemma

In this lesson students learn the ways that the apps they use are designed to encourage them to share more information—both with other users and with the apps themselves. They are then introduced to the idea of persuasive design or “dark patterns” and investigate whether these are used to make it more difficult to opt out of data collection on popular apps. Finally, the class creates a “rogues’ gallery” to help them identify dark patterns when they encounter them.

The Invisible Machine: Big Data and You

In this lesson, students examine a fictional social network profile to learn how online platforms collect data about their users. They then read an article that explains how platforms use this data and explores some of the issues this raises. Finally, they create a mind map of their own online data profile and reflect on how the data they post may be collected and used by others.

Privacy Rights of Children and Teens

In this lesson, students are introduced to the privacy principles that inform the Alberta and BC Personal Information Protection Acts, Québec’s An Act Respecting the Protection of Personal Information in the Private Sector and the students’ federal Personal Information Protection and Electronic Documents Act (PIPEDA) relating to personal information collection online. They learn ways to find out what personal information may or has been collected by platforms that they use, how to limit data collection about themselves, and the various forms of recourse that are available to them if they feel an organization is not respecting their rights.

Privacy Pursuit: My Privacy, Your Privacy

In this lesson, students start by considering the permanence of online content. They review privacy strategies and privacy risks and analyze how likely and severe different privacy risks are. They then consider how their actions and decisions can affect others’ privacy and develop a list of “Dos and Don’ts” for managing both their own and others’ privacy.