Legislation
Internationally, a wide range of legislation has been developed in order to manage and protect individual’s personal information. Canada’s public and private sector are governed separately in terms of privacy protection.
Internationally, a wide range of legislation has been developed in order to manage and protect individual’s personal information. Canada’s public and private sector are governed separately in terms of privacy protection.
Verbal or emotional abuse is the most prevalent form of bullying online. Social bullying, another pervasive form – particularly with girls – includes social exclusion and spreading gossip and rumours.
In this lesson, students are introduced to the privacy principles that inform the Alberta and BC Personal Information Protection Acts, Québec’s An Act Respecting the Protection of Personal Information in the Private Sector and the students’ federal Personal Information Protection and Electronic Documents Act (PIPEDA) relating to personal information collection online. They learn ways to find out what personal information may or has been collected by platforms that they use, how to limit data collection about themselves, and the various forms of recourse that are available to them if they feel an organization is not respecting their rights.
The #ForYou discussion guide includes a gameplay overview, instructions on how to run the game as a workshop, a pre-brief and debrief before and after each round of the gameplay to introduce and discuss key ideas about algorithms, rules for quickplay, and a glossary of key terms.
When my kids saw the TikTok app icon on my phone, both of them had the same reaction: “WHAT? Why are you on TikTok?” While I thought it was because they wanted to tell me I was too old for the app, it was more that they really didn’t understand the appeal since they aren’t current users (for now).
In this lesson, students start by considering the permanence of online content. They review privacy strategies and privacy risks and analyze how likely and severe different privacy risks are. They then consider how their actions and decisions can affect others’ privacy and develop a list of “Dos and Don’ts” for managing both their own and others’ privacy.