Does It Matter Who Has Your Data? 1.Intro 2.Teach 1: Travel Safety Rules 3.Teach 2: How to Protect Your Data 4.Wrap-Up 5.Assessment 6.Extension Activity.

Slides:



Advertisements
Similar presentations
Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
Advertisements

Keep It Private VISD COMMON SENSE MEDIA CATEGORY: PRIVACY & SECURITY.
Common Sense Unit 2 – Lesson 3 Category: Internet Safety.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
SPYWARE  Do you know where your personal information is?
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Unit 1: Feeling on Display 1.Intro: 2.Teach 1: Video Viewing and DiscussionVideo Viewing and Discussion 3.Teach 2: Decoding the Double StandardDecoding.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
How It Applies In A Virtual World
Internet Safety Guidelines
Internet Safety Guidelines Elementary Information and graphics obtained from:
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
(Cross-Curricular Categories) Relationship & Communication
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
What is a Firewall Anyway?. What is a firewall? A firewall is a network security device positioned between two different networks, usually between an.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
INTERNET SAFETY Sergeant Karl Youngblood Barbara Burchard Information adapted from the
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
HAZLETON AREA HIGH SCHOOL Internet Safety 9 th -12 th Grade.
Computer Ethics.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Private and Personal Information Common Sense Unit l – Lesson 2 (Cross-Curricular Categories) Privacy and Security Information Literacy.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Ms. Park.  Q&A: What are some Internet safety tips you already know?
Unit 1: Turn Down the Dial on Cyberbullying and Online Cruelty 1.Intro:Intro: 2.Teach 1: Stacey’s StoryStacey’s Story 3.Teach 2: Dial DownDial Down 4.Wrap-UpWrap-Up.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Protecting Students on the School Computer Network Enfield High School.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
What is a Firewall Anyway? IT-IDT-6.4 Characterize the purposes, features & functions of network components:…firewalls..
Grades 4-6 Be SAFE Online! Ceres Unified School District.
Internet Safety Internet Safety LPM
Unit 1: Oops! I Broadcast it on the Network 1.Intro: Sharing Online 2.Teach 1: Explore the Benefits of Sharing 3.Teach 2: Examine the Risks of Over-sharing.
© Nichola Wilkin Ltd Online Safety Quiz Start Quiz.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
What’s the Big Deal about Internet Privacy Marrs Computer Club.
What’s the Big Deal About Internet Privacy?. Today’s Objective I can explain to Mr. Bates why companies collect information about visitors on their websites.
WALT use the internet to find information. WILF Use safe internet surfing skills How to narrow a search What to do if your find something inappropriate.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
1 Targets and Waste Social Profiling and Your Role as the Consumer.
3.02 Rememberl the rules of online safety. Slide 1 AGENDA – OCTOBER 10, 2011 Lesson 3.2 – Online Safety (Read the Lesson) CW #14a – Vocabulary Matrix CW.
Unit 1: Digital Life 102 Intro: Got Media Smarts?
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
What are the Pros and Cons of Advertising Via Newsletters?
Free But Effective Listing Building and Marketing Service How to easily and quickly grow a list of potential buyers and constantly send them marketing.
Your Choices, Your Future A simple guide. All applications for 6 th form places, college courses and apprenticeships will be made through one website.
What’s the Big Deal About Internet Privacy? 1.Intro: 2.Teach 1: What's Private? 3.Teach 2: Design a Privacy Policy 4.Wrap-Up 5.Assessment 6.Extension Activity.
"Our vision is to be earth's most customer-centric company; to build a place where people can come to find and discover anything they might want to buy.
Importance of Privacy Internet Safety
Keep it private.
Cyberbullying: Crossing the Line
STOP. THINK. CONNECT. Online Safety Quiz.
Choices 360 UNIV 1301.
Being Aware of What You Share
Internet Safety – Social Media
Does It Matter Who Has Your Data?
What’s the Big Deal About Internet Privacy?
Presentation transcript:

Does It Matter Who Has Your Data? 1.Intro 2.Teach 1: Travel Safety Rules 3.Teach 2: How to Protect Your Data 4.Wrap-Up 5.Assessment 6.Extension Activity Alignment with Common Core Standards: Source: Common Core State Standards Initiative ©2012 grades 9-10: RL.4, RL.10, RI.4, RI.7, RI.10, W.4, W.7, W.8, SL.1a-d, SL.2, SL.3, SL.5, L.6 grades 11-12: RL.4, RL.10, RI.4, RI.7, RI.10, W.4, W.7, W.8, SL.1a-d, SL.2, SL.3, SL.5, L.6

Introduction  What kinds of information about yourself do you share online?  What else do you do online that reflects who you are? What kind of searches online do you make? Key Vocabulary terms track and target.  When you input information into a website – such as profile information or search terms – you are telling that site something about yourselves.  The companies that run the sites track this data. They then use it to target students with specific content, especially advertising related to their interests.

Introduction  What do you think are companies’ goals in tracking your information?  Tracking allows companies to target them with personalized content, usually to tailor their experience on the website, or to deliver advertising aimed at them.  What do you think of tracking and targeting?  Some students may believe that this is an invasion of your privacy or makes you feel uncomfortable; others might find that personalized information is useful to you or makes you feel special.  Do you think it is okay for companies to collect information about you?  We will debate this issue later in the lesson.

Travel Safety Rules  Key Vocabulary term demographic: common categories of the population, such as age, gender, and race  Download and complete the “Same Search Student Handout” from the website (under Resources)  Paste your screen captures into your OneNote binder under Online Info > Same Search

Travel Safety Rules – “Same Search” Chart

How to Protect Your Data  You may sometimes want to share information on sites that you know and trust, while preventing other sites from getting you data.  The important thing is to make your own choices about how and where you share your personal data, and about how this data is used.  There are things that you can do to help protect your personal information.  You will be learning some strategies that can help you limit the data that companies collect.

How to Protect Your Data In Pairs, discuss each of the following tips for limiting data collection. Be able to explain how and why each item might affect how much personal information companies are able to acquire.  Do not provide addresses to mailing lists unless you need to do so.  Unsubscribe from listserves or websites that you do not regularly use.  Limit the number of times you click on ads, no matter what they are for.  Avoid “too good to be true” products, deals, and opportunities. Once you have confirmed your address, they are likely to sell your address to other companies.  Make sure you have antivirus software, and that it also protects against spyware, programs that secretly collect your data.  Disable Internet “cookies,” so that companies cannot put tracking devices on your computer. (Sites will not be able to remember your preferences as well this way, which is something to consider.)  Investigate computer applications that block pop-up ads.  Examine sites’ privacy policies before you reveal any information on the site; avoid using sites that will share your data with others.

Wrap-up (1 of 3)  What information about your demographic group and online behavior might websites collect about you?  Gender, age, ethnicity, location  Political or religious views  Likes and dislikes  Subjects or activities that interest you  Products you look at or buy online

Wrap-up (2 of 3)  What are the pros and cons of online tracking and targeting?  Tracking and targeting enable websites to provide search results and advertising that may be of greater interest to them.  On the other hand, these practices may limit the results they get when they perform online searches, and they may represent an invasion of privacy.

Wrap-up (3 of 3)  What are three ways you might help prevent companies from collecting information about you online that you may not want them to have?  Limit the amount of personal information you give out on websites  Disable cookies  Install antivirus software  Read site privacy policies

Assessment  Take “Assessment 2” (the link’s on the drop-down menu).  Make sure that you fill in your name and my address Answer the

Extension Activities  Read “The Hidden Secrets of Online Quizzes” article from the website (the link’s under Online Activities).  The link can be found on the website under Online Activities.