• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

Privacy and Security

Page history last edited by Patricia Bunch 6 years, 2 months ago

Use this Wiki to complete Privacy and Security! 

 

• I can discuss potential threats to privacy.
• I can discuss possible ways to protect my privacy.
• I can recognize both weak and strong passwords. 

 

 

1. Two Truths and a Lie!

 

A. I love skiing!

B. I went to Mexico for my honeymoon and climbed Chichen Itza!  

C. In high school, I got a D in Trigonometry! 

 

Which one is my lie?

 

Make up your own... TWO truths and ONE lie.


2. Social Smarts Group Discussion Topics

Read the graphic novel, Social Smarts: Privacy, The Internet and You, as a group.

Answer the questions you were assigned.  

 

· Group ADiscuss what steps you can take to make sure that you have control of your online information.

  1.  Why is it important to lock privacy settings and set strong passwords?
  2.  Who can access your personal information if you do not lock your privacy settings tight?
  3.  Why is it important to use different passwords for different online sites?
  4. Is it always possible to delete a picture or post, permanently, after you have put it online?

Group B:  Discuss how you can make sure that the information you post does not give the wrong impression of who you are in real life.

  1.  What sort of information is best left offline?
  2.  How can little details add up to something big?
  3.  How someone can figure out where you live from the information you are posting online. 
  4. Can posting where you are going to be at certain times turn into a safety issue? 

Group C: Discuss how you can learn about privacy risks of new technologies, such as online gaming devices, before you use them.  

  1.  Does every new kind of technology pose a privacy risk? 
  2. What are some good ways to figure out if or how a new technology can pose risks to your online privacy?

Group D    Discuss the importance of taking steps to protect your privacy on mobile devices.

  1.  If you lost your mobile device, today, and it had no password, what information would you be most worried about?
  2.  Are there any reasons why you would not put a password on your mobile device? 
  3. How much information could someone learn about you if you left your mobile phone on the bus and it was not protected 

 

 


 

3. Tracking Teresa!

Vocabulary:

   a. Personal Information - Personal information is information about an individual. It can include your name, social security number, birthday, e-mail address, and phone number.
   b. Identity - All of the factors that make up who you are. 
   c. Online Profile - An informal online summary of who you are.
   d. Security – Freedom from danger. Online, security refers to protecting one’s private/personal information. 

3. Tracking Teresa Video:

Watch the video below to answer the questions about 

 

  

4. Password Tips! 

 

Do's  Don'ts 

  DO share your password only with you parents.

  DO create passwords with at least eight characters.

  DO use combinations of letters, numbers, and symbols, which are harder to crack than just words.

  DO change your password regularly – at least every six months.

  DON’T give a password to anyone else – not even your friends.

  DON’T use passwords that are easy for people you know to guess, like your nickname or your pet’s name. 

  DON’T use any private identity information in your password.

  DON’T use a word in the dictionary as a password.

 

 

Use common sense! 

Know the kinds of personal identity information: 

Full (first and last) name

Email addres 

Passwords 

Credit card numbers 

Mother’s maiden name

Postal address 

Phone numbers 

Calling card numbers 

Social Security number 

5. Understanding Your Online Footprints

Use the Powerpoint to complete Cornell Notes

Make sure you fill in the headings!

Objective:

Students will be able to analyze potential online dangers in order to recognize safe and appropriate decisions when using social media.

Essential Question:

How can I protect my personal information online?

 

 

Group A:

·        Discuss what steps you can take to make sure that you have control of your online information.

o   Why is it important to lock privacy settings and set strong passwords?  

o   Who can access your personal information if you do not lock your privacy settings tight?

o   Why is it important to use different passwords for different online sites?

o   Is it always possible to delete a picture or post, permanently, after you have put it online?

Group B:

·        Discuss how you can make sure that the information you post does not give the wrong impression of who you are in real life.

o   What sort of information is best left offline?

o   How can little details add up to something big?

o   How someone can figure out where you live from the information you are posting online.

o   Can posting where you are going to be at certain times turn into a safety issue?

Group C:

·        Discuss how you can learn about privacy risks of new technologies, such as online gaming devices, before you use them.  

o   Does every new kind of technology pose a privacy risk?

o   What are some good ways to figure out if or how a new technology can pose risks to your online privacy?

Group D:

·        Discuss the importance of taking steps to protect your privacy on mobile devices.

o   If you lost your mobile device, today, and it had no password, what information would you be most worried about?

o   Are there any reasons why you would not put a password on your mobile device?

o   How much information could someone learn about you if you left your mobile phone on the bus and it was not protected?

Comments (0)

You don't have permission to comment on this page.