Digital Media
Advanced
80 mins
Teacher/Student led
+65 XP
What you need:
Chromebook/Laptop/PC or iPad/Tablet

Data Privacy Deep Dive

In this lesson, you'll explore the essentials of protecting your personal information online. Start by reflecting on what you've shared digitally, understand key privacy concepts, and engage in practical activities to identify risks and create a plan to safeguard your data.
Learning Goals Learning Outcomes Teacher Notes

Teacher Class Feed

Load previous activity

    1 - Introduction

    In our increasingly digital world, where we share so much of our lives online through social media, games, and apps, it's essential to understand data privacy. Data privacy means having control over your personal information – like your name, location, photos, and even your opinions – and deciding who can access it and how it's used. This protects you from risks such as unwanted attention, identity theft, or companies using your data without permission. As a young person navigating the online space, learning about data privacy empowers you to make safer choices and stay in control of your digital footprint.

    Before we explore more about data privacy, we'll start with a reflective exercise. This will help you think about your own online behaviours and connect personally with why privacy matters.

    Task Instructions

    In your notebook or a digital document, follow these steps to complete the activity:

    1. List at least five pieces of personal information that you have shared online. Think about details like your full name, age, current location, photographs, or opinions on platforms such as social media, apps, games, or educational tools.
    2. For each item on your list, note where you shared it (e.g., on Instagram or a gaming app).

    For guidance, here are some examples:

    • Posting a photograph on Instagram.
    • Entering your date of birth in a gaming application.
    • Sharing your school email address on a learning platform.
    • Commenting on a post with your location details.
    • Uploading a video that reveals your home environment.
    Activity: Spend approximately 5 minutes compiling your list. Be honest, as this is just for your own reflection on what information might already be online. After making your list, take a moment to reflect by answering these questions: How might this shared information be used by others? What potential risks could arise from it?
    Important Note: It is essential to remember that information shared online can be difficult to retract completely. This exercise serves as a foundation for comprehending the significance of data privacy in protecting your personal details. 

    2 - Defining Data Privacy

    Introduction to Data Privacy

    Having reflected upon the personal information you have shared online in the previous step, it is now time to develop a clear and comprehensive understanding of the concept of data privacy. This foundational knowledge will enable you to make informed decisions about your online activities.

    Data privacy is defined as an individual's fundamental right to control the collection, utilisation, and dissemination of their personal information, especially in digital environments. This right ensures that your data is protected from misuse or unauthorised access, allowing you to maintain autonomy over your personal details.

    To explain further, data privacy involves several key elements:

    • Control over Collection: You decide what information is gathered about you, such as when an app requests access to your location or camera.
    • Control over Utilisation: You determine how your data is used, for example, whether it can be employed to personalise advertisements or shared for research purposes.
    • Control over Dissemination: You manage who receives your information, ensuring it is not shared with third parties without your explicit consent.

    Personal information protected under data privacy includes items such as your full name, date of birth, home address, email address, photographs, location data, browsing history, and even your preferences or opinions expressed online. For instance, when you sign up for a social media account, data privacy principles require the platform to obtain your permission before using your details for targeted marketing or sharing them with other companies. This protection is vital to prevent risks like identity theft, cyberbullying, or unauthorised surveillance, which could compromise your safety and well-being.

    In essence, data privacy empowers you to navigate the digital world with confidence, knowing that you have the authority to safeguard your information. It promotes a balance between enjoying online services and maintaining personal security.

    Activity: Now, to reinforce your understanding, compose a concise summary of this definition in a single sentence within your notebook or a digital document. Incorporate what data privacy signifies to you on a personal level. For example: 'Data privacy represents my right to control how my personal information is handled online, which helps me feel secure and empowered when using apps and websites'. Allocate approximately 5 minutes to draft your summary sentence.
    Guidance: Reflect upon the reasons why exercising control over your data is essential for preserving your personal safety, autonomy, and trust in the digital realm.

    3 - Data Collection Brainstorm

    Exploring Methods of Data Collection

    In the digital landscape, websites and applications frequently gather extensive data about users, often in subtle ways that may go unnoticed. Understanding these methods is crucial for recognising potential privacy implications. This step involves a brainstorming exercise to identify and analyse how data is collected.

    To begin, reflect on common techniques employed by online platforms. For instance, data collection can occur through tracking your geographical location via your device's GPS, utilising cookies to monitor your browsing patterns, recording interactions such as likes and comments on social media, logging purchase histories in e-commerce sites, or capturing audio inputs from voice-activated assistants.

    Follow these steps to complete the brainstorming exercise:

    1. In your notebook or a digital document, compile a list of at least five distinct methods by which websites or applications collect user data.
    2. For each method on your list, provide a brief explanation of how it works and note potential reasons why companies might seek this information (for example, to deliver personalised advertisements or improve user experience).
    3. Expand your list by incorporating additional methods you can think of, such as accessing your device's camera, analysing search history, or monitoring app usage patterns.
    Ensure each entry includes the method, a short description, and the possible motivations behind the data collection. This exercise will enhance your awareness of data practices.

    If you need inspiration, click the button below to reveal some examples.

    Activity: Dedicate approximately 10 minutes to brainstorming and listing at least five methods of data collection, including explanations and motivations for each.
    Key Takeaway: Gaining insight into data collection mechanisms empowers you to identify situations where your privacy could be compromised and to make more informed decisions online.

    4 - Case Study

    Exploring a Real-World Example of Data Privacy Risks

    In this step, we will examine a significant real-world incident to understand the potential dangers associated with inadequate data privacy practices. By analysing this case, you will gain insights into how personal information can be mishandled and the broader implications for individuals and society.

    Case Study: The 2018 Facebook-Cambridge Analytica Scandal

    In 2018, a major data privacy scandal involving the social media platform Facebook and a company named Cambridge Analytica came to light. Cambridge Analytica, a political consulting firm, gained access to the personal data of approximately 87 million Facebook users without their explicit knowledge or full consent. This data was collected through a seemingly innocent personality quiz app on Facebook, which not only gathered information from users who took the quiz but also from their friends' profiles.

    The collected data included details such as users' likes, shares, friend connections, and even private messages in some cases. Cambridge Analytica used this information to build detailed psychological profiles of individuals. These profiles were then employed to create highly targeted political advertisements aimed at influencing voter behaviour during elections, including the 2016 US presidential election and the UK's Brexit referendum.

    Many affected users were unaware that their data had been harvested and shared, leading to widespread privacy violations. The scandal sparked global outrage, resulted in investigations by governments, and led to significant fines for Facebook. It highlighted how personal data could be exploited for manipulative purposes, eroding trust in online platforms.

    Reflection Questions

    To deepen your understanding, reflect on this case study by answering the following questions in your notebook or a digital document. Provide your responses in full sentences.

    1. What risks did this incident create for the affected users? (For example, consider possibilities such as manipulation of opinions, identity theft, or unauthorised use of personal information.)
    2. How did this scandal impact society as a whole? (For instance, think about effects like diminished trust in social media platforms or changes in public awareness about data privacy.)
    3. What actions could users take to avoid similar privacy issues in the future? (Suggestions might include reviewing app permissions or being cautious about third-party quizzes.)
    Activity: Dedicate approximately 10 minutes to reading the case study carefully and composing your answers to the reflection questions.
    Important Note: This example illustrates how even seemingly harmless online activities, such as sharing likes or participating in quizzes, can lead to the misuse of personal data. It underscores the importance of vigilance in protecting your digital information.

    5 - Red Flag Scenarios

    Identifying Red Flag Scenarios in Data Sharing

    In the digital world, not all forms of sharing personal information are safe. It is important to develop the skill of recognising potential risks associated with sharing data online. This ability helps you protect your privacy and avoid situations where your personal details could be misused. In this step, you will practise identifying 'red flags' by evaluating a series of scenarios. You will categorise each one as either 'Safe Sharing' or 'Risky Sharing'. For those you identify as risky, you will suggest a safer alternative action.

    Remember, a 'red flag' is any action that could potentially expose your identity, location, or other sensitive information to unauthorised individuals or lead to privacy breaches. By spotting these, you can make more informed decisions about what to share online.

    Risky Vs Safe Sharing

    Follow these steps in your notebook or a digital document:

    1. Review the five scenarios listed below.
    2. For each scenario, decide if it represents 'Safe Sharing' or 'Risky Sharing'.
    3. If you classify a scenario as 'Risky Sharing', propose one safer alternative action that could reduce the risk.

    Here are the scenarios:

    1. Posting your full name and school on a public gaming profile.
    2. Sharing a photo of your pet without location tags.
    3. Giving your home address in an app to enter a contest.
    4. Liking posts on a private social media account.
    5. Using voice chat in a game with strangers, revealing personal stories.

    Example: Scenario 1 – Risky Sharing; Safer action: Use a username or pseudonym instead of your real name to maintain anonymity.

    Once you have completed the task, you can check your answers against suggested responses by clicking the button below.

    Activity: Dedicate approximately 5-10 minutes to reviewing the scenarios, categorising them, and suggesting alternatives for the risky ones. This exercise will strengthen your ability to recognise privacy risks in everyday online activities.
    Key Tip: Consider whether the action could reveal identifiable information about you, such as your name, location, or personal habits. If it could, it is often a red flag and should be approached with caution.

    Unlock the Full Learning Experience

    Get ready to embark on an incredible learning journey! Get access to this lesson and hundreds more in our Digital Skills Curriculum.

    Copyright Notice
    This lesson is copyright of Coding Ireland 2017 - 2025. Unauthorised use, copying or distribution is not allowed.
    πŸͺ Our website uses cookies to make your browsing experience better. By using our website you agree to our use of cookies. Learn more