SlideShare a Scribd company logo
1 of 29
Download to read offline
A Privacy Primer
For Grade 9 Health students
Presented by K. Covintree
Private
Personal
PRIVATE
Social Security Number (SSN)
Driver's license number
ID card number
Credit card numbers
Bank account numbers
Fingerprints
Medical records
PERSONAL
Address
Birth date
Birth place
Salary
Grades
It can be used to
• identify
• contact
• locate a specific
individual
It can be used in
conjunction with
other information
to identify a
specific individual.
What about your privacy online?
How private is your online life?
LET’S PLAY:
10 Steps to Privacy
Directions:
1. Players line up side
by side.
2. Listen to the
following
statements.
3. If the statement
applies to you, take
a step forward.
2. My online passwords are
 My birth-date
 My phone number
 My address
 Names of friends, family, pets
 All the same
 The word “password”
What does a STRONG password consist of?
Note:Without even logging
in, anyone can see the
information on this page.
Elements redacted are too
personally specific to share
when this presentation goes
online.
Images from Facebook and used with permission.
Note: Original images
covered over to protect
privacy of person(s)
presented. Insert your own
embarrassing pictures here.
Infographic authored by www.MyPermissions.com
Use a browser's
cookie notification
feature and don't
accept cookies
from places you
don't trust.
An adult you trust
Image by Dave Makes on flicker. Used with permission.
Determine which
information you want to
keep private.
Only you can decide
what pieces of
information you
actually care about
keeping private.
Take action to
protect that
information.
• Secure your devices so
they don’t get malware
• Personalize the privacy
settings on your accounts
• Use strong passwords
• Monitor your identity
regularly
How long does a browser keep your search information?
What does a strong password consist of?
What types of data do mobile apps collect?
Is it okay for my parents to read text messages?
What is one law that protects my privacy?
How does this relate to Health?
“Computer Security” on Consumer Information from the Federal
Trade Commission.
My Permissions Blog.
On Guard Online.
Privacy Rights Clearinghouse.
PrivacyTool Kit from the American Library Association(ALA).
“Programming Guide and Activities” for Choose PrivacyWeek
from ALA.
“Protecting Privacy Campaign” from UC Davis Information and
EducationalTechnology.
“What does privacy mean to you” from iKeepSafe.
Youth and Media Project from the University of St. Gallen and
the Berkman Center for Internet and Society.
All images from morguefile and MS Office unless otherwise
noted.
Thank you for viewing this Privacy Primer
forGrade 9 Health students.
Created by K. Covintree, Sept 2013

More Related Content

What's hot

Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world finalshanikosh
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullyingparulata
 
Is social media the new surveillance?
Is social media the new surveillance?Is social media the new surveillance?
Is social media the new surveillance?Derek Wilson Law
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 
Social media ppt
Social media pptSocial media ppt
Social media pptLeadMillion
 
Digital Identity
Digital IdentityDigital Identity
Digital IdentityAaron Wong
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social mediaAM Oh
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsDave Tinker, CFRE
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital IdentityDigital-identity
 

What's hot (12)

Social Networking
Social NetworkingSocial Networking
Social Networking
 
Cel1
Cel1Cel1
Cel1
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullying
 
Is social media the new surveillance?
Is social media the new surveillance?Is social media the new surveillance?
Is social media the new surveillance?
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Social media ppt
Social media pptSocial media ppt
Social media ppt
 
Digital Identity
Digital IdentityDigital Identity
Digital Identity
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for Parents
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 

Viewers also liked

Real Projects And Ahe June 2007 Ru
Real Projects And Ahe June 2007 RuReal Projects And Ahe June 2007 Ru
Real Projects And Ahe June 2007 RuSergey Dmitriev
 
Game|Changers at Stelka's Demo
Game|Changers at Stelka's DemoGame|Changers at Stelka's Demo
Game|Changers at Stelka's DemoSergey Dmitriev
 
Wiki-course 'An Introduction to the IT Industry' 2010
Wiki-course 'An Introduction to the IT Industry' 2010Wiki-course 'An Introduction to the IT Industry' 2010
Wiki-course 'An Introduction to the IT Industry' 2010Sergey Dmitriev
 
How To Facilitate Students Potential 2007
How To Facilitate Students Potential 2007How To Facilitate Students Potential 2007
How To Facilitate Students Potential 2007Sergey Dmitriev
 
Game|Changers 2012 на "Преподавании ИТ в России"
Game|Changers 2012 на "Преподавании ИТ в России"Game|Changers 2012 на "Преподавании ИТ в России"
Game|Changers 2012 на "Преподавании ИТ в России"Sergey Dmitriev
 
Understanding Wikis, Rev.
Understanding Wikis, Rev.Understanding Wikis, Rev.
Understanding Wikis, Rev.K Covintree
 
Webquest Collaboration
Webquest CollaborationWebquest Collaboration
Webquest CollaborationK Covintree
 

Viewers also liked (9)

Real Projects And Ahe June 2007 Ru
Real Projects And Ahe June 2007 RuReal Projects And Ahe June 2007 Ru
Real Projects And Ahe June 2007 Ru
 
Game|Changers at Stelka's Demo
Game|Changers at Stelka's DemoGame|Changers at Stelka's Demo
Game|Changers at Stelka's Demo
 
Award bookmarks
Award bookmarksAward bookmarks
Award bookmarks
 
Wiki-course 'An Introduction to the IT Industry' 2010
Wiki-course 'An Introduction to the IT Industry' 2010Wiki-course 'An Introduction to the IT Industry' 2010
Wiki-course 'An Introduction to the IT Industry' 2010
 
How To Facilitate Students Potential 2007
How To Facilitate Students Potential 2007How To Facilitate Students Potential 2007
How To Facilitate Students Potential 2007
 
Game|Changers 2012 на "Преподавании ИТ в России"
Game|Changers 2012 на "Преподавании ИТ в России"Game|Changers 2012 на "Преподавании ИТ в России"
Game|Changers 2012 на "Преподавании ИТ в России"
 
4th Place
4th Place4th Place
4th Place
 
Understanding Wikis, Rev.
Understanding Wikis, Rev.Understanding Wikis, Rev.
Understanding Wikis, Rev.
 
Webquest Collaboration
Webquest CollaborationWebquest Collaboration
Webquest Collaboration
 

Similar to A Privacy Primer

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxsadia456189
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1sabrinacotta
 
Your Online Identity: Discovering, Controlling, Managing (January 2016)
Your Online Identity: Discovering, Controlling, Managing (January 2016)Your Online Identity: Discovering, Controlling, Managing (January 2016)
Your Online Identity: Discovering, Controlling, Managing (January 2016)KR_Barker
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Onlinetomasztopa
 
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...m Habitat
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Themmilfamln
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1KR_Barker
 
Age verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solutionAge verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solutionAboul Ella Hassanien
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYgailmowal
 
Who is the digital you?
Who is the digital you?Who is the digital you?
Who is the digital you?Tony Fish
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Secure social networking
Secure social networkingSecure social networking
Secure social networkingOsaid To'meh
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 

Similar to A Privacy Primer (20)

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
Your Online Identity: Discovering, Controlling, Managing (January 2016)
Your Online Identity: Discovering, Controlling, Managing (January 2016)Your Online Identity: Discovering, Controlling, Managing (January 2016)
Your Online Identity: Discovering, Controlling, Managing (January 2016)
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Online
 
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1
 
Age verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solutionAge verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solution
 
Users guide
Users guideUsers guide
Users guide
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
Who is the digital you?
Who is the digital you?Who is the digital you?
Who is the digital you?
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 

More from K Covintree

Prescott Library US Review: Fall 2015
Prescott Library US Review: Fall 2015Prescott Library US Review: Fall 2015
Prescott Library US Review: Fall 2015K Covintree
 
Access NoodleTools through Google apps
Access NoodleTools through Google appsAccess NoodleTools through Google apps
Access NoodleTools through Google appsK Covintree
 
Upper School Annual Report SY1314
Upper School Annual Report SY1314Upper School Annual Report SY1314
Upper School Annual Report SY1314K Covintree
 
125 Books for 125 Years
125 Books for 125 Years125 Books for 125 Years
125 Books for 125 YearsK Covintree
 
What is Western Business Attire?
What is Western Business Attire?What is Western Business Attire?
What is Western Business Attire?K Covintree
 
Glogster for students
Glogster for studentsGlogster for students
Glogster for studentsK Covintree
 
Library life after HS
Library life after HSLibrary life after HS
Library life after HSK Covintree
 
Upper School Annual Report 2012-2013
Upper School Annual Report 2012-2013Upper School Annual Report 2012-2013
Upper School Annual Report 2012-2013K Covintree
 
Upper school annual rpt 1112
Upper school annual rpt 1112Upper school annual rpt 1112
Upper school annual rpt 1112K Covintree
 
Upper School Annual Report 2010-11
Upper School Annual Report 2010-11Upper School Annual Report 2010-11
Upper School Annual Report 2010-11K Covintree
 
Writing a Book Review, Revised ed.
Writing a Book Review, Revised ed.Writing a Book Review, Revised ed.
Writing a Book Review, Revised ed.K Covintree
 
Noodletools for students
Noodletools for studentsNoodletools for students
Noodletools for studentsK Covintree
 
January 18, 2012
January 18, 2012January 18, 2012
January 18, 2012K Covintree
 
Kindle consent form
Kindle consent formKindle consent form
Kindle consent formK Covintree
 
E reader checkout consent form
E reader checkout consent formE reader checkout consent form
E reader checkout consent formK Covintree
 
Keywords: Small but mightly
Keywords: Small but mightlyKeywords: Small but mightly
Keywords: Small but mightlyK Covintree
 
What is plagiarism?
What is plagiarism?What is plagiarism?
What is plagiarism?K Covintree
 
Social Networking
Social NetworkingSocial Networking
Social NetworkingK Covintree
 

More from K Covintree (20)

Prescott Library US Review: Fall 2015
Prescott Library US Review: Fall 2015Prescott Library US Review: Fall 2015
Prescott Library US Review: Fall 2015
 
Access NoodleTools through Google apps
Access NoodleTools through Google appsAccess NoodleTools through Google apps
Access NoodleTools through Google apps
 
National Parks
National ParksNational Parks
National Parks
 
Upper School Annual Report SY1314
Upper School Annual Report SY1314Upper School Annual Report SY1314
Upper School Annual Report SY1314
 
125 Books for 125 Years
125 Books for 125 Years125 Books for 125 Years
125 Books for 125 Years
 
What is Western Business Attire?
What is Western Business Attire?What is Western Business Attire?
What is Western Business Attire?
 
Glogster for students
Glogster for studentsGlogster for students
Glogster for students
 
Library life after HS
Library life after HSLibrary life after HS
Library life after HS
 
Upper School Annual Report 2012-2013
Upper School Annual Report 2012-2013Upper School Annual Report 2012-2013
Upper School Annual Report 2012-2013
 
Upper school annual rpt 1112
Upper school annual rpt 1112Upper school annual rpt 1112
Upper school annual rpt 1112
 
Upper School Annual Report 2010-11
Upper School Annual Report 2010-11Upper School Annual Report 2010-11
Upper School Annual Report 2010-11
 
Writing a Book Review, Revised ed.
Writing a Book Review, Revised ed.Writing a Book Review, Revised ed.
Writing a Book Review, Revised ed.
 
Noodletools for students
Noodletools for studentsNoodletools for students
Noodletools for students
 
January 18, 2012
January 18, 2012January 18, 2012
January 18, 2012
 
Kindle consent form
Kindle consent formKindle consent form
Kindle consent form
 
E reader checkout consent form
E reader checkout consent formE reader checkout consent form
E reader checkout consent form
 
Keywords: Small but mightly
Keywords: Small but mightlyKeywords: Small but mightly
Keywords: Small but mightly
 
Award bookmarks
Award bookmarksAward bookmarks
Award bookmarks
 
What is plagiarism?
What is plagiarism?What is plagiarism?
What is plagiarism?
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 

Recently uploaded

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 

Recently uploaded (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

A Privacy Primer

  • 1. A Privacy Primer For Grade 9 Health students Presented by K. Covintree
  • 3. PRIVATE Social Security Number (SSN) Driver's license number ID card number Credit card numbers Bank account numbers Fingerprints Medical records PERSONAL Address Birth date Birth place Salary Grades
  • 4. It can be used to • identify • contact • locate a specific individual It can be used in conjunction with other information to identify a specific individual.
  • 5. What about your privacy online?
  • 6. How private is your online life? LET’S PLAY: 10 Steps to Privacy Directions: 1. Players line up side by side. 2. Listen to the following statements. 3. If the statement applies to you, take a step forward.
  • 7.
  • 8. 2. My online passwords are  My birth-date  My phone number  My address  Names of friends, family, pets  All the same  The word “password”
  • 9. What does a STRONG password consist of?
  • 10.
  • 11.
  • 12. Note:Without even logging in, anyone can see the information on this page. Elements redacted are too personally specific to share when this presentation goes online.
  • 13.
  • 14. Images from Facebook and used with permission. Note: Original images covered over to protect privacy of person(s) presented. Insert your own embarrassing pictures here.
  • 15.
  • 16.
  • 17. Infographic authored by www.MyPermissions.com
  • 18.
  • 19.
  • 20. Use a browser's cookie notification feature and don't accept cookies from places you don't trust.
  • 21.
  • 22. An adult you trust
  • 23.
  • 24. Image by Dave Makes on flicker. Used with permission.
  • 25. Determine which information you want to keep private. Only you can decide what pieces of information you actually care about keeping private. Take action to protect that information. • Secure your devices so they don’t get malware • Personalize the privacy settings on your accounts • Use strong passwords • Monitor your identity regularly
  • 26. How long does a browser keep your search information? What does a strong password consist of? What types of data do mobile apps collect? Is it okay for my parents to read text messages? What is one law that protects my privacy? How does this relate to Health?
  • 27.
  • 28. “Computer Security” on Consumer Information from the Federal Trade Commission. My Permissions Blog. On Guard Online. Privacy Rights Clearinghouse. PrivacyTool Kit from the American Library Association(ALA). “Programming Guide and Activities” for Choose PrivacyWeek from ALA. “Protecting Privacy Campaign” from UC Davis Information and EducationalTechnology. “What does privacy mean to you” from iKeepSafe. Youth and Media Project from the University of St. Gallen and the Berkman Center for Internet and Society. All images from morguefile and MS Office unless otherwise noted.
  • 29. Thank you for viewing this Privacy Primer forGrade 9 Health students. Created by K. Covintree, Sept 2013