ican-grade4-private_and_personal_information-commonsenseeducation.docx | |
File Size: | 13 kb |
File Type: | docx |
As you navigate the internet you will eventually visit sites that request information about your identity. It is important that you learn to adopt a critical inquiry process to empower you to be able to stay safe and protect yourself (and your family) from identity theft.
In this lesson, you will learn to think critically about the user information that some websites request or require. You will also learn what is appropriate to post or share online and what information is not safe to share. Additionally, you will learn the difference between private information and personal information, and you will have to decide what information is safe and unsafe to share online.
In this lesson, you will learn to think critically about the user information that some websites request or require. You will also learn what is appropriate to post or share online and what information is not safe to share. Additionally, you will learn the difference between private information and personal information, and you will have to decide what information is safe and unsafe to share online.
Possible Responses:
|
|
Possible Responses:
|
|
Let's visit some websites that require users to register. As you review the online registration page of each of these websites, consider they TYPE of information that each site requires or requests before users can participate on their site.
Possible Responses:
|
|
Possible Answers:
|
|
Personal Information is usually safe to share online
https://www.youtube.com/watch?v=ayyr0IDk1hQ
Private Information is usually not safe to share online.
Students should get permission
from a parent/guardian or teacher
before giving out private information.
Students should get permission
from a parent/guardian or teacher
before giving out private information.
https://www.youtube.com/watch?v=mBxwPNc9HR8
Possible Answers:
|
|
Explain:
An identity thief uses private information to pretend to be the person whose identity he/she has stolen. Once a thief has taken someone's identity, he/she can use that person's name and other private information to get a driver's license or buy things. An identity thief can even use another person's private information to apply for a credit card and purchase things up that cost a lot of money. Identity thieves never pay their bills! It is even possible for people to use a person's name who isn't even old enough to have a driver's license or a credit card! In fact, young students and teens are often the targets of identity thieves because kids have clean credit histories and parents aren't often checking their children's credit scores.
It is often not until much later after an identity has been stolen that the victim realizes or learns that their identity has even been taken.
It is often not until much later after an identity has been stolen that the victim realizes or learns that their identity has even been taken.
Important: Private information can be used by an online predator to steal your identity. Personal Information cannot usually be used to steal a person's identity.
Videos for Additional Reinforcement:
https://www.youtube.com/watch?v=qwelJjfxuVM
https://www.youtube.com/watch?v=i7ovB72YXPc
https://www.youtube.com/watch?v=mBxwPNc9HR8
Review:
Additional Lesson Resources:
https://www.youtube.com/watch?v=jNUvoLRv-88 _
Post Assessment:
A link to your online assessment will be placed in Google Classroom by the day of the week.
Image Credits on this page: https://postmediawindsorstar.files.wordpress.com/2014/04/curbing_kids_online-1.jpg?w=630, http://www.cue.org/sites/cue.org/files/images/LOGO_Common_Sense_Education.png, http://www.vastsolution.com/admin/wp-content/uploads/2015/08/18971646401_f58760bebf_o_d.jpg, and https://i.kinja-img.com/gawker-media/image/upload/s---sx72oUR--/c_fill,fl_progressive,g_north,h_358,q_80,w_636/18kzc0zdatgspjpg.jpg,www.kahoot.com,