Day 12 - Privacy Concerns and Protections

Day 12: Privacy Concerns and Protections

Learning Objectives

Essential Questions

Materials Needed

Vocabulary

Procedure (50 minutes)

Opening (8 minutes)

  1. Review and Connection (3 minutes)

    • Review data collection practices from previous lesson
    • Connect to today's focus on privacy concerns and protections
  2. Warm-up Activity (5 minutes)

    • Present a scenario: "Your entire digital history becomes public tomorrow"
    • Ask students to write down their top three privacy concerns
    • Create a class list of privacy concerns
    • Introduce the importance of privacy protections

Main Activities (32 minutes)

  1. Exploration: Privacy Laws and Regulations (10 minutes)

    • Introduce major privacy laws and regulations:
      • General Data Protection Regulation (GDPR)
      • California Consumer Privacy Act (CCPA)
      • Children's Online Privacy Protection Act (COPPA)
      • Health Insurance Portability and Accountability Act (HIPAA)
      • Family Educational Rights and Privacy Act (FERPA)
      • Other relevant national and state regulations
    • Explain key principles in privacy regulations:
      • Transparency and notice
      • Purpose limitation
      • Data minimization
      • Accuracy
      • Storage limitation
      • Integrity and confidentiality
      • Accountability
    • Discuss user rights under privacy laws:
      • Right to access
      • Right to correction
      • Right to deletion
      • Right to opt out
      • Right to data portability
    • Compare privacy approaches across different jurisdictions
  2. Discussion: Privacy-Enhancing Technologies (12 minutes)

    • Explain technologies that help protect privacy:
      • Encryption (end-to-end, at rest, in transit)
      • Anonymization and pseudonymization
      • VPNs and proxy servers
      • Tor and anonymous browsing
      • Ad and tracker blockers
      • Private browsing modes
      • Two-factor authentication
      • Password managers
    • Demonstrate how some privacy tools work
    • Discuss the strengths and limitations of each approach
    • Explain privacy by design principles:
      • Proactive not reactive
      • Privacy as the default setting
      • Privacy embedded into design
      • Full functionality with privacy
      • End-to-end security
      • Visibility and transparency
      • User-centered design
  3. Case Studies: Privacy Breaches and Consequences (10 minutes)

    • Present 2-3 significant privacy breach cases
    • For each case, analyze:
      • What data was compromised
      • How the breach occurred
      • Impact on individuals and organizations
      • Response and remediation
      • Lessons learned
    • Discuss the real-world consequences of privacy failures
    • Connect to broader issues of trust and accountability
    • Consider how breaches might have been prevented

Closing (10 minutes)

  1. Debate: Privacy vs. Convenience Trade-offs (7 minutes)

    • Divide class into two groups
    • One group argues for prioritizing privacy
    • One group argues for prioritizing convenience/functionality
    • Each group presents their strongest arguments
    • Discuss how to find an appropriate balance
    • Consider how context affects these trade-offs
    • Reflect on personal preferences and choices
  2. Exit Ticket: Personal Data Protection Plan (3 minutes)

    • Students begin developing a personal data protection plan
    • Plan should include:
      • Privacy settings to review and adjust
      • Tools to consider using
      • Habits to develop or change
      • How to make informed decisions about data sharing
    • Students will complete the plan as homework
    • Preview that next class will focus on computing innovations and problem-solving

Assessment

Differentiation

For Advanced Students

For Struggling Students

Homework/Extension

Teacher Notes