Information privacy and security-primary
Join Sam as they interact with friends in a social media environment.
More resources:
- Access Cyberhunt - a collection of short 5-15 min conversation starters, warm-up activities, or challenges
- Get a collection of cyber security posters
Students will learn about personal information security using an innovative approach of thinking from a hacker’s point-of-view. They will learn to create strong passwords and discover just how vulnerable private information can be online.
Year groups: 5 – 6
Access Information Privacy and Security activity.
Date: On-demand
Syllabus outcomes
PD3-1, PD3-2.
ACTDIP022.
Applying social and ethical protocols and practices when using ICT
Students apply appropriate practices to recognise the intellectual property for digital information of themselves and others. They use appropriate practices for the physical and logical storage and security of digital information and apply appropriate protocols when using ICT to safely create, communicate or share information. Students gain an understanding of the benefits and consequences of the use of ICT by individuals, groups and communities and the impact of the use of ICT on the fabric of society. In developing and acting with ICT capability, students:
recognise intellectual property
apply digital information security practices
apply personal security protocols
identify the impacts of ICT in society.