Personal Information Online
# Personal Information Online ## Learning Objectives By the end of this lesson, you will be able to: - Identify different types of personal information and understand why they need protection online - Recognize the risks associated with sharing personal information on digital platforms - Apply practical strategies to protect your personal data when using websites, apps, and social media - Evaluate privacy settings and make informed decisions about what to share online - Understand the consequences of oversharing and how digital footprints can affect your future ## Introduction Every time you go online, you leave traces of yourself—like digital footprints in the sand. Whether you're creating a social media account, playing an online game, or simply browsing websites, you're constantly sharing information about yourself. But have you ever stopped to think about who might be collecting this information and what they might do with it? Personal information is any data that can identify you as an individual. In the physical world, you wouldn't give your home address to a stranger on the street or share your family photos with everyone you meet. The same caution should apply online, but many young people share personal details without realizing the potential risks. Understanding what personal information is and how to protect it is one of the most important digital literacy skills you'll ever learn. In this lesson, we'll explore the different types of personal information, discover why protecting it matters, and learn practical strategies to keep yourself safe while still enjoying everything the internet has to offer. Remember: being smart about your personal information doesn't mean you can't have fun online—it just means you're taking control of your digital life. ## Key Concepts ### Types of Personal Information Personal information can be divided into several categories: **Direct Identifiers** - Information that directly identifies you: - Full name - Home address and phone number - Email address - Date of birth - Photographs of yourself - School name and location - National identification numbers **Sensitive Personal Information** - Data that requires extra protection: - Passwords and login credentials - Financial information (bank details, credit card numbers) - Medical information - Family details (parents' names, siblings) - Location data (where you are right now) **Indirect Identifiers** - Information that might not seem personal but can identify you when combined: - Username or gaming handles - Favorite places or regular routines - Hobbies and interests - Friends' names - Pet names (often used as security questions) ### Why Protecting Personal Information Matters **Identity Theft**: Criminals can use your personal information to pretend to be you, opening accounts or making purchases in your name. **Privacy Invasion**: Once information is online, it can be difficult or impossible to remove. People you don't know might access your photos, learn about your habits, or discover where you live. **Digital Footprint Consequences**: Everything you share online creates a permanent record. Universities and future employers often search for applicants online. Inappropriate content shared at age 13 could affect opportunities at age 18 or beyond. **Cyberbullying and Harassment**: Personal information can be used to target, embarrass, or harass you. The more people know about you, the more vulnerable you become. **Physical Safety Risks**: Sharing your location or routine can put you at risk in the real world, as people can use this information to find you. ### Privacy Settings and Controls Most online platforms offer privacy controls, but they're often hidden or set to share widely by default. Key privacy features include: - **Profile Visibility**: Who can see your profile and posts (public, friends only, private) - **Location Services**: Whether apps can track where you are - **Contact Permissions**: Who can message you or find you through search - **Tagging Controls**: Whether others can tag you in photos or posts - **Data Sharing**: Whether your information is shared with third-party companies ### The "Think Before You Share" Framework Before posting or sharing anything online, ask yourself: 1. **Would I be comfortable with everyone seeing this?** (parents, teachers, future employers) 2. **Could this information be used to identify or find me?** 3. **Am I sharing information about others without their permission?** 4. **Could this be misunderstood or used against me?** 5. **Is this something I'll be proud of in five years?** ## Worked Examples ### Example 1: Evaluating a Social Media Post **Scenario**: Maya wants to post on social media: "So excited for my birthday party tomorrow at Pizza Palace on Elm Street at 4 PM! Can't wait to turn 13! 🎉" **Step 1**: Identify what personal information is being shared - Her birthday (tomorrow) - Her age (turning 13) - Her exact location at a specific time (Pizza Palace on Elm Street at 4 PM) **Step 2**: Assess the risks - Strangers know where she'll be at a specific time (safety risk) - Her birthday is revealed (often used for security questions) - Public announcement of her absence from home **Step 3**: Create a safer alternative Better post: "Birthday celebrations with friends tomorrow! So excited! 🎉" **Solution**: This revised post shares her excitement without revealing specific locations, times, or personal details that could compromise her safety. ### Example 2: Setting Up a New Account **Scenario**: James is creating an account on a new gaming platform that asks for the following information: - Username - Email address - Date of birth - Phone number - Home address - Profile photo - Security question: "What is your pet's name?" **Step 1**: Determine what's necessary vs. optional - Necessary: Username, email, date of birth (for age verification) - Question: Phone number, home address (usually optional) - Should avoid: Using real photo, answering with actual pet's name **Step 2**: Make safe choices - Choose a username that doesn't include his real name or birthdate - Use a parent's email or dedicated gaming email, not his school email - Provide real birthdate only if required for age verification - Skip optional fields like phone and address - Use a made-up answer for security questions (and record it safely) - Use an avatar instead of a real photo **Solution**: James successfully creates an account while minimizing personal information shared, reducing his risk of identity theft or privacy invasion. ### Example 3: Responding to Information Requests **Scenario**: While playing an online game, another player messages: "Hey! You seem cool. What school do you go to? Maybe we're near each other. What's your Snapchat?" **Step 1**: Recognize the warning signs - A stranger asking for identifying information - Questions about location - Request for contact on another platform **Step 2**: Appropriate response James should: NOT share his school name, location, or other social media accounts with strangers **Step 3**: Safe action Better response: "I prefer to keep gaming and personal life separate" or simply not responding and blocking if the requests continue. **Solution**: Protecting personal information means being cautious even in friendly-seeming interactions online. ## Practice Questions **Question 1**: Which of the following is the SAFEST username for a social media account? a) Sarah_Johnson_2011 b) SarahLondonSchool c) CosmicGalaxyArt d) SarahElmStreet **Question 2**: You're posting a photo of your new school uniform. What information should you remove or hide before posting? - List at least three pieces of information to protect **Question 3**: Explain why sharing your location in real-time (like posting "Having coffee at Central Café right now") might be risky. **Question 4**: Your friend tags you in an embarrassing photo without asking permission. What steps should you take? **Question 5**: Create a "safe sharing checklist" with five questions you should ask yourself before posting anything online. ## Summary - **Personal information** includes direct identifiers (name, address), sensitive data (passwords, financial information), and indirect identifiers (usernames, routines) that can identify you when combined - **Protecting personal information** prevents identity theft, privacy invasion, cyberbullying, and can protect your future opportunities - **Think before you share**: Always consider who might see your posts, how information could be misused, and whether you'll be comfortable with it being permanent - **Use privacy settings** on all platforms and regularly review them, as defaults often favor sharing over privacy - **Be cautious with strangers** online and never share identifying information like your school, address, or real-time location - **Your digital footprint is permanent**: What you share now can be found years later by universities, employers, or anyone searching for you ## Exam Tips - **For scenario-based questions**: Always identify the specific types of personal information at risk and explain the potential consequences. Examiners look for clear understanding of both identification and risk assessment. - **Use specific examples in your answers**: Rather than saying "personal information is dangerous to share," explain "Sharing your school name and photo allows strangers to identify and locate you, creating a physical safety risk." Detailed, specific answers earn higher marks. - **Know your privacy tools**: Be prepared to describe specific privacy settings (profile visibility, location services, tagging controls) and explain when and why each should be used. Questions often ask you to recommend appropriate settings for given scenarios. --- ## Practice Question Answers **Answer 1**: c) CosmicGalaxyArt - This username doesn't contain any personal information like real names, birth years, or locations. **Answer 2**: Information to remove/hide: - School name or logo on the uniform - Any name badges or identification - Location tags showing your school - Background details revealing the school location - Any metadata showing when/where the photo was taken **Answer 3**: Sharing real-time location is risky because: it tells people where you are right now (making you vulnerable), shows when you're not at home, creates a pattern of your movements that strangers can track, and remains online permanently, revealing places you regularly visit. **Answer 4**: Steps to take: - Ask your friend politely to remove the photo - If they won't remove it, untag yourself from the photo - Report the photo to the platform if necessary - Adjust your privacy settings so friends must ask permission before tagging - Talk to your friend about asking permission before posting photos of others in the future **Answer 5**: Safe Sharing Checklist: 1. Would I be comfortable with my parents/teachers seeing this? 2. Does this reveal my location, school, or other identifying information? 3. Could someone use this information to harm, embarrass, or impersonate me? 4. Am I sharing information about others without their permission? 5. Will I be proud of this post in five years?
Why This Matters
This lesson teaches students how to identify and protect personal information when using the internet. Students learn about different types of personal data, the risks of sharing too much online, and strategies for maintaining privacy across digital platforms.
Key Words to Know
Introduction
Personal Information Online refers to any data that can identify you as an individual on the internet. In today's digital world, understanding how to protect your personal information is essential for staying safe online. This topic is crucial for Cambridge Lower Secondary Digital Literacy students as it forms the foundation of responsible digital citizenship.
Personal information includes obvious details like your full name, address, phone number, and date of birth, but also extends to less obvious data such as your school name, photographs, email address, and even your preferences and habits online. Every time you create an account, post on social media, or fill in a form online, you're sharing personal information that could potentially be accessed by others.
The risks associated with sharing personal information online include identity theft, cyberbullying, fraud, unwanted contact from strangers, and reputation damage. However, understanding these risks doesn't mean avoiding the internet entirely—it means learning to make informed decisions about what to share, when to share it, and with whom. This study guide will help you develop the knowledge and skills needed to protect your personal information while still enjoying the benefits of being online.
Core Concepts
Types of Personal Information
Personally Identifiable Information (PII) includes any data that can be used to identify you specifically. This is divided into two categories:
- Sensitive PII: Full name, home address, phone number, passport number, bank details, date of birth, and national insurance/social security numbers
- Non-sensitive PII: Email address, school name, username, IP address, and device information
Digital Footprint
Your digital footprint is the trail of data you leave behind when using the internet. This includes websites you visit, posts you make, photos you share, and comments you write. Digital footprints can be active (information you deliberately share) or passive (data collected without your direct knowledge, like cookies tracking your browsing).
Privacy Settings and Controls
Most online platforms offer privacy settings that allow you to control who sees your information. Understanding and regularly reviewing these settings is crucial for protecting your personal data. Key concepts include public versus private profiles, friend/follower lists, and data sharing permissions.
Key Skills
Evaluating What to Share
Develop the ability to assess information before posting online by asking: Could this identify me or my location? Could this embarrass me in the future? Would I be comfortable with strangers seeing this? This critical thinking skill helps prevent oversharing.
Managing Privacy Settings
Learn to navigate and configure privacy settings across different platforms. This includes:
- Setting profiles to private rather than public
- Controlling who can see your posts and personal information
- Managing app permissions and data access
- Reviewing and updating settings regularly as platforms change
Creating Strong Passwords
Master the skill of creating secure passwords using combinations of uppercase and lowercase letters, numbers, and symbols. Avoid using personal information in passwords and use different passwords for different accounts. Understanding two-factor authentication adds an extra layer of security.
Recognizing Risks
Develop awareness of potential threats such as phishing attempts, fake websites, and suspicious requests for personal information. Learn to identify warning signs like poor spelling, urgent demands, or requests for sensitive data.
Worked Examples
Example 1: Social Media Profile Setup
Scenario: Maya is creating a new social media account...
Common Mistakes
Oversharing on Social Media
Mistake: Students often post excessive personal details, includ...
2 more sections locked
Upgrade to Starter to unlock all study notes, audio listening, and more.
Exam Tips
- 1.Be able to identify examples of personal information versus general information that is safe to share publicly
- 2.Understand the consequences of sharing personal data online, including both immediate and long-term risks
- 3.Know how to adjust privacy settings and explain why different settings are appropriate for different situations