Understand key rights under data protection laws (including right to see personal data, withdraw consent, request rectification/deletion).
Research Your Rights
Use a reliable website (e.g., ICO.org.uk for UK data protection laws) to find answers to:
What is the right to access your data?
How can you withdraw consent for your data being used?
Under what circumstances can you request rectification or deletion of personal data?
Scenario Exercise
Imagine an online shop has your details and you notice incorrect information.
Write an email requesting your data to be corrected or deleted. Include:
Which data is incorrect
Your contact information
Request for confirmation once corrected
Reflection
In 3–4 sentences, explain why these rights are important for individuals.
Understand importance of protecting personal information and privacy online, and methods to do so.
Privacy Settings Exploration
On a social media account or demo account, explore privacy settings.
Adjust:
Who can see posts or profile
Location sharing (turn on/off GPS tracking)
Email notifications
Secondary Email Activity
Set up a secondary email address for signing up to newsletters or online services.
Explain why using a secondary email improves privacy.
Private Browsing Task
Open a browser in Incognito/Private mode.
Visit a website and compare how cookies/history behave compared with normal browsing.
Note 2–3 benefits of private browsing.
Reflection
Write 3–4 sentences explaining at least two methods you used to protect your information online and why they are effective.
Know how to backup files to the cloud.
Cloud Backup Practice
Select 2–3 files on your computer (documents, photos).
Upload them to a cloud service (Google Drive, OneDrive, Dropbox).
Organize files in folders and name them clearly.
Restore Test
Delete a local copy and then restore it from the cloud backup.
Reflection
In 2–3 sentences, explain why cloud backups are important. Include a scenario where having a backup would help.
Know how to avoid exposure to malware (worms, trojans, ransomware).
Identify Malware Examples
Research definitions of worms, trojans, and ransomware.
List 1–2 examples of each type in a table.
Malware Type
Definition
Example
Worm
__________________
__________________
Trojan
__________________
__________________
Ransomware
__________________
__________________
Safety Practices Task
Research or discuss at least 3 ways to avoid malware (e.g., antivirus software, avoiding suspicious downloads, not clicking unknown links).
Write a short paragraph explaining which method you think is most effective and why.
Know how to minimise health risks from device/internet use.
Screen Time Awareness
Track your device usage for one day. Note hours spent on:
Schoolwork/learning
Social media or entertainment
Gaming or video streaming
Health Risk Discussion
Identify possible effects: weight gain, decline in fitness, poor sleep patterns.
Suggest 2–3 strategies to reduce these risks, e.g.:
Take regular breaks (5–10 min per hour)
Stretching or short exercises
Setting device-free times before bed
Action Plan
Create a simple weekly plan showing how you will manage screen time and include breaks, exercise, and healthy sleep routines.