Slider

Introduction

Technology and digital resources are being used with increasing frequency in our classrooms and schools. Teachers, support staff, and administration have indicated that there is a need for appropriate direction and policy in this area. This resource supports existing curriculum and learning. To that end PVNCCDSB has developed a Digital Privacy Scope & Sequence which serves as the foundation for teaching and learning in this area. As an educator, when you introduce technologies, software, and services into your classroom, it is your responsibility to keep student privacy and security at the forefront of your planning and pedagogy.

Digital privacy and security continue to be of critical importance to our staff and students. By exploring the topics and resources listed below, educators can work with students to ensure that they have the skills needed to keep themselves and their personal information safe when navigating the ever-evolving digital world.

Please note that some of the resources associated with this page are only available to PVNCCDSB teachers and staff.  You must be logged into your PVNCCDSB Google account to access the resources linked in the sections below.

Click here to download a PDF version of this information.

Digital Privacy Scope and Sequence

Create

Catholic Graduate Expectation:

  • Reflective Thinker, Critical Thinker

Digital Privacy Scope & Sequence Legend*

Skill is introduced only if the technology or software is utilized in this grade.

  • A (As needed):  Skill is introduced only if the technology or software is utilized in this grade
  • I (Introduction): Skill is introduced and applied as technology and software is utilized in the classroom.
  • R (Reinforced) Skill is strengthened and supported with additional materials based on the grade level and technologies that are being utilized in the classroom
  • M (Mastered): By the end of designated grade, skill has been acquired completely and applied consistently and effectively.

*Please Note:
Even though skills are applied at specific grades, the facilitator should continue to monitor student proficiency in all skill areas as recommended by the Digital Privacy Learning Scope and Sequence.

The following resources are intended for teachers to use at their own discretion. As an educator, when you introduce technologies, software, and services into your classroom it is your responsibility to ensure you understand where data is being stored and how it is being used.


Resources

Identify importance of and create strong passwords & keep them private

As Needed: JK, SK, Grade 1; Introduction: Grade 2; Reinforced: Grade 3,4; Mastered: Grade 5;

Powerful Passwords (K-2)

Strong Passwords (3-5)

Account Security (6-12)


Creating A Positive Digital Footprint

As Needed: JK, SK, Grade 1; Introduction: Grade 2; Reinforce: Grade, 3, 4, 5; Mastered: Grade 6;

Follow The Digital Trail (K-2)

Digital Footprint


Demonstrate safe electronic communication practices, recognition of the potentially public exposure of email and appropriate email etiquette

As Needed: Grade 1, 2, 3, 4; Introduction: Grade 5; Reinforced: Grade,6, 7; Mastered: Grade 8;

Keep it Private (K-2)

Private and Personal Information (3-5)

Talking Safely Online (3-5)


Understanding what personal information should and should not be included, how that information will be accessed and used when signing a student up for a service.

As Needed: Year 1, Year 2 Introduction: Grade 1; Mastered: Grade 2

Account Security (6-12)

Protecting Reputations Online


Understanding what personal information should and should not be included, how that information will be accessed and used when students are creating personal accounts.

Introduction: Grade 7; Reinforced: Grade, 8, 9; Mastered: Grade 10

Cyber Sense Poem

Data Defenders Guides and Game


Manage, Use, Share

Catholic Graduate Expectation:

  • Effective Communicator, Communication

Digital Privacy Scope & Sequence Legend*

Skill is introduced only if the technology or software is utilized in this grade.

  • A (As needed):  Skill is introduced only if the technology or software is utilized in this grade
  • I (Introduction): Skill is introduced and applied as technology and software is utilized in the classroom.
  • R (Reinforced) Skill is strengthened and supported with additional materials based on the grade level and technologies that are being utilized in the classroom
  • M (Mastered): By the end of designated grade, skill has been acquired completely and applied consistently and effectively.

*Please Note:
Even though skills are applied at specific grades, the facilitator should continue to monitor student proficiency in all skill areas as recommended by the Digital Privacy Learning Scope and Sequence.

The following resources are intended for teachers to use at their own discretion. As an educator, when you introduce technologies, software, and services into your classroom it is your responsibility to ensure you understand where data is being stored and how it is being used.


Resources

Identify consequences of digital information becoming visible or taken

As Needed: Grade 4, 5; Introduction: Grade 6; Reinforced: Grade, 8, 9; Mastered: Grade 10

Know the Deal: Value Of Privacy

Sharing Your Information

Identity Theft


Curate a positive digital footprint

As Needed: Grade 2,3; Introduction: Grade 4; Reinforced: Grade, 5,6,7,8,9; Mastered: Grade 10

Online Reputation Presentation Package

Here's 5 Tips For Spring Cleaning Your Digital Footprint


Evaluate your digital footprint using a specific tool (vanity)

As Needed: Grade 3, 4, 5, 6; Introduction: Grade 7; Re-enforced: Grade, 8, 9; Mastered: Grade 10

Getting the Toothpaste Back Into The Tube

Information Once It's Out There

CyberSense and Nonsense: The Second Adventure of The Three CyberPigs

5 Ways to Make A Positive Digital Footprint

Do A Vanity Search Using Google

  • Do a Vanity Search Using Google (or other search engine). Include an image search

Does it Matter Who Has Your Data

Online Citizenship


Understanding privacy policies by looking critically at the language used

As Needed: Grade 6, 7; Introduction: Grade 8; Reinforced: Grade, 9, 10; Mastered: Grade 11

Click If You Agree

Kids' Privacy Sweep

Privacy For Kids

Privacy Online


Understanding and recognizing the importance of intellectual and creative property in a digital environment

As Needed: Grade 3, 4; Introduction: Grade 5; Reinforced: Grade 6, 7, 8; Mastered: Grade 9

Stay On The Path

Citations & Citing Your Work

Plagiarism

Intellectual Property (Patents, Trademarks, etc.)

Fair Use


Identify and explore low risk alternatives that protect from exposure to age - inappropriate content

As Needed: Grade 1, 2; Introduction: Grade 3; Reinforced: Grade, 4, 5, 6, 7, 8, 9, 10, 11, 12; Mastered: N/A

So Many Choices!

Protect

Catholic Graduate Expectation:

  • Self Directed

Digital Privacy Scope & Sequence Legend*

Skill is introduced only if the technology or software is utilized in this grade.

  • A (As needed):  Skill is introduced only if the technology or software is utilized in this grade
  • I (Introduction): Skill is introduced and applied as technology and software is utilized in the classroom.
  • R (Reinforced) Skill is strengthened and supported with additional materials based on the grade level and technologies that are being utilized in the classroom
  • M (Mastered): By the end of designated grade, skill has been acquired completely and applied consistently and effectively.

*Please Note:
Even though skills are applied at specific grades, the facilitator should continue to monitor student proficiency in all skill areas as recommended by the Digital Privacy Learning Scope and Sequence.

The following resources are intended for teachers to use at their own discretion. As an educator, when you introduce technologies, software, and services into your classroom it is your responsibility to ensure you understand where data is being stored and how it is being used.


Resources

Logging in and out of accounts (including social logins)

As Needed: Y1, Y2; Introduction: Grade 1; Reinforced: Grade 2, 3, 4; Mastered: Grade 5

Account Security


Launch, use and close appropriate software, apps & websites

As Needed: N/A; Introduction: Y1; Reinforced:Y2, Grade 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12; Mastered: N/A


Understand and manage browser history and cookies

As Needed: Grade 3; Introduction: Grade 4; Reinforced: Grade 5, 6, 7, 8; Mastered: N/A

Website Cookies


Configure and regularly audit account settings and preference in regards to privacy and security

As Needed: Grade 4; Introduction: Grade 5; Reinforced: Grade 6, 7, 8, 9, 10, 11, 12; Mastered: N/A

Mobile Safety & Security


Recognize and describe the potential risks and dangers associated with various forms of online communications property in a digital environment

As Needed: Y2, Grade 1; Introduction: Grade 2; Reinforced: Grade  3, 4, 5, 6, 7, 8, 9, 10, 11, 12; Mastered: N/A


Identify and explain the strategies for the safe and efficient use of technology (e.g. virus protection software, spam filters, popup blockers)

As Needed:Grade 5; Introduction: Grade 6; Reinforced: Grade  7, 8, 9, 10, 11, 12; Mastered: N/A

 

Computer Viruses & Threats


Look critically at the addictive nature of products (e.g. video games, social media), brain chemistry and the means to self regulate.

As Needed:Y1, Y2, Grade 1, 2, 3; Introduction: Grade 4; Reinforced: Grade  5, 6, 7, 8, 9, 10, 11, 12; Mastered: N/A


Look critically at what personal information is being collected and how it might be sold/used

As Needed:Y1, Y2; Introduction: Grade 1; Reinforced: Grade 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12; Mastered: N/A