Slider

Introduction

Technology and digital resources are being used with increasing frequency in our classrooms and schools. Teachers, support staff and administration have indicated that there is a need for appropriate direction and policy in this area. This resource supports existing curriculum and learning. To that end PVNCCDSB has developed a Digital Privacy Learning Scope & Sequence which serves as the foundation for teaching and learning in this area. As an educator, when you introduce technologies, software, and services into your classroom, it is your responsibility to keep student privacy and security at the forefront of your planning and pedagogy.

Digital privacy and security continue to be of critical importance to our staff and students. By exploring the topics and resources listed below, educators can work with students to ensure that they have the skills needed to keep themselves and their personal information safe when navigating the ever-evolving digital world.

Please note that some of the resources associated with this page are only available to PVNCCDSB teachers and staff.  You must be logged into your PVNCCDSB Google account to access the resources linked in the sections below.

Click here to download a PDF version of this information.

Learning Scope & Sequence

Create

Catholic Graduate Expectation:

  • Reflective Thinker, Critical Thinker

Digital Privacy Scope & Sequence Legend*

Skill is introduced only if the technology or software is utilized in this grade.

  • A (As needed):  Skill is introduced only if the technology or software is utilized in this grade
  • I (Introduction): Skill is introduced and applied as technology and software is utilized in the classroom.
  • R (Reinforced) Skill is strengthened and supported with additional materials based on the grade level and technologies that are being utilized in the classroom
  • M (Mastered): By the end of designated grade, skill has been acquired completely and applied consistently and effectively.

*Please Note:
Even though skills are applied at specific grades, the facilitator should continue to monitor student proficiency in all skill areas as recommended by the Digital Privacy Learning Scope and Sequence.

The following resources are intended for teachers to use at their own discretion. As an educator, when you introduce technologies, software, and services into your classroom it is your responsibility to ensure you understand where data is being stored and how it is being used.


Resources

Identify importance of and create strong passwords & keep them private

As Needed: JK, SK, Grade 1; Introduction: Grade 2; Reinforced: Grade 3,4; Mastered: Grade 5;

Powerful Passwords (K-2)

Strong Passwords (3-5)

Account Security (6-12)

Click here to return to the top of this section.


Creating A Positive Digital Footprint

As Needed: JK, SK, Grade 1; Introduction: Grade 2; Reinforce: Grade, 3, 4, 5; Mastered: Grade 6;

Follow The Digital Trail (K-2)

Digital Footprint

Click here to return to the top of this section.


Demonstrate safe electronic communication practices, recognition of the potentially public exposure of email and appropriate email etiquette

As Needed: Grade 1, 2, 3, 4; Introduction: Grade 5; Reinforced: Grade,6, 7; Mastered: Grade 8;

Keep it Private (K-2)

Private and Personal Information (3-5)

Talking Safely Online (3-5)

Click here to return to the top of this section.


Understanding what personal information should and should not be included, how that information will be accessed and used when signing a student up for a service.

As Needed: Year 1, Year 2 Introduction: Grade 1; Mastered: Grade 2

Account Security (6-12)

Protecting Reputations Online

Click here to return to the top of this section.


Understanding what personal information should and should not be included, how that information will be accessed and used when students are creating personal accounts.

Introduction: Grade 7; Reinforced: Grade, 8, 9; Mastered: Grade 10

Cyber Sense Poem

Data Defenders Guides and Game

Click here to return to the top of this section.


Manage, Use, Share

Catholic Graduate Expectation:

  • Effective Communicator, Communication

Digital Privacy Scope & Sequence Legend*

Skill is introduced only if the technology or software is utilized in this grade.

  • A (As needed):  Skill is introduced only if the technology or software is utilized in this grade
  • I (Introduction): Skill is introduced and applied as technology and software is utilized in the classroom.
  • R (Reinforced) Skill is strengthened and supported with additional materials based on the grade level and technologies that are being utilized in the classroom
  • M (Mastered): By the end of designated grade, skill has been acquired completely and applied consistently and effectively.

*Please Note:
Even though skills are applied at specific grades, the facilitator should continue to monitor student proficiency in all skill areas as recommended by the Digital Privacy Learning Scope and Sequence.

The following resources are intended for teachers to use at their own discretion. As an educator, when you introduce technologies, software, and services into your classroom it is your responsibility to ensure you understand where data is being stored and how it is being used.


Resources

Identify consequences of digital information becoming visible or taken

As Needed: Grade 4, 5; Introduction: Grade 6; Reinforced: Grade, 8, 9; Mastered: Grade 10

Know the Deal: Value Of Privacy

Sharing Your Information

Identity Theft

Click here to return to the top of this section.


Curate a positive digital footprint

As Needed: Grade 2,3; Introduction: Grade 4; Reinforced: Grade, 5,6,7,8,9; Mastered: Grade 10

Online Reputation Presentation Package

Here's 5 Tips For Spring Cleaning Your Digital Footprint

Click here to return to the top of this section.


Evaluate your digital footprint using a specific tool (vanity)

As Needed: Grade 3, 4, 5, 6; Introduction: Grade 7; Re-enforced: Grade, 8, 9; Mastered: Grade 10

Getting the Toothpaste Back Into The Tube

Information Once It's Out There

CyberSense and Nonsense: The Second Adventure of The Three CyberPigs

5 Ways to Make A Positive Digital Footprint

Do A Vanity Search Using Google

  • Do a Vanity Search Using Google (or other search engine). Include an image search

Does it Matter Who Has Your Data

Online Citizenship

Click here to return to the top of this section.


Understanding privacy policies by looking critically at the language used

As Needed: Grade 6, 7; Introduction: Grade 8; Reinforced: Grade, 9, 10; Mastered: Grade 11

Click If You Agree

Kids' Privacy Sweep

Privacy For Kids

Privacy Online

Click here to return to the top of this section.


Understanding and recognizing the importance of intellectual and creative property in a digital environment

As Needed: Grade 3, 4; Introduction: Grade 5; Reinforced: Grade 6, 7, 8; Mastered: Grade 9

Stay On The Path

Citations & Citing Your Work

Plagiarism

Intellectual Property (Patents, Trademarks, etc.)

Fair Use

Click here to return to the top of this section.


Identify and explore low risk alternatives that protect from exposure to age - inappropriate content

As Needed: Grade 1, 2; Introduction: Grade 3; Reinforced: Grade, 4, 5, 6, 7, 8, 9, 10, 11, 12; Mastered: N/A

So Many Choices!

Click here to return to the top of this section.

Protect

Catholic Graduate Expectation:

  • Self Directed

Digital Privacy Scope & Sequence Legend*

Skill is introduced only if the technology or software is utilized in this grade.

  • A (As needed):  Skill is introduced only if the technology or software is utilized in this grade
  • I (Introduction): Skill is introduced and applied as technology and software is utilized in the classroom.
  • R (Reinforced) Skill is strengthened and supported with additional materials based on the grade level and technologies that are being utilized in the classroom
  • M (Mastered): By the end of designated grade, skill has been acquired completely and applied consistently and effectively.

*Please Note:
Even though skills are applied at specific grades, the facilitator should continue to monitor student proficiency in all skill areas as recommended by the Digital Privacy Learning Scope and Sequence.

The following resources are intended for teachers to use at their own discretion. As an educator, when you introduce technologies, software, and services into your classroom it is your responsibility to ensure you understand where data is being stored and how it is being used.


Resources

Logging in and out of accounts (including social logins)

As Needed: Y1, Y2; Introduction: Grade 1; Reinforced: Grade 2, 3, 4; Mastered: Grade 5

Account Security

Click here to return to the top of this section.


Launch, use and close appropriate software, apps & websites

As Needed: N/A; Introduction: Y1; Reinforced:Y2, Grade 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12; Mastered: N/A

Click here to return to the top of this section.


Understand and manage browser history and cookies

As Needed: Grade 3; Introduction: Grade 4; Reinforced: Grade 5, 6, 7, 8; Mastered: N/A

Website Cookies

Click here to return to the top of this section.


Configure and regularly audit account settings and preference in regards to privacy and security

As Needed: Grade 4; Introduction: Grade 5; Reinforced: Grade 6, 7, 8, 9, 10, 11, 12; Mastered: N/A

Mobile Safety & Security

Click here to return to the top of this section.


Recognize and describe the potential risks and dangers associated with various forms of online communications property in a digital environment

As Needed: Y2, Grade 1; Introduction: Grade 2; Reinforced: Grade  3, 4, 5, 6, 7, 8, 9, 10, 11, 12; Mastered: N/A

Click here to return to the top of this section.


Identify and explain the strategies for the safe and efficient use of technology (e.g. virus protection software, spam filters, popup blockers)

As Needed:Grade 5; Introduction: Grade 6; Reinforced: Grade  7, 8, 9, 10, 11, 12; Mastered: N/A

 

Computer Viruses & Threats

Click here to return to the top of this section.


Look critically at the addictive nature of products (e.g. video games, social media), brain chemistry and the means to self regulate.

As Needed:Y1, Y2, Grade 1, 2, 3; Introduction: Grade 4; Reinforced: Grade  5, 6, 7, 8, 9, 10, 11, 12; Mastered: N/A

Click here to return to the top of this section.


Look critically at what personal information is being collected and how it might be sold/used

As Needed:Y1, Y2; Introduction: Grade 1; Reinforced: Grade 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12; Mastered: N/A

Click here to return to the top of this section.