video

Lesson video

In progress...

Loading...

Hi everybody.

Welcome to this lesson on online data.

My name is Miss Wittams-Howarth and I'm gonna be with you today.

Thank you for joining me.

Let's get started.

So the outcome for today's lesson is I can describe how data is collected, sold, and used online, and explain how to protect my sensitive data.

Before we start, let's have a look at some ground rules.

Firstly, we have Laura and she says, "Listen to others.

It's okay to disagree with each other, but we should listen properly before making assumptions or deciding how to respond.

When disagreeing, it's important to challenge the statement, not the person." And then we have Andeep.

And Andeep says, "Respect privacy.

We can discuss examples, but don't use names or descriptions that identify anyone, including ourselves." A really good top tip is to say, my friend.

And then we don't know whether it's your friend, your family member, something you've read, something you've seen on TV, perhaps, we don't know.

Then we have Izzy.

And Izzy says, you can choose your level of participation.

Everyone has a right to choose not to answer a question or to join in the discussion.

We never put anyone on the spot, including our teachers.

And then lastly, Jacob says, there's no judgement.

We can explore beliefs and misunderstandings about a topic without the fear of being judged.

And that also means if you have a question, it's not gonna be a stupid one.

There is no such thing as a stupid question.

I can almost guarantee that if you have a question that you want to ask, there'll be plenty of other people who want to ask the same question.

Let's have a look at our keywords for this lesson.

You'll notice that they come up throughout the lesson in bold.

Here they are.

The first one is data, which means detailed information stored online.

Then we have monitor, which means to collect information about someone.

And then we have internet protocol address or IP address for short.

And that is a unique set of characters that identifies each computer that communicates over a network.

And then lastly, app.

And that's an abbreviated form of application, a software programme designed to perform a specific function, normally downloaded onto a digital device.

And here is our lesson outline.

So firstly, what data is collected about us? And then the second part of the lesson is how can we keep our data safe? Let's move on to the first part of the lesson.

What data is collected about us? What sort of data do you share online through social media, websites and apps? Let's have a look.

Jacob says that he had to enter his name, date of birth, gender, and address to set up a social media account.

Andeep said that the search engine monitors the website he visits and records any online purchases he makes.

Izzy says, social media platforms record, what she likes, who her friends are and what she comments on.

There's quite a lot of information that is gathered about us as we just go about our business on the internet.

There are three main types of data that are stored about us when we access the internet.

There's device data, personal data, and behavioural data.

We'll explore those over the next few slides.

Device data is the information that can be taken from digital devices such as computers, laptops, tablets, or smartphones.

And this includes the internet protocol or IP address.

This identifies the device and tells the internet where to send the information.

It also records browser or search history and location tracking, so it knows where you are.

Andeep says, when I use my device, the internet can store details about my device, the websites I have visited and my location.

Personal data is any information that relates to a specific person.

It might be their name, their age, their gender, or their email address.

Some sites also carry out image recognition and be able to see where your image is used across the internet.

Thanks, Andeep.

Behavioural data looks at how you behave online.

It includes the websites you visit and how you interact with these sites, purchases, likes, comments, how you interact with others on social media, likes, comments, shares, watching reels, or short videos, anything you'd like that that you interact with online, that's what behavioural data stores.

Andeep says, targeted adverts will be sent to us based on what we show interest in online.

Let's see how well you've been listening.

True or false? There are three different types of data that can be collected about us when we access the internet.

True or false? I'm going to give you a few seconds to think about it and then we'll take some feedback.

So if you ticked true, you'd be absolutely right.

Well done.

Let's look at a specific example and see how this works out in practise.

Izzy wants to buy a new pair of trainers and looks on the internet to order them.

Her data can be collected at every point.

So firstly, the IP address is recorded when she turns on her computer and connects to the internet.

Next, her browser history.

She accesses the search engine.

Then, as she goes about the internet looking for her trainers, the interactions she uses are monitored.

She puts in her search terms, for example.

They're monitored and used to target perhaps advertising to her later on.

Cookies can be installed.

Whenever she clicks on a link or visits a website.

Data can be stored as she visits each website in turn.

Now Izzy is worried about the data she's given away through her internet shopping, and she wonders if there is anything she can do to keep her data private.

It's a good question, Izzy.

First of all, we need to understand a little bit more about how data is tracked and stored.

Cookies, we talked about those a few moments ago.

They're files with pieces of data that are stored on our computers and they allow the website to remember our digital device, whether that's our tablet, our phone, our computer.

Our permissions.

Websites and apps will ask for permission to access your information such as your location, your camera, your microphone, photos.

And then user settings.

Social media platforms will store the interactions we make on online.

They keep a record of what we do.

The sort of cookie notice that you'll receive when you go onto websites.

We use cookies to enhance your experience, serve personalised ads or content, and analyse our traffic.

By clicking "accept all" you consent to our use of cookies.

And you've got three choices there.

Customised, reject, all, accept all.

So let's see how they're, those cookies are gonna be used on these websites.

Your data is used to target you with ads.

The data that is stored is monitored to understand what you are interested in.

By accepting, you give permission for your data to be collected.

If you reject, you won't be remembered or sent targeted ads.

You still can access the website.

With customise, you can select who can store your data.

Third party means other companies.

So sometimes companies and websites can store data not just for themselves, but for other people too.

They can sell your data.

Now let's do a check.

How well were you listening? The files that are stored on your computer to track on.

Our online interactions are called IP addresses or internet protocol addresses, cookies or trackers.

Have a think.

I'll take feedback in a moment.

If you said cookies, you'd be right.

Well done.

Great listening.

Personalised adverts.

If we previously searched for a computer game, when we revisit that website, the site will monitor this and recommend similar games.

When we next log on, we might be sent targeted ads that are about other brands.

If we click on these, we are then sent other links we might be interested in, like an event or sale.

Personalised adverts can come from our browser history, the websites that we visit and what we search for.

Aisha says, "Well, what's the problem with getting personalised ads? Surely it just means I only see things I'm interested in." Alex, that's a really good point, says, "It means that we might be less likely to see if the product is good value and adverts are not always targeted at us based on just our search history." Personalised adverts can also target you based on their monitoring of your social media posts and photos.

Izzy posted about a school camping trip and then received these adverts.

So Izzy posted, can't wait for the school camping trip this weekend, and she's put some tags in there.

So let's see what she got, what personalised adverts she got in response to that.

So she got one saying 20% off all hiking footwear.

Click here to learn more about camping trips abroad.

Sign up for online lessons on how to survive in the wild.

Meet new friends to go camping with.

So just from that one post she received all of those adverts.

Not all of those adverts were appropriate.

Let's have a look.

What about 20% off all hiking footwear? Although it was a targeted ad, Izzy was going camping, but she might not have been looking to buy any equipment.

So this was a spam email.

Learning about camping trips abroad.

Well, the link could be unsafe and it might not direct Izzy to a holiday website.

This sort of research is better carried out by an adult.

What about signing up for online lessons on how to survive in the wild? Well, if she signed up, it would mean giving more sensitive data away.

Also, this trip might not be appropriate for a teenager and then meeting new friends to go camping with.

And that potentially could create contact with people Izzy does not know in real life on the internet, and that's an unsafe way to be online.

So not all of those, in fact, all of those adverts that she received had real downsides.

So let's have a look.

It's not just targeted advertising or data storage that can be a risk when we use the internet.

We can also be shown filter bubbles.

So same message that Izzy posts.

A filter bubble is created when we are suggested content.

Other people on social media, internet sites or blogs to follow based on previous likes, comments and interactions.

Algorithms take what we input when we search online and then recommend output or content that we might be interested in.

This is how it works.

Input.

So maybe we put in a search online and the computer, the algorithm is a set of rules followed by a computer to create the output.

The output would be suggestions.

Over time, these algorithms will suggest more content that ensures users only encounter information and opinions that can form to and reinforce their own beliefs and likes.

This can isolate users from any viewpoints or interests different to their own.

A filter bubble can be created by algorithms. Let's say a user clicks on a running website.

They're suggested links to other runners on social media to follow.

The runners talk about extreme running and post content about this.

The user is then monitored and targeted with content that criticises people who enjoy jogging.

Interactions with others confirm beliefs about running and they start to believe that joggers are lazy.

And then the user is sent disinformation about how the Olympics is going to ban running and are called to join a protest about this.

And all of this has come from just clicking on a website about running.

Let's check.

How well were you listening? A filter bubble is a filter you can select to improve photographs.

Is it B, a type of data stored about you online, or C, a personalised online experience? Let me give you a few seconds to think about it and then we'll some feedback.

So if you said C, a personalised online experience, you'd be correct.

Well done.

And now I have a task for you.

Complete the table with missing data to outline the three different ways that information can be collected about us.

So the columns in the table, we have device data, personal data and behavioural data.

And what you need to do is sort out from these five types of data underneath which column they go into.

So you've got gender websites visited, interactions on social media, email address, and browser history.

You might want to pause the presentation now and have a go at this task and then we will take some feedback in a few minutes.

Off you go.

Let's take some feedback.

So you were asked to create the table with the missing data to outline the three different ways that information can be collected about us.

So we had device data, and under that you should have got the IP address, browser history and location tracking.

For personal data, you should have got name and age, gender and email address, and then behavioural data, the websites you visited, the interactions with those sites purchases, likes and comments and interactions on social media, likes, comments, and shares.

So well done if you got that or most of that right.

Very well done.

We're gonna move on to the second part of the lesson now.

How can we keep our data safe? So we now understand all of the data that's collected about us as we make our way around the internet.

But what can we do about it? How can we keep ourselves safe? So social media companies analyse all of our online data to create a profile about us.

They sell this profile to other companies or advertisers who use it to inform their own advertising strategies.

Targeted advertising is more likely to result in purchases and therefore increased profit.

So it's all about making money.

Our personal data is extremely valuable.

Social media companies will collect and sell our data to companies to help them decide who to target advertising at.

When we make a purchase from an online advert, both the companies selling the product and the social media company, earn money.

They both win.

Each time, we like share or comment about the product online, we are giving them free advertising.

There are lots of ways that we can maintain control over how our data is stored, used and shared.

Only accept necessary cookies.

Use secure websites.

There's a little padlock symbol that symbolises that your data is stored safely.

And keep social media accounts private.

Make sure you use strong passwords and update them regularly.

Most of our devices now have ways of coming up with secure passwords and storing them for us.

So it does make that much easier.

Delete apps that you don't use anymore.

Just because you don't use them, it doesn't mean the app isn't tracking your online interactions.

So it's good to have a really good clear out.

Only download apps from secure stores.

These are normally already loaded onto your phone or tablet.

Avoid downloading apps directly from websites, as these may not always be genuine.

So true or false? How well have you been listening? Companies are allowed to sell your data without asking permission.

True or false? Have a little think.

So if you said true, you'd be right.

Well done.

It's also important to ensure that the website which we visit and the apps we use is secure.

We may be asked for permission to access our data through a popup.

If not, we can also remove permissions through the settings on our app or on our digital device.

It won't always be easy to find.

It's a very good point, Lucas.

It is in the interest of companies to discouraged us from opting out of data collection.

Sensitive data.

So for example, the app would like you to access your photos.

Allow the app to access your photos.

Select photos.

Allow access to all photos.

Don't allow.

So just like that there on the screen, apps and websites will have popups that ask your permission to access your photo gallery.

Photos could be used without your authorization to create a profile of you.

Before you select, take a moment to think about whether this app needs access to these.

Apps and websites will also have popups that ask permission to access your location.

So there's an example on the right hand side of the screen and it might say allow all the time.

Allow only while using the app or deny.

Your location, for example.

Where you go to school and meet friends could be accessed by cyber criminals.

Before you select, take a moment to think about whether this app needs access to these.

It isn't just social media sites and companies that want access to our data.

Cyber criminals may also try to hack or gain this data to collect our data and sell it without proper authorization.

Find ways to hack into our accounts, and that means including our bank accounts too.

Instal malware on our devices.

Malware is a programme that specifically is designed to gain unauthorised access to a device's network.

It can be used to hack into things.

It can find out our passwords and it can cause absolute havoc.

So malware is a real problem.

It can access our accounts and steal our personal data, and that can be used to exploit an individual or even a company.

How well were you listening? Let's do a check.

Which of these is not an effective way to control your data? Deny access to location in popups.

Delete apps from your device that are no longer used.

Only download apps from websites or only accept necessary cookies.

Have a little think and I'll take some feedback in a moment.

So if you check C, only download apps from websites, you would be correct.

Always check if the app can be downloaded from a secure app store instead.

Well done if you got that right.

Great listening.

So task B, choose one of the following security settings and write one paragraph to explain how it keeps data safe.

So you could pick denying app access, using secure websites or keeping social media accounts private.

It doesn't matter which one of those you choose.

But try and think of as many points as you can and write a paragraph about how it keeps data safe.

You might want to pause the presentation now so that you can have a go at this task and we'll take feedback when you're done.

Off you go.

So remember, you are asked to pick the methods of keeping data safe and your answers might have included, for example, using secure websites.

You might have included that it improves the security VR data that's collected and stored.

It prevents malware from being installed on our digital devices that could lead to accounts being accessed without authorization.

Denying app access.

Denying app access to location tracking and to all photos means that sensitive data is not made public and photos cannot be used by companies to create a profile of us.

You might have said something slightly different to those, but if you've included any of those points, very well done.

If you were writing about keeping social media accounts private, you might have included some of this information.

Keeping social media accounts private means that our interactions, comments, likes and shares cannot be used to target advertising at us.

It also means that companies can't build profiles of us to sell on.

Brilliant.

Well done, if you've got any of those.

Any of those points right.

That's great.

Here's a summary of the lesson.

Our personal online data is highly valuable and is collected, stored, shared, and sold, whenever we access the internet.

This data is used to target advertising at us, but it is also monitored to personalise the content that we see online.

The risks of our data being accessed include being hacked, having data stolen, and being in a filter bubble that prevents us from seeing opinions different to our own.

We have some control over how our sensitive data is used.

We should ensure that our settings are private, that we access apps and websites securely and that we deny cookies and tracking where possible.

On this slide, we've got three sources of support.

We've got Childline, CEOP, and Internet Matters.

So you can get in touch with them if you need further help or support about any of the issues raised in today's lesson.

Thank you very much for learning with me today.

I look forward to seeing you again soon for another lesson.

Take care of yourselves.