Year 10
Lesson details
Key learning points
- In this lesson, we will discover the reality and limitations of privacy and surveillance. We will learn the laws that protect us directly, and others that enable the security services to protect us from harm. We will then think about the tension that exists between these two sets of laws. In addition, we will consider the different technology that we encounter in our daily lives and the privacy implications of these. Finally, we will learn about how intrusive social media is in its harvesting of data, and become more informed about the data that they are making available through our engagement with technology, as well as the, environmental impacts of social media.
Licence
This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.
Loading...
5 Questions
Q1.
Which two acts are designed to protect us from having our privacy exploited for nefarious or exploitative commercial purposes?
Freedom of Information Act 2000 and Investigatory Powers Act 2016.
Investigatory Powers Act 2016 and Data Protection Act 2018.
Telecommunications Act 1984 and Investigatory Powers Act 2016.
Q2.
The Investigatory Powers Act 2016 specifies the following
Phone companies and internet service providers are required to keep copies of users’ emails and browsing histories forever.
The police have no right to look at private browsing histories.
The security services have no right to look at phone records.
Q3.
3. The following statement describes which Act? “It allows any Secretary of State to give secret directions to Ofcom or any providers of public electronic communications networks. For example, after the 9/11 attacks, our National Security Agency MI5 used the act to collect bulk telephone communications data.”
The Data Protection Act 2018.
The Freedom of Information Act 2000.
The Investigatory Powers Act 2016.
Q4.
Businesses need to register to use CCTV with which organisation?
The local council.
The police.
The Security Services.
Q5.
Who could use or access your web browser history?
Criminals.
Internet service providers and advertisers.
Law enforcement.