Computer Science
Grade 9
20 min
Privacy Settings: Controlling Your Online Presence
Learn how to adjust privacy settings on social media and other online platforms.
Tutorial Preview
1
Introduction & Learning Objectives
Learning Objectives
Identify at least five types of Personally Identifiable Information (PII) commonly shared online.
Analyze the privacy settings of a social media or app profile and categorize them as 'public', 'friends only', or 'private'.
Configure privacy settings on a mock application to apply the Principle of Least Privilege.
Evaluate the permissions requested by a mobile application and determine which are necessary for its core function.
Explain the difference between first-party and third-party data sharing.
Articulate the long-term risks of oversharing personal information online.
Ever posted a photo and had a stranger comment on it? 🤔 Let's explore how you can control exactly who sees your digital life.
This lesson will teach...
2
Key Concepts & Vocabulary
TermDefinitionExample
Personally Identifiable Information (PII)Any data that can be used to identify a specific individual. It's like your digital fingerprint.Your full name, home address, email, phone number, date of birth, or a photo where your face is clearly visible.
Digital FootprintThe trail of data you leave behind when you use the internet. It includes websites you visit, social media posts, and information you submit online.A comment you left on a YouTube video years ago, a photo you were tagged in on Instagram, and your search history are all part of your digital footprint.
GeotaggingThe process of adding geographical identification data to media like photos and videos. It automatically tags your location.When you post a photo to social media, the app might automatically ad...
3
Core Syntax & Patterns
The Principle of Least Privilege (PoLP)
Grant an entity (a user or an app) only the minimum permissions necessary to perform its function.
Apply this when installing a new app or configuring settings. If a calculator app asks for access to your contacts and microphone, it's violating PoLP. Deny permissions that are not essential for the app's core purpose.
The 'Public by Default' Pattern
Assume all settings are set to 'Public' or the least private option when you create a new account. `DefaultSetting = PUBLIC`
Always perform a privacy check-up immediately after creating a new online account. Manually change settings for post visibility, friend requests, and data sharing from 'Public' or 'Everyone' to 'Friends Only'...
4 more steps in this tutorial
Sign up free to access the complete tutorial with worked examples and practice.
Sign Up Free to ContinueSample Practice Questions
Challenging
A new 'Smart Pizza' ordering app requests these permissions: Location (to find nearby stores), Contacts (to share offers with friends), and Camera (to scan coupon QR codes). You want to order a pizza for delivery to your saved home address. Applying the Principle of Least Privilege, which permissions are absolutely necessary for THIS specific task?
A.Location, Contacts, and Camera
B.Location and Contacts
C.None of them
D.Location only
Challenging
The 'I Have Nothing to Hide' fallacy is a pitfall because it incorrectly assumes that privacy is about hiding bad things. Based on the tutorial's content, a more accurate reason to value privacy is that it is fundamentally about:
A.Control over your own personal information and how it is used.
B.Making sure no one ever knows your real name online.
C.Preventing advertisers from making money.
D.Deleting your digital footprint completely.
Challenging
A free navigation app requires access to your location to function. Its privacy policy also states, 'We share aggregated, anonymized user location patterns with third-party urban planning partners.' Which is the most critical and nuanced evaluation of this situation?
A.This is illegal and should be reported immediately.
B.The location permission is unnecessary for a navigation app.
C.This is a good example of the 'I Have Nothing to Hide' fallacy in action.
D.The permission is necessary, but you must trust the company's anonymization process and decide if the data sharing is a price you're willing to pay.
Want to practice and check your answers?
Sign up to access all questions with instant feedback, explanations, and progress tracking.
Start Practicing Free