Privacy and surveillance

In this lesson, you will discover the reality and limitations of privacy and surveillance. You will learn the laws that protect us directly, and others that enable the security services to protect us from harm and the tension between. In addition, you will consider the different technology that we encounter in our daily lives and the privacy implications of these. Finally, you will learn about how intrusive social media is in its harvesting of data, and become more informed about the data that they are making available through your engagement with technology, as well as the, environmental impacts of social media.

Video

Click on the play button to start the video. If your teacher asks you to pause the video and look at the worksheet you should:

  • Click "Close Video"
  • Click "Next" to view the activity

Your video will re-appear on the next page, and will stay paused in the right place.

Worksheet

These slides will take you through some tasks for the lesson. If you need to re-play the video, click the ‘Resume Video’ icon. If you are asked to add answers to the slides, first download or print out the worksheet. Once you have finished all the tasks, click ‘Next’ below.

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Lesson 5: Privacy and Surveillance

Don’t worry if you get a question wrong! Forgetting is an important step in learning. We will recap next lesson.

Question 1

Question 2

Question 3

Question 4

Question 5

Q1.Which two acts are designed to protect us from having our privacy exploited for nefarious or exploitative commercial purposes?

1/5

Q2.The Investigatory Powers Act 2016 specifies the following

2/5

Q3.3. The following statement describes which Act? “It allows any Secretary of State to give secret directions to Ofcom or any providers of public electronic communications networks. For example, after the 9/11 attacks, our National Security Agency MI5 used the act to collect bulk telephone communications data.”

3/5

Q4.Businesses need to register to use CCTV with which organisation?

4/5

Q5.Who could use or access your web browser history?

5/5

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Lesson 5: Privacy and Surveillance

Don’t worry if you get a question wrong! Forgetting is an important step in learning. We will recap next lesson.

Question 1

Question 2

Question 3

Question 4

Question 5

Q1.Which two acts are designed to protect us from having our privacy exploited for nefarious or exploitative commercial purposes?

1/5

Q2.The Investigatory Powers Act 2016 specifies the following

2/5

Q3.3. The following statement describes which Act? “It allows any Secretary of State to give secret directions to Ofcom or any providers of public electronic communications networks. For example, after the 9/11 attacks, our National Security Agency MI5 used the act to collect bulk telephone communications data.”

3/5

Q4.Businesses need to register to use CCTV with which organisation?

4/5

Q5.Who could use or access your web browser history?

5/5

Lesson summary: Privacy and surveillance

It looks like you have not completed the quiz.

To share your results with your teacher please complete the quiz.

Time to move!

Did you know that exercise helps your concentration and ability to learn?

For 5 mins...

Move around:
Walk

On the spot:
Dance

Take part in The Big Ask.

The Children's Commissioner for England wants to know what matters to young people.

Share your views and have your voice heard.

Browse Oak's lessons: