Skip to content
Computing · Secondary 3 · Impacts of Computing on Society · Semester 2

Protecting Your Personal Data Online

Students will learn about the types of personal data collected online, how it's used, and practical steps to protect their privacy.

MOE Syllabus OutcomesMOE: Ethics and Social Issues - S3

About This Topic

Protecting Your Personal Data Online equips Secondary 3 students with essential digital literacy to thrive in Singapore's connected society. They identify key types of personal data, including direct identifiers like names, NRIC numbers, emails, and phone contacts, plus inferred data such as location history, browsing patterns, and purchase behaviors. Websites, apps, and social platforms gather this via cookies, pixels, forms, and device sensors. Students examine how companies analyze it for targeted advertising, user profiling, price discrimination, and resale to third parties, linking to real apps like TikTok or Lazada they use daily.

This topic sits within the MOE Computing curriculum's Impacts of Computing on Society unit, under Ethics and Social Issues standards. It sharpens critical evaluation of data practices, fosters responsible choices, and prepares students for Smart Nation challenges. Practical strategies covered include strong unique passwords, two-factor authentication, privacy setting tweaks, VPN use, and spotting phishing cues.

Active learning suits this topic perfectly. When students audit their own app permissions in pairs or simulate data leaks through role-plays, remote concepts turn urgent and actionable. Group strategy swaps build confidence and peer accountability for lasting habits.

Key Questions

  1. Identify different types of personal data that can be collected online.
  2. Explain how companies might use personal data for advertising or other purposes.
  3. Develop strategies to manage and protect their own personal information online.

Learning Objectives

  • Classify types of personal data collected online, distinguishing between direct identifiers and inferred data.
  • Analyze how companies utilize personal data for targeted advertising, user profiling, and potential price discrimination.
  • Develop and present a personal data protection strategy incorporating at least three practical online safety measures.
  • Critique the privacy policies of two different popular apps or websites, identifying potential risks and benefits of data collection.
  • Demonstrate how to adjust privacy settings on a common social media platform to minimize data exposure.

Before You Start

Introduction to the Internet and World Wide Web

Why: Students need a basic understanding of how the internet functions to comprehend how data is transmitted and collected online.

Basic Cybersecurity Concepts

Why: Familiarity with concepts like passwords and malware provides a foundation for understanding more advanced protection methods like 2FA and phishing prevention.

Key Vocabulary

Personally Identifiable Information (PII)Information that can be used on its own or with other information to identify, contact, or locate a single person. Examples include name, NRIC, or email address.
Inferred DataInformation about a person that is not directly provided but is deduced from their online behavior, such as browsing history or purchase patterns.
CookiesSmall text files stored on a user's computer by a website to remember information about the user, like login details or preferences.
Two-Factor Authentication (2FA)A security process that requires users to provide two different authentication factors to verify their identity, adding an extra layer of protection beyond just a password.
PhishingA cybercrime where attackers impersonate trustworthy entities to trick individuals into revealing sensitive information like passwords or credit card details.

Watch Out for These Misconceptions

Common MisconceptionIncognito mode keeps all my online activity private.

What to Teach Instead

Incognito only prevents local history and cookie storage on the device; websites, ISPs, and advertisers still track via IP and fingerprints. Hands-on demos comparing tracked sites in normal versus incognito modes clarify this, while pair discussions expose hidden persistence.

Common MisconceptionCompanies collect data only to improve their services for me.

What to Teach Instead

Firms often aggregate and sell data for ads or unrelated purposes, despite privacy policies. Role-play sales pitches and data flow maps in groups help students question motives, revealing profit incentives over user benefit.

Common MisconceptionA single strong password protects all my accounts.

What to Teach Instead

Reuse risks chain breaches across sites; multi-factor and managers are vital. Simulations of hacked password dumps in small groups show cascade effects, prompting adoption of layered defenses through peer coaching.

Active Learning Ideas

See all activities

Real-World Connections

  • Cybersecurity analysts at financial institutions like DBS Bank in Singapore constantly monitor for data breaches and develop strategies to protect customer PII from sophisticated phishing attacks.
  • Digital marketing professionals at companies like Shopee use data analytics to understand consumer behavior and tailor advertisements, raising questions about the ethical boundaries of personalized marketing.
  • Users of ride-sharing apps like Grab may not realize the extent of location data collected, which can be used for service improvement but also raises privacy concerns if misused.

Assessment Ideas

Exit Ticket

Provide students with three scenarios describing online data collection. Ask them to identify the type of data collected (PII or inferred), explain one potential use by a company, and suggest one protective measure they could take.

Discussion Prompt

Pose the question: 'Is it acceptable for companies to use your browsing history to show you personalized ads, even if you haven't explicitly agreed?' Facilitate a class discussion where students debate the pros and cons, referencing concepts like user profiling and price discrimination.

Quick Check

Show students screenshots of common app permission requests (e.g., location, contacts, microphone). Ask them to quickly write down whether they would grant each permission and provide a one-sentence justification based on potential data use and privacy risks.

Frequently Asked Questions

What types of personal data do websites collect from students?
Common types include profile details like names, ages, and schools; contact info such as emails and phones; behavioral data from clicks, searches, and time spent; plus device signals like location and IP addresses. In Singapore context, apps may access SingPass-linked info. Teach via device audits: students categorize their own data examples, grasp collection scale, and link to daily logins for relevance.
How do companies use personal data for advertising?
Companies build profiles from data to show tailored ads, like suggesting sneakers after sports searches. Algorithms predict interests, adjust prices dynamically, and retarget across sites. Explain with real examples: trace a student's mock shopping session to ad follows. This reveals value chains, urging privacy tweaks like ad blockers for control.
What practical steps protect personal data online?
Key steps: use unique strong passwords via managers, enable two-factor authentication everywhere, review and limit app permissions regularly, opt out of data sharing in settings, avoid public Wi-Fi without VPN, and verify links before clicking. Role-plays reinforce: students practice on dummy accounts, share checklists, building routines against phishing and leaks.
How can active learning help students grasp online privacy?
Active methods like personal device audits and phishing role-plays make abstract risks concrete, as students confront their own data exposures. Small-group strategy jigsaws promote teaching peers, deepening understanding through explanation. Whole-class shares of real setting changes ensure application, far outpacing lectures by sparking ownership and discussion of Singapore-specific threats like scam SMS.