Face to Face Session 6.1 - Guidelines, duration and tools

 

teacher-icon-27.png

  • Type: Face to face session (in person or video conference)
  • Duration:
    • 1 session of 2 hours 
  • Content
    1. Introduction 
    2. Protecting privacy and personal data in the digital environment
    3.  Digital communication on health information (Part 1 (forum)

Materials

DPTA_6_EN.pdf
Handbook Module 6 EN.pdf
Module 6 Part 1 EN.pdf
Module 6 Part 1 EN.pptx
Online Training Module 6, Part 1

Action 6.1.1 Introduction

Once the attendees are in the classroom, the trainer will introduce the objectives of the session, including learning objectives, activities, and planning.

  • Duration: 10 minutes
  • Tools: Module 6 Part 1- 6.1.1 Introduction (PPT)

Action 6.1.2 Protecting privacy and personal data in the digital environment

The teacher can start with a short summary of what the participants have learned so far:

  1. To use a digital device
  2. How and where to find information
  3. Assessing information and the source of information
  4. Ways of communication in the digital environment

Now it´s time to add the part of protecting privacy.

  • Therefore, this action starts with a brainstorming about possible risk factors in the digital environment. The trainer asks the participants what they know about possible risk factors by using digital devices and surfing on the internet. This is to determine whether the participants are aware of the risk factors in the digital environment. The aim is to collect risk factors such as computer viruses, hacking, and associated identity theft (more risk factors are provided by the training materials).
  • In the next step, the criteria on how to decide if the website is trustable are repeated: Imprint, data-protection regulation, website starts with https, etc. Some examples should be shown.
  • Another risk exists by spam mails. The participants should learn to identify spam mails. Therefore, examples of different mails are shown, and the participants should decide, which ones are spam mails and which ones are not (Examples provided by training materials).
  • Also, the creation of a safe password is important for protecting personal data. The main criteria for creating a safe password should be discussed and should be collected on the blackboard/whiteboard/power point.
  • Practical Activity: Before the break, a last activity is to be conducted. To get a linkage to DPTA 5, the evaluation of the pre-identified websites from the group dynamic activity “what kind of information can we find online” can be expanded by a few questions related to the privacy and security (e.g. Is the user’s privacy protected? Does the website clearly state a privacy policy? Can the users protect their health information?).

 

  • Duration: 50 minutes
  • Tool: Module 6 Part 1 – 6.1.2 Protecting privacy and personal data (PPT)

Break 20 minutes

Action 6.1.3 Digital communication on health information (forum)

The next part of the session aims to raise awareness of the sensitivity of health data. To do this, it is important to learn what information can be disclosed by oneself in the digital environment, e.g., in a post in a forum, and what information should rather not be posted publicly on the internet.

Group-work: The participants are divided into different groups (3-5 participants). Each group gets case studies of persons who describe their health-problem in a forum. The next step is to discuss in the groups which case study includes too many personal information. Each group should collect the information which are too private on a sheet of paper. In the end, they discuss in plenum, which information are too personal and collect together some generic terms (e.g., surname, birthday or specific medical values) on the blackboard/whiteboard or Power Point. Every participant has to write down the generic terms, so that everyone has a kind of “checklist” about what information should not be included while communicating about health-related problems in the digital environment.

  • Duration: 50 minutes
  • Tools: Module 6 Part 1- 6.1.3 Protecting privacy and personal data (PPT)
    • Slides: 23 - 29

END OF FIRST DAY