DigComp 2.2 English questionnaire
4.2 Protecting personal data and privacy
Knowledge
I know that the “privacy policy” of an app or service should explain what personal data it collects (e.g. name, brand of device, geolocation of the user), and whether data are shared with third parties
Knowledge
I am aware that secure electronic identification is a key feature designed to enable safer sharing of personal data with third parties when conducting public sector and private transactions.
Knowledge
I know that the processing of personal data is subject to local regulations such as the EU’s General Data Protection Regulation (GDPR) (e.g. voice interactions with a virtual assistant are personal data in terms of the GDPR and can expose users to certain data protection, privacy and security risks ). (AI)
Skills
I know how to identify suspicious e-mail messages that try to obtain sensitive information (e.g. personal data, banking identification) or might contain malware. Knows that these emails are often designed to trick people who do not check carefully and who are thus more susceptible to fraud, by containing deliberate errors that prevent vigilant people clicking on them.
Skills
I know how to apply basic security measures in online payments (e.g. never sending a scan of credit cards or giving the pin code of a debit/payment/credit card).
Skills
I know how to use electronic identification for services provided by public authorities or public services (e.g. filling-in your tax form, applying for social benefits, requesting certificates) and by the business sector, such as banks and transport services.
Skills
I know how to use digital certificates acquired from certifying authorities (e.g. digital certificates for authentication and digital signing stored on national identity cards).
Attitudes
I weigh the benefits and risks before allowing third parties to process personal data (e.g. recognises that a voice assistant on a smartphone, that is used to give commands to a robot vacuum cleaner, could give third parties - companies, governments, cybercriminals - access to the data). (AI)
Attitudes
I am confident in carrying out online transactions after taking appropriate safety and security measures.
Use Case Employment scenario
I can distinguish between appropriate and inappropriate digital content to share it on the corporate Twitter account, so that my privacy and that of my colleagues are not damaged.
Use Case Employment scenario
I can assess whether personal data are used on the Corporate Twitter appropriately according to the European Data Protection Law and Right to be Forgotten.
Use Case Employment scenario
I can deal with complex situations that can arise with personal data in my organisation while on Twitter, such as removing pictures or names to protect personal information in accordance with the European Data Protection Law and Right to be Forgotten.
Use Case Employment scenario
I can select the most appropriate way to protect the personal data of my colleagues (e.g. address, phone number) when sharing digital content (e.g. a picture) on the corporate Twitter account.
Use Case Learning Scenario
I can overcome complex situations that can arise with my personal data and those of my classmates while on the digital education platform, such as personal data is not used in accordance to the “Privacy policy” of the platform.
Use Case Learning Scenario
I can select the most appropriate way to protect my personal data (e.g. address, phone number), before sharing it on the school’s digital platform.
Use Case Learning Scenario
I can distinguish between appropriate and inappropriate digital content to share it on my school’s digital platform, so that my privacy and that of my classmates are not damaged.
Use Case Learning Scenario