Information privacy and security-secondary

Get sleuthing and learn about cyber security. 

Students can boost their cyber security skills, learn how to protect from hackers and take a step toward a career in cybersecurity.

Year groups:  7 – 8

Access Information Privacy and Security v2.0 

Date: On-demand 

Syllabus outcomes

NESA outcomes

Information and Software Technology 7 – 10: 5.3.1, 5.2.2, 5.2.3, LS3.1, LS4.1 

Australian Curriculum version 8.4


ICT Capability

Applying social and ethical protocols and practices when using ICT 

Students apply appropriate practices to recognise the intellectual property for digital information of themselves and others. They use appropriate practices for the physical and logical storage and security of digital information and apply appropriate protocols when using ICT to safely create, communicate or share information. Students gain an understanding of the benefits and consequences of the use of ICT by individuals, groups and communities and the impact of the use of ICT on the fabric of society. In developing and acting with ICT capability, students: 

  • recognise intellectual property 

  • apply digital information security practices 

  • apply personal security protocols 

  • identify the impacts of ICT in society 

Top of page