How to teach kids identity and access management regarding personal dataHow to teach kids identity and access management regarding personal data

This Blog is a special kind of blog, I am not writing about topics you get used to, but I will write about topics which might be different from the rest sometimes. Today I will write about “Educational Gaps: Neglected Lessons on Personal Data.”

Today’s topic is what we not learning in schools, Disney movies or any other places, but from the real life. This means if we want well funkctioning kids to grow up, we need to educate them with different stories regarding LIFE. Real life, not just a pink bubbly dream.

This is a lot of RESPONSIBILITY.

What you need to have kids and to have responsible kids you need to teach them for a responsible life with gradually and progressively as you learn life and you have been learning you have to teach them in the same way. I am not saying do this or that, but it would be nice if they would have some idea how to cope with life, even if those things will never happen with them, at least have some idea for different solutions, because they never know when they need some knowledge or ideas.

It is better if they have some idea ahead, because if they do not have then their life will be a bit difficult. Even things not happened with you, you need to have some stories which happened with others, and might tell kids about it.

Types of difficulties


I will not write scams or examples, you have to find out on your own, how to educate kids regarding this, but you need to find out, because if you not educating them then they might be naive, which means they might be exposed for threats and bad guys.

As we all know in today’s complex world, it’s crucial for young minds to be equipped with knowledge beyond the traditional curriculum. Stories of scams serve as cautionary tales, illustrating the importance of critical thinking and skepticism.

By sharing real-life examples of individuals who fell victim to scams, students can develop a heightened awareness of potential pitfalls and scams that may target them, fostering a sense of financial literacy and caution.

Layoffs and unemployment

The harsh reality of layoffs and unemployment is a prevalent issue that even adults grapple with.

Introducing stories of individuals who faced unexpected job losses can prepare students for the uncertainties of the job market. These narratives emphasize adaptability, resilience, and the significance of acquiring a versatile skill set to navigate the ever-changing landscape of employment.

By imparting these lessons, we empower students to proactively shape their own career paths and respond resiliently to setbacks.


Excommunication from social circles is an often-overlooked aspect of growing up, but it can profoundly impact a student’s mental and emotional well-being. Sharing stories of individuals who have experienced exclusion highlights the importance of empathy, inclusivity, and kindness.

By fostering an environment of understanding, students can contribute to creating a supportive community, reducing the likelihood of exclusionary behaviors and promoting a culture of acceptance.


Self-protection is a vital skill that extends beyond physical safety. Narratives of students who successfully navigated challenges using self-advocacy, emotional intelligence, and assertiveness can empower their peers.

By learning about

  • effective communication,
  • setting boundaries, and
  • seeking help when needed,

students gain the tools necessary to protect themselves from various forms of harm, ensuring a safer and more supportive school environment.

In conclusion, weaving these stories into the educational fabric provides students with a broader perspective on life.

Understanding the nuances of scams, unemployment challenges, social dynamics, and self-protection equips students with practical life skills that extend beyond textbooks, preparing them to navigate the complexities of the real world with resilience and wisdom.

Personal data

We need to speak about this topic, because not everyone think through what personal data means, and not everyone understand that even sharing your best friend’s e-mail address in a game or if your kids are doing this that means you/they shared someone else’s personal data and who knows to what database they are hold and kept.

So better if you enlighten everyone that not just other’s picture, video and e-mail needs to be kept in private, but personal data too. Personal data, also known as personal information, refers to any information that relates to an identified or identifiable individual. It encompasses a broad range of details that can be used to distinguish or trace an individual’s identity, either directly or indirectly.

Protect your personal data as much as you can in most situations especially online and teach this for kids too.

Note: you need to speak with your kids what can they share and with who and in what situations.

This is more like identity and access management in technology, but kids really need to know they can not be naive and trust in everyone as much as they trust in their close family members regarding their personal data.

This is more like identity and access management in technology, but kids really need to know they can not be naive and trust in everyone as much as they trust in their close family members regarding their personal data.

Personal data can include, but is not limited to:

Basic Identification Information

  • Name
  • Date of birth
  • Gender
  • Social security number
  • National identification number

Obviously I will not write here but personal ID, driving license and passports neither.

Contact Information

  • Address
  • Phone number
  • Email address

Demographic Information

  • Ethnicity
  • Race
  • Marital status
  • Language

Financial Information

  • Bank account details
  • Credit card information
  • Salary details

Of couse this is less relevant regarding kids, but still good to know because once they grow up. This is PRIVATE means they do not even tell to their close friends, or anyone close to them.

Health Information

  • Medical history
  • Health insurance information
  • Biometric data

Online Identifiers

  • IP addresses
  • Usernames
  • Social media profiles

With technology, more and more threats are out there, highlighting the critical need for robust cybersecurity measures to safeguard individuals’ personal data and protect against the increasing sophistication of cyber threats.

Educational and Professional Details

  • Educational background
  • Employment history
  • Professional qualifications

Biometric Data

  • Fingerprints
  • Facial recognition data
  • Retina scans

Location Data

  • GPS coordinates
  • Data from location-based services

Preferences and Behavior

  • Shopping preferences
  • Web browsing history
  • Interests and hobbies

The protection of personal data is a critical aspect of privacy, and various laws and regulations exist globally to regulate its collection, processing, and storage.

Individuals have the right to know

  • what personal data is being collected about them,
  • how it is being used, and
  • to have some control over its use.

Organizations that handle personal data are often required to implement measures to ensure the security and confidentiality of this information.

Toolbox to solve issues

You need different toolbox for different life situations I will write one and you can create for yourself and your kids more as I will not the one who teach them but you can help them by teaching them what to do and where to go when they face with a challange if they are facing with issues.

For example when I faced with a challange like seeing 2nd security code which was masked and should be then it meant I needed to update 3 companies regarding this issue.

So it will not help if you accept the fact, but you need to act on it, which means reporting the issues to different companies.

Knowledge Base

  • Awareness of Common Scams: Stay informed about prevalent scams targeting individuals.
  • Education on Online Safety: Understand the importance of safeguarding personal information.

Reporting Platforms (US)

Here the examples are specified to the US, find your countries platforms and create a toolbox.

  • Federal Trade Commission (FTC): Report scams and deceptive business practices in the United States.
  • Internet Crime Complaint Center (IC3): For reporting cybercrime globally.
  • Better Business Bureau (BBB): File complaints about businesses and report scams.

Financial Protections

  • Contact Your Bank: Report unauthorized transactions and seek assistance in case of financial fraud.
  • Credit Reporting Agencies: Place fraud alerts or freezes on your credit reports to prevent identity theft.

Online Platforms

  • Social Media Networks: Report scams or suspicious activity on platforms like Facebook, Instagram, or Twitter.
  • Email Providers: Flag phishing emails and report suspicious messages.

Local Authorities

  • Local Police: Report scams and fraud to your local law enforcement agency.
  • Consumer Protection Agencies: Check for local consumer protection agencies that handle scams.

Community Awareness

  • Educate Others: Share information about scams with friends and family to enhance community awareness.
  • Neighborhood Watch Programs: Engage in local initiatives to prevent and report scams in your community.

Cybersecurity Tools

  • Antivirus Software: Install and regularly update antivirus programs to protect against online threats.
  • Secure Password Management: Utilize strong, unique passwords and consider using password management tools.

Legal Advice

  • Legal Aid Services: Seek legal advice if you’ve been a victim of fraud, especially for more complex cases.

Do not forget that quick reporting of scams can prevent further harm and aid authorities in taking appropriate action. Always be cautious about sharing personal information online and verify the legitimacy of requests before providing any sensitive data.

Obviously those information most family know and responsible for it, but creating a toolbox can help a lot in order to manage these kind of situations well, because in emergency it is not easy to think logically and fast all the time.

What is GDPR?

GDPR, or the General Data Protection Regulation, is a comprehensive data protection and privacy regulation in the European Union (EU) that came into effect on May 25, 2018.

It aims to give individuals more control over their personal data and how it is collected, processed, stored, and shared – mostly by companies. The GDPR applies not only to organizations based in the EU but also to those outside the EU that process the personal data of EU residents.

Key principles of GDPR

  • Lawful and Fair Processing: data processing must have a legal basis, and individuals must be informed about how their data will be used in a clear and transparent manner.
  • Purpose Limitation: personal data should only be collected for specified, explicit, and legitimate purposes. It should not be further processed in ways incompatible with those purposes.
  • Data Minimization: organizations should only collect and process the personal data that is necessary for the intended purpose.
  • Accuracy: organizations are responsible for ensuring the accuracy of the personal data they hold, and they must take steps to rectify inaccurate information.
  • Storage Limitation: personal data should be kept for no longer than necessary for the purposes for which it is being processed.
  • Integrity and Confidentiality: organizations are required to implement security measures to protect personal data from unauthorized access, disclosure, alteration, and destruction.
  • Accountability: organizations must demonstrate compliance with the principles of GDPR and be able to show how they are meeting their obligations.
  • Individual Rights: GDPR grants individuals several rights, including the right to access their data, the right to rectify inaccuracies, the right to erasure (also known as the “right to be forgotten”), and the right to data portability.

Provisions of GDPR

Data Protection Officer (DPO)

  • Some organizations are required to appoint a Data Protection Officer to oversee GDPR compliance, particularly if they process large amounts of sensitive data.

Data Breach Notification

  • Organizations must notify relevant authorities and affected individuals of data breaches within 72 hours of becoming aware of the breach.

I hope knowing these kind of information will help a bit all of us to be more aware what we need to protect regarding personal data in the cyberspace.

By Silk and Cake

Hi, Silk & Cake is my new blog about design, experience, entertainment, business, travel, fashion, and LifeStyle.

Leave a Reply