Search Results
Student Handout
Image

K, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, Primary (K-2), Elementary (3-5), Intermediate (6-8), Secondary (9-12)
Students recognize the importance of protecting online identity by engaging in class discussion. They list types of information that reveal personal identity; explain the purpose of protecting online identity; discuss the risks of revealing personally identifiable information; evaluate online profiles and behaviors for security and identity protection, and create a sketch of an online registration form and user profile for people under age 13.
Student Handout
Image

7, Intermediate (6-8)
Students recognize the importance of protecting online identity by engaging in class discussion. They list types of information that reveal personal identity; explain the purpose of protecting online identity; discuss the risks of revealing personally identifiable information; evaluate online profiles and behaviors for security and identity protection, and create a sketch of an online registration form and user profile for people under age 13.
Lesson Plan
Image

7, Intermediate (6-8)
Students recognize the importance of protecting online identity by engaging in class discussion. They list types of information that reveal personal identity; explain the purpose of protecting online identity; discuss the risks of revealing personally identifiable information; evaluate online profiles and behaviors for security and identity protection, and create a sketch of an online registration form and user profile for people under age 13.
Student Handout
Image

7, Intermediate (6-8)
Students engage in dialogue about their experiences in various online communities, create user personas and provide background information about a technology of their choice. They aquire and use vocabulary terms; describe personal experience with using a site, app, or multiplayer game; identify the need for online safety; create a user persona, and write a user story.
Lesson Plan
Image

7, Intermediate (6-8)
Students engage in dialogue about their experiences in various online communities, create user personas and provide background information about a technology of their choice. They aquire and use vocabulary terms; describe personal experience with using a site, app, or multiplayer game; identify the need for online safety; create a user persona, and write a user story.
Lesson Plan
Image

7, 8, Intermediate (6-8)
In this series, students examine and discuss online activities that are common in their generation's digital culture. They think critically about the safety and security issues associated with sharing videos and friending people online. The goal is to empower students to make wise choices.
Student Handout
Image

7, 8, Intermediate (6-8)
In this series, students examine and discuss online activities that are common in their generation's digital culture. They think critically about the safety and security issues associated with sharing videos and friending people online. The goal is to empower students to make wise choices.
Student Handout
Image

7, 8, Intermediate (6-8)
In this series, students examine and discuss online activities that are common in their generation's digital culture. They think critically about the safety and security issues associated with sharing videos and friending people online. The goal is to empower students to make wise choices.
Student Handout
Image

7, 8, Intermediate (6-8)
Students explore the safety and security risks of apps like Snapchat, which facilitate the real-time sharing of photos that self-destruct after a designated period of time. They use a graphic organizer to sort their ideas.
Lesson Plan
Image

7, 8, Intermediate (6-8)
Students explore the safety and security risks of apps like Snapchat, which facilitate the real-time sharing of photos that self-destruct after a designated period of time. They use a graphic organizer to sort their ideas.
Student Handout
Image

8, Intermediate (6-8)
Students discover that, by providing indirect personal information online, bullies or predators can discover a target’s offline identity and location. They read and discuss Brittany’s story, and develop strategies to identify and prevent unsafe situations.
Lesson Plan
Image

8, Intermediate (6-8)
Students discover that, by providing indirect personal information online, bullies or predators can discover a target’s offline identity and location. They read and discuss Brittany’s story, and develop strategies to identify and prevent unsafe situations.
Student Handout
Image

8, Intermediate (6-8)
Students explore the risks of posting personal information online. They identify risk factors and practice proactive steps to keep sensitive information private.
Student Handout
Image

8, Intermediate (6-8)
Students explore the risks of posting personal information online. They identify risk factors and practice proactive steps to keep sensitive information private.
Lesson Plan
Image

8, Intermediate (6-8)
Students explore the risks of posting personal information online. They identify risk factors and practice proactive steps to keep sensitive information private.
Student Handout
Image

8, Intermediate (6-8)
Students participate in an anonymous survey. They examine a true-life stories; identify online safety issues, and determine factors that contribute to safety risks in screen names, passwords and profiles.
Student Handout
Image

6, 7, 8, Intermediate (6-8)
Students come to understand that cyber bullying is a cyclical pattern of behavior initiated and perpetuated through electronic means. They closely examine a scholarly definition in order to identify the roles in a cyber bullying situation, distinguish cyber bullying from social conflict, and determine the power of the upstander in breaking the cycle.
Lesson Plan
Image

8, Intermediate (6-8)
Students participate in an anonymous survey. They examine a true-life stories; identify online safety issues, and determine factors that contribute to safety risks in screen names, passwords and profiles.
Teacher Reference Page
Image

9, 10, 11, 12, Secondary (9-12)
In this lesson, students explore the concept of invasion of privacy. They research key terms in order to better understand the technologies and online practices that intrude on their right to privacy. Students deconstruct the legal definition of “invasion of privacy” into four categories and decide whether a particular practice is highly invasive, moderately invasive or non-invasive. Students use their understanding of privacy policies, and their knowledge of key terms, to support their opinions.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
In this lesson, students explore the concept of invasion of privacy. They research key terms in order to better understand the technologies and online practices that intrude on their right to privacy. Students deconstruct the legal definition of “invasion of privacy” into four categories and decide whether a particular practice is highly invasive, moderately invasive or non-invasive. Students use their understanding of privacy policies, and their knowledge of key terms, to support their opinions.