Search Results
Student Handout
Image
,
Teacher Reference Page
Image


K, 1, 2, Primary (K-2)
As part of i-SAFE’s Music and Movement series, students sing along with the song, “You’ve Got to Follow the Plan” and review basic safety concepts by conducting a mystery scavenger hunt. They express their ideas both verbally and visually.
Lesson Plan
Image

K, 1, 2, Primary (K-2)
As part of i-SAFE’s Music and Movement series, students sing along with the song, “You’ve Got to Follow the Plan” and review basic safety concepts by conducting a mystery scavenger hunt. They express their ideas both verbally and visually.
Student Handout
Image
,
Teacher Reference Page
Image


K, 1, 2, Primary (K-2)
As part of i-SAFE’s Music and Movement series, students sing along with the song “Safe as Can Be.” They listen closely to the lyrics and illustrate the Internet safety concepts identified in the song.
Lesson Plan
Image

K, 1, 2, Primary (K-2)
As part of i-SAFE’s Music and Movement series, students sing along with the song “Safe as Can Be.” They listen closely to the lyrics and illustrate the Internet safety concepts identified in the song.
Lesson Plan
Image

K, 1, 2, Primary (K-2)
Students follow along with dialogue between characters Dot & i to learn how to find balance between screen time and real world interaction. Students list reasons to log off or turn off a device. They determine time limits for using technology and identify their favorite offline activities.
Lesson Plan
Image

K, 1, 2, Primary (K-2)
Students follow along with dialogue between characters Dot & i as well as informational text to learn that netquette means to be polite and courteous when communicating with others online and through electronic devices. They learn basic guidelines for digital etiquette or "netiquette."
Lesson Plan
Image

K, 1, 2, Primary (K-2)
Students follow along with dialogue between characters Dot & I to learn how to communicate safety online. Students come to understand that they need parent permission and supervision to communicate with others online, and that they should only communicate online with people that they already know and trust.
Lesson Plan
Image

K, 1, 2, Primary (K-2)
Students follow along with dialogue between characters Dot & i to learn that they need to create safe usernames and secure passwords in order to protect their digital safety. They use tips from Dot & i to practice creating safe and secure usernames and passwords.
Lesson Plan
Image

K, 1, 2, Primary (K-2)
Students follow along with dialogue between Dot & i as well as informational text to learn that not all websites are safe for children. They come to understand that some websites are appropriate while other websites are inappropriate. Students identify websites that are suitable for someone their age.
Lesson Plan
Image

K, 1, 2, Primary (K-2)
This unit lays a foundation for digital safety. Students acquire and use age-appropriate vocabulary terms related to technology, information security, and online safety. They use illustrations to clarify informational text and present their ideas both verbally and in writing.
Teacher Reference Page
Image

K, 1, 2, 3, 4, 5, Primary (K-2), Elementary (3-5)
Acceptable Use Policies are often written in complex legal language. Given that students (and parents) are responsible for knowing, understanding and agreeing to follow school policies and procedures, this unit aims to familiarize students with the school's AUP. Students become familiar with the purpose of an AUP and the guidelines for responsible use of educational technology. They participate in a collaborative project that promotes responsible use of educational technology at school and at home. Visit isafedirect.com for more information on cloud-based AUP training and verification.
Lesson Plan
Image

K, 1, 2, 3, 4, 5, Primary (K-2), Elementary (3-5)
The purpose of the Student Pledge is to promote responsible technology use at school. Students pledge to make good choices while using electronic devices, online programs and networks provided by their school or school district.
Lesson Plan
Image

K, 1, 2, 3, 4, 5, Primary (K-2), Elementary (3-5)
Students share what they have learned about their school's AUP with their parents and guardians.
Lesson Plan
Image

K, 1, 2, 3, 4, 5, Primary (K-2), Elementary (3-5)
Students become familiar with their school's AUP and create a poster that displays guidelines for acceptable (responsible) use of technology.
Lesson Plan
Image

K, 1, 2, 3, 4, 5, Primary (K-2), Elementary (3-5)
Acceptable Use Policies are often written in complex legal language. Given that students (and parents) are responsible for knowing, understanding and agreeing to follow school policies and procedures, this unit aims to familiarize students with the school's AUP. Students become familiar with the purpose of an AUP and the guidelines for responsible use of educational technology. They participate in a collaborative project that promotes responsible use of educational technology at school and at home. Visit isafedirect.com for more information on cloud-based AUP training and verification.
Student Handout
Image

2, 3, 4, Primary (K-2), Elementary (3-5)
Students learn that companies design websites that appeal to children in order to advertise toys and games.They understand that adult permission and supervision is an important aspect of protecting their privacy and safety. Students collaborate in a discussion and express their ideas both verbally and in writing.
Teacher Reference Page
Image

3, 4, Elementary (3-5)
Students learn that private information can be made public even when they engage in seemingly “safe” activities. They acquire and use vocabulary terms. Working in groups, students create scenarios and apply techniques to maintain personal information in a given situation.
Student Handout
Image

3, 4, Elementary (3-5)
Students learn that private information can be made public even when they engage in seemingly “safe” activities. They acquire and use vocabulary terms. Working in groups, students create scenarios and apply techniques to maintain personal information in a given situation.
Lesson Plan
Image

3, 4, Elementary (3-5)
Students learn that private information can be made public even when they engage in seemingly “safe” activities. They acquire and use vocabulary terms. Working in groups, students create scenarios and apply techniques to maintain personal information in a given situation.
Student Handout
Image

5, 6, Elementary (3-5), Intermediate (6-8)
Students learn that they can safely interact with others by being careful about the types of personal information that they reveal online. They examine a series of scenarios and determine the potential consequences.