Search Results
Student Handout
Image

5, Elementary (3-5)
Students recognize the risks of having a weak password. Class discussion and practice activities enable students to create strong passwords to protect themselves from cyber bullying, identity theft and online predators. Student will be able to state the attributes of a strong password, explain the importance of protecting online accounts, and create strong and secure passwords.
Student Handout
Image
,
Visual Display
Image


2, Primary (K-2)
Students understand the concept online identity. They discuss their offline identity, examine how an identity forms, and discuss how an identity forms online. A Parent Page is included.
Student Handout
Image

5, Elementary (3-5)
Students learn how to safeguard their identities, protect their personal safety, and take action when contacted by an inappropriate and unsafe person online. Students complete their plan for their Sock Puppet Nation virtual world.
Student Handout
Image

5, Elementary (3-5)
Students learn how to safeguard their identities, protect their personal safety, and take action when contacted by an inappropriate and unsafe person online. Students complete their plan for their Sock Puppet Nation virtual world.
Student Handout
Image

5, Elementary (3-5)
Students learn how to safeguard their identities, protect their personal safety, and take action when contacted by an inappropriate and unsafe person online. Students complete their plan for their Sock Puppet Nation virtual world.
Student Handout
Image

5, Elementary (3-5)
Students learn how to safeguard their identities, protect their personal safety, and take action when contacted by an inappropriate and unsafe person online. Students complete their plan for their Sock Puppet Nation virtual world.
Multimedia Resource
Image

5, Elementary (3-5)
Students learn how to safeguard their identities, protect their personal safety, and take action when contacted by an inappropriate and unsafe person online. Students complete their plan for their Sock Puppet Nation virtual world.
Multimedia Resource
Image

6, Intermediate (6-8)
This introductory lesson prepares students for the Online Personal Safety unit by allowing them to share their perspectives and experiences with digital communication. Initiate a class discussion about the online activities of the students, and the role of parental supervision and permission in these digital places. Gauge student attitudes towards the roles that adults play in keeping young people safe in the real world as well as online. Students will write a reflection on their current online practices and perspective on personal safety.
Multimedia Resource
Image

6, Intermediate (6-8)
In this lesson, students will practice choosing safe screen names. A screen name is a general term for online communities and networks. The term varies with other forms of online communication (e.g. social media sites, gaming networks, forums, and instant messaging apps.) Other versions of this term include: username, handle, gamertag, and profile name. Following the practice session, students will discuss the pros and cons of online anonymity in relationship to the behaviors exhibited by people online.
Multimedia Resource
Image

6, Intermediate (6-8)
Online accounts store personally identifiable information. Therefore, online security is a crucial aspect of protecting personal safety. In this lesson, students will learn how to protect their online accounts by creating strong passwords. Students will understand that strong passwords safeguard personal information from people with negative intentions such as cyber bullies, online predators and perpetrators of identity theft.
Student Handout
Image

6, Intermediate (6-8)
Students investigate the tactics of unknown online contacts. A scenario illustrates how an unsafe online contact can gather information and interact with individuals to lure them into unsafe situations. Students identify the types of private information; distinguish grooming tactics in a given scenario; determine the boundaries of safe online communication, and develop personal safety guidelines.
Teacher Reference Page
Image

6, Intermediate (6-8)
Students investigate the tactics of unknown online contacts. A scenario illustrates how an unsafe online contact can gather information and interact with individuals to lure them into unsafe situations. Students identify the types of private information; distinguish grooming tactics in a given scenario; determine the boundaries of safe online communication, and develop personal safety guidelines.
Multimedia Resource
Image

6, Intermediate (6-8)
At this point, students have studied the realities of participating in online communities and practiced strategies to protect their safety and identity. Students will understand their responsibilities, and the responsibilities of online services and parents, in protecting online personal safety.
Student Handout
Image

6, Intermediate (6-8)
Students investigate the tactics of unknown online contacts. A scenario illustrates how an unsafe online contact can gather information and interact with individuals to lure them into unsafe situations. Students identify the types of private information; distinguish grooming tactics in a given scenario; determine the boundaries of safe online communication, and develop personal safety guidelines.
Student Handout
Image

6, Intermediate (6-8)
Students investigate the tactics of unknown online contacts. A scenario illustrates how an unsafe online contact can gather information and interact with individuals to lure them into unsafe situations. Students identify the types of private information; distinguish grooming tactics in a given scenario; determine the boundaries of safe online communication, and develop personal safety guidelines.
Student Handout
Image

7, Intermediate (6-8)
Students engage in dialogue about their experiences in various online communities, create user personas and provide background information about a technology of their choice. They aquire and use vocabulary terms; describe personal experience with using a site, app, or multiplayer game; identify the need for online safety; create a user persona, and write a user story.
Student Handout
Image

7, Intermediate (6-8)
Students engage in dialogue about their experiences in various online communities, create user personas and provide background information about a technology of their choice. They aquire and use vocabulary terms; describe personal experience with using a site, app, or multiplayer game; identify the need for online safety; create a user persona, and write a user story.
Student Handout
Image

7, Intermediate (6-8)
Students investigate the tactics of unknown online contacts. They learn how an unsafe online contact gathers information and interacts with individuals in order to lead them into harmful situations. Students identify the types of private information; distinguish grooming tactics in a given scenario; determine the boundaries of safe online communication, and develop personal safety guidelines.
Student Handout
Image

7, Intermediate (6-8)
Students recognize the risks of having a weak password and devise solutions. They identify techniques used to decipher passwords; discuss the online risks to personal safety and security; explain the importance of protecting online accounts; develop solutions, or safety strategies, that reduce or eliminate threats; demonstrate the steps to create a strong password, and use the SWOT information in the design of the final project.
Student Handout
Image

7, Intermediate (6-8)
Students recognize the risks of having a weak password and devise solutions. They identify techniques used to decipher passwords; discuss the online risks to personal safety and security; explain the importance of protecting online accounts; develop solutions, or safety strategies, that reduce or eliminate threats; demonstrate the steps to create a strong password, and use the SWOT information in the design of the final project.