Search Results
Student Handout
Image

6, Intermediate (6-8)
Students recognize the importance of protecting their identity by engaging in class discussion. They list types of information that reveal personal identity; identify three risks to online personal safety and security; assess screen names for safety; create safe screen names, and weigh the pros and cons of online anonymity.
Student Handout
Image

6, Intermediate (6-8)
Students recognize the importance of protecting their identity by engaging in class discussion. They list types of information that reveal personal identity; identify three risks to online personal safety and security; assess screen names for safety; create safe screen names, and weigh the pros and cons of online anonymity.
Student Handout
Image

6, Intermediate (6-8)
Students recognize the risks of having a weak password. They state the attributes of a strong password; define four techniques used to decipher passwords; describe three threats to online security and safety; explain the importance of protecting online accounts, and practice creating strong passwords.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students explore the safety and security risks of apps, like Snapchat, that enable users to share self-destructing photos and videos. They expose the risks of sharing private or compromising photos, and dispel the idea that photos and videos completely disappear by demonstrating how media files can be recovered. Students write and publish an informative article about disappearing media and submit their entry to iDrive.
Teacher Reference Page
Image

9, 10, 11, 12, Secondary (9-12)
Students explore the safety and security risks of apps, like Snapchat, that enable users to share self-destructing photos and videos. They expose the risks of sharing private or compromising photos, and dispel the idea that photos and videos completely disappear by demonstrating how media files can be recovered. Students write and publish an informative article about disappearing media and submit their entry to iDrive.
Teacher Reference Page
Image

6, Intermediate (6-8)
Students recognize the risks of having a weak password. They state the attributes of a strong password; define four techniques used to decipher passwords; describe three threats to online security and safety; explain the importance of protecting online accounts, and practice creating strong passwords.
Teacher Reference Page
Image

5, Elementary (3-5)
Students learn how to safeguard their identities, protect their personal safety, and take action when contacted by an inappropriate and unsafe person online. Students complete their plan for their Sock Puppet Nation virtual world.
Teacher Reference Page
Image

5, Elementary (3-5)
Students learn how to safeguard their identities, protect their personal safety, and take action when contacted by an inappropriate and unsafe person online. Students complete their plan for their Sock Puppet Nation virtual world.
Teacher Reference Page
Image

5, Elementary (3-5)
Students learn how to safeguard their identities, protect their personal safety, and take action when contacted by an inappropriate and unsafe person online. Students complete their plan for their Sock Puppet Nation virtual world.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students discuss their comfort level with sharing their data and personal details with online services and companies. They review the common practices of online services and develop a perspective on consumer data privacy by examining the privacy policies of sites and services.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students discuss their comfort level with sharing their data and personal details with online services and companies. They review the common practices of online services and develop a perspective on consumer data privacy by examining the privacy policies of sites and services.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students discuss their comfort level with sharing their data and personal details with online services and companies. They review the common practices of online services and develop a perspective on consumer data privacy by examining the privacy policies of sites and services.
Teacher Reference Page
Image

9, 10, 11, 12, Secondary (9-12)
In this lesson, students explore the concept of invasion of privacy. They research key terms in order to better understand the technologies and online practices that intrude on their right to privacy. Students deconstruct the legal definition of “invasion of privacy” into four categories and decide whether a particular practice is highly invasive, moderately invasive or non-invasive. Students use their understanding of privacy policies, and their knowledge of key terms, to support their opinions.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
In this lesson, students explore the concept of invasion of privacy. They research key terms in order to better understand the technologies and online practices that intrude on their right to privacy. Students deconstruct the legal definition of “invasion of privacy” into four categories and decide whether a particular practice is highly invasive, moderately invasive or non-invasive. Students use their understanding of privacy policies, and their knowledge of key terms, to support their opinions.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students develop an informed perspective on Internet privacy. They explore personal privacy and consumer privacy. They review privacy policies and determine whether a situation constitutes an “invasion of privacy.” Students are empowered to protect their privacy online. iDrive Empowerment Activity included.
Student Handout
Image

3, 4, 5, Elementary (3-5)
The Sock Puppet Nation comic “A Major Misunderstanding” illustrates how a text message conversation can quickly unravel without the aid of non-verbal cues like tone-of-voice and body language to interpret the meaning of words and phrases. Students analyze characters' thoughts, words, actions and feelings, and they distinguish between literal language and figures of speech. The lesson includes a teacher guide, printable activity pages, and interactive multimedia resources.
Student Handout
Image

3, 4, 5, Elementary (3-5)
The Sock Puppet Nation comic “A Major Misunderstanding” illustrates how a text message conversation can quickly unravel without the aid of non-verbal cues like tone-of-voice and body language to interpret the meaning of words and phrases. Students analyze characters' thoughts, words, actions and feelings, and they distinguish between literal language and figures of speech. The lesson includes a teacher guide, printable activity pages, and interactive multimedia resources.
Teacher Reference Page
Image

6, 7, 8, Intermediate (6-8)
This interactive lesson underscores the importance of being mindful while communicating via text messages. Given three scenarios, students analyze the context of the conversation, find key details, draw inferences and draft an appropriate response. The lesson includes a teacher guide, printable activity pages, and interactive multimedia resources.
Teacher Reference Page
Image

7, 8, Intermediate (6-8)
Students explore the safety and security risks of apps like Snapchat, which facilitate the real-time sharing of photos that self-destruct after a designated period of time. They use a graphic organizer to sort their ideas.
Lesson Plan
Image

6, 7, 8, Intermediate (6-8)
This interdisciplinary unit provides educators with a flexible framework for debate. The purpose of the debate unit is to afford students the opportunity to engage in the dynamic challenge of forming an opinion on e-Safety issues based on evidence and reason, articulating their position and persuading an audience.