
Getting the Toothpaste Back into the Tube: A Lesson on Online Information
In this lesson, students watch a short video that compares getting rid of personal information online to getting toothpaste back into a tube. After a short discussion of how visual analogies like this work, students discuss the meaning of the video (that information online is permanent.) They then read a series of short scenarios that help them identify four further principles of information online: that it can be copied, that it can be seen by unintended audiences, that it can be seen by larger audiences than intended, and that it becomes searchable. Finally, students create a simple animation that illustrates one of these principles.

Data Defenders Teacher's Guide
This Teacher’s Guide includes background information, learning expectations and points of discussion on the types of personal information and privacy-management strategies that are presented in the game. The guide also includes an overview of the Data Defenders game, and exercises and handouts to help students to develop skills and confidence to manage their privacy online.

Addressing AI in the Classroom: Tips for Teachers
Teachers can play a critical role in educating their students about AI, even if they aren’t experts on it. By addressing AI in ways that are designed to build students’ skills and teach them about the pitfalls of relying too much on it, teachers can help build the next generation of citizens who are empowered with the skills necessary to succeed in a world infused with AI technology.

Privacy Pirates
This tutorial introduces children, ages 7-9, to the concept of online privacy and teaches them to distinguish between information that is appropriate to give out and information better kept private – and to recognize how this may change in different contexts.

Privacy Pursuit: What is Privacy?
In this lesson, students draw connections between their existing concepts of privacy and how it applies to the internet and networked devices, then learn essential vocabulary relating to privacy. They then consider some scenarios in which children encounter privacy risks and draw on those to develop a list of “dos” and “don’ts” for using networked devices.