
What Students Need to Know about Freedom of Information and Protection of Privacy (Grade 5) - Lesson
The Information and Privacy Commissioner of Ontario has created three guides for teachers that help increase the understanding of open government and personal privacy. What Students Need to Know About Freedom of Information and Protection of Privacy has been created to provide an opportunity for teachers and their students to discuss why access to government-held information and personal privacy are important public values and how these values are reflected in our relationships with governments.

What is AI?
This guide provides an overview of what AI is – and in particular Generative AI – and gives two examples of main AI tools you are likely to encounter. Then it explains some key ethical and social issues related to Generative AI.
Pay For Play
In this lesson, students discuss their experiences playing free online games and then learn the costs of these “free” games in the form of paying with money, sharing personal information or providing attention to advertising or branded content. Students then learn a variety of techniques for mitigating the risks and drawbacks of online games and communicate their learning by describing one of these techniques in video-game terms.

Addressing AI in the Classroom: Tips for Teachers
Teachers can play a critical role in educating their students about AI, even if they aren’t experts on it. By addressing AI in ways that are designed to build students’ skills and teach them about the pitfalls of relying too much on it, teachers can help build the next generation of citizens who are empowered with the skills necessary to succeed in a world infused with AI technology.

Privacy Pursuit: What is Privacy?
In this lesson, students draw connections between their existing concepts of privacy and how it applies to the internet and networked devices, then learn essential vocabulary relating to privacy. They then consider some scenarios in which children encounter privacy risks and draw on those to develop a list of “dos” and “don’ts” for using networked devices.