
Getting the Toothpaste Back into the Tube: A Lesson on Online Information
In this lesson, students watch a short video that compares getting rid of personal information online to getting toothpaste back into a tube. After a short discussion of how visual analogies like this work, students discuss the meaning of the video (that information online is permanent.) They then read a series of short scenarios that help them identify four further principles of information online: that it can be copied, that it can be seen by unintended audiences, that it can be seen by larger audiences than intended, and that it becomes searchable. Finally, students create a simple animation that illustrates one of these principles.

Data Defenders (Grades 4-6)
Data Defenders is an interactive game that teaches children and pre-teens the concept of personal information and its economic value, and introduces them to ways to manage and protect their personal information on the websites and apps they enjoy

Internet Time Capsule
In this lesson, students learn about the concept of "time capsules" and then apply the idea by selecting time capsule contents to represent both the time they live in and their own lives and tastes. They then extend this idea to online content, making a "time capsule" of any online content connected to them. Younger students finish the lesson by creating a group Internet time capsule, while older students finish by considering what online content they might like to remove or keep out of their "time capsules."

Privacy Pirates
This tutorial introduces children, ages 7-9, to the concept of online privacy and teaches them to distinguish between information that is appropriate to give out and information better kept private – and to recognize how this may change in different contexts.

Privacy Pursuit: My Privacy, Your Privacy
In this lesson, students start by considering the permanence of online content. They review privacy strategies and privacy risks and analyze how likely and severe different privacy risks are. They then consider how their actions and decisions can affect others’ privacy and develop a list of “Dos and Don’ts” for managing both their own and others’ privacy.