
Data Defenders Teacher's Guide
This Teacher’s Guide includes background information, learning expectations and points of discussion on the types of personal information and privacy-management strategies that are presented in the game. The guide also includes an overview of the Data Defenders game, and exercises and handouts to help students to develop skills and confidence to manage their privacy online.

What is AI?
This guide provides an overview of what AI is – and in particular Generative AI – and gives two examples of main AI tools you are likely to encounter. Then it explains some key ethical and social issues related to Generative AI.
Privacy Pursuit: My Privacy, Your Privacy
In this lesson, students start by considering the permanence of online content. They review privacy strategies and privacy risks and analyze how likely and severe different privacy risks are. They then consider how their actions and decisions can affect others’ privacy and develop a list of “Dos and Don’ts” for managing both their own and others’ privacy.

Internet Time Capsule
In this lesson, students learn about the concept of "time capsules" and then apply the idea by selecting time capsule contents to represent both the time they live in and their own lives and tastes. They then extend this idea to online content, making a "time capsule" of any online content connected to them. Younger students finish the lesson by creating a group Internet time capsule, while older students finish by considering what online content they might like to remove or keep out of their "time capsules."

Data Defenders: Understanding data collection online
In this lesson, students explore the concepts relating to data collection that are introduced in the educational game Data Defenders. The lesson will underscore for students the idea that their data is valuable and worthy of careful management by analyzing the platforms, applications and websites they use through the lens of the five privacy tools (which address the five principal ways data is collected online) introduced in Data Defenders. Finally, students consider how to apply these tools to their own online activities.