
Getting the Toothpaste Back into the Tube: A Lesson on Online Information
In this lesson, students watch a short video that compares getting rid of personal information online to getting toothpaste back into a tube. After a short discussion of how visual analogies like this work, students discuss the meaning of the video (that information online is permanent.) They then read a series of short scenarios that help them identify four further principles of information online: that it can be copied, that it can be seen by unintended audiences, that it can be seen by larger audiences than intended, and that it becomes searchable. Finally, students create a simple animation that illustrates one of these principles.

Click If You Agree
When you sign up for a service on a website or use an application for the first time, do you read the privacy policy and terms of use thoroughly? Or, like most of us, do you click “I Agree” as fast as you can?

Privacy Pursuit: What is Privacy?
In this lesson, students draw connections between their existing concepts of privacy and how it applies to the internet and networked devices, then learn essential vocabulary relating to privacy. They then consider some scenarios in which children encounter privacy risks and draw on those to develop a list of “dos” and “don’ts” for using networked devices.

Addressing AI in the Classroom: Tips for Teachers
Teachers can play a critical role in educating their students about AI, even if they aren’t experts on it. By addressing AI in ways that are designed to build students’ skills and teach them about the pitfalls of relying too much on it, teachers can help build the next generation of citizens who are empowered with the skills necessary to succeed in a world infused with AI technology.

Data Defenders: Understanding data collection online
In this lesson, students explore the concepts relating to data collection that are introduced in the educational game Data Defenders. The lesson will underscore for students the idea that their data is valuable and worthy of careful management by analyzing the platforms, applications and websites they use through the lens of the five privacy tools (which address the five principal ways data is collected online) introduced in Data Defenders. Finally, students consider how to apply these tools to their own online activities.