
Privacy Pursuit: Protecting Your Privacy
In this lesson, students review what the word “privacy” means in an online context and learn key privacy-related vocabulary. They explore different privacy risks and then learn practical techniques and strategies to manage and protect their privacy. Students then demonstrate their understanding of these strategies by illustrating them. Finally, students revisit material from earlier in the lesson and consider how their actions might put other people’s privacy at risk.

Click If You Agree
When you sign up for a service on a website or use an application for the first time, do you read the privacy policy and terms of use thoroughly? Or, like most of us, do you click “I Agree” as fast as you can?

Data Defenders (Grades 4-6)
Data Defenders is an interactive game that teaches children and pre-teens the concept of personal information and its economic value, and introduces them to ways to manage and protect their personal information on the websites and apps they enjoy

Your Online Resume
In this lesson, students learn that their online presence is like a resume that can help them – or hurt them – in their future personal and professional lives. The lesson begins by having students do a self-appraisal of their online resume. Students will review steps for limiting the negative impact of things they’ve posted online. Students then think about people whom they consider to be heroes or role models, identify the characteristics that make them admire these people, and discuss what those people did in order to be seen so positively. Finally, students learn tools and strategies for consciously building a positive online brand and develop a communications plan for doing so.
Privacy Pursuit: What is Privacy?
In this lesson, students draw connections between their existing concepts of privacy and how it applies to the internet and networked devices, then learn essential vocabulary relating to privacy. They then consider some scenarios in which children encounter privacy risks and draw on those to develop a list of “dos” and “don’ts” for using networked devices.