Online Safety

Not a Learning.com customer? Learn More

Type:Lesson

Estimated Time:15 minutes

Score Type:Auto Score

This lesson automatically provides a score to your gradebook

Available Language: English


Vocabulary: acronyms, communication, digital citizenship, digital footprint, emoticons, instant messaging, link, password, photo sharing, post, privacy settings, profile page, tag, texting


Primary Objectives:

  • Students avoid posting material that might embarrass or harm themselves.
  • Students learn how to convey emotion respectfully online, and how to handle any offensive or insulting material they may receive.
  • Students learn that if someone writes them a message that makes them feel bad, they should show it to a teacher or parent before deleting it and not reply.
  • Students limit the personal information they share online.
  • Students recognize the need to be cautious in making new online connections.
  • Students understand that strong emotions can cause them to do or say things they may later regret, and that they should think twice before posting online.
  • Students use privacy settings on social networks to restrict who can communicate with them.
  • Students use techniques to make their passwords strong and they do not share them with anyone.

Secondary Objectives:

  • Students correctly use digital media and environments to communicate and work collaboratively.
  • Students demonstrate sound reasoning as they use the Internet.
  • Students learn to use emoticons to communicate emotion.
  • Students make safe choices with social media.
  • Students respond appropriately to online communications.
  • Students understand responsibilities within a digital environment.

Subjects:

Advantages and Disadvantages of Technology Use 

Information Technology > Technology and Society > Advantages and Disadvantages of Technology Use 

Bullying and Harassment

Information Technology > Internet > Bullying and Harassment

Bullying and Harassment 

Information Technology > Internet > Bullying and Harassment 

Development of Safe Interactive Environments 

Information Technology > Internet > Development of Safe Interactive Environments 

Digital Citizenship

Information Literacy > Student Use - Digital Media > Digital Citizenship

Digital Citizenship 

Digital Literacy > Student Use > Digital Citizenship 

Ethics 

Information Technology > Digital Communications > Ethics 

Internet Attacks and Abuse

Information Technology > Internet > Internet Attacks and Abuse

Internet Attacks and Abuse 

Information Technology > Internet > Internet Attacks and Abuse 

Negative Impact

Information Technology > Internet > Negative Impact

Negative Impact 

Information Technology > Internet > Negative Impact 

On-line Etiquette 

Information Technology > Basic Operations and Concepts > On-line Etiquette 

Safety

Information Technology > Internet > Safety

Safety 

Information Technology > Internet > Safety 

Security Options 

Information Technology > Internet > Security Options 

Security and Privacy 

Information Technology > Internet > Security and Privacy 
Show More

Teacher Notes:

  • Discuss the school’s Acceptable Use Policy with students and how it models the responsible use of technology. Online resources can enhance your knowledge of the ethical use of technology and support student learning. Search for information on websites such as ConnectSafely.org or Net Literacy.

Extension Ideas:

  • Students can draw comic strips that illustrate the possible consequences for revealing personal information online such as phone numbers or passwords. Have students role-play what to do after receiving a harassing text message.

Standards:

S.2.a Students cultivate and manage their digital identity and reputation and are aware of the permanence of their actions in the digital world.
S.2.b Students engage in positive, safe, legal and ethical behavior when using technology, including social interactions online or when using networked devices.
S.2.d Students manage their personal data to maintain digital privacy and security and are aware of data-collection technology used to track their navigation online.
2-NI-05 Explain how physical and digital security measures protect electronic information. (P7.2)
3A-IC-29 Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users. (P7.2)
3A-IC-30 Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. (P7.3)
3A-NI-06 Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts. (P3.3)
3A-NI-07 Compare various security measures, considering tradeoffs between the usability and security of a computing system. (P6.3)
3A-NI-08 Explain tradeoffs when selecting and implementing cybersecurity recommendations. (P7.2)
3B-AP-18 Explain security issues that might lead to compromised computer programs. (P7.2)
ISTE seal of compliance for proficiency student standards ISTE seal of compliance for readiness student standards
Feedback