Lesson plans
Our lesson plans are crafted by learning designers, professional educators, and through co-design with children and young people. We offer high-quality teaching materials that empower educators to foster digital citizenship in today's technology-driven educational landscape.
.png)
Contact
About this Risk Area
When potentially harmful contact is initiated by others online, including strangers who may pose risks such as exploitation or identity theft.
Example topics:
- Online privacy and security practices, including setting strong passwords and managing privacy settings.
- Recognising and responding to online threats, such as phishing scams and identity theft.
- Establishing boundaries for online interactions and understanding the risks of sharing personal information online.
- Seeking help and reporting inappropriate or harmful online behaviour to trusted adults or authorities.
The resources for this risk area support learning in relation to safe online communication, privacy settings, and establishing boundaries for interacting with others on the internet.
Learners explore contact risks by creating a podcast or fact sheet, building skills to stay safe when connecting with others online.

Contact
About this Risk Area
When potentially harmful contact is initiated by others online, including strangers who may pose risks such as exploitation or identity theft.
Example topics:
- Online privacy and security practices, including setting strong passwords and managing privacy settings.
- Recognising and responding to online threats, such as phishing scams and identity theft.
- Establishing boundaries for online interactions and understanding the risks of sharing personal information online.
- Seeking help and reporting inappropriate or harmful online behaviour to trusted adults or authorities.
The resources for this risk area support learning in relation to safe online communication, privacy settings, and establishing boundaries for interacting with others on the internet.
Students learn online safety through 'Swoosh, Glide, and Rule Number 5' story time, addressing internet use with family and friends.

Contact
About this Risk Area
When potentially harmful contact is initiated by others online, including strangers who may pose risks such as exploitation or identity theft.
Example topics:
- Online privacy and security practices, including setting strong passwords and managing privacy settings.
- Recognising and responding to online threats, such as phishing scams and identity theft.
- Establishing boundaries for online interactions and understanding the risks of sharing personal information online.
- Seeking help and reporting inappropriate or harmful online behaviour to trusted adults or authorities.
The resources for this risk area support learning in relation to safe online communication, privacy settings, and establishing boundaries for interacting with others on the internet.
This activity is relevant for students engaging in online activities such as gaming, social media, or messaging services, helping them identify when to seek support before sharing personal information, expanding their understanding of hacking and its impacts.

Contact
About this Risk Area
When potentially harmful contact is initiated by others online, including strangers who may pose risks such as exploitation or identity theft.
Example topics:
- Online privacy and security practices, including setting strong passwords and managing privacy settings.
- Recognising and responding to online threats, such as phishing scams and identity theft.
- Establishing boundaries for online interactions and understanding the risks of sharing personal information online.
- Seeking help and reporting inappropriate or harmful online behaviour to trusted adults or authorities.
The resources for this risk area support learning in relation to safe online communication, privacy settings, and establishing boundaries for interacting with others on the internet.
This game promotes discussions about online safety, encouraging cooperation while learning to protect their personal information.