• lenny-learning-logoLenny Learning
  • Home
    Home
  • Lessons
    Lessons
  • Curriculum
    Curriculum
  • Surveys
    Surveys
  • Videos
    Videos
  • Support
    Support
  • Log In
lenny

Swipe Smart Stay Safe!

user image

ctonks

Tier 1
For Schools

Lesson Plan

Online Safety Step-by-Step Plan

Learners will state three online privacy rules, identify at least three red flags, demonstrate how to block or report, and practice sending a clear refusal or safety message.

This lesson is important because it equips adults with crucial skills to protect themselves from online risks, fostering safer digital interactions and personal well-being.

Audience

Adults

Time

90 Minutes

Approach

Interactive scenarios, practical demonstrations, and guided practice.

Materials

  • Swipe Smart Visual Scenarios, - Red Flag/Green Flag Scenario Cards, - My Privacy Settings Checklist, - Refusal Text Templates, - Spot the Scam Relay, - Who to Tell and How to Get Help, and - Personal Online Safety Contract

Prep

Preparation

20 Minutes

  • Review all generated materials: Online Safety Step-by-Step Plan, Swipe Smart Visual Scenarios, Red Flag/Green Flag Scenario Cards, My Privacy Settings Checklist, Refusal Text Templates, Spot the Scam Relay, Who to Tell and How to Get Help, and Personal Online Safety Contract.
  • Print and cut out the Red Flag/Green Flag Scenario Cards.
  • Ensure projector or screen is set up for Swipe Smart Visual Scenarios.
  • Have markers or pens available for activities.

Step 1

Activate Prior Knowledge & Set Rules

15 Minutes

  • Warm-Up: Begin by asking participants to anonymously share one online interaction that made them feel uncomfortable or confused.
  • Group Discussion: Facilitate a brief discussion on common online challenges and the importance of digital safety.
  • Set Ground Rules: Establish a safe and respectful environment for discussing sensitive topics. Emphasize confidentiality and judgment-free sharing. Introduce the Swipe Smart Visual Scenarios for visual support.
  • Transition: Explain that today's session will equip them with practical tools to navigate online spaces confidently.

Step 2

Teach Privacy Rules & Risks

25 Minutes

  • Presentation: Use the Swipe Smart Visual Scenarios to introduce key concepts: digital privacy, sexting/image-sharing risks, and red flags/scams.
  • Interactive Learning: Pause after each concept to ask questions and encourage participants to share relevant experiences or concerns. Utilize the My Privacy Settings Checklist as a handout during this section.
  • Demonstration: Model how to block and report inappropriate content or users on common platforms. Guide participants through their own device settings, if applicable and comfortable.
  • Reinforcement: Emphasize the long-term consequences of sharing private information or images online.

Step 3

Analyze Scenarios (Red Flag/Green Flag)

20 Minutes

  • Small Group Activity: Divide participants into small groups. Distribute Red Flag/Green Flag Scenario Cards.
  • Task: Each group discusses the scenarios, identifying

Step 4

Analyze Scenarios (Red Flag/Green Flag)

20 Minutes

  • Small Group Activity: Divide participants into small groups. Distribute Red Flag/Green Flag Scenario Cards.
  • Task: Each group discusses the scenarios, identifying red flags (warnings) and green flags (safe practices). They should discuss why each flag is important.
  • Group Share: Bring the groups back together to share their findings and discuss any differences in interpretation. Address misconceptions and reinforce key safety principles. Utilize Spot the Scam Relay elements here if time permits as a quick check for understanding.

Step 5

Practice Refusal & Safety Messages

20 Minutes

  • Introduction to Refusal: Explain the importance of clear communication and setting boundaries online. Introduce Refusal Text Templates.
  • Role-Play/Practice: In pairs or small groups, have participants practice using the provided refusal text templates or create their own responses to hypothetical unsafe online situations. Emphasize assertiveness and clarity.
  • Teacher Guidance: Provide feedback and suggestions on their refusal and safety messages. Encourage participants to adapt templates to their personal style while maintaining effectiveness.
  • Discussion: Ask participants how it felt to practice these messages and what challenges they foresee.

Step 6

Create Online Safety Contract & Share Support

10 Minutes

  • Individual Reflection: Distribute the Personal Online Safety Contract.
  • Contract Completion: Guide participants to complete their personal contracts, outlining specific actions they will take to stay safe online and identifying trusted individuals or resources for support. Include elements from Who to Tell and How to Get Help during this reflection.
  • Share Support: Conclude by reiterating the importance of having a support system. Facilitate a brief discussion using Who to Tell and How to Get Help prompts, ensuring everyone knows how and where to seek help if needed.
  • Wrap-Up: Thank participants and encourage them to apply their new knowledge.
lenny

Slide Deck

Swipe Smart, Stay Safe: Navigating Your Digital World

How confident do you feel navigating online interactions safely?

Today, we'll learn practical skills to protect ourselves online and build a safer digital life for everyone.

Welcome participants to the session. Start with an engaging question to activate prior knowledge about online interactions. Briefly introduce the topic of online safety and the goals for the session.

Digital Privacy: What's Yours to Keep?

Digital privacy means controlling who sees your information online. Think about:
- Personal photos and videos
- Location data
- Contact information
- Private conversations

Once it's online, it's often there forever.

Explain what digital privacy means in simple terms. Emphasize that what we share online can be permanent and accessible. Discuss the importance of reviewing privacy settings on various platforms.

Sexting & Image-Sharing: The Hidden Risks

Sharing intimate images, or 'sexting,' carries significant risks:
- Non-consensual sharing: Images can be shared without your permission.
- Blackmail & exploitation: Predators can use images against you.
- Permanent digital footprint: These images can resurface unexpectedly.
- Legal consequences: In some cases, sharing certain images can be illegal.

Think before you send. Protect yourself and others.

Address this sensitive topic with care. Explain the risks associated with sending or sharing intimate images, including non-consensual sharing, blackmail, and impact on future opportunities. Emphasize that consent is crucial and can be revoked. Link to the idea that these actions can be illegal.

Spotting Red Flags & Scams

Online spaces can have hidden dangers. Look out for these 'red flags':
- Asking for money early on
- Pressuring you for personal info
- Too good to be true offers
- Refusing to meet in person or video call
- Love bombing or intense flattery
- Inconsistent stories

Trust your gut feeling!

Introduce common 'red flags' or warning signs that indicate a potentially unsafe online interaction or scam. Provide clear examples for each. Encourage participants to share any red flags they've encountered.

Your Power: Block & Report!

Don't feel helpless. You have the power to protect yourself:
- Blocking: Prevents unwanted contact from a specific user.
- Reporting: Notifies the platform of inappropriate or harmful content/behavior.

How to Block & Report:
* Find the user's profile or message.
* Look for a '...' or 'More Options' icon.
* Select 'Block' or 'Report'.
* Follow the prompts.

It's okay to protect your peace!

Clearly demonstrate or explain the steps to block and report on common platforms. Explain why these features are important and empower users to take control. Reassure them that it's okay to use these features.

Stay Smart, Stay Safe!

Remember these key takeaways:
- Guard your digital privacy.
- Understand the risks of sharing images.
- Trust your instincts and spot red flags.
- Empower yourself by blocking and reporting.

Your online safety is in your hands!

Summarize the key takeaways from the presentation. Reinforce the idea of being proactive and building a strong support network. Transition into the next activity.

lenny

Activity

Red Flag / Green Flag Scenario Cards

Instructions: Read each scenario with your group. Discuss whether you think it's a Red Flag (a warning sign of danger or discomfort) or a Green Flag (a sign of safety, respect, or good practice). Be ready to explain why you chose your answer.


Scenario 1: New Online Friend Requests Money

You matched with someone new on a dating app. After only a few days of chatting, they tell you about a sudden financial emergency and ask if you can lend them money, promising to pay you back next week.

Red Flag or Green Flag?



Why?




Scenario 2: Sharing Location with Trusted Friends

You are meeting up with friends you know well in real life. You share your live location with them through a secure app for a limited time so they know you arrived safely and can find you easily.

Red Flag or Green Flag?



Why?




Scenario 3: Immediate Pressure for Personal Details

Someone you just started chatting with online immediately asks for your full home address, where you work, and your social security number, claiming they want to send you a gift or verify your identity.

Red Flag or Green Flag?



Why?




Scenario 4: Receiving an Unsolicited Intimate Image

You receive an unsolicited intimate image from someone you barely know online. It makes you feel uncomfortable and surprised.

Red Flag or Green Flag?



Why?




Scenario 5: Reviewing and Adjusting Privacy Settings

You regularly check the privacy settings on your social media accounts and adjust them to limit who can see your posts, photos, and personal information to only trusted friends and family.

Red Flag or Green Flag?



Why?




Scenario 6: Being Encouraged to Speak Up

Your online gaming group has a clear rule that if anyone feels uncomfortable or sees something inappropriate, they should speak up or message a moderator. Everyone supports this rule.

Red Flag or Green Flag?



Why?




Scenario 7: Meeting Someone New in a Public Place

You decide to meet an online acquaintance for the first time. You suggest a well-lit, busy public place, inform a friend of your plans, and arrange your own transportation.

Red Flag or Green Flag?



Why?




Scenario 8: Receiving a Very Formal and Urgent Email from an Unknown Sender

You receive an email claiming to be from your bank, stating there's an urgent issue with your account and asking you to click a link to verify your details immediately to avoid account suspension.

Red Flag or Green Flag?



Why?




Scenario 9: Someone Asks You to Keep Your Relationship a Secret

An online romantic interest insists that your relationship must be kept a complete secret from your friends and family, saying they don't want any "drama" or "interference."

Red Flag or Green Flag?



Why?




Scenario 10: Participating in a Public Online Forum with Clear Rules

You join an online forum dedicated to your hobby. The forum has clear community guidelines, active moderators, and a reputation for respectful discussion. You post regularly and engage positively with other members.

Red Flag or Green Flag?



Why?




Scenario 11: An Online Acquaintance Pressures You to Send Racy Photos

Someone you've been chatting with online for a few weeks starts pressuring you to send them racy photos, even after you've expressed discomfort. They say, "If you really liked me, you would."

Red Flag or Green Flag?



Why?




Scenario 12: Creating Strong, Unique Passwords for All Accounts

You use a password manager to create and store strong, unique passwords for every one of your online accounts, and you enable two-factor authentication whenever possible.

Red Flag or Green Flag?



Why?



lenny
lenny

Worksheet

My Privacy Settings Checklist

This checklist will help you review and adjust your privacy settings across different online platforms. Take some time to go through each item and ensure your settings align with your comfort level and safety needs.

Section 1: Social Media (e.g., Facebook, Instagram, Twitter, LinkedIn)

  • Who can see your posts?

    • Check if your default post setting is Public, Friends, or Custom.
    • Action: Consider setting it to "Friends" or "Custom" for more control.
    • My Setting:


  • Who can see your profile information (photos, birthdate, city, employer)?

    • Review who can view your basic and detailed profile information.
    • Action: Limit sensitive information to "Friends" or "Only Me."
    • My Setting:


  • Tagging and Photo Privacy

    • Do you approve tags before they appear on your profile?
    • Action: Enable tag review to prevent unwanted photos appearing on your profile.
    • My Setting:


  • Location Services

    • Are location services enabled for your social media apps?
    • Action: Turn off location services for social media or limit it to "While Using App" only if necessary.
    • My Setting:


  • Who can send you friend requests or messages?

    • Can anyone send you requests, or only friends of friends?
    • Action: Adjust settings to filter unwanted contact.
    • My Setting:


Section 2: Messaging Apps (e.g., WhatsApp, Signal, Telegram)

  • Last Seen/Online Status

    • Who can see when you were last online or if you are currently online?
    • Action: Consider limiting this to "My Contacts" or "Nobody."
    • My Setting:


  • Read Receipts

    • Do you want others to know when you have read their messages?
    • Action: You can usually turn read receipts off if you prefer more privacy.
    • My Setting:


  • Profile Photo and About Info

    • Who can see your profile picture and your "About" information?
    • Action: Limit this to "My Contacts" or "Nobody."
    • My Setting:


  • Group Invitations

    • Who can add you to groups without your permission?
    • Action: Set this to "My Contacts" to prevent unwanted group additions.
    • My Setting:


Section 3: Email (e.g., Gmail, Outlook, Yahoo Mail)

  • Two-Factor Authentication (2FA)

    • Is 2FA enabled for your email account?
    • Action: Enable 2FA for an extra layer of security.
    • My Setting:


  • Review Connected Apps

    • Which third-party apps have access to your email account?
    • Action: Revoke access for any apps you no longer use or don't recognize.
    • My Setting:


  • Spam Filters

    • Are your spam filters effectively catching unwanted emails?
    • Action: Adjust your spam filter settings if you are receiving too much unwanted mail.
    • My Setting:


Remember to regularly review your privacy settings as platforms update their features.

lenny
lenny

Script

Refusal Text Templates: Say No with Confidence

It can be tough to say "no" online, but it's essential for your safety and well-being. These templates provide clear, firm, and polite ways to refuse unwanted requests or set boundaries. Feel free to adapt them to your style!


Scenario 1: Refusing a Request for Personal Information

When someone asks for your address, full name, or other sensitive details too soon.

  • Template 1 (Polite & Firm): "Thanks for asking, but I prefer to keep that private for now."


  • Template 2 (Boundary Setting): "I'm not comfortable sharing that. Let's keep our conversations focused on [shared interest]."


  • Template 3 (Simple & Direct): "No, I don't give out that information online."



Scenario 2: Declining to Send Intimate Photos/Videos

When someone pressures you for explicit images.

  • Template 1 (Direct Refusal): "No, I'm not going to send any intimate photos. Please don't ask again."


  • Template 2 (Focus on Respect): "I'm not comfortable with that request. Respect my boundaries."


  • Template 3 (Educational): "Sharing intimate images can have serious risks, and I choose not to. I suggest you reconsider asking others to do so as well."



Scenario 3: Saying No to an Unwanted Date/Meet-up

When an online acquaintance asks to meet, and you're not interested or feel unsafe.

  • Template 1 (Clear & Kind): "I appreciate the invitation, but I'm not interested in meeting up."


  • Template 2 (Firm Boundary): "Thanks, but I'm not looking to meet new people in person from this app."


  • Template 3 (Prioritizing Safety): "I don't feel comfortable meeting up. I need to prioritize my safety online and offline."



Scenario 4: Ending an Uncomfortable Conversation

When a conversation turns inappropriate, aggressive, or makes you feel uneasy.

  • Template 1 (Exit Statement): "This conversation is making me uncomfortable, so I'm going to end it here."


  • Template 2 (Blocking Intent): "I don't appreciate the way this is going. I'm going to block you now."


  • Template 3 (Simple & Final): "I'm done with this conversation."



Scenario 5: Refusing a Request for Money

When an online acquaintance asks for financial assistance.

  • Template 1 (Direct Refusal): "I'm sorry, but I can't help you financially."


  • Template 2 (Setting Boundaries): "I don't lend money to people I know online."


  • Template 3 (Suggesting Alternatives): "I hope you find the help you need, but I'm not able to provide financial support."


Remember, you always have the right to say no and protect your boundaries online. Don't feel guilty for prioritizing your safety! If someone continues to harass you after you've said no, consider blocking and reporting them.

lenny
lenny

Game

Spot the Scam Relay: Can You Detect Deception?

Goal: Work in teams to quickly and accurately identify common online scams and their red flags.

Time: 15-20 minutes

Materials:

  • Scam Message Cards (Print out and cut into individual cards before class)
  • Whiteboard or large paper for scoring
  • Markers

Setup:

  1. Divide the class into 2-3 teams.
  2. Designate a starting line and a finish line (where the scam cards will be placed).

How to Play:

  1. Each team will line up behind the starting line.
  2. On "Go," the first person from each team runs to the finish line, picks one Scam Message Card, and reads it.
  3. They must then identify at least one red flag and what type of scam it might be (e.g., phishing, romance scam, fake lottery). They can also identify how they would respond (e.g., block, delete, report).
  4. After stating their answer, they run back and tag the next teammate.
  5. If a team member is correct, their team gets a point. If incorrect or unable to identify, the card goes back into the pile.
  6. The game continues until all cards are used or time runs out. The team with the most points wins.

Scoring: 1 point per correctly identified scam/red flag.

Teacher Notes:

  • Encourage discussion within teams before a player runs back.
  • Clarify any uncertainties about scam types or red flags as they arise.
  • Emphasize that the goal is learning, not just winning.

Example Scam Message Cards (to be printed separately, 1 per card)

Card 1: "URGENT - Your Bank Account Is Locked!"

  • Email Subject: "Urgent Account Alert - Action Required Immediately!"
  • Email Body: "Dear Valued Customer, Your [Bank Name] account has been temporarily suspended due to suspicious activity. Please click this link immediately to verify your details and reactivate your account: [Suspicious Link] Failure to do so will result in permanent account closure."

Card 2: "Secret Admirer Lottery Win!"

  • Direct Message: "Congratulations! You have been selected as the lucky winner of our exclusive Secret Admirer Lottery! To claim your prize of $1,000,000, simply reply with your full bank account details and a small processing fee of $500."

Card 3: "Help Me, I'm Stranded!"

  • Text Message from an Unknown Number (claiming to be a friend): "Hey, it's [Friend's Name]. I'm stranded in [Distant City] and lost my wallet! I desperately need $200 for a taxi and food. Can you wire it to me ASAP? I'll pay you back tomorrow, promise!"

Card 4: "Investment Opportunity - Guaranteed Returns!"

  • Social Media Ad: "Tired of your low-paying job? Invest in our new crypto-currency platform with guaranteed 1000% returns in just 24 hours! Limited spots available. Click here to get rich now! [Link to shady website]"

Card 5: "Verification Required for Profile"

  • Dating App Message: "Hi, I'm [Attractive Name]! Your profile looks great, but before we chat further, I need you to verify you're a real person. Please click this link and enter your login details for your other social media accounts to confirm: [Suspicious Link]"

Card 6: "Your Package Is Delayed"

  • Text Message (from an unknown number, no tracking info): "Your package delivery is delayed. Please confirm your shipping details and pay a small re-delivery fee here: [Suspicious Link] to avoid further delays."

Card 7: "Technical Support Scam"

  • Pop-up on computer screen: "WARNING! Your computer is infected with a severe virus. Do not shut down your computer. Call this toll-free number immediately for technical support: 1-800-XXX-XXXX. Your data is at risk!"

Card 8: "Exclusive Job Offer - No Experience Needed!"

  • Email from an unknown recruiter: "Dear [Your Email Address], You have been selected for an exclusive remote job opportunity that requires no prior experience and pays $5,000 a week! To apply, simply click this link and provide your banking information for direct deposit setup: [Suspicious Link]"
lenny
lenny

Discussion

Who to Tell and How to Get Help: Building Your Support Network Online

It's crucial to remember that you don't have to navigate online challenges alone. Having a support system is a key part of digital safety. This discussion will help us identify trusted resources and individuals.


Discussion Prompts:

  1. Trusted Individuals:

    • If you experienced an uncomfortable or concerning situation online, who is the first person you would consider telling? (e.g., a partner, family member, close friend, colleague, mentor)
    • What qualities make this person trustworthy and a good source of support?





  2. Types of Help Needed:

    • Beyond just talking, what kind of practical help might you need if you encountered a serious online issue (e.g., harassment, identity theft, cyberbullying, scam)? (e.g., technical assistance, emotional support, legal advice, reporting to authorities)
    • How might the type of help needed vary depending on the situation?







  3. Formal Resources & Organizations:

    • What official or formal resources are available for online safety? (e.g., local police department, national cybercrime reporting centers, online safety organizations, mental health services)
    • Where could you look to find reliable information or assistance if you're unsure who to contact?







  4. Overcoming Barriers to Seeking Help:

    • What stops people from asking for help when they have an online problem (e.g., embarrassment, fear of judgment, not knowing who to trust, thinking it's not serious enough)?
    • How can we encourage ourselves and others to seek help sooner rather than later?











  5. Creating a Personal Safety Plan:

    • Think about a specific online scenario you might face. Who would you tell, and what steps would you take to get help?
    • Share one key takeaway from this discussion that you will remember when facing an online challenge.





Remember, reaching out for help is a sign of strength, not weakness. Your safety and well-being are paramount.

lenny
lenny

Cool Down

My Personal Online Safety Contract

Name:



Date:


I, [Your Name], hereby commit to prioritizing my online safety and well-being. This contract outlines the specific actions I will take to protect myself and my digital footprint.


My Online Safety Commitments:

  1. Privacy Settings Pledge: I will regularly review and adjust my privacy settings on all social media, messaging, and email platforms to control who sees my personal information. I will specifically focus on:

    • (Platform/App 1):


    • (Specific Action):


    • (Platform/App 2):


    • (Specific Action):


  2. Red Flag Awareness: I commit to being vigilant and trusting my instincts when I encounter potential online red flags. If something feels off, I will pause, investigate, and seek advice. My key red flags to watch for are:










  3. Refusal and Boundaries: I will confidently use refusal strategies and set clear boundaries in online interactions. I understand that I have the right to say "no" and protect my personal space. I will use phrases like:







  4. Blocking and Reporting: I will utilize blocking and reporting features whenever I encounter inappropriate content, harassment, or scams. I know that these tools are there to protect me. I will remember to:

    • Block when:


    • Report when:


  5. My Support Network: I will identify and rely on my trusted support network when I need help or advice regarding online safety. My go-to people/resources are:

    • (Person/Resource 1):


    • (Person/Resource 2):


    • (Formal Resource if needed):



My Signature:



Date:


This contract is a personal commitment to my digital well-being and can be revisited and updated as needed.

lenny
lenny