Learning Materials

Digital Safety in the Classroom

Practical guidance for teachers: prevention, classroom routines, digital wellbeing, and a clear incident response you can apply immediately.

01
Prevent — rules, routines, digital hygiene
02
Recognize — signals, patterns, escalation
03
Respond — evidence, procedure, support

TEACHER TOOLKIT

Ready-to-use building blocks: agreements, micro-activities, checklists, and communication templates.

Classroom agreements

Simple rules for class and online spaces that students actually remember.

Examples
Passwords are not shared and we do not log into other people’s accounts.
Class group chats: respect, no mocking, no public sharing of screenshots.
If something feels wrong or suspicious: stop, save evidence, tell an adult.

Micro-activities

Short routines that build habits without taking the whole lesson.

Ideas
“Safety minute”: one rule + one real example.
Mini role-play: what to do when a message pressures you.
Source check in 3 steps: who, evidence, reliability.

Class climate

Trust, boundaries, and a reporting culture students will actually use.

Focus
Predictable routines and calm communication.
A simple way to report (anonymous box / form).
Follow-up after incidents so they do not return.

Communication templates

Short messages you can reuse with students and parents.

Use-cases
“We focus on facts, not blame. Here is what we know so far…”
“Please do not share screenshots. Save them and send privately.”
“Next steps: evidence → school procedure → check-in within 48 hours.”
Tip: choose one routine and repeat it weekly (5–10 minutes). Consistency beats long lectures.

10-minute classroom plan

Use it anytime: before holidays, after an incident, or as a weekly routine.

1
1 minute: the goal
State one rule and why it matters (codes, photos, passwords, respect).
2
3 minutes: a situation
Use a short scenario: urgency, manipulation, “keep it secret”, pressure to click or send.
3
4 minutes: practice
Stop → save evidence → report. Clearly say who students should talk to (e.g., class teacher, prevention coordinator, school psychologist) and how to do it.
4
2 minutes: exit question
Ask “What do you do first?” Collect 2–3 answers and reinforce the correct steps.
View incident response guide

Ready-to-say lines

Short lines that reduce panic, stop escalation, and protect evidence.

“Thank you for telling me. We will handle this calmly and based on facts. I can’t promise full secrecy, but we will keep you safe.”

“We stop public discussion. Screenshots are not shared. Evidence goes to an adult, not to the group chat.”

“We are collecting facts and following the school procedure. Please do not spread content in group chats.”

“No one has the right to pressure you for photos, codes, or secrets. Stop and tell an adult immediately.”
Tip: keep one “class rules slide” ready. Repeat the same structure; only scenarios change.

INCIDENT RESPONSE GUIDE

A clear flow that prioritizes safety, evidence integrity, and school procedure.

STEP 1
Listen calmly
Let the student speak. Avoid blame. Do not promise full secrecy; explain that the school will follow a clear procedure.
STEP 2
Secure evidence
Screenshots, usernames, date/time, and a short factual timeline (who/what/when).
STEP 3
Follow the procedure
Inform the designated school contact (e.g., prevention coordinator / counselor). Record actions. Avoid “private investigations” in class chats.
STEP 4
Support & follow-up
Agree next steps, reduce escalation, monitor dynamics, and check in within 24–48 hours.

60-second protocol

  1. Stop public sharing; do not handle it in group chats. Communicate privately with the designated school contact.
  2. Save evidence (screenshots, links, time, accounts).
  3. Inform the class teacher or prevention coordinator and involve the school psychologist/leadership if needed.
  4. Agree next steps and a check-in time (24–48 hours).

Who to involve

  • Class teacher / prevention coordinator
  • School psychologist / counselor
  • School leadership / IT admin (accounts/devices)

What to document

  • Screenshots (with time/date visible if possible).
  • Who was involved (accounts), what happened, when it started.
  • Actions taken: who was informed, what was recommended, what was agreed.

Escalate immediately if

  • An unknown adult is contacting a student or grooming indicators appear.
  • Threats, extortion, sexual content, blackmail, or pressure to meet.
  • Self-harm mentions, severe distress, or a safety risk.
Do
  • Keep it factual and calm.
  • Secure evidence before it disappears.
  • Follow the school procedure and involve the right staff.
Don’t
  • Do not shame the victim or solve it publicly.
  • Do not confront suspected persons alone.
  • Do not share screenshots in class or group chats.
After
  • Short class reset: rules + remind who to talk to.
  • Check in with involved students.
  • Monitor for recurrence and retaliation.

MODEL SITUATIONS

Practical examples with recommended actions you can apply in school.

Cyberbullying

Humiliation in a class group chat

A student is mocked in a group chat and stops participating in class.

Document Talk privately Inform leadership
What to do today
Stop public discussion, save evidence privately, and set a clear class boundary (no sharing, no retaliation).
What to say
We will handle this based on facts. Sharing increases harm. Evidence goes to an adult, not to the group chat.
Grooming

Unknown adult asks for photos

A student mentions an online “friend” requesting private photos or meetings.

Escalate Parents Psychologist
What to do
Stop contact, save evidence, inform parents and the designated school contact. Escalate immediately if there is pressure to meet or threats.
Warning signs
Secrecy, rapid intimacy, gifts, requests for photos, moving to private apps, pressure to meet, manipulation or blackmail.
Misinformation

Viral claim causes conflict

Students share a claim; arguments escalate and verified sources are rejected.

Sources Fact-check Rules
What to do
Pause the discussion, identify the claim, verify with 2–3 reliable sources, and agree on a rule: “share only after checking”. Focus on evidence, not blame.
Quick check
Who posted it? What is the evidence? Can another trusted source confirm it? If not, label it unverified and do not spread further.
Prevention

5-minute class reset

A short routine after an incident to stop escalation and restore boundaries.

One rule Reporting Follow-up
What to say
We stop public sharing. Evidence goes privately to an adult. If you need help, talk to the designated school contact.
What to do
Repeat the rule, remind who to talk to, and set a check-in within 24–48 hours.
More situations: classroom & social networks
Impersonation account targets a student
Collect links/screenshots, involve the designated school contact and parents, and stop public sharing in class.
Private photos circulate in class
Stop the spread, preserve evidence privately, follow procedure, and focus on the victim’s safety and support.
Student is pressured for a verification code
Explain that “codes = keys”, teach immediate stop/report, and demonstrate takeover risk.
More situations: devices & school infrastructure
Suspicious extension on a school PC
Stop browsing, note the name, remove via IT policy, scan the device, and report to the admin.
“Urgent payment” message to students
Teach a 10-second check: sender, urgency, domain, and verification through another method.
Shared classroom account used for harassment
Disable shared logins, move to individual access, reset passwords, and set clear rules.