Online Identity: My Digital FootprintActivities & Teaching Strategies
Active learning helps Year 2 students grasp the concept of a digital footprint because abstract ideas like online permanence come alive when they see, touch, and move through concrete representations. By acting out sharing scenarios, drawing their digital steps, and physically asking for permission, students connect abstract risks to their own choices and behaviors.
Learning Objectives
- 1Classify personal information into categories of 'safe to share' and 'unsafe to share' with unfamiliar online contacts.
- 2Analyze how specific online actions, such as posting a photo or commenting, contribute to a digital footprint.
- 3Justify the importance of asking permission before sharing images or personal details of classmates or family members online.
- 4Demonstrate responsible online behavior by creating a poster illustrating safe sharing practices.
Want a complete lesson plan with these objectives? Generate a Mission →
Role-Play: Sharing Scenarios
Prepare cards with scenarios like 'A chat app stranger asks for your photo.' Students in pairs draw a card, act out the interaction, decide on a safe response, and share reasoning with the group. Follow with a class chart of safe/unsafe choices.
Prepare & details
Evaluate what types of personal information are safe to share with strangers online.
Facilitation Tip: During Role-Play: Sharing Scenarios, provide props like toy phones or tablets to make the situations feel real and immediate for students.
Setup: Open space or rearranged desks for scenario staging
Materials: Character cards with backstory and goals, Scenario briefing sheet
Footprint Mapping: Draw Your Trail
Each student lists or draws three online actions they do, like liking posts or sharing drawings. They connect these with arrows to show a 'footprint' on paper. Pairs compare maps and discuss privacy risks.
Prepare & details
Analyze how our online activities contribute to our 'digital footprint'.
Facilitation Tip: When running Footprint Mapping: Draw Your Trail, give each student a large piece of paper and colored markers to trace their digital steps visually.
Setup: Open space or rearranged desks for scenario staging
Materials: Character cards with backstory and goals, Scenario briefing sheet
Permission Relay Game
In small groups, one student holds an image card of a peer. They pass it only after asking permission aloud and getting a yes. Rotate roles; debrief on why permission matters every time.
Prepare & details
Justify the importance of seeking permission before sharing images or information about others.
Facilitation Tip: For Permission Relay Game, set up stations around the room so students can physically move while practicing asking for permission before sharing.
Setup: Open space or rearranged desks for scenario staging
Materials: Character cards with backstory and goals, Scenario briefing sheet
Digital Detective Audit
Whole class brainstorms shared online activities from class apps or games. List them on the board, then vote with thumbs up/down on safety. Discuss adjustments for better privacy.
Prepare & details
Evaluate what types of personal information are safe to share with strangers online.
Facilitation Tip: In Digital Detective Audit, use highlighters so students can mark safe and unsafe sharing behaviors directly on printed examples.
Setup: Open space or rearranged desks for scenario staging
Materials: Character cards with backstory and goals, Scenario briefing sheet
Teaching This Topic
Experienced teachers approach this topic by grounding abstract ideas in concrete, relatable experiences. Use storytelling and role-play to make online scenarios feel real, because young learners understand consequences better through immediate, tangible interactions. Avoid abstract explanations about servers or algorithms; instead, focus on the child’s own actions and how they can control their digital footprint. Research suggests that modeling and guided practice—like repeatedly asking students to verbalize permission requests—builds lasting habits more effectively than lectures.
What to Expect
Successful learning looks like students identifying which personal information is unsafe to share and justifying their choices using clear safety rules. They should demonstrate the habit of seeking permission before posting images or details about others, and recognize that their online actions create a lasting record.
These activities are a starting point. A full mission is the experience.
- Complete facilitation script with teacher dialogue
- Printable student materials, ready for class
- Differentiation strategies for every learner
Watch Out for These Misconceptions
Common MisconceptionDuring Role-Play: Sharing Scenarios, watch for students who say online content disappears when apps are closed.
What to Teach Instead
Use the role-play to show that once a photo or comment is sent, others can copy or save it, even if the original poster deletes it. Have students act out a friend taking a screenshot of their shared photo and explain that the photo now exists on another device.
Common MisconceptionDuring Permission Relay Game, watch for students who assume it’s okay to share photos if they play with their friends often.
What to Teach Instead
Pause the relay and ask students to consider their friend’s feelings and rights. Use the relay cards to review phrases like 'Would your friend be happy if this was posted?' and 'What if they didn’t want everyone to see it?' to reinforce consent.
Common MisconceptionDuring Digital Detective Audit, watch for students who treat online strangers the same as school friends.
What to Teach Instead
Use the printed examples to highlight how strangers online might not have good intentions. Ask students to compare online stranger rules with playground rules, and circle any sharing actions that would be unsafe in both places.
Assessment Ideas
After Role-Play: Sharing Scenarios, present students with scenario cards such as 'A stranger asks for your favorite toy' and 'A friend asks to post a picture of you at school'. Ask students to hold up a green card if it’s safe to share and a red card if it’s not, explaining their choice for one scenario.
After Footprint Mapping: Draw Your Trail, provide students with a worksheet divided into two columns: 'Safe to Share' and 'Unsafe to Share.' Ask them to draw or write three examples of personal information or online actions in the correct column.
After Permission Relay Game, ask students: 'Imagine you found a funny picture of your friend. Before you post it online for everyone to see, what is the most important thing you should do, and why?' Facilitate a class discussion on seeking permission and protecting others’ privacy.
Extensions & Scaffolding
- Challenge: Ask students to create a short comic strip showing a scenario where someone forgot to ask for permission before sharing a photo, then rewriting it to include the correct steps.
- Scaffolding: Provide sentence starters for permission requests, such as 'Can I take a picture of you? May I post it online?' and model tone and body language.
- Deeper exploration: Invite students to interview a family member about their own digital footprint and bring back one thing they learned about staying safe online.
Key Vocabulary
| Digital Footprint | The trail of data left behind by a person's online activity. This includes websites visited, emails sent, and information submitted online. |
| Personal Information | Details about yourself that identify you, such as your full name, address, phone number, or school name. Some of this is safe to share, and some is not. |
| Privacy | Keeping personal information safe and controlling who sees it. It means deciding what you want to share and with whom. |
| Responsible Sharing | Thinking carefully before posting or sending information online, considering who might see it and if it is appropriate and safe to share. |
Suggested Methodologies
More in Safe Travels in Cyberspace
Digital Etiquette: The Kind Keyboard
Students practice positive communication and understand the impact of their words and actions in digital spaces.
2 methodologies
Account Security: Password Power
Students learn to create strong, memorable passwords and understand their role in protecting personal digital information.
2 methodologies
Screen Time Balance: Healthy Habits
Students discuss and identify healthy habits for screen time, understanding the importance of balancing digital and non-digital activities.
2 methodologies
Reliable Sources: Trusting Information
Students begin to question the reliability of information found online and understand that not everything on the internet is true.
2 methodologies
Asking for Help: When Things Go Wrong Online
Students learn to identify situations where they need to ask a trusted adult for help when encountering uncomfortable or confusing online content.
2 methodologies
Ready to teach Online Identity: My Digital Footprint?
Generate a full mission with everything you need
Generate a Mission