Staying Safe OnlineActivities & Teaching Strategies
Active learning helps Year 3 students internalise online safety by letting them test real-world scenarios in a controlled setting. Role-plays and games turn abstract rules into memorable, child-centred experiences that build confidence in identifying risks and responding appropriately.
Learning Objectives
- 1Identify personal information that should be kept private online, such as full name, address, and passwords.
- 2Evaluate the trustworthiness of online profiles and information sources by recognizing potential inaccuracies or misleading content.
- 3Design a personal set of rules for safe and responsible online behaviour, including when and how to report concerns.
- 4Explain the importance of not sharing personal secrets or sensitive details with unknown individuals online.
Want a complete lesson plan with these objectives? Generate a Mission →
Role-Play: Safe Chat Scenarios
Prepare cards with online chat scenarios, some safe and some risky. In pairs, students act out responses, then switch roles and discuss better choices. Debrief as a class to highlight key strategies.
Prepare & details
Evaluate which personal information should always remain private online.
Facilitation Tip: During the role-play, assign roles with clear but subtle differences so students notice how easily identities can be misrepresented.
Setup: Groups at tables with case materials
Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template
Sorting Game: Private or Public?
Create cards listing personal details like age, school name, or favourite game. Small groups sort them into 'private' or 'shareable' piles, justifying choices. Display and review class sorts.
Prepare & details
Assess the reliability of online identities and information sources.
Facilitation Tip: For the sorting game, use real examples like school photos or cartoon avatars to help students focus on the information being shared, not the image itself.
Setup: Groups at tables with case materials
Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template
Rule Design: Class Digital Code
Brainstorm rules for safe online behaviour in whole class discussion. Groups illustrate one rule each on posters, then vote to finalise the class code. Display it near computers.
Prepare & details
Design a set of rules for safe and responsible online behavior.
Facilitation Tip: When designing the class digital code, provide sentence starters on the board to support students who struggle to formulate rules independently.
Setup: Groups at tables with case materials
Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template
Detective Challenge: Spot Fakes
Show sample online profiles, some real and some fake. Individually, students note clues like mismatched details, then share findings in small groups to assess reliability.
Prepare & details
Evaluate which personal information should always remain private online.
Facilitation Tip: In the detective challenge, give each pair only three clues so they must evaluate each piece carefully rather than guessing randomly.
Setup: Groups at tables with case materials
Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template
Teaching This Topic
Start with physical actions: have students stand on a line marked ‘safe’ or ‘unsafe’ to categorise statements before discussing. Use peer teaching—let students explain their reasoning to each other—to strengthen understanding. Avoid lengthy lectures; instead, keep conversations short and connected to the activities. Research shows that when children teach others, their own learning deepens, so pair strong and developing students for reflection after each task.
What to Expect
Students will confidently distinguish between private and public information, demonstrate how to verify online identities, and articulate clear rules for safe digital behaviour. Their actions and discussions should show they understand the importance of protecting personal details and seeking adult help when unsure.
These activities are a starting point. A full mission is the experience.
- Complete facilitation script with teacher dialogue
- Printable student materials, ready for class
- Differentiation strategies for every learner
Watch Out for These Misconceptions
Common MisconceptionDuring Role-Play: Safe Chat Scenarios, watch for students who treat online friends the same as in-person ones without questioning differences in behaviour or identity.
What to Teach Instead
Use the role-play cards to highlight inconsistencies, such as mismatched interests or sudden requests for personal details, then pause to ask students what they notice and why it matters.
Common MisconceptionDuring Sorting Game: Private or Public?, watch for students who dismiss sharing photos or locations as harmless because they cannot see immediate harm.
What to Teach Instead
Ask students to imagine the photo being printed and shown to someone they don’t know, then have them move the card to ‘private’ while discussing how strangers could use the image.
Common MisconceptionDuring Rule Design: Class Digital Code, watch for students who believe passwords only need to be hidden from strangers outside the family.
What to Teach Instead
Guide students to include rules about not sharing passwords even with siblings or family friends, using examples like shared tablets or school devices to highlight risks.
Assessment Ideas
After Sorting Game: Private or Public?, present students with new scenarios on cards and ask them to hold up a green card for ‘safe to share’ or a red card for ‘keep private.’ Ask one student per card to explain their choice.
During Role-Play: Safe Chat Scenarios, freeze the role-play at key moments and ask the class to suggest what the student should do next, focusing on reporting to a trusted adult and not sharing secrets.
After Rule Design: Class Digital Code, ask students to write one new rule they learned and one adult they can talk to if they feel unsafe, then collect the slips to check for key safety concepts and adult connections.
Extensions & Scaffolding
- Challenge students to create a short comic strip showing a safe online conversation and an unsafe one, then swap with a partner to identify the risks.
- Scaffolding: Provide a word bank with key terms like ‘stranger,’ ‘password,’ and ‘trusted adult’ to support rule writing for students who need more structure.
- Deeper: Invite a local police officer or digital safety educator to join the class for a Q&A, using their real-life examples to extend learning beyond the classroom examples.
Key Vocabulary
| Personal Information | Details about yourself that identify you, like your full name, address, phone number, or school. This information should be kept private online. |
| Online Identity | The way a person presents themselves on the internet, which may not always be true or accurate. It's important to be critical of who you interact with. |
| Trusted Adult | A grown-up, like a parent, teacher, or family member, that you can talk to if something online makes you feel worried, uncomfortable, or unsafe. |
| Digital Citizen | Someone who uses technology responsibly and ethically, showing respect for others and following rules for safe online behaviour. |
Suggested Methodologies
More in How Computers Talk
Parts of a System
Identifying hardware and software components and how they work together.
2 methodologies
Input and Output Devices
Students identify and categorize various input (e.g., keyboard, mouse) and output (e.g., screen, printer) devices.
2 methodologies
Software: The Brains of the Machine
Students explore different types of software (operating systems, applications) and their roles.
2 methodologies
Connecting Digital Systems
Students learn that digital systems can connect to each other to share information, both nearby and across the world.
2 methodologies
Local Networks vs. The Internet
Students distinguish between local area networks (LANs) and the global internet.
2 methodologies
Ready to teach Staying Safe Online?
Generate a full mission with everything you need
Generate a Mission