Skip to content

Protecting Personal Data OnlineActivities & Teaching Strategies

Active learning builds lasting digital safety habits better than lectures because students confront real risks through hands-on practice. When they test passwords and adjust settings themselves, they experience the consequences of weak choices instead of just hearing about them.

Year 6Technologies4 activities25 min45 min

Learning Objectives

  1. 1Design a strong, memorable password incorporating uppercase letters, lowercase letters, numbers, and symbols.
  2. 2Explain the purpose of privacy settings on online platforms and their impact on personal data visibility.
  3. 3Evaluate the effectiveness of different security measures, such as multi-factor authentication, in protecting online accounts.
  4. 4Critique the potential risks associated with sharing personal information online and propose mitigation strategies.

Want a complete lesson plan with these objectives? Generate a Mission

30 min·Pairs

Pairs Challenge: Strong Password Design

Pairs brainstorm memorable phrases then convert them into strong passwords using four criteria: length over 12 characters, mixed case, numbers, symbols. They swap and attempt to guess each other's password. Debrief on what worked best.

Prepare & details

Design a strong and memorable password using best practices.

Facilitation Tip: During Pairs Challenge: Strong Password Design, move between pairs to ask guiding questions like 'How might a hacker guess this phrase?' instead of giving answers.

Setup: Groups at tables with matrix worksheets

Materials: Decision matrix template, Option description cards, Criteria weighting guide, Presentation template

AnalyzeEvaluateCreateDecision-MakingSelf-Management
45 min·Small Groups

Small Groups: Privacy Settings Simulation

Provide screenshots of social media profiles with default settings. Groups adjust settings to private, justify choices for different scenarios like family sharing versus public posts, and present one change to the class.

Prepare & details

Justify the importance of regularly updating privacy settings on social media.

Setup: Groups at tables with matrix worksheets

Materials: Decision matrix template, Option description cards, Criteria weighting guide, Presentation template

AnalyzeEvaluateCreateDecision-MakingSelf-Management
40 min·Whole Class

Whole Class: Security Measure Evaluation

Display common measures like passwords, biometrics, and updates. Class votes on effectiveness via polls, discusses evidence from scenarios, and ranks them for protecting data.

Prepare & details

Evaluate the effectiveness of different security measures in protecting personal information.

Setup: Groups at tables with matrix worksheets

Materials: Decision matrix template, Option description cards, Criteria weighting guide, Presentation template

AnalyzeEvaluateCreateDecision-MakingSelf-Management
25 min·Individual

Individual: Personal Data Audit

Students review their own device or app privacy settings, note one change to make, and write a justification. Share anonymously via class padlet for collective feedback.

Prepare & details

Design a strong and memorable password using best practices.

Setup: Groups at tables with matrix worksheets

Materials: Decision matrix template, Option description cards, Criteria weighting guide, Presentation template

AnalyzeEvaluateCreateDecision-MakingSelf-Management

Teaching This Topic

Start with low-stakes practice so students feel safe making mistakes. Avoid overwhelming them with too many rules at once. Research shows that repeated, brief exposures to concepts like complexity and visibility build stronger retention than single, long lessons.

What to Expect

Successful learning shows when students can explain why complexity matters in passwords and adjust privacy settings without teacher reminders. They should justify choices using specific criteria like character types and visibility restrictions.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring Pairs Challenge: Strong Password Design, watch for students who favor long passwords with only letters, assuming length alone guarantees security.

What to Teach Instead

Have these students test their passwords using a simple checklist that includes character variety. Ask them to compare their 'long-letter' password with one that mixes cases, numbers, and symbols to see which meets the criteria better.

Common MisconceptionDuring Small Groups: Privacy Settings Simulation, watch for students who assume privacy settings only need checking at setup.

What to Teach Instead

Give each group a mock profile that has been updated by the teacher to include new default settings. Ask them to identify what changed and how to adjust it, reinforcing that settings require regular review.

Common MisconceptionDuring Individual: Personal Data Audit, watch for students who believe personal details like pet names can’t be guessed in passwords.

What to Teach Instead

Ask peers to share one personal detail from a bio (real or fictional) and have the student guess if their pet’s name could fit. Use this to show how social media exposes such details and how to avoid using them.

Assessment Ideas

Quick Check

After Pairs Challenge: Strong Password Design, present example passwords on the board and ask students to identify which are strong and which are weak. Collect their justifications using a thumbs-up system to quickly gauge understanding.

Discussion Prompt

After Small Groups: Privacy Settings Simulation, pose the question: 'Imagine a friend wants to share their location on a social media app. What information should they consider before enabling this feature, and what privacy settings could help them stay safe?' Facilitate a class discussion to assess their ability to connect privacy settings to real-world risks.

Peer Assessment

After Individual: Personal Data Audit, have students swap their password designs with a partner. Partners use a checklist to assess whether each password includes uppercase, lowercase, numbers, symbols, and avoids common words. Discuss findings in pairs before finalizing their designs.

Extensions & Scaffolding

  • Challenge early finishers to create a password for a mock gaming account that includes a phrase they’ve never used before.
  • Scaffolding for students who struggle: provide a word bank of symbols and numbers to mix into their passwords.
  • Deeper exploration: research and present one real-world data breach case, focusing on how weak passwords or privacy settings contributed.

Key Vocabulary

Password StrengthRefers to the resistance of a password to guessing or brute-force attacks, determined by its length, complexity, and uniqueness.
Privacy SettingsControls offered by online services that allow users to manage who can see their personal information, posts, and profile details.
Two-Factor Authentication (2FA)A security process that requires users to provide two different authentication factors to verify their identity, such as a password and a code from a mobile device.
Personal Identifiable Information (PII)Any data that could potentially identify a specific individual, including names, addresses, email addresses, and birthdates.

Ready to teach Protecting Personal Data Online?

Generate a full mission with everything you need

Generate a Mission