Skip to content
Technologies · Year 7

Active learning ideas

Privacy in the Digital Age

Active learning helps Year 7 students grasp the complexities of digital privacy because abstract concepts like data tracking and consent become tangible when they analyze real services, debate trade-offs, and audit their own digital footprints. Role-playing and case studies transform policy language into lived experience, making abstract risks concrete for young learners.

ACARA Content DescriptionsAC9TDI8K03
30–50 minPairs → Whole Class4 activities

Activity 01

Formal Debate40 min · Pairs

Debate Pairs: Privacy vs Data Benefits

Pair students to argue for personal privacy or company data collection, using provided fact sheets on Australian laws. Switch sides after 10 minutes, then whole class votes on key points. End with personal privacy pledges.

Evaluate the balance between personal privacy and data collection by companies.

Facilitation TipFor Debate Pairs, provide a visible scoring rubric so students focus on reasoning and evidence rather than winning the argument.

What to look forPose the question: 'Imagine a new app asks for access to your location, contacts, and camera. What information would you be most concerned about sharing, and why? What Australian Privacy Principles might apply here?' Facilitate a class discussion where students share their reasoning.

AnalyzeEvaluateCreateSelf-ManagementDecision-Making
Generate Complete Lesson

Activity 02

Formal Debate50 min · Small Groups

Data Breach Case Study: Small Group Analysis

Assign groups a real Australian breach like Optus or Medibank. Groups timeline events, identify failures, and propose fixes using privacy principles. Present findings to class for peer feedback.

Analyze the implications of data breaches on individual privacy.

Facilitation TipDuring Data Breach Case Study, assign each group a different breach timeline to present, ensuring all students examine varied perspectives.

What to look forPresent students with a short scenario describing a company's data collection policy. Ask them to identify one potential privacy risk for users and one APP that this policy might need to consider. Collect responses to gauge understanding of data risks and regulations.

AnalyzeEvaluateCreateSelf-ManagementDecision-Making
Generate Complete Lesson

Activity 03

Formal Debate30 min · Individual

Privacy Audit: Individual Digital Check

Students list their apps and websites, note data permissions, and adjust settings for better privacy. Share anonymized findings in pairs, then discuss class trends on common risks.

Justify the need for privacy regulations in the digital world.

Facilitation TipIn the Privacy Audit, provide a clear template that walks students through checking privacy settings on one account they use most.

What to look forOn an exit ticket, ask students to write two sentences explaining the difference between data collection for personalized services and data collection that poses a privacy risk. Then, ask them to list one action they can take to protect their digital privacy.

AnalyzeEvaluateCreateSelf-ManagementDecision-Making
Generate Complete Lesson

Activity 04

Jigsaw45 min · Small Groups

Jigsaw: Stakeholder Perspectives

Divide into experts on users, companies, and regulators. Research roles, then regroup to solve a data dilemma scenario. Teach home groups new insights from expert knowledge.

Evaluate the balance between personal privacy and data collection by companies.

Facilitation TipFor the Role-Play Jigsaw, assign roles in advance so students prepare relevant talking points from their stakeholder viewpoint.

What to look forPose the question: 'Imagine a new app asks for access to your location, contacts, and camera. What information would you be most concerned about sharing, and why? What Australian Privacy Principles might apply here?' Facilitate a class discussion where students share their reasoning.

UnderstandAnalyzeEvaluateRelationship SkillsSelf-Management
Generate Complete Lesson

A few notes on teaching this unit

Teachers should model skepticism by reading privacy policies aloud and reacting to unclear language, then invite students to do the same. Research shows that guided comparisons of multiple policies help students notice patterns in vague terms like ‘may use your data for marketing.’ Avoid simplifying too much; instead, scaffold understanding by breaking policies into smaller, concrete statements.

By the end of these activities, students will justify when to share personal data and when to refuse, using evidence from privacy policies and data breach reports. They will articulate the balance between convenience and privacy and apply Australian Privacy Principles to everyday apps and websites.


Watch Out for These Misconceptions

  • During Role-Play Jigsaw, watch for students assuming free services are private because they appear trustworthy.

    Have the ‘App Developer’ role present a generic privacy policy that includes vague phrases like ‘data may be used for improvements.’ After the role-play, pause to highlight which permissions were justified and which were not.

  • During Privacy Audit, watch for students who believe deleting an account removes all personal data permanently.

    Direct students to check the platform’s ‘Download Your Data’ feature to see what persists, then read the retention policy together to find the clause that mentions data kept for analytics or legal reasons.

  • During Debate Pairs, watch for students asserting that privacy laws do not apply to minors.

    Provide the exact wording from the Australian Privacy Principles that covers minors, then ask pairs to locate where parental consent is mentioned. This moves the conversation from assumption to textual evidence.


Methods used in this brief