Skip to content

Privacy in the Digital AgeActivities & Teaching Strategies

Active learning helps Year 7 students grasp the complexities of digital privacy because abstract concepts like data tracking and consent become tangible when they analyze real services, debate trade-offs, and audit their own digital footprints. Role-playing and case studies transform policy language into lived experience, making abstract risks concrete for young learners.

Year 7Technologies4 activities30 min50 min

Learning Objectives

  1. 1Analyze how companies collect personal data through online platforms and identify specific tracking technologies used.
  2. 2Evaluate the ethical implications of targeted advertising and its reliance on user data.
  3. 3Justify the necessity of privacy regulations, such as the Australian Privacy Principles, in protecting individuals from data misuse.
  4. 4Compare the potential risks of data breaches, like identity theft, with the benefits of digital convenience.
  5. 5Critique the balance between personal privacy expectations and corporate data collection practices.

Want a complete lesson plan with these objectives? Generate a Mission

40 min·Pairs

Debate Pairs: Privacy vs Data Benefits

Pair students to argue for personal privacy or company data collection, using provided fact sheets on Australian laws. Switch sides after 10 minutes, then whole class votes on key points. End with personal privacy pledges.

Prepare & details

Evaluate the balance between personal privacy and data collection by companies.

Facilitation Tip: For Debate Pairs, provide a visible scoring rubric so students focus on reasoning and evidence rather than winning the argument.

Setup: Two teams facing each other, audience seating for the rest

Materials: Debate proposition card, Research brief for each side, Judging rubric for audience, Timer

AnalyzeEvaluateCreateSelf-ManagementDecision-Making
50 min·Small Groups

Data Breach Case Study: Small Group Analysis

Assign groups a real Australian breach like Optus or Medibank. Groups timeline events, identify failures, and propose fixes using privacy principles. Present findings to class for peer feedback.

Prepare & details

Analyze the implications of data breaches on individual privacy.

Facilitation Tip: During Data Breach Case Study, assign each group a different breach timeline to present, ensuring all students examine varied perspectives.

Setup: Two teams facing each other, audience seating for the rest

Materials: Debate proposition card, Research brief for each side, Judging rubric for audience, Timer

AnalyzeEvaluateCreateSelf-ManagementDecision-Making
30 min·Individual

Privacy Audit: Individual Digital Check

Students list their apps and websites, note data permissions, and adjust settings for better privacy. Share anonymized findings in pairs, then discuss class trends on common risks.

Prepare & details

Justify the need for privacy regulations in the digital world.

Facilitation Tip: In the Privacy Audit, provide a clear template that walks students through checking privacy settings on one account they use most.

Setup: Two teams facing each other, audience seating for the rest

Materials: Debate proposition card, Research brief for each side, Judging rubric for audience, Timer

AnalyzeEvaluateCreateSelf-ManagementDecision-Making
45 min·Small Groups

Jigsaw: Stakeholder Perspectives

Divide into experts on users, companies, and regulators. Research roles, then regroup to solve a data dilemma scenario. Teach home groups new insights from expert knowledge.

Prepare & details

Evaluate the balance between personal privacy and data collection by companies.

Facilitation Tip: For the Role-Play Jigsaw, assign roles in advance so students prepare relevant talking points from their stakeholder viewpoint.

Setup: Flexible seating for regrouping

Materials: Expert group reading packets, Note-taking template, Summary graphic organizer

UnderstandAnalyzeEvaluateRelationship SkillsSelf-Management

Teaching This Topic

Teachers should model skepticism by reading privacy policies aloud and reacting to unclear language, then invite students to do the same. Research shows that guided comparisons of multiple policies help students notice patterns in vague terms like ‘may use your data for marketing.’ Avoid simplifying too much; instead, scaffold understanding by breaking policies into smaller, concrete statements.

What to Expect

By the end of these activities, students will justify when to share personal data and when to refuse, using evidence from privacy policies and data breach reports. They will articulate the balance between convenience and privacy and apply Australian Privacy Principles to everyday apps and websites.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring Role-Play Jigsaw, watch for students assuming free services are private because they appear trustworthy.

What to Teach Instead

Have the ‘App Developer’ role present a generic privacy policy that includes vague phrases like ‘data may be used for improvements.’ After the role-play, pause to highlight which permissions were justified and which were not.

Common MisconceptionDuring Privacy Audit, watch for students who believe deleting an account removes all personal data permanently.

What to Teach Instead

Direct students to check the platform’s ‘Download Your Data’ feature to see what persists, then read the retention policy together to find the clause that mentions data kept for analytics or legal reasons.

Common MisconceptionDuring Debate Pairs, watch for students asserting that privacy laws do not apply to minors.

What to Teach Instead

Provide the exact wording from the Australian Privacy Principles that covers minors, then ask pairs to locate where parental consent is mentioned. This moves the conversation from assumption to textual evidence.

Assessment Ideas

Discussion Prompt

After Debate Pairs, pose a follow-up question: ‘What specific phrase in a privacy policy would make you reconsider sharing data?’ Listen for students citing vague language or unclear purposes.

Quick Check

During Data Breach Case Study, collect each group’s list of affected stakeholders and one APP violation. Review these to check if students correctly identify risks like unauthorized access or failure to disclose breaches promptly.

Exit Ticket

After the Privacy Audit, ask students to write two sentences comparing ‘data collected for personalized services’ with ‘data collected that poses a risk.’ Then, have them list one change they will make to a setting based on their audit.

Extensions & Scaffolding

  • Challenge students to design an infographic explaining one Australian Privacy Principle to a Year 6 audience.
  • Scaffolding: Provide sentence starters for the debate pairs, such as ‘One benefit of sharing data is…’ and ‘One risk is…’
  • Deeper: Have students interview a family member about their data sharing decisions and compare answers to their own audit findings.

Key Vocabulary

Data CollectionThe process by which companies gather information about users' online activities, preferences, and personal details.
Tracking TechnologiesTools like cookies and pixels used by websites and apps to monitor user behavior across the internet.
Australian Privacy Principles (APPs)A set of rules under the Privacy Act 1988 that governs how Australian government agencies and many private sector organizations handle personal information.
Data BreachAn incident where sensitive, protected, or confidential data is accessed, stolen, or used by an unauthorized individual.
Targeted AdvertisingAdvertising that is specifically aimed at users based on their past behavior, demographics, and interests, often powered by collected data.

Ready to teach Privacy in the Digital Age?

Generate a full mission with everything you need

Generate a Mission