Skip to content
Technologies · Year 7

Active learning ideas

Protecting Personal Information Online

Active learning works for this topic because digital safety skills require hands-on practice. Students need to test their own strategies in realistic, low-risk situations to understand the consequences of weak passwords or misjudged privacy settings.

ACARA Content DescriptionsAC9TDI8K03
25–40 minPairs → Whole Class4 activities

Activity 01

Role Play35 min · Pairs

Role-Play: Phishing Hunt

Distribute printed mock emails and websites to pairs. Students list three phishing indicators per item, such as fake links or pressure tactics, then swap with another pair for verification. Groups report top red flags to the class.

Design a strategy for creating and managing secure passwords.

Facilitation TipFor the Phishing Hunt, assign roles like ‘hacker’ and ‘user’ to keep the simulation active and focused on specific red flags.

What to look forPresent students with 3-4 example emails. Ask them to circle any suspicious elements (e.g., generic greetings, urgent requests, odd sender addresses) and write one sentence explaining why each is a potential phishing attempt.

ApplyAnalyzeEvaluateSocial AwarenessSelf-Awareness
Generate Complete Lesson

Activity 02

Role Play40 min · Small Groups

Password Strength Challenge: Small Groups

Provide criteria sheets for strong passwords. Groups generate five examples, test them using an online strength checker, and refine based on results. Each group shares one winning password and explains its features.

Evaluate the authenticity of suspicious emails or websites.

Facilitation TipIn the Password Strength Challenge, provide a timer and rotation so groups test each other’s passwords under pressure.

What to look forPose the question: 'Imagine a new social media app asks for access to your contacts, location, and microphone. What questions would you ask about their privacy policy, and what settings would you adjust before signing up? Why?' Facilitate a class discussion on their responses.

ApplyAnalyzeEvaluateSocial AwarenessSelf-Awareness
Generate Complete Lesson

Activity 03

Role Play30 min · Whole Class

Privacy Audit Trail: Whole Class Demo

Project common social media platforms. As a class, walk through adjusting settings step-by-step, voting on best options via hand signals. Students then apply changes to demo accounts and note personal takeaways.

Justify the importance of managing privacy settings on social media and other platforms.

Facilitation TipDuring the Privacy Audit Trail, project a live social media profile so the whole class spots visibility gaps together.

What to look forStudents receive a card with a scenario: 'You receive a text message saying your online game account is locked and you need to click a link to verify your details.' Ask them to write two specific actions they would take and one reason why those actions are important for protecting their information.

ApplyAnalyzeEvaluateSocial AwarenessSelf-Awareness
Generate Complete Lesson

Activity 04

Role Play25 min · Individual

Strategy Design Sprint: Individual to Pairs

Individuals brainstorm a personal password management plan. Pair up to critique and improve plans using a checklist. Pairs present final strategies with justifications to the group.

Design a strategy for creating and managing secure passwords.

What to look forPresent students with 3-4 example emails. Ask them to circle any suspicious elements (e.g., generic greetings, urgent requests, odd sender addresses) and write one sentence explaining why each is a potential phishing attempt.

ApplyAnalyzeEvaluateSocial AwarenessSelf-Awareness
Generate Complete Lesson

A few notes on teaching this unit

Teach this topic through cycles of demonstration, practice, and reflection. Start with concrete examples students recognize, then guide them to abstract rules. Avoid overwhelming them with too many technical details at once. Research shows that spaced repetition of safety checks helps habits form, so revisit strategies in later lessons.

Successful learning looks like students confidently identifying phishing cues, creating passwords that resist cracking attempts, and adjusting privacy settings with clear reasoning. Assessment should show they can apply strategies beyond the classroom.


Watch Out for These Misconceptions

  • During Password Strength Challenge, watch for students assuming personal details make passwords secure.

    Provide a live password cracker tool during the challenge so groups see how quickly simple passwords fail, then guide them to replace dictionary words and birthdays with random combinations.

  • During Privacy Audit Trail, watch for students believing default privacy settings protect them.

    Have students screenshot a social media profile before and after changing settings, then compare visibility with peers to highlight gaps in default protections.

  • During Role-Play: Phishing Hunt, watch for students dismissing phishing emails from familiar senders.

    Use spoofed email addresses in the role-play that mimic real contacts, then prompt students to verify sender details beyond the display name during the debrief.


Methods used in this brief