Skip to content
Computer Science · Grade 10

Active learning ideas

Privacy and Surveillance in the Digital Age

Active learning engages students by making abstract privacy concepts tangible through debate, simulation, and analysis. When students apply ideas to personal data or real policies, they shift from passive understanding to ownership of their digital rights.

Ontario Curriculum ExpectationsCS.HS.S.10CS.HS.S.11
35–50 minPairs → Whole Class4 activities

Activity 01

Socratic Seminar45 min · Small Groups

Debate Carousel: Convenience vs Privacy

Divide class into groups to prepare arguments at stations: one for data collection benefits, one for privacy risks. Groups rotate every 10 minutes to hear and rebut opposing views. Conclude with whole-class vote and reflection on trade-offs.

Analyze the trade-offs between convenience and privacy in using digital services.

Facilitation TipDuring the Debate Carousel, assign rotating roles to ensure every student contributes to both pro and con arguments, deepening perspective-taking.

What to look forPose the following: 'Imagine you are offered a new app that provides highly personalized news feeds and recommendations, but it requires access to your location history, contacts, and browsing data. Discuss the specific benefits you might gain and the potential privacy risks involved. What factors would influence your decision to use or not use this app?'

AnalyzeEvaluateCreateSocial AwarenessRelationship Skills
Generate Complete Lesson

Activity 02

Socratic Seminar35 min · Individual

Digital Footprint Audit: Personal Mapping

Students list 10 apps or sites they use daily, then research data each collects via privacy policies. They map connections to create a visual footprint poster. Share in pairs to identify common patterns.

Explain the concept of digital footprints and their long-term implications.

Facilitation TipFor the Digital Footprint Audit, provide a template with clear categories (photos, posts, searches) so students focus on analysis rather than formatting.

What to look forAsk students to write down two examples of their own digital footprint. Then, have them identify one potential long-term implication for each example and suggest one action they could take to manage their digital footprint more effectively.

AnalyzeEvaluateCreateSocial AwarenessRelationship Skills
Generate Complete Lesson

Activity 03

Jigsaw50 min · Small Groups

Jigsaw: Regulation Critique

Assign small groups specific policies (e.g., Google, Facebook, PIPEDA). Groups summarize key clauses and strengths/weaknesses. Regroup into expert teaching teams to present findings to peers.

Critique current privacy policies and regulations regarding data collection.

Facilitation TipIn the Policy Jigsaw, use color-coded sticky notes to highlight clauses that confuse students, making patterns visible for group discussion.

What to look forPresent students with a simplified, anonymized privacy policy snippet. Ask them to identify: (1) What type of data is being collected? (2) How will this data be used? (3) What is one right the user has according to this snippet?

UnderstandAnalyzeEvaluateRelationship SkillsSelf-Management
Generate Complete Lesson

Activity 04

Socratic Seminar40 min · Pairs

Surveillance Simulation: Role-Play Scenarios

Pairs draw scenarios like app tracking or CCTV monitoring. One acts as citizen, other as data collector; switch roles. Debrief on power imbalances and rights.

Analyze the trade-offs between convenience and privacy in using digital services.

Facilitation TipRun the Surveillance Simulation in teams of four, with one student playing a wary citizen, another a corporation, another a government agency, and another a journalist to create realistic power dynamics.

What to look forPose the following: 'Imagine you are offered a new app that provides highly personalized news feeds and recommendations, but it requires access to your location history, contacts, and browsing data. Discuss the specific benefits you might gain and the potential privacy risks involved. What factors would influence your decision to use or not use this app?'

AnalyzeEvaluateCreateSocial AwarenessRelationship Skills
Generate Complete Lesson

A few notes on teaching this unit

Teachers should ground discussions in students' lived experiences by starting with their own data use before introducing frameworks. Avoid overwhelming students with technical jargon; instead, use relatable examples like school-provided apps or social media ads. Research shows that role-play and personal mapping increase empathy and retention more than lectures, so prioritize activities that require students to embody perspectives.

Successful learning looks like students confidently articulating the tension between convenience and privacy, critically evaluating their own digital practices, and recognizing how policies shape their data rights. Evidence includes articulate debate points, accurate footprint maps, and insightful policy critiques.


Watch Out for These Misconceptions

  • During the Debate Carousel, watch for students claiming 'Incognito mode fully protects privacy'.

    Pause the debate and assign groups to test tracking cookies before and after using Incognito mode in a shared browser demo. Have them present evidence of persistent tracking to correct the misconception.

  • During the Digital Footprint Audit, watch for students saying 'Personal data is unimportant unless you're famous'.

    Redirect students to aggregate their audit findings on a class chart, showing how individual posts combine into collective profiles. Ask them to identify how ads or opportunities might be biased by these profiles.

  • During the Policy Jigsaw, watch for students assuming 'Privacy policies ensure fair data use'.

    Have groups highlight vague consent language in their assigned policies and prepare a 30-second 'red flag' presentation to teach peers how to spot unfair clauses.


Methods used in this brief