Skip to content
Computer Science · Grade 9

Active learning ideas

Digital Footprint and Online Privacy

Active learning helps students grasp the permanence and complexity of digital footprints far better than passive lessons. When they trace their own online traces, design privacy strategies, and role-play data collection, the abstract becomes concrete and personal.

Ontario Curriculum ExpectationsCS.HS.CY.5CS.HS.S.12
30–45 minPairs → Whole Class4 activities

Activity 01

Socratic Seminar35 min · Pairs

Self-Audit: Mapping Personal Footprint

Students list all online accounts, apps, and devices they use daily. They perform Google searches for their name, email, and usernames, then screenshot results. In pairs, they categorize findings as public, private, or risky and brainstorm quick fixes.

Analyze how personal data is collected and used by online services.

Facilitation TipDuring Self-Audit, provide a fillable template with columns for action, platform, and duration to keep students focused on traceable activities.

What to look forAsk students to write down three specific actions they can take to manage their digital footprint and one potential long-term consequence of not managing it. Collect these as students leave.

AnalyzeEvaluateCreateSocial AwarenessRelationship Skills
Generate Complete Lesson

Activity 02

Socratic Seminar45 min · Small Groups

Group Challenge: Privacy Strategy Design

Small groups review common privacy tools like two-factor authentication and VPNs. They create a one-page strategy guide tailored to teen scenarios, such as social media or gaming. Groups present and vote on the most practical ideas.

Evaluate the long-term implications of one's digital footprint.

Facilitation TipIn the Group Challenge, assign each group a different privacy tool to research so teams can compare strengths and limitations.

What to look forPose the question: 'If a company offers a free service, what is the most likely way they are making money from your usage?' Facilitate a class discussion focusing on data monetization and targeted advertising.

AnalyzeEvaluateCreateSocial AwarenessRelationship Skills
Generate Complete Lesson

Activity 03

Simulation Game40 min · Whole Class

Simulation Game: Data Collection Role-Play

Assign roles as users, websites, and trackers. Users 'visit' sites while trackers log fake data points like location and clicks. Debrief as whole class on how data aggregates into profiles, revealing collection scale.

Design a personal strategy for managing online privacy and digital identity.

Facilitation TipDuring Simulation, give students specific roles like ‘ad tracker’ and ‘user’ with scripted actions to make tracking visible and discussable.

What to look forPresent students with a short, anonymized online scenario (e.g., a user posting personal details on a public forum). Ask students to identify the potential privacy risks involved and suggest one immediate action the user should take.

ApplyAnalyzeEvaluateCreateSocial AwarenessDecision-Making
Generate Complete Lesson

Activity 04

Socratic Seminar30 min · Pairs

Pairs Debate: Privacy vs. Convenience

Pairs research one pro-privacy tool (e.g., ad blockers) and one convenience feature (e.g., personalized feeds). They debate trade-offs, then switch sides. Conclude with personal commitment statements.

Analyze how personal data is collected and used by online services.

Facilitation TipIn the Pairs Debate, require each side to cite at least one real-world privacy incident to ground arguments in evidence.

What to look forAsk students to write down three specific actions they can take to manage their digital footprint and one potential long-term consequence of not managing it. Collect these as students leave.

AnalyzeEvaluateCreateSocial AwarenessRelationship Skills
Generate Complete Lesson

A few notes on teaching this unit

Teachers should avoid overwhelming students with legal jargon; instead, use relatable examples like school photos or sports schedules that get posted online. Research shows role-play and mapping exercises boost retention, so prioritize activities where students create visible artifacts of their learning. Emphasize iterative improvement—students should revise their privacy strategies after each simulation.

By the end of these activities, students should be able to map their digital footprint, explain how passive data builds profiles, and justify privacy choices using evidence from simulations. They should also anticipate reputational risks and propose concrete safeguards.


Watch Out for These Misconceptions

  • During Self-Audit, watch for students who assume deleted posts vanish completely.

    Have students trace a single post through deletion, screenshot, and cache, then document where copies persist. Use the mapping template to highlight third-party databases and archived pages.

  • During Simulation, watch for students who believe incognito mode stops all tracking.

    Have students run identical searches in incognito and normal mode, then compare results. Use network diagrams to show which entities still collect data despite the mode.

  • During Self-Audit, watch for students who only consider active posts.

    Provide a sample browser history with metadata like timestamps and IP addresses. Ask students to label which data points could build a profile, then collaboratively expand the footprint map.


Methods used in this brief