Keeping Information PrivateActivities & Teaching Strategies
Active learning works well for this topic because young children learn best by doing, especially with sensitive subjects like privacy. Sorting, creating, and role-playing help students practice safe choices in contexts that feel real to them.
Learning Objectives
- 1Identify personal information that should be kept private online.
- 2Explain why sharing certain personal details poses risks.
- 3Construct a set of rules for safe online information sharing.
- 4Analyze scenarios to determine if sharing personal information is appropriate.
Want a complete lesson plan with these objectives? Generate a Mission →
Sorting Activity: Safe or Share Cards
Prepare cards with examples of information like 'my favourite colour' or 'home address.' In small groups, students sort them into 'safe to share' and 'keep private' piles, then justify choices to the group. End with a class share-out to agree on rules.
Prepare & details
Justify why certain personal details should not be shared online.
Facilitation Tip: During the Sorting Activity, circulate and listen for student reasoning to identify where misconceptions about trust and information sharing emerge.
Setup: Groups at tables with case materials
Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template
Role-Play: Online Chat Scenarios
Pairs act out online chats using scripted cards; one asks for personal details, the other responds safely. Switch roles and discuss what worked. Teacher facilitates debrief on risks and good responses.
Prepare & details
Analyze the potential risks of sharing too much information.
Facilitation Tip: In Role-Play scenarios, step in immediately if students reveal personal details aloud to model safe language and behavior.
Setup: Groups at tables with case materials
Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template
Poster Creation: Our Privacy Rules
Whole class brainstorms rules for safe sharing, then small groups illustrate one rule each on a shared poster. Display and refer to it during device time.
Prepare & details
Construct rules for deciding what information is safe to share.
Facilitation Tip: For Poster Creation, provide sentence starters like 'We do not share... because...' to scaffold explanations of privacy rules.
Setup: Groups at tables with case materials
Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template
Digital Detective Game
Individuals use printed 'screens' to spot unsafe sharing in mock social media posts, circling private info and suggesting fixes. Share findings in pairs.
Prepare & details
Justify why certain personal details should not be shared online.
Facilitation Tip: During the Digital Detective Game, allow students to replay scenarios until they identify the privacy risk correctly, reinforcing the learning through immediate feedback.
Setup: Groups at tables with case materials
Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template
Teaching This Topic
Teach this topic through guided practice that mirrors real online interactions. Avoid abstract lectures; instead, use concrete examples and peer-led discussions to build understanding. Research shows that children this age grasp safety concepts best when they experience consequences through role-play, so design activities where mistakes lead to discussions rather than punishments.
What to Expect
Students will confidently categorize personal information, justify their choices, and apply privacy rules in simulated online situations. They will create clear, child-friendly guidelines they can explain and defend to others.
These activities are a starting point. A full mission is the experience.
- Complete facilitation script with teacher dialogue
- Printable student materials, ready for class
- Differentiation strategies for every learner
Watch Out for These Misconceptions
Common MisconceptionDuring Sorting Activity, watch for students who categorize 'My Best Friend's Name' as safe to share because they trust them personally.
What to Teach Instead
Use the Sorting Activity to prompt students to consider how information could be misused even by people they know. Ask, 'If your best friend shared your friend's name with someone else, would you still want that name shared? Why or why not?'
Common MisconceptionDuring Role-Play, watch for students who assume online friends are always trustworthy based on their profile picture or friendly messages.
What to Teach Instead
During Role-Play, pause after each scenario and ask, 'How do you know this person is who they say they are? What could happen if they shared your school name with someone else?'
Common MisconceptionDuring Poster Creation, watch for students who treat photos and drawings as completely harmless to share online.
What to Teach Instead
Use the Poster Creation activity to have students examine sample photos for clues that reveal location or identity. Ask, 'What can someone learn about you just from this picture?'
Assessment Ideas
After Sorting Activity, give each student three cards with 'My Full Name', 'My Favorite Color', and 'My Home Address'. Ask them to write on the back of each card 'Safe to Share' or 'Keep Private' and explain why for one of the 'Keep Private' cards.
During Role-Play, present a scenario where 'a new friend online asks for your school name so they can send you a birthday card.' Ask students, 'What is the risk here? What is a safe way to respond?' Facilitate a brief class discussion on their answers.
After Poster Creation, show images of common online activities, such as playing a game or posting a picture. Ask students to give a thumbs up if they think it is generally safe to share their name while doing it, and a thumbs down if it is not. Discuss why.
Extensions & Scaffolding
- Challenge students who finish early to create a new online chat scenario where someone tries to trick a peer into sharing private information, then solve it as a class.
- For students who struggle, provide pre-sorted cards with clear explanations attached to the back for reference during sorting activities.
- Deeper exploration: Have students interview a family member about how they keep personal information private, then present one safety tip to the class.
Key Vocabulary
| Personal Information | Details about you that, if shared, could identify you or give others private facts about your life. This includes your full name, address, or school name. |
| Privacy | Keeping personal information safe and not letting others see or use it without your permission. It means controlling who knows what about you. |
| Online Stranger | Someone you do not know in real life who you meet or communicate with on the internet. It is important to be cautious when interacting with them. |
| Risk | A situation where something bad might happen. Sharing too much personal information online can create risks like unwanted contact or someone using your details wrongly. |
Suggested Methodologies
More in Information Technology in Our World
Identifying Technology Around Us
Recognizing information technology in the school and local community.
2 methodologies
How Computers Work (Basic Input/Output)
Understanding the basic concepts of input, processing, and output in simple devices.
2 methodologies
The Power of the Internet (Introduction)
A basic introduction to how computers are connected globally to share information.
2 methodologies
Ready to teach Keeping Information Private?
Generate a full mission with everything you need
Generate a Mission