Skip to content

Keeping Information PrivateActivities & Teaching Strategies

Active learning works well for this topic because young children learn best by doing, especially with sensitive subjects like privacy. Sorting, creating, and role-playing help students practice safe choices in contexts that feel real to them.

Year 2Computing4 activities20 min35 min

Learning Objectives

  1. 1Identify personal information that should be kept private online.
  2. 2Explain why sharing certain personal details poses risks.
  3. 3Construct a set of rules for safe online information sharing.
  4. 4Analyze scenarios to determine if sharing personal information is appropriate.

Want a complete lesson plan with these objectives? Generate a Mission

25 min·Small Groups

Sorting Activity: Safe or Share Cards

Prepare cards with examples of information like 'my favourite colour' or 'home address.' In small groups, students sort them into 'safe to share' and 'keep private' piles, then justify choices to the group. End with a class share-out to agree on rules.

Prepare & details

Justify why certain personal details should not be shared online.

Facilitation Tip: During the Sorting Activity, circulate and listen for student reasoning to identify where misconceptions about trust and information sharing emerge.

Setup: Groups at tables with case materials

Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template

AnalyzeEvaluateCreateDecision-MakingSelf-Management
30 min·Pairs

Role-Play: Online Chat Scenarios

Pairs act out online chats using scripted cards; one asks for personal details, the other responds safely. Switch roles and discuss what worked. Teacher facilitates debrief on risks and good responses.

Prepare & details

Analyze the potential risks of sharing too much information.

Facilitation Tip: In Role-Play scenarios, step in immediately if students reveal personal details aloud to model safe language and behavior.

Setup: Groups at tables with case materials

Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template

AnalyzeEvaluateCreateDecision-MakingSelf-Management
35 min·Whole Class

Poster Creation: Our Privacy Rules

Whole class brainstorms rules for safe sharing, then small groups illustrate one rule each on a shared poster. Display and refer to it during device time.

Prepare & details

Construct rules for deciding what information is safe to share.

Facilitation Tip: For Poster Creation, provide sentence starters like 'We do not share... because...' to scaffold explanations of privacy rules.

Setup: Groups at tables with case materials

Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template

AnalyzeEvaluateCreateDecision-MakingSelf-Management
20 min·Individual

Digital Detective Game

Individuals use printed 'screens' to spot unsafe sharing in mock social media posts, circling private info and suggesting fixes. Share findings in pairs.

Prepare & details

Justify why certain personal details should not be shared online.

Facilitation Tip: During the Digital Detective Game, allow students to replay scenarios until they identify the privacy risk correctly, reinforcing the learning through immediate feedback.

Setup: Groups at tables with case materials

Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template

AnalyzeEvaluateCreateDecision-MakingSelf-Management

Teaching This Topic

Teach this topic through guided practice that mirrors real online interactions. Avoid abstract lectures; instead, use concrete examples and peer-led discussions to build understanding. Research shows that children this age grasp safety concepts best when they experience consequences through role-play, so design activities where mistakes lead to discussions rather than punishments.

What to Expect

Students will confidently categorize personal information, justify their choices, and apply privacy rules in simulated online situations. They will create clear, child-friendly guidelines they can explain and defend to others.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring Sorting Activity, watch for students who categorize 'My Best Friend's Name' as safe to share because they trust them personally.

What to Teach Instead

Use the Sorting Activity to prompt students to consider how information could be misused even by people they know. Ask, 'If your best friend shared your friend's name with someone else, would you still want that name shared? Why or why not?'

Common MisconceptionDuring Role-Play, watch for students who assume online friends are always trustworthy based on their profile picture or friendly messages.

What to Teach Instead

During Role-Play, pause after each scenario and ask, 'How do you know this person is who they say they are? What could happen if they shared your school name with someone else?'

Common MisconceptionDuring Poster Creation, watch for students who treat photos and drawings as completely harmless to share online.

What to Teach Instead

Use the Poster Creation activity to have students examine sample photos for clues that reveal location or identity. Ask, 'What can someone learn about you just from this picture?'

Assessment Ideas

Exit Ticket

After Sorting Activity, give each student three cards with 'My Full Name', 'My Favorite Color', and 'My Home Address'. Ask them to write on the back of each card 'Safe to Share' or 'Keep Private' and explain why for one of the 'Keep Private' cards.

Discussion Prompt

During Role-Play, present a scenario where 'a new friend online asks for your school name so they can send you a birthday card.' Ask students, 'What is the risk here? What is a safe way to respond?' Facilitate a brief class discussion on their answers.

Quick Check

After Poster Creation, show images of common online activities, such as playing a game or posting a picture. Ask students to give a thumbs up if they think it is generally safe to share their name while doing it, and a thumbs down if it is not. Discuss why.

Extensions & Scaffolding

  • Challenge students who finish early to create a new online chat scenario where someone tries to trick a peer into sharing private information, then solve it as a class.
  • For students who struggle, provide pre-sorted cards with clear explanations attached to the back for reference during sorting activities.
  • Deeper exploration: Have students interview a family member about how they keep personal information private, then present one safety tip to the class.

Key Vocabulary

Personal InformationDetails about you that, if shared, could identify you or give others private facts about your life. This includes your full name, address, or school name.
PrivacyKeeping personal information safe and not letting others see or use it without your permission. It means controlling who knows what about you.
Online StrangerSomeone you do not know in real life who you meet or communicate with on the internet. It is important to be cautious when interacting with them.
RiskA situation where something bad might happen. Sharing too much personal information online can create risks like unwanted contact or someone using your details wrongly.

Ready to teach Keeping Information Private?

Generate a full mission with everything you need

Generate a Mission