Skip to content
Computing · Year 6 · The Impact of Technology on Society · Summer Term

Online Privacy and Data Collection

Students investigate how corporations collect and use personal data, and strategies for protecting online privacy.

National Curriculum Attainment TargetsKS2: Computing - Online SafetyKS2: Computing - Digital Literacy

About This Topic

In Year 6 Computing, students examine how corporations collect personal data via cookies, app permissions, and browsing habits to build user profiles for advertising. They critique the claim that 'free' services like games and social platforms have no cost, understanding data as the hidden payment. This directly supports KS2 standards in online safety and digital literacy by fostering awareness of data trails from everyday online actions.

Students distinguish safe data to share, such as first names in school-approved chats, from high-risk details like addresses or precise locations. They design personal strategies including strong, unique passwords, regular privacy setting reviews, and questioning data requests. These activities build critical evaluation skills essential for safe digital citizenship.

Active learning suits this topic well. When students role-play data-sharing decisions in pairs or audit mock profiles collaboratively, abstract risks become immediate and relatable. Group debates on trade-offs encourage ownership of privacy choices, making lessons stick through real application and peer feedback.

Key Questions

  1. Critique the idea that 'free' online services come without a cost.
  2. Differentiate between personal data that is safe to share and data that is not.
  3. Design strategies individuals can use to regain control of their personal data online.

Learning Objectives

  • Analyze how online platforms collect personal data through cookies and user activity.
  • Evaluate the trade-offs between using 'free' online services and sharing personal data.
  • Classify types of personal data based on their sensitivity and potential risks if shared.
  • Design a personal privacy plan outlining specific steps to protect online data.
  • Critique the statement that online services are truly 'free' by identifying data as the payment.

Before You Start

Introduction to the Internet and World Wide Web

Why: Students need a basic understanding of how the internet works and how websites are accessed to grasp data collection concepts.

Digital Citizenship and Online Etiquette

Why: Prior knowledge of responsible online behavior provides a foundation for understanding the importance of protecting personal information.

Key Vocabulary

Personal DataInformation that can be used to identify a specific individual, such as name, address, or online activity.
Data CollectionThe process by which websites and apps gather information about users' behavior, preferences, and identity.
CookiesSmall text files stored on a user's computer by websites to remember information about them, like login details or browsing history.
Privacy SettingsOptions within apps and websites that allow users to control who sees their information and how their data is used.
User ProfileA collection of data compiled about an individual, often used by companies for targeted advertising or service personalization.

Watch Out for These Misconceptions

Common MisconceptionFree online services do not collect or sell personal data.

What to Teach Instead

These services profit from data shared through interactions. Role-play scenarios reveal how small shares accumulate into profiles, while group audits correct this by tracking mock data flows. Peer discussions solidify the trade-off concept.

Common MisconceptionIncognito or private browsing fully protects my identity.

What to Teach Instead

It only hides history from device users, not sites or trackers. Simulations with fake profiles show persistent cookies, and collaborative reviews help students see limits. Hands-on testing builds accurate mental models.

Common MisconceptionData shared only with friends stays private.

What to Teach Instead

Friends' devices or apps can leak it further. Group strategy designs expose chain reactions, and sharing exercises with safe examples clarify boundaries through real-time feedback.

Active Learning Ideas

See all activities

Real-World Connections

  • Social media platforms like TikTok and Instagram use data collected from user interactions, such as likes, shares, and viewing times, to create detailed user profiles for targeted advertising.
  • Online game developers often collect data on player progress, in-game purchases, and device information to improve game design and market new features or related products.
  • Online retailers such as Amazon use browsing history and purchase data to recommend products, influencing consumer choices and driving sales through personalized suggestions.

Assessment Ideas

Exit Ticket

Give students a card with a scenario, e.g., 'A new game asks for your exact location and access to your contacts.' Ask them to write: 1. What type of data is being requested? 2. Is this data safe to share? Why or why not? 3. What action should the user take?

Discussion Prompt

Pose the question: 'If a website offers a service for free, what is the real cost to the user?' Facilitate a class discussion, guiding students to identify personal data as the 'payment' and discuss its value and risks.

Quick Check

Present students with a list of data points (e.g., favorite color, home address, school name, date of birth, IP address). Ask them to sort these into two categories: 'Generally Safe to Share' and 'Risky to Share,' explaining their reasoning for at least two items in each category.

Frequently Asked Questions

How to teach Year 6 students about online data collection?
Start with real examples like targeted ads after searches. Use visuals of data flows from apps to servers. Build to critiques of 'free' services through evidence from class audits, ensuring students connect daily habits to corporate practices. Follow with strategy design for application.
What personal data should Year 6 avoid sharing online?
Avoid full names, addresses, phone numbers, school details, or location data, as these enable tracking or targeting. Safe shares include nicknames or general interests in controlled environments. Teach through audits: students categorize their data and justify choices, reinforcing discernment.
How does active learning benefit online privacy lessons?
Active approaches like role-plays and group audits make invisible data processes visible and personal. Students practice decisions in safe scenarios, debate trade-offs, and design strategies, leading to deeper retention. Peer feedback during shares builds confidence in applying privacy skills independently.
What strategies help Year 6 protect online privacy?
Recommend strong passwords with numbers and symbols, enabling two-factor authentication, reviewing app permissions regularly, and using privacy-focused search tools. Minimize shares by asking 'Do I need to give this?' Practice via pledges: students commit to one weekly habit, tracked in journals for accountability.