Skip to content

Online Privacy and Data CollectionActivities & Teaching Strategies

Active learning makes online privacy concrete for Year 6 students because abstract data points become visible when they simulate how companies collect and combine information. When learners step into the roles of data collectors and data subjects, they directly experience the hidden mechanics behind apps and websites they already use. This embodied understanding helps students grasp why their digital choices matter and how small actions create large trails.

Year 6Computing4 activities25 min40 min

Learning Objectives

  1. 1Analyze how online platforms collect personal data through cookies and user activity.
  2. 2Evaluate the trade-offs between using 'free' online services and sharing personal data.
  3. 3Classify types of personal data based on their sensitivity and potential risks if shared.
  4. 4Design a personal privacy plan outlining specific steps to protect online data.
  5. 5Critique the statement that online services are truly 'free' by identifying data as the payment.

Want a complete lesson plan with these objectives? Generate a Mission

30 min·Small Groups

Role-Play: Data Collectors Challenge

Assign roles as 'companies' and 'users' in small groups. Companies ask for data like email or hobbies; users respond or refuse with reasons, then switch. Debrief on patterns in shared data and potential uses.

Prepare & details

Critique the idea that 'free' online services come without a cost.

Facilitation Tip: During the Role-Play: Data Collectors Challenge, assign clear roles (e.g., app developer, marketer, user) and provide simple props like printed data cards so learners can physically trade information.

Setup: Chairs in rows facing a front table for officials, podium for speakers

Materials: Stakeholder role cards, Issue briefing document, Speaking request cards, Voting ballot

ApplyAnalyzeEvaluateCreateDecision-MakingSocial Awareness
25 min·Pairs

Privacy Audit: App Settings Check

Provide printed screenshots of common apps. In pairs, students locate and adjust privacy options, noting changes. Pairs present one key finding to the class.

Prepare & details

Differentiate between personal data that is safe to share and data that is not.

Facilitation Tip: In the Privacy Audit: App Settings Check, give each student a sample app with pre-filled permissions so they can see the gap between what the app requests and what is truly necessary.

Setup: Chairs in rows facing a front table for officials, podium for speakers

Materials: Stakeholder role cards, Issue briefing document, Speaking request cards, Voting ballot

ApplyAnalyzeEvaluateCreateDecision-MakingSocial Awareness
40 min·Small Groups

Strategy Workshop: Design Privacy Plans

Small groups list five personal data protection strategies, such as two-factor authentication. Create posters with steps and examples. Share via gallery walk.

Prepare & details

Design strategies individuals can use to regain control of their personal data online.

Facilitation Tip: During the Strategy Workshop: Design Privacy Plans, supply template privacy checklists with age-appropriate language and examples to guide independent planning.

Setup: Chairs in rows facing a front table for officials, podium for speakers

Materials: Stakeholder role cards, Issue briefing document, Speaking request cards, Voting ballot

ApplyAnalyzeEvaluateCreateDecision-MakingSocial Awareness
35 min·Whole Class

Formal Debate: Free Services Debate

Whole class splits into teams to argue for or against using 'free' apps despite data collection. Use evidence from prior activities. Vote and reflect on key points.

Prepare & details

Critique the idea that 'free' online services come without a cost.

Facilitation Tip: In the Debate: Free Services Debate, provide a structured format with sentence stems so all students can participate, regardless of confidence.

Setup: Two teams facing each other, audience seating for the rest

Materials: Debate proposition card, Research brief for each side, Judging rubric for audience, Timer

AnalyzeEvaluateCreateSelf-ManagementDecision-Making

Teaching This Topic

Experienced teachers approach online privacy by turning abstract policies into personal experiences. They avoid long lectures about terms of service and instead let students feel the tension between convenience and control. Research shows that when learners simulate data collection and observe its results, they build stronger mental models than when they only listen. Teachers also emphasize concrete actions—like toggling settings or removing permissions—so students leave with skills they can use immediately.

What to Expect

By the end of the sequence, students will confidently identify the types of personal data collected, explain why free services trade data for access, and design practical privacy plans they can apply at home. They will articulate the difference between hiding history and preventing tracking, and justify their decisions with evidence from their privacy audits.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring Role-Play: Data Collectors Challenge, watch for students who believe free services do not collect or share any personal data.

What to Teach Instead

Use the role-play to show how small data points (likes, searches, location pings) accumulate into detailed profiles. After the activity, ask groups to tally the total data shared in one session and discuss what a company could infer from that profile.

Common MisconceptionDuring Privacy Audit: App Settings Check, watch for students who think incognito or private browsing fully protects their identity.

What to Teach Instead

Have students test a fake profile in incognito mode and use browser tools to inspect persistent cookies and trackers. After the test, run a whole-class review of the findings to correct the misconception.

Common MisconceptionDuring Strategy Workshop: Design Privacy Plans, watch for students who believe data shared only with friends stays private.

What to Teach Instead

Use the workshop to model how friend devices or apps can leak data further. Provide a flowchart template where students map potential leaks and revise their plans to include safer sharing boundaries.

Assessment Ideas

Exit Ticket

After Role-Play: Data Collectors Challenge, give students a card with a scenario (e.g., 'A new game asks for your exact location and access to your contacts.'). Ask them to write: 1. What type of data is being requested? 2. Is this data safe to share? Why or why not? 3. What action should the user take?

Discussion Prompt

After Debate: Free Services Debate, pose the question: 'If a website offers a service for free, what is the real cost to the user?' Facilitate a class discussion, guiding students to identify personal data as the 'payment' and discuss its value and risks.

Quick Check

During Privacy Audit: App Settings Check, present students with a list of data points (e.g., favorite color, home address, school name, date of birth, IP address). Ask them to sort these into two categories: 'Generally Safe to Share' and 'Risky to Share,' explaining their reasoning for at least two items in each category.

Extensions & Scaffolding

  • Challenge: Ask students to research a new app or game they like and prepare a one-minute pitch explaining the data it collects and how they would protect their privacy.
  • Scaffolding: Provide a word bank of data types (e.g., location, contacts, browsing history) and sentence starters (e.g., "This is risky because...") to support struggling writers during the exit-ticket.
  • Deeper exploration: Invite students to compare two privacy policies side by side, highlighting differences in language and data use, and present their findings to the class.

Key Vocabulary

Personal DataInformation that can be used to identify a specific individual, such as name, address, or online activity.
Data CollectionThe process by which websites and apps gather information about users' behavior, preferences, and identity.
CookiesSmall text files stored on a user's computer by websites to remember information about them, like login details or browsing history.
Privacy SettingsOptions within apps and websites that allow users to control who sees their information and how their data is used.
User ProfileA collection of data compiled about an individual, often used by companies for targeted advertising or service personalization.

Ready to teach Online Privacy and Data Collection?

Generate a full mission with everything you need

Generate a Mission