Privacy Settings and Online IdentityActivities & Teaching Strategies
Active learning works well for this topic because students need to test privacy settings themselves to see how they function in real apps. Adjusting visibility options in live demos and mapping real versus online identity builds confidence in applying these skills outside the classroom.
Platform Privacy Audit: Setting Sleuths
In pairs, students choose a common social media or gaming platform. They then systematically investigate and document the available privacy settings, noting what each setting controls and its potential impact on visibility. Finally, they present their findings to the class, highlighting the most important settings for user control.
Prepare & details
Evaluate the effectiveness of different privacy settings on social media platforms.
Facilitation Tip: During the Demo Account Audit, circulate with a checklist to ensure all students locate the privacy settings on each platform, not just the ones they use personally.
Setup: Flexible space for group stations
Materials: Role cards with goals/resources, Game currency or tokens, Round tracker
Online Identity Persona Map
Individually, students create a visual map comparing their real-world identity traits with their curated online identity. They identify elements they choose to share online versus those they keep private, discussing the reasons behind these choices. This activity encourages self-reflection on digital presentation.
Prepare & details
Design a strategy for maintaining a positive and secure online identity.
Facilitation Tip: For Identity Mapping, provide a clear example of a profile that mixes neutral and personal details so students see how small choices add up.
Setup: Flexible space for group stations
Materials: Role cards with goals/resources, Game currency or tokens, Round tracker
Digital Footprint Scenario Analysis
Small groups analyze short case studies of individuals whose online actions led to unexpected consequences. They discuss how different privacy settings and online behaviors might have altered the outcomes, focusing on responsible digital decision-making.
Prepare & details
Compare the concept of online identity with real-world identity.
Facilitation Tip: In Scenario Role-Play, assign roles randomly to avoid students defaulting to their own preferences and to encourage diverse perspectives.
Setup: Flexible space for group stations
Materials: Role cards with goals/resources, Game currency or tokens, Round tracker
Teaching This Topic
Teachers should model the process of checking privacy settings slowly, pausing to ask students what they notice at each step. It helps to frame identity as something that evolves, not fixed, so students feel empowered to adjust their settings over time. Research suggests that peer sharing during role-plays reduces anxiety about making mistakes because students realize others face similar dilemmas.
What to Expect
Students will explain how different privacy levels work, identify risks in sample profiles, and justify personal choices using evidence from activities. They will also describe at least two ways online actions can affect real-life reputation.
These activities are a starting point. A full mission is the experience.
- Complete facilitation script with teacher dialogue
- Printable student materials, ready for class
- Differentiation strategies for every learner
Watch Out for These Misconceptions
Common MisconceptionDuring Demo Account Audit, watch for students who assume private profiles are completely hidden from strangers.
What to Teach Instead
Use the demo profiles to show how shared posts, tagged photos, or public bios can still appear in search results, even with strict settings turned on.
Common MisconceptionDuring Identity Mapping, watch for students who draw clear lines between online and real selves.
What to Teach Instead
Have them add arrows between mapped elements and real-life consequences, like how a post about disliking a teacher could affect class relationships.
Common MisconceptionDuring Scenario Role-Play, watch for students who insist strict settings are always best without considering trade-offs.
What to Teach Instead
Prompt groups to list one benefit of relaxed settings, like connecting with distant family, to balance their decisions.
Assessment Ideas
After Demo Account Audit, give students a scenario: 'You are setting up a new account and want to share with close friends only. List three settings to adjust and explain why each matters.' Collect responses to check understanding of visibility controls.
After Identity Mapping, pose: 'How might a casual comment in your bio today be interpreted by someone who doesn’t know you?' Use student responses to assess whether they recognize the permanence and audience of online content.
During Strategy Design, have students swap their Personal Plans and use a rubric to evaluate each other’s choices. Look for clear reasoning tied to specific risks and benefits in the plans.
Extensions & Scaffolding
- Challenge: Ask students to find and screenshot a platform’s privacy policy summary, then highlight one clause that contradicts their understanding of safety.
- Scaffolding: Provide a partially completed profile template with three safe defaults already filled in to reduce overwhelm.
- Deeper exploration: Have students interview a family member about their privacy settings and compare findings to their own choices in a short reflection.
Suggested Methodologies
More in Impacts and Digital Literacy
Introduction to Digital Citizenship
Students will explore what it means to be a responsible digital citizen and the importance of online etiquette.
2 methodologies
Online Etiquette and Netiquette
Students will learn about appropriate communication and behaviour in various online environments, including social media and forums.
2 methodologies
The Digital Footprint: Data Collection
Exploring how personal data is collected and the long term consequences of an online presence.
3 methodologies
Cyberbullying and Online Harassment
Understanding the forms of cyberbullying, its impact, and strategies for prevention and response.
3 methodologies
Cybersecurity Threats: Phishing & Malware
Understanding common threats like phishing and malware and how to defend against them.
2 methodologies
Ready to teach Privacy Settings and Online Identity?
Generate a full mission with everything you need
Generate a Mission