Keeping Our Information Safe OnlineActivities & Teaching Strategies
Young students learn best by doing, especially when topics involve abstract risks like online privacy. Active role-plays and sorting games make invisible dangers visible, while pledges and discussions give children tools to articulate their understanding. These methods turn cautionary advice into memorable, child-led learning.
Learning Objectives
- 1Identify at least five types of personal information that should be kept private online.
- 2Explain the potential risks associated with sharing personal information online, such as identity theft or unwanted contact.
- 3Analyze online scenarios to determine when it is appropriate to share information and when to seek adult guidance.
- 4Formulate a personal online safety plan that includes steps for responding to uncomfortable online situations.
- 5Evaluate the credibility of online sources regarding personal safety advice.
Want a complete lesson plan with these objectives? Generate a Mission →
Role-Play: Online Scenarios
Prepare cards with scenarios like 'A chat friend asks for your address' or 'A game requests your photo.' In pairs, students act out the situation, decide safe responses, and share with the class. Debrief on why choices matter.
Prepare & details
What kind of information should we keep private online?
Facilitation Tip: During the Role-Play: Online Scenarios, assign clear roles like 'trusted adult', 'stranger', or 'child unsure what to share' to keep scenarios focused and relatable.
Sorting Game: Share or Not?
Print images and statements of info types (e.g., favorite color vs. home address). Students sort into 'safe to share' and 'keep private' piles in small groups, then justify choices. Display sorts for class vote.
Prepare & details
Why is it important to ask an adult before sharing things online?
Facilitation Tip: For the Sorting Game: Share or Not?, use real examples from your class’s daily online lives to make the activity immediately relevant.
Safety Pledge Posters
Students draw or write personal online safety rules, like 'Ask an adult first.' In small groups, combine into a class poster and present pledges. Hang posters as ongoing reminders.
Prepare & details
What should we do if something online makes us feel uncomfortable?
Facilitation Tip: When creating Safety Pledge Posters, let students work in small groups to draft one rule that feels most important to them, then combine ideas into a class pledge.
Discussion Circles: Uncomfortable Moments
Pose key questions in a whole-class circle. Students share what makes them uncomfortable online and brainstorm actions like 'tell a trusted adult.' Record ideas on chart paper.
Prepare & details
What kind of information should we keep private online?
Facilitation Tip: In Discussion Circles: Uncomfortable Moments, normalize mistakes by modeling how to respond if someone says something unsafe, such as 'I’m not sure, let’s ask the teacher together.'
Teaching This Topic
Teachers should avoid lecturing about risks and instead guide students to discover protections through guided discovery. Children need repeated practice responding to scenarios, so short, frequent activities work better than one long lesson. Research shows that peer feedback strengthens understanding, so build in time for students to explain their choices to each other.
What to Expect
Students will confidently identify sensitive information, explain why sharing certain details is unsafe, and demonstrate how to respond to uncomfortable online situations. Success looks like clear reasoning during discussions and thoughtful choices in sorting games and role-plays.
These activities are a starting point. A full mission is the experience.
- Complete facilitation script with teacher dialogue
- Printable student materials, ready for class
- Differentiation strategies for every learner
Watch Out for These Misconceptions
Common MisconceptionDuring Role-Play: Online Scenarios, watch for students who assume someone is safe because they seem friendly.
What to Teach Instead
Use the role-play to pause and ask, 'What if this person is pretending? What clues tell us this might be risky?' Guide students to look for inconsistencies in the scenario details.
Common MisconceptionDuring Sorting Game: Share or Not?, watch for students who think popular apps or games must be safe.
What to Teach Instead
After the game, ask students to share examples of data that trusted sites still collect. Have them add these examples to their 'unsafe to share' list.
Common MisconceptionDuring Discussion Circles: Uncomfortable Moments, watch for students who say 'just ignore it.'
What to Teach Instead
Use the circle to practice specific phrases like 'I need to tell an adult' or 'I don’t feel comfortable.' Model these responses first, then ask students to try them in pairs.
Assessment Ideas
After Role-Play: Online Scenarios, provide each student with a half-sheet listing two scenarios: one safe request and one unsafe request. Ask them to circle the unsafe one and explain why in one sentence.
During Sorting Game: Share or Not?, circulate with a checklist of expected responses for each card. Note which students hesitate or change their minds after group discussion.
After Safety Pledge Posters, ask students to share one rule they included and why it matters. Listen for explanations that mention adult help, consent, or consequences of sharing.
Extensions & Scaffolding
- Challenge students to write a short 'digital safety tip' for a younger child, using examples from today’s activities.
- For students who struggle, provide visual cards with simple icons (house for address, phone for number) to help them categorize information in the sorting game.
- Allow extra time for students to research one child-friendly privacy policy from a site they use at home and compare it to class rules.
Key Vocabulary
| Personal Information | Details about yourself that, if shared widely, could identify you or compromise your safety. This includes your full name, address, phone number, and school name. |
| Privacy Settings | Controls on social media platforms and apps that allow you to limit who can see your posts, photos, and personal details. |
| Digital Footprint | The trail of data you leave behind when you use the internet, including websites you visit, emails you send, and information you post. |
| Cyberbullying | Harassment or bullying that takes place over digital devices like cell phones, computers, and tablets, often through social media, SMS, or gaming platforms. |
| Phishing | A fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication. |
Suggested Methodologies
More in Human Rights and Global Responsibility
What Are Rights? Being Fair to Everyone
Introduce the basic idea of rights as things everyone should have and be able to do, and why it's important to treat everyone fairly.
3 methodologies
My Rights and Responsibilities at School
Explore the rights children have at school, like the right to learn and play, and the responsibilities that come with these rights.
3 methodologies
The United Nations: Working Together for Peace
Learn that the United Nations is a group of countries that work together to help people around the world and promote peace.
3 methodologies
Children's Rights in Ireland
Evaluate the implementation of the UN Convention on the Rights of the Child (UNCRC) within the Irish legal system and society.
2 methodologies
Human Rights Defenders and Activism
Profile individuals and organizations that fight for social justice and civil liberties, understanding their methods and challenges.
3 methodologies
Ready to teach Keeping Our Information Safe Online?
Generate a full mission with everything you need
Generate a Mission