Protecting Personal InformationActivities & Teaching Strategies
Active learning works well for this topic because young students process abstract risks better through role-play and hands-on activities than through lectures alone. Moving beyond worksheets to movement and materials keeps their focus on real-world consequences, not just rules.
Learning Objectives
- 1Identify personal information that should be kept private.
- 2Explain why sharing personal information online can be risky.
- 3Design simple rules for protecting personal information.
- 4Compare safe and unsafe ways to share information online.
Want a complete lesson plan with these objectives? Generate a Mission →
Role-Play: Online Stranger Scenarios
Divide class into small groups. Assign roles: one student as a chat friend asking for personal details, others decide whether to share and why. Groups perform skits, then discuss as a class what went right or wrong. End with key takeaways on a chart.
Prepare & details
Explain why it is important to keep personal information private.
Facilitation Tip: During Role-Play: Online Stranger Scenarios, assign clear roles and give students time to rehearse their responses before performing for peers.
Setup: Flexible space for group stations
Materials: Role cards with goals/resources, Game currency or tokens, Round tracker
Poster Creation: My Privacy Rules
Students work in pairs to draw and label a poster showing personal information to keep private, like address or password. Include one 'do' and one 'don't' example. Pairs present to the class for feedback and display posters in the room.
Prepare & details
Predict the risks of sharing too much information online.
Facilitation Tip: For Poster Creation: My Privacy Rules, provide sentence starters on strips of paper to scaffold language for students who struggle to articulate rules.
Setup: Flexible space for group stations
Materials: Role cards with goals/resources, Game currency or tokens, Round tracker
Simulation Game: Privacy Detective Hunt
Prepare cards with info types: some personal (e.g., birthday), some public (e.g., favorite color). In small groups, students sort cards into 'share' or 'keep private' piles and justify choices. Review as whole class with thumbs up/down voting.
Prepare & details
Design strategies to protect your personal information.
Facilitation Tip: In Privacy Detective Hunt, hide clues in predictable spots so students practice scanning for information that should never be shared.
Setup: Flexible space for group stations
Materials: Role cards with goals/resources, Game currency or tokens, Round tracker
Think-Pair-Share: Protection Strategies
Pose a scenario like 'A game asks for your school name.' Students think alone for 1 minute, pair to share ideas, then share with class. Teacher compiles top strategies on board for class agreement.
Prepare & details
Explain why it is important to keep personal information private.
Facilitation Tip: During Think-Pair-Share: Protection Strategies, set a timer for pair discussions to keep energy high and prevent off-topic conversations.
Setup: Standard classroom seating; students turn to a neighbor
Materials: Discussion prompt (projected or printed), Optional: recording sheet for pairs
Teaching This Topic
Teachers approach this topic by framing safety as a skill, not a warning, so students feel capable rather than fearful. Use repetition: revisit the same scenarios with new layers of detail to deepen understanding. Avoid singling out students who share personal details; instead, gently redirect with group discussion and class agreements.
What to Expect
Successful learning looks like students applying privacy rules confidently in new situations, explaining why certain actions are unsafe, and using the language of protection in their discussions. Watch for students who shift from vague 'don’t share' to specific 'I won’t tell strangers my school name because they could find me'.
These activities are a starting point. A full mission is the experience.
- Complete facilitation script with teacher dialogue
- Printable student materials, ready for class
- Differentiation strategies for every learner
Watch Out for These Misconceptions
Common MisconceptionDuring Role-Play: Online Stranger Scenarios, watch for students who assume online friends are trustworthy. Redirect by having peers act out how quickly information can spread when a 'friend' shares it with others.
What to Teach Instead
During Role-Play: Online Stranger Scenarios, pause the scene after a character shares information and ask the class to predict what might happen next. Use their predictions to highlight the risk of oversharing.
Common MisconceptionDuring Poster Creation: My Privacy Rules, watch for students who dismiss the risk of sharing photos. Redirect by having them compare photos with and without identifiable details, noting what strangers could learn.
What to Teach Instead
During Poster Creation: My Privacy Rules, provide sample photos and ask students to circle details that give away location or identity. Use their findings to update the class’s 'never share' list.
Common MisconceptionDuring Privacy Detective Hunt, watch for students who believe strangers cannot find them in real life from online details. Redirect by having them trace how an online username or photo could lead to a school or neighborhood.
What to Teach Instead
During Privacy Detective Hunt, after students find clues, ask them to map how a stranger could use that information. Use their maps to reinforce the connection between online and real-world risks.
Assessment Ideas
After Role-Play: Online Stranger Scenarios, show students pictures of different scenarios. Ask them to give a thumbs up for safe and a thumbs down for unsafe, then explain their choices in one sentence.
During Think-Pair-Share: Protection Strategies, ask students: 'Imagine you are playing a new online game and someone asks for your home address so they can send you a prize. What should you do? Why is this important?' Listen for explanations that involve not sharing and understanding the risk.
After Poster Creation: My Privacy Rules, give each student a small piece of paper. Ask them to draw one thing they learned about keeping their personal information safe. They can draw a picture of a lock, a secret code, or a safe place.
Extensions & Scaffolding
- Challenge: Ask early finishers to create a short comic strip showing a safe and unsafe way to handle personal information online.
- Scaffolding: Provide picture cards for students to sort into 'safe to share' and 'never share' piles during activities.
- Deeper exploration: Invite a community helper like a police officer to explain how sharing personal information can lead to real-world problems.
Key Vocabulary
| Personal Information | Details about you that are private, like your full name, address, or phone number. This information helps people know who you are. |
| Private | Something that should not be shared with everyone. It is meant to be kept safe and only shared with trusted people. |
| Online | Using computers, tablets, or phones to connect to the internet. This is where you might play games, watch videos, or talk to others. |
| Stranger | Someone you do not know. It is important to be careful when talking to strangers, especially online. |
| Password | A secret word or code that protects your online accounts, like a secret key. |
Suggested Methodologies
More in Rights and the Law
Laws for Personal Safety
Understanding how laws exist to keep citizens safe and the role of the police.
2 methodologies
Fair Conflict Resolution
Exploring the concept of a neutral third party in settling disputes.
2 methodologies
Understanding Ownership and Sharing
The ethics of private property versus public resources.
2 methodologies
The Concept of Justice
Introducing the basic idea of justice and what it means for everyone to be treated fairly under the law.
2 methodologies
Consequences of Breaking Rules
Understanding that actions have consequences and the importance of accountability.
2 methodologies
Ready to teach Protecting Personal Information?
Generate a full mission with everything you need
Generate a Mission