Skip to content

Protecting Personal InformationActivities & Teaching Strategies

Active learning works well for this topic because young students process abstract risks better through role-play and hands-on activities than through lectures alone. Moving beyond worksheets to movement and materials keeps their focus on real-world consequences, not just rules.

Primary 1CCE4 activities15 min30 min

Learning Objectives

  1. 1Identify personal information that should be kept private.
  2. 2Explain why sharing personal information online can be risky.
  3. 3Design simple rules for protecting personal information.
  4. 4Compare safe and unsafe ways to share information online.

Want a complete lesson plan with these objectives? Generate a Mission

30 min·Small Groups

Role-Play: Online Stranger Scenarios

Divide class into small groups. Assign roles: one student as a chat friend asking for personal details, others decide whether to share and why. Groups perform skits, then discuss as a class what went right or wrong. End with key takeaways on a chart.

Prepare & details

Explain why it is important to keep personal information private.

Facilitation Tip: During Role-Play: Online Stranger Scenarios, assign clear roles and give students time to rehearse their responses before performing for peers.

Setup: Flexible space for group stations

Materials: Role cards with goals/resources, Game currency or tokens, Round tracker

ApplyAnalyzeEvaluateCreateSocial AwarenessDecision-Making
25 min·Pairs

Poster Creation: My Privacy Rules

Students work in pairs to draw and label a poster showing personal information to keep private, like address or password. Include one 'do' and one 'don't' example. Pairs present to the class for feedback and display posters in the room.

Prepare & details

Predict the risks of sharing too much information online.

Facilitation Tip: For Poster Creation: My Privacy Rules, provide sentence starters on strips of paper to scaffold language for students who struggle to articulate rules.

Setup: Flexible space for group stations

Materials: Role cards with goals/resources, Game currency or tokens, Round tracker

ApplyAnalyzeEvaluateCreateSocial AwarenessDecision-Making
20 min·Small Groups

Simulation Game: Privacy Detective Hunt

Prepare cards with info types: some personal (e.g., birthday), some public (e.g., favorite color). In small groups, students sort cards into 'share' or 'keep private' piles and justify choices. Review as whole class with thumbs up/down voting.

Prepare & details

Design strategies to protect your personal information.

Facilitation Tip: In Privacy Detective Hunt, hide clues in predictable spots so students practice scanning for information that should never be shared.

Setup: Flexible space for group stations

Materials: Role cards with goals/resources, Game currency or tokens, Round tracker

ApplyAnalyzeEvaluateCreateSocial AwarenessDecision-Making
15 min·Pairs

Think-Pair-Share: Protection Strategies

Pose a scenario like 'A game asks for your school name.' Students think alone for 1 minute, pair to share ideas, then share with class. Teacher compiles top strategies on board for class agreement.

Prepare & details

Explain why it is important to keep personal information private.

Facilitation Tip: During Think-Pair-Share: Protection Strategies, set a timer for pair discussions to keep energy high and prevent off-topic conversations.

Setup: Standard classroom seating; students turn to a neighbor

Materials: Discussion prompt (projected or printed), Optional: recording sheet for pairs

UnderstandApplyAnalyzeSelf-AwarenessRelationship Skills

Teaching This Topic

Teachers approach this topic by framing safety as a skill, not a warning, so students feel capable rather than fearful. Use repetition: revisit the same scenarios with new layers of detail to deepen understanding. Avoid singling out students who share personal details; instead, gently redirect with group discussion and class agreements.

What to Expect

Successful learning looks like students applying privacy rules confidently in new situations, explaining why certain actions are unsafe, and using the language of protection in their discussions. Watch for students who shift from vague 'don’t share' to specific 'I won’t tell strangers my school name because they could find me'.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring Role-Play: Online Stranger Scenarios, watch for students who assume online friends are trustworthy. Redirect by having peers act out how quickly information can spread when a 'friend' shares it with others.

What to Teach Instead

During Role-Play: Online Stranger Scenarios, pause the scene after a character shares information and ask the class to predict what might happen next. Use their predictions to highlight the risk of oversharing.

Common MisconceptionDuring Poster Creation: My Privacy Rules, watch for students who dismiss the risk of sharing photos. Redirect by having them compare photos with and without identifiable details, noting what strangers could learn.

What to Teach Instead

During Poster Creation: My Privacy Rules, provide sample photos and ask students to circle details that give away location or identity. Use their findings to update the class’s 'never share' list.

Common MisconceptionDuring Privacy Detective Hunt, watch for students who believe strangers cannot find them in real life from online details. Redirect by having them trace how an online username or photo could lead to a school or neighborhood.

What to Teach Instead

During Privacy Detective Hunt, after students find clues, ask them to map how a stranger could use that information. Use their maps to reinforce the connection between online and real-world risks.

Assessment Ideas

Quick Check

After Role-Play: Online Stranger Scenarios, show students pictures of different scenarios. Ask them to give a thumbs up for safe and a thumbs down for unsafe, then explain their choices in one sentence.

Discussion Prompt

During Think-Pair-Share: Protection Strategies, ask students: 'Imagine you are playing a new online game and someone asks for your home address so they can send you a prize. What should you do? Why is this important?' Listen for explanations that involve not sharing and understanding the risk.

Exit Ticket

After Poster Creation: My Privacy Rules, give each student a small piece of paper. Ask them to draw one thing they learned about keeping their personal information safe. They can draw a picture of a lock, a secret code, or a safe place.

Extensions & Scaffolding

  • Challenge: Ask early finishers to create a short comic strip showing a safe and unsafe way to handle personal information online.
  • Scaffolding: Provide picture cards for students to sort into 'safe to share' and 'never share' piles during activities.
  • Deeper exploration: Invite a community helper like a police officer to explain how sharing personal information can lead to real-world problems.

Key Vocabulary

Personal InformationDetails about you that are private, like your full name, address, or phone number. This information helps people know who you are.
PrivateSomething that should not be shared with everyone. It is meant to be kept safe and only shared with trusted people.
OnlineUsing computers, tablets, or phones to connect to the internet. This is where you might play games, watch videos, or talk to others.
StrangerSomeone you do not know. It is important to be careful when talking to strangers, especially online.
PasswordA secret word or code that protects your online accounts, like a secret key.

Ready to teach Protecting Personal Information?

Generate a full mission with everything you need

Generate a Mission