Skip to content
English Language · JC 2

Active learning ideas

Staying Safe Online

Active learning fits this topic because staying safe online requires more than reading definitions, it needs practice in spotting risks in real time. Role-plays and policy breakdowns help students move from passive awareness to active questioning, which builds lasting digital habits that textbooks alone cannot achieve.

MOE Syllabus OutcomesMOE: Digital Literacy and Privacy - Secondary 2
20–50 minPairs → Whole Class4 activities

Activity 01

Mystery Object30 min · Pairs

Role-Play: Phishing Encounters

Pairs simulate email exchanges: one sends a phishing message using suspicious language, the other responds by identifying red flags like urgent demands or fake links. Switch roles after 5 minutes. Groups share effective response phrases in a class debrief.

What does 'cybersecurity' mean for you?

Facilitation TipDuring the phishing role-play, assign specific roles (e.g., suspicious student, confident scammer) to heighten peer observation of tone and urgency cues.

What to look forPresent students with two contrasting privacy policy excerpts from different companies. Ask: 'Which excerpt provides clearer information about how your data is used? Point to specific phrases that build or reduce your trust, and explain why.'

UnderstandAnalyzeEvaluateSelf-ManagementSocial Awareness
Generate Complete Lesson

Activity 02

Mystery Object45 min · Small Groups

Small Group: Privacy Policy Breakdown

Provide excerpts from real company policies. Groups highlight key terms like 'data breach' and 'consent,' then rewrite unclear sections in plain language. Present rewrites to class for vote on clearest versions.

How do companies tell us about keeping our data safe?

Facilitation TipFor privacy policy breakdowns, provide highlighters and colored pencils to let students code vague versus clear commitments visually before discussion.

What to look forDisplay a simulated phishing email on the board. Ask students to individually write down three specific red flags in the email that indicate it is not legitimate and briefly explain why each is a warning sign.

UnderstandAnalyzeEvaluateSelf-ManagementSocial Awareness
Generate Complete Lesson

Activity 03

Mystery Object50 min · Whole Class

Whole Class: Trust Debate

Pose statements like 'All friend recommendations online are trustworthy.' Divide class into affirm/negate teams to argue using safety vocabulary. Vote and reflect on language that builds or erodes trust.

What can you do to be safe and trustworthy online?

Facilitation TipIn the trust debate, give each student two sticky notes to vote on claims, then require them to cite exact phrases from policies during rebuttals.

What to look forOn an index card, have students define 'cybersecurity' in their own words and list two concrete actions they can take to improve their personal online safety this week.

UnderstandAnalyzeEvaluateSelf-ManagementSocial Awareness
Generate Complete Lesson

Activity 04

Mystery Object20 min · Individual

Individual: Safety Action Plan

Students list three personal online habits, evaluate risks with terms like 'cybersecurity,' then draft an action plan. Share one tip with a partner for feedback before class gallery walk.

What does 'cybersecurity' mean for you?

Facilitation TipFor the safety action plan, model one example with a think-aloud before students draft their own, including deadlines like 'check privacy settings weekly'.

What to look forPresent students with two contrasting privacy policy excerpts from different companies. Ask: 'Which excerpt provides clearer information about how your data is used? Point to specific phrases that build or reduce your trust, and explain why.'

UnderstandAnalyzeEvaluateSelf-ManagementSocial Awareness
Generate Complete Lesson

A few notes on teaching this unit

Start by modeling skepticism yourself—read aloud a privacy notice and pause to question vague phrases like 'may use your data for marketing.' Avoid overwhelming students with technical jargon early; instead, focus on language patterns they can apply immediately. Research shows that students learn best when they connect concepts to their own daily habits, so anchor discussions in familiar apps like social media or school portals.

Successful learning looks like students confidently identifying vague language in privacy policies, explaining red flags in phishing attempts, and justifying their trust decisions with specific terms. They should also be able to draft clear safety steps tailored to their own online routines.


Watch Out for These Misconceptions

  • During Role-Play: Phishing Encounters, watch for students who assume antivirus software alone prevents all scams. Redirect by having them note that phishing relies on human error, not just software gaps, using the role-play scripts to highlight tone and urgency cues.

    During Role-Play: Phishing Encounters, shift focus from tools to habits by asking students to practice spotting phishing cues in real time, using peer observation and scripted responses to emphasize sender verification over antivirus reliance.

  • During Small Group: Privacy Policy Breakdown, watch for students who believe data breaches only affect large companies. Redirect by having groups trace how personal data in breaches leads to identity theft risks, using policy excerpts to link company actions to individual consequences.

    During Small Group: Privacy Policy Breakdown, expose individual impacts by having students collaboratively map consequences of data breaches, using policy language to connect vague commitments to real-world identity theft scenarios.

  • During Whole Class: Trust Debate, watch for students who equate platform familiarity with automatic trust. Redirect by having them scrutinize terms like 'encryption' in policies, using active voting and rebuttals to challenge assumptions and build critical questioning skills.

    During Whole Class: Trust Debate, expose flaws in assumptions by requiring students to cite specific phrases from policies during rebuttals, using active voting to reinforce that trust demands scrutiny of language, not just brand recognition.


Methods used in this brief