Skip to content
English Language · JC 2

Active learning ideas

Understanding Digital Privacy

Active learning helps students grasp digital privacy because it transforms abstract concepts like data flows and consent into tangible experiences. When students examine real policies or debate trade-offs, they move beyond passive reading to active reasoning about their own digital lives.

MOE Syllabus OutcomesMOE: Digital Literacy and Privacy - Secondary 2
45–60 minPairs → Whole Class3 activities

Activity 01

Role Play60 min · Small Groups

Privacy Policy Deconstruction

In small groups, students analyze the privacy policies of popular apps or websites. They identify key clauses related to data collection, usage, and sharing, and then present their findings to the class, highlighting any potentially concerning aspects.

What does 'digital privacy' mean to you?

Facilitation TipFor the Jigsaw Reading activity, assign each group a specific section of a privacy policy to dissect, then have them teach their findings to peers using a shared template.

ApplyAnalyzeEvaluateSocial AwarenessSelf-Awareness
Generate Complete Lesson

Activity 02

Role Play45 min · Individual

Digital Footprint Mapping

Individually, students brainstorm all the ways they leave digital traces online, from social media posts to website cookies. They then create a visual map of their digital footprint and discuss strategies for managing it responsibly.

How do websites and apps ask for your personal information?

Facilitation TipDuring the Think-Pair-Share on data request scenarios, circulate to listen for students who conflate terms like 'data collection' and 'data sharing,' and redirect with clarifying questions.

ApplyAnalyzeEvaluateSocial AwarenessSelf-Awareness
Generate Complete Lesson

Activity 03

Role Play50 min · Small Groups

Data Broker Role-Play

Students are assigned roles as consumers, app developers, or data brokers. They engage in a simulated negotiation about data sharing, highlighting different perspectives and the ethical dilemmas involved in monetizing personal information.

Why is it important to be careful with your information online?

Facilitation TipFor the Role-Play Debate on privacy versus convenience, provide clear role cards with conflicting priorities to ensure structured argumentation.

ApplyAnalyzeEvaluateSocial AwarenessSelf-Awareness
Generate Complete Lesson

A few notes on teaching this unit

Teaching digital privacy works best when it balances skepticism with agency. Avoid overwhelming students with technical jargon, but do not shy away from showing how easily data can be repurposed. Research suggests that students retain more when they connect lessons to their own online habits, so incorporate opportunities for self-reflection. Use real-world examples to ground abstract ideas, but always provide low-stakes ways for students to test their understanding without fear of judgment.

Successful learning looks like students confidently identifying how data is collected and shared, articulating personal privacy boundaries, and evaluating trade-offs between convenience and control. They should also recognize misleading language in policies and feel empowered to revisit their own digital choices.


Watch Out for These Misconceptions

  • During the Data Flow Mapping activity, watch for students who assume deleting an app removes data entirely. Redirect them to trace where their data might still exist by examining terms of service or news articles about data retention.

    Use the Data Flow Mapping activity to trace an example app’s data trail. Have students research and annotate where data persists (e.g., analytics servers, third-party sales) and share findings in small groups to correct assumptions.

  • During the Jigsaw Reading: Privacy Policy Breakdown activity, watch for students who believe privacy policies are written for clarity. Redirect them to highlight vague phrases like 'may use your information' and discuss why such language is intentionally ambiguous.

    During the Jigsaw Reading activity, have groups identify and rephrase unclear sections of policies into plain language. Then, facilitate a class discussion on why vague terms are used and how they obscure data practices.

  • During the Role-Play Debate: Privacy vs. Convenience activity, watch for students who think consenting once covers all future uses. Redirect them to examine how policies are updated and why consent is often broad and ongoing.

    Use the Role-Play Debate activity to simulate policy updates. Assign students to revise old consents based on new terms, and have them present how past agreements no longer reflect current practices.


Methods used in this brief