Lesson Plan
Guardians of Your Data Lesson Plan
Students will learn to identify privacy risks, develop strong passwords, analyze common online scenarios, and create personal digital safety agreements.
Teaching digital safety equips students to protect personal data, prevent cyberbullying, and foster respectful online interactions, building lifelong safe habits.
Audience
6th Grade Students
Time
45 minutes
Approach
Interactive discussion & hands-on activities
Prep
Teacher Preparation
10 minutes
- Queue the Are You Safe Online? Presentation
- Print or prepare digital access to the Password Power-Up Challenge
- Print scenario cards from the Privacy Scenarios Chat
- Make copies of the Create Your Own Digital Contract template
- Review all materials to familiarize yourself with content and flow
Step 1
Warm-Up: Password Power-Up
5 minutes
- Introduce the concept of strong passwords and why they matter
- Display the Password Power-Up Challenge
- In pairs, students brainstorm criteria for a strong password (length, complexity, uniqueness)
- Invite 2–3 pairs to share examples and explain their reasoning
Step 2
Presentation & Guided Discussion
10 minutes
- Present slides from the Are You Safe Online? Presentation
- Define digital privacy, data protection, and cyberbullying
- Ask: What personal info should remain private? Why?
- Highlight real-life consequences of oversharing and weak passwords
- Encourage students to ask questions as you advance through slides
Step 3
Group Discussion: Privacy Scenarios Chat
10 minutes
- Divide students into groups of 3–4
- Distribute one scenario card from Privacy Scenarios Chat to each group
- Groups read their scenario and discuss: What privacy risks exist? How would you respond?
- After 5 minutes, have each group share their scenario and solution with the class
Step 4
Activity: Create Your Own Digital Contract
15 minutes
- Hand out the Create Your Own Digital Contract template to each student
- Explain the sections: password rules, screen-time limits, sharing boundaries, respectful communication
- Students complete their contracts individually or with a partner, setting personal guidelines
- Invite volunteers to share one contract clause they wrote
Step 5
Wrap-Up & Reflection
5 minutes
- Facilitate a quick round: Each student names one new habit they’ll implement
- Collect contracts as an exit ticket or have students sign and take them home
- Encourage students to display their digital contracts at home or in their online profile
use Lenny to create lessons.
No credit card needed
Slide Deck
Are You Safe Online?
Building Safe Digital Habits, Privacy & Respect in Our Online World
Welcome students! Introduce today’s session: we’ll learn how to stay safe online by protecting our privacy, creating strong passwords, and communicating respectfully.
Learning Goals
- Identify privacy risks
- Create strong, unique passwords
- Recognize and prevent cyberbullying
- Set healthy online boundaries
Review what students will learn today. Encourage them to ask questions as we go.
What Is Digital Privacy & Data Protection?
Digital Privacy: Controlling who sees your personal info
Data Protection: Keeping that info safe from misuse
Define each term clearly. Ask: What personal details do you keep private? Invite examples.
Why Privacy Matters
- Oversharing can lead to unwanted contact
- Stolen info risks identity theft
- Personal details can be misused or spread online
Share real-life examples (e.g., posting your birthday leads to unwanted messages). Emphasize thinking before posting.
Password Power-Up
- Length: at least 12 characters
- Complexity: mix letters, numbers & symbols
- Uniqueness: different for each account
- Avoid personal info (names, birthdays)
Introduce the Password Power-Up Challenge. Show weak vs. strong examples and invite student input.
Cyberbullying: Spot & Stop
- Mean messages, rumors & exclusion online
- Hurt feelings and damage reputations
- Always tell a trusted adult & report the behavior
Define cyberbullying and share brief examples. Ask students if they’ve encountered it and discuss why it hurts. Emphasize reporting and support.
Next Up: Privacy Scenarios & Your Digital Contract
- Group Discussion: Privacy Scenarios Chat
- Activity: Create Your Own Digital Contract
Explain next steps: small-group scenario chat followed by crafting personal digital contracts. Remind students where to find materials.
Warm Up
Password Power-Up Challenge
Objective: Brainstorm the criteria for a strong password, then practice rating sample passwords.
1. List Three Strong-Password Rules
Think about what makes a password hard to guess. On the lines below, write three qualities your ideal password should have.
- _________________________________
2. _________________________________
3. _________________________________
2. Rate These Passwords
For each example below, decide if it’s Strong or Weak, then explain your reasoning.
Password: abc123
Strength: ______________
Reason: ________________________________________________________________
Password: Sunshine2020!
Strength: ______________
Reason: ________________________________________________________________
Password: Jk%5pQ!z#
Strength: ______________
Reason: ________________________________________________________________
After 3–4 minutes, we’ll share examples and compare notes.
Discussion
Privacy Scenarios Chat
Instructions:
- Divide students into groups of 3–4.
- Give each group one scenario card below.
- Read the scenario, discuss the prompts, and write your responses in the spaces provided.
- After 5 minutes, each group will share their scenario and solution with the class.
Scenario 1: Stranger Friend Request
You get a friend request on a social media site from someone you don’t know. Their profile shows no mutual friends and very little information.
Discussion Prompts:
- What privacy risks could accepting this request pose?
- How would you respond to this request?
- What would you tell a friend who is unsure?
Responses:
- _________________________________
2. _________________________________
3. _________________________________
Scenario 2: Sharing Photos
Your friend wants to post a group photo from lunch and tag everyone without asking first.
Discussion Prompts:
- Why might someone not want to be tagged or have their photo shared?
- How can you respect everyone’s privacy before posting?
- What could you say to your friend?
Responses:
- _________________________________
2. _________________________________
3. _________________________________
Scenario 3: Location Tagging
A classmate is posting selfies and tagging the exact location of your favorite park.
Discussion Prompts:
- What are the dangers of sharing your location online?
- How might this information be misused?
- What privacy settings or actions could prevent this?
Responses:
- _________________________________
2. _________________________________
3. _________________________________
Scenario 4: Comment Chain
You notice someone has posted personal comments (like phone number or address) in a public post thread on your school’s page.
Discussion Prompts:
- What risks arise when personal info is shared publicly?
- How should you and the page moderator handle it?
- What advice would you give to the person who posted it?
Responses:
- _________________________________
2. _________________________________
3. _________________________________
Scenario 5: Quiz App Ask
A fun quiz app asks for your full name, birth date, and email before you can see your results.
Discussion Prompts:
- Why do you think the app wants that information?
- What could happen if you share real info?
- How else can you enjoy the quiz safely?
Responses:
- _________________________________
2. _________________________________
3. _________________________________
Scenario 6: Cyberbullying Witness
You see a group chat where classmates are making fun of another student’s post.
Discussion Prompts:
- How does cyberbullying affect people?
- What should you do if you witness it?
- How can you help stop it?
Responses:
- _________________________________
2. _________________________________
3. _________________________________
Activity
Create Your Own Digital Contract
Purpose: Design your personal agreement for safe, respectful, and balanced online use. Keep this contract visible at home or in your digital workspace.
Instructions
- Read each section below.
- Write your own rules or guidelines in the space provided.
- Be specific, realistic, and honest with yourself.
- Sign and date at the end.
1. Password Rules
List at least three guidelines you’ll follow to keep your passwords strong and secure.
- ________________________________________________________________
- ________________________________________________________________
- ________________________________________________________________
(You can add more rules if you like.)
2. Screen-Time Limits
Set boundaries for how much time you’ll spend online each day or week, including social media, gaming, and other apps.
- Maximum daily screen time: ________________________________
- Specific “unplug” periods (e.g., homework, family time):
____________________________________________________
3. Sharing Boundaries
Decide what content is off-limits, when you’ll ask permission, and how you’ll protect others’ privacy.
- I will never share without permission:
____________________________________________________ - I will think twice before posting personal info such as:
____________________________________________________
4. Respectful Communication
Outline how you’ll behave online to prevent cyberbullying and foster positive interactions.
- I will treat others kindly by:
____________________________________________________ - If I see unkind behavior, I will:
____________________________________________________
5. Accountability & Support
Identify at least one person you’ll turn to for help with online safety or if you’re worried.
Name: __________________________________ Relationship: ____________________
Sign & Date
I, ____________________________, agree to follow these rules to keep my digital life safe and healthy.
Signed: _______________________ Date: _______________