lenny

Are You Safe Online?

Lesson Plan

Guardians of Your Data Lesson Plan

Students will learn to identify privacy risks, develop strong passwords, analyze common online scenarios, and create personal digital safety agreements.

Teaching digital safety equips students to protect personal data, prevent cyberbullying, and foster respectful online interactions, building lifelong safe habits.

Audience

6th Grade Students

Time

45 minutes

Approach

Interactive discussion & hands-on activities

Prep

Teacher Preparation

10 minutes

Step 1

Warm-Up: Password Power-Up

5 minutes

  • Introduce the concept of strong passwords and why they matter
  • Display the Password Power-Up Challenge
  • In pairs, students brainstorm criteria for a strong password (length, complexity, uniqueness)
  • Invite 2–3 pairs to share examples and explain their reasoning

Step 2

Presentation & Guided Discussion

10 minutes

  • Present slides from the Are You Safe Online? Presentation
  • Define digital privacy, data protection, and cyberbullying
  • Ask: What personal info should remain private? Why?
  • Highlight real-life consequences of oversharing and weak passwords
  • Encourage students to ask questions as you advance through slides

Step 3

Group Discussion: Privacy Scenarios Chat

10 minutes

  • Divide students into groups of 3–4
  • Distribute one scenario card from Privacy Scenarios Chat to each group
  • Groups read their scenario and discuss: What privacy risks exist? How would you respond?
  • After 5 minutes, have each group share their scenario and solution with the class

Step 4

Activity: Create Your Own Digital Contract

15 minutes

  • Hand out the Create Your Own Digital Contract template to each student
  • Explain the sections: password rules, screen-time limits, sharing boundaries, respectful communication
  • Students complete their contracts individually or with a partner, setting personal guidelines
  • Invite volunteers to share one contract clause they wrote

Step 5

Wrap-Up & Reflection

5 minutes

  • Facilitate a quick round: Each student names one new habit they’ll implement
  • Collect contracts as an exit ticket or have students sign and take them home
  • Encourage students to display their digital contracts at home or in their online profile
lenny
0 educators
use Lenny to create lessons.

No credit card needed

Slide Deck

Are You Safe Online?

Building Safe Digital Habits, Privacy & Respect in Our Online World

Welcome students! Introduce today’s session: we’ll learn how to stay safe online by protecting our privacy, creating strong passwords, and communicating respectfully.

Learning Goals

  • Identify privacy risks
  • Create strong, unique passwords
  • Recognize and prevent cyberbullying
  • Set healthy online boundaries

Review what students will learn today. Encourage them to ask questions as we go.

What Is Digital Privacy & Data Protection?

Digital Privacy: Controlling who sees your personal info

Data Protection: Keeping that info safe from misuse

Define each term clearly. Ask: What personal details do you keep private? Invite examples.

Why Privacy Matters

  • Oversharing can lead to unwanted contact
  • Stolen info risks identity theft
  • Personal details can be misused or spread online

Share real-life examples (e.g., posting your birthday leads to unwanted messages). Emphasize thinking before posting.

Password Power-Up

  • Length: at least 12 characters
  • Complexity: mix letters, numbers & symbols
  • Uniqueness: different for each account
  • Avoid personal info (names, birthdays)

Introduce the Password Power-Up Challenge. Show weak vs. strong examples and invite student input.

Cyberbullying: Spot & Stop

  • Mean messages, rumors & exclusion online
  • Hurt feelings and damage reputations
  • Always tell a trusted adult & report the behavior

Define cyberbullying and share brief examples. Ask students if they’ve encountered it and discuss why it hurts. Emphasize reporting and support.

Next Up: Privacy Scenarios & Your Digital Contract

Explain next steps: small-group scenario chat followed by crafting personal digital contracts. Remind students where to find materials.

lenny

Warm Up

Password Power-Up Challenge

Objective: Brainstorm the criteria for a strong password, then practice rating sample passwords.

1. List Three Strong-Password Rules

Think about what makes a password hard to guess. On the lines below, write three qualities your ideal password should have.

  1. _________________________________

    2. _________________________________

    3. _________________________________

2. Rate These Passwords

For each example below, decide if it’s Strong or Weak, then explain your reasoning.

Password: abc123
Strength: ______________
Reason: ________________________________________________________________



Password: Sunshine2020!
Strength: ______________
Reason: ________________________________________________________________



Password: Jk%5pQ!z#
Strength: ______________
Reason: ________________________________________________________________


After 3–4 minutes, we’ll share examples and compare notes.

lenny
lenny

Discussion

Privacy Scenarios Chat

Instructions:

  • Divide students into groups of 3–4.
  • Give each group one scenario card below.
  • Read the scenario, discuss the prompts, and write your responses in the spaces provided.
  • After 5 minutes, each group will share their scenario and solution with the class.

Scenario 1: Stranger Friend Request

You get a friend request on a social media site from someone you don’t know. Their profile shows no mutual friends and very little information.

Discussion Prompts:

  1. What privacy risks could accepting this request pose?
  2. How would you respond to this request?
  3. What would you tell a friend who is unsure?

Responses:

  1. _________________________________

    2. _________________________________

    3. _________________________________


Scenario 2: Sharing Photos

Your friend wants to post a group photo from lunch and tag everyone without asking first.

Discussion Prompts:

  1. Why might someone not want to be tagged or have their photo shared?
  2. How can you respect everyone’s privacy before posting?
  3. What could you say to your friend?

Responses:

  1. _________________________________

    2. _________________________________

    3. _________________________________


Scenario 3: Location Tagging

A classmate is posting selfies and tagging the exact location of your favorite park.

Discussion Prompts:

  1. What are the dangers of sharing your location online?
  2. How might this information be misused?
  3. What privacy settings or actions could prevent this?

Responses:

  1. _________________________________

    2. _________________________________

    3. _________________________________


Scenario 4: Comment Chain

You notice someone has posted personal comments (like phone number or address) in a public post thread on your school’s page.

Discussion Prompts:

  1. What risks arise when personal info is shared publicly?
  2. How should you and the page moderator handle it?
  3. What advice would you give to the person who posted it?

Responses:

  1. _________________________________

    2. _________________________________

    3. _________________________________


Scenario 5: Quiz App Ask

A fun quiz app asks for your full name, birth date, and email before you can see your results.

Discussion Prompts:

  1. Why do you think the app wants that information?
  2. What could happen if you share real info?
  3. How else can you enjoy the quiz safely?

Responses:

  1. _________________________________

    2. _________________________________

    3. _________________________________


Scenario 6: Cyberbullying Witness

You see a group chat where classmates are making fun of another student’s post.

Discussion Prompts:

  1. How does cyberbullying affect people?
  2. What should you do if you witness it?
  3. How can you help stop it?

Responses:

  1. _________________________________

    2. _________________________________

    3. _________________________________

lenny
lenny

Activity

Create Your Own Digital Contract

Purpose: Design your personal agreement for safe, respectful, and balanced online use. Keep this contract visible at home or in your digital workspace.


Instructions

  1. Read each section below.
  2. Write your own rules or guidelines in the space provided.
  3. Be specific, realistic, and honest with yourself.
  4. Sign and date at the end.

1. Password Rules

List at least three guidelines you’ll follow to keep your passwords strong and secure.

  1. ________________________________________________________________


  2. ________________________________________________________________


  3. ________________________________________________________________



    (You can add more rules if you like.)

2. Screen-Time Limits

Set boundaries for how much time you’ll spend online each day or week, including social media, gaming, and other apps.

  • Maximum daily screen time: ________________________________


  • Specific “unplug” periods (e.g., homework, family time):
    ____________________________________________________



3. Sharing Boundaries

Decide what content is off-limits, when you’ll ask permission, and how you’ll protect others’ privacy.

  • I will never share without permission:
    ____________________________________________________


  • I will think twice before posting personal info such as:
    ____________________________________________________



4. Respectful Communication

Outline how you’ll behave online to prevent cyberbullying and foster positive interactions.

  • I will treat others kindly by:
    ____________________________________________________


  • If I see unkind behavior, I will:
    ____________________________________________________



5. Accountability & Support

Identify at least one person you’ll turn to for help with online safety or if you’re worried.
Name: __________________________________ Relationship: ____________________



Sign & Date

I, ____________________________, agree to follow these rules to keep my digital life safe and healthy.

Signed: _______________________ Date: _______________

lenny
lenny