Lesson Plan
Who's Watching You Online? Lesson Plan
Students will identify common online privacy risks and create a personalized checklist of safe digital practices to protect their information and well-being.
High school freshmen need foundational digital safety skills to navigate social media, apps, and online interactions responsibly—reducing risks like data breaches, cyberbullying, and unwanted tracking.
Audience
9th Grade
Time
30 minutes
Approach
Hands-on scenarios, group brainstorming, and a quick quiz.
Materials
- Projector or Smartboard, * Digital Safety Scenarios Worksheet, * Online Privacy Quick Quiz, * Safe Practices Checklist Template, and * Sticky Notes
Prep
Review and Prepare Materials
10 minutes
- Review Digital Safety Scenarios Worksheet
- Familiarize yourself with the quiz questions in Online Privacy Quick Quiz
- Preview the structure of the Safe Practices Checklist Template
- Test projector or smartboard setup
Step 1
Introduction to Digital Safety
5 minutes
- Pose the question: “Who could be watching you online?”
- Elicit and discuss student experiences or concerns
- Display a brief slide highlighting key privacy concepts
Step 2
Online Risk Identification
10 minutes
- Distribute Digital Safety Scenarios Worksheet
- In pairs, read scenarios and highlight potential privacy risks
- Use sticky notes to mark the riskiest actions and share insights aloud
Step 3
Safe Practices Brainstorm
10 minutes
- Present Safe Practices Checklist Template
- In small groups, brainstorm and record safe behaviors for each scenario
- Share top three practices per group and compile a master checklist on the board
Step 4
Quick Quiz and Reflection
5 minutes
- Administer Online Privacy Quick Quiz
- Students complete individually to reinforce key points
- Conclude with each student stating one personal takeaway and next step for staying safe online
use Lenny to create lessons.
No credit card needed
Slide Deck
Who’s Watching You Online?
Understanding Digital Privacy and Safety
• What information do you share online?
• Who could access it?
• Why does it matter?
Welcome students and introduce the lesson’s focus on online privacy. Explain that over the next 30 minutes, we'll explore who might be observing their digital footprints and how to stay safe.
Introduction to Digital Safety
• Who could be watching you online?
• Examples:
– Social media connections
– Advertisers tracking your behavior
– Cybercriminals and hackers
Pose the question “Who could be watching you online?” Invite volunteers to share experiences. Emphasize that watchers can include friends, companies, hackers, or even strangers.
Online Risk Identification
- Open the Digital Safety Scenarios Worksheet
- In pairs, read each scenario and highlight potential privacy risks
- Mark the riskiest actions with sticky notes
Distribute the Digital Safety Scenarios Worksheet. Organize students into pairs. Remind them to highlight risks and use sticky notes for the riskiest actions. Circulate and prompt deeper thinking.
Safe Practices Brainstorm
• Refer to the Safe Practices Checklist Template
• In small groups, list safe behaviors for each scenario
• Share your group’s top three practices
Display the Safe Practices Checklist Template. Form small groups. Encourage students to brainstorm safe behaviors for each scenario and list their top three. Compile answers on the board.
Online Privacy Quick Quiz
Complete the Online Privacy Quick Quiz individually.
• Circle the best answer for each question
• Check your responses against the answer key
Hand out the Online Privacy Quick Quiz. Give students 3–4 minutes to complete it individually. Afterward, review answers as a class to reinforce key concepts.
Reflection & Next Steps
• Write one personal takeaway from today’s lesson
• Identify one next step to stay safe online
• Share with a classmate or the whole group
Wrap up by asking each student to state one personal takeaway and one next step they will take to protect their online privacy. Encourage sharing aloud.
Worksheet
Digital Safety Scenarios Worksheet
In pairs, read each scenario below and identify the privacy risks. For each scenario, answer the questions and write your responses in the spaces provided.
Scenario 1: The Public Profile
Alex sets all of their social media profiles to public so anyone can view their photos, friends list, and posts. They often share their location in real time when hanging out with friends.
- What personal information is at risk in this scenario?
- Who might be watching or collecting this information?
- Suggest one safe practice Alex could use to protect their privacy.
Scenario 2: The Free App
Maria downloads a free weather app that requests access to her camera, contacts, and phone call logs. She doesn’t read the permissions and taps "Allow" for everything.
- Which permissions could pose the biggest privacy risk?
- What could happen if the app misuses these permissions?
- How can Maria decide which permissions to grant or deny?
Scenario 3: The Unknown Link
During an online game chat, Jamal receives a link from a player he doesn’t know. The message says, “Click for free in-game coins!” He’s not sure if the link is safe.
- What risks are involved in clicking an unknown link?
- List two safe steps Jamal could take before clicking.
- Explain why it’s important to verify the source of links.
Scenario 4: The Weak Password
Taylor uses “password123” for all online accounts and never updates it. They log in on a friend’s device but forget to log out.
- What are the dangers of a weak, reused password?
- What could happen if someone accesses an account on Taylor’s behalf?
- Describe two strategies for creating and managing strong passwords.
After completing all scenarios, compare your answers with another pair. Discuss which risks you found most surprising and share one tip you’ll use to stay safe online.
Worksheet
Safe Practices Checklist Template
Directions: In your small group, review each scenario and brainstorm three safe digital practices to address the risks. Write your ideas in the spaces provided. Once finished, select your top three practices to share with the class.
| Scenario | Safe Practice 1 | Safe Practice 2 | Safe Practice 3 |
|---|---|---|---|
| Scenario 1: The Public Profile | |||
| Scenario 2: The Free App | |||
| Scenario 3: The Unknown Link | |||
| Scenario 4: The Weak Password |
Quiz
Online Privacy Quick Quiz
Answer Key
Online Privacy Quick Quiz Answer Key
Use this key to check student responses and provide feedback.
Question 1
Prompt: Which account setting helps protect your social media posts from being seen by strangers?
Correct Answer: Friends Only
Explanation:
- Public allows anyone to view your content.
- Friends Only restricts posts to approved connections, keeping strangers out.
- Private and Custom can also limit access, but “Private” may hide your profile entirely and “Custom” requires additional configuration. The quiz answer focuses on the straightforward “Friends Only” setting.
Question 2
Prompt: What should you review before granting permissions to a new app?
Correct Answer: The requested permissions
Explanation:
- The app’s rating, download size, or ad count doesn’t reveal what data the app can access.
- Reviewing requested permissions lets you see if the app needs access to camera, contacts, location, etc., so you can decide what’s appropriate and protect your privacy.
Question 3
Prompt: Why is it risky to click on a link from an unknown sender?
Correct Answer: It could contain malware
Explanation:
- Unknown links can lead to harmful websites that download malware or steal data.
- While some links might be harmless surveys, taking that risk can compromise your device security and personal information.
Question 4
Prompt: Which of the following is the strongest password?
Correct Answer: P@5sW0rd!%
Explanation:
- password123, Summer2023, and JohnDoe are predictable and easy to crack.
- P@5sW0rd!% uses a mix of uppercase and lowercase letters, numbers, and special characters, making it far more secure.
Question 5
Prompt: After using a friend’s device to check your email, what is the safest next step?
Correct Answer: Log out of your account
Explanation:
- Leaving your account signed in lets the next person access it.
- Changing your password is useful if you suspect a breach, but the immediate step is to log out to close your session.
- Deleting browser history can hide your activity, but it doesn’t prevent account access by others.