| Lesson Plan |
| Grade: |
Date: 25/02/2026 |
| Subject: Information Communication Technology ICT |
| Lesson Topic: Know and understand characteristics of personal and sensitive data including personal name, address, date of birth, a photograph in school uniform, medical history |
Learning Objective/s:
- Describe what constitutes personal and sensitive data and give examples.
- Explain why each listed data item (name, address, DOB, photograph, medical history) is considered sensitive.
- Identify legal and ethical obligations for handling such data in schools.
- Apply classification techniques to determine protection measures for different data types.
- Evaluate appropriate security controls (access control, encryption, passwords) for safeguarding personal data.
|
Materials Needed:
- Projector or interactive whiteboard
- Slide presentation on data types and protection
- Printed worksheet with fictional student profile
- Classification chart template (Public/Personal/Sensitive)
- Markers and sticky notes
- Internet access for research on data protection laws
|
Introduction:
Begin with a quick poll: ask students to raise their hand if they have ever shared personal details online. Connect this to their prior knowledge of privacy and explain that today they will explore exactly what information is considered personal or sensitive in an ICT context. By the end of the lesson they will be able to classify data items and suggest appropriate safeguards.
|
Lesson Structure:
- Do‑now (5’) – Students write down three pieces of information they think are private; share briefly. (Check prior knowledge)
- Mini‑lecture (10’) – Define personal vs. sensitive data, using slides and real‑world examples.
- Table analysis (10’) – Review the characteristics table; discuss why each listed item is sensitive and the risks involved.
- Classification activity (15’) – In pairs, students complete the Data Classification Chart for the fictional profile, then present their decisions.
- Protection strategies (10’) – Demonstrate access control, encryption, and strong passwords; link each to the data types classified.
- Quick check (5’) – Exit ticket: students write one action they will take to protect personal data.
|
Conclusion:
Summarise that understanding data characteristics enables us to choose the right security measures and meet legal duties. Ask a few students to share the protection action they noted on their exit tickets. Assign a short homework: research one recent data breach and write a paragraph on how better classification could have prevented it.
|