Kenya Technical Trainers College: 2020Edaddipics1A

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

KENYA TECHNICAL TRAINERS COLLEGE

2020EDADDIPICS1A
ED4006-ICT INTEGRATION
ASSIGNMENT ON ICT POLICY WRITE UP
2020ED142389
PURITY JEPKEMOI KANGOGO

ICT POLICY TO BE USED IN A TVET INSTITUTIOIN


Policy-is a deliberate system of principles to guide decisions and achieve rational outcomes.
ICT policy-these are the policies put in place to bring digital technology to all individuals and
communities so that they can have access to information.
The following is a brief ICT write up policy to be used in a TVET institution:
Aims of the ICT policy
 To give trainees experience in a wide range of ICT hardware and software.
 To enrich and enliven other areas of the curriculum and to support specific learning
needs.
 To teach the trainees to use relevant technology safely.
 To provide trainees with necessary knowledge and skills to make informed choices about
using technology beyond the classroom and after their time at school.
 To encourage pupils to understand and change the world through computational thinking.

Validation
 ICT literacy has become an essential skill for everyday life. Technology is constantly
evolving and institutions have to respond to these developments. The key to responding
to these changes lies within the education system. It is the role of the trainers to model
and teach ICT skills discretely and across the curriculum.
The trainees will leave learning institutions equipped to meet the demands of the ever-
changing technological world.

Purposes for ICT policy


 To encourage responsible, competent, confident and creative users of information and
communication technology.
 To understand and apply the fundamental principles of computer science, including logic,
algorithms, data representation, and communication.
 To be able to reflect and comment on the use of ICT.
 To understand the risks involved with using technology and react appropriately.

Guidelines for the ICT policy


Trainers and subject co-ordinators are responsible for organizing an appropriate, effective
curriculum that is developed reciprocally and informed by current national strategy. Due to the
rapidly changing nature of technology, ICT planning will be subject to frequent reflection and
change.
Trainees will have an opportunity to develop skills in:
1. Use of hardware such as cameras, recording devices
2. Processing and interpreting data
3. Control and programming activities
4. Searching, organizing and presenting data
5. Databases
6. Internet research and other uses
7. Spreadsheet modelling
8. Understanding the role of ICT in society

 The institution is equipped with an ICT suite and classrooms are equipped with
multimedia PCs for staff and trainees use. There are an additional 60 desktop computers
for use in classrooms. Each classroom has an interactive whiteboard to use as a teaching
tool. Other ICT equipment such as cameras, recording devices and iPads are also
available to bring ICT into subjects across the curriculum.
 Trainees will be taught IT skills discretely and alongside other objectives.
 Trainees will use ICT to support, enhance and develop all aspects of the curriculum.
 Trainees will develop ICT skills at an appropriate level regardless of race, gender,
intellect, emotional or physical difficulties.

E-Safety
 The institution’s e-safety are co-ordinated by current ICT co-ordinators with input from:
the e-safety governor and ICT technical staff. Staff and pupils also provide input via
lessons and staff meetings. E-safety at the institution is monitored using logs of reported
incidents, monitoring logs of internet activity and regular staff and pupil surveys.
 Trainees will be taught discrete e-safety lessons at least every second term, including at
least one extended series of lessons per year. These lessons will be frequently adapted to
reflect changes in technology, and will concern the use of and sharing of personal
information, how to respond in unsafe/unsure situations and how to report problems and
concerns

Learning via the Internet


The institution’s internet access will be designed expressly for education.
Trainees will learn appropriate and safe Internet use and their use of the Internet will be
monitored carefully.
Staff should guide trainees in online activities that will support the learning outcomes planned
for the learners.
Trainees will be educated in the effective use of the internet in research, including the skills of
knowledge location, retrieval and evaluation.
Trainees and staff will sign up to an Acceptable Use Policy for technology and the Internet,
which will be displayed in classrooms and the ICT suite.

Website and blog content management


 The point of contact on the website will be the institutions’s address, institution’s e-mail
and telephone number.
 Staff or trainees home information will not be published.
 Website or blog photographs that include trainees will be selected carefully and in line
with the institution’s guidelines on the publication of photographs.
 Trainees full names will not be used anywhere on the website, particularly in association
with photographs.
 Written permission from parents or carers will be obtained before photographs of trainees
are published on the school website or blog.
 The institution’s principal will take overall editorial responsibility and ensure that content
is accurate and appropriate.
 The copyright of all material must be held by the institution, or be attributed to the owner
where permission to reproduce has been obtained.

Mobile technologies
 Appropriate use of mobile phones will be taught to trainees as part of their e-safety
programme.
 Emerging technologies will be examined for educational benefit and the risk assessed
before use in institution allowed.
 The impact of sending abusive or inappropriate text messages is explored during ICT
lessons.
 Phones are not to be used during the lessons.

Institution’s Staff and the E-safety


 The Institution’s Personal Data Handling Policy and Staff and Volunteer ICT Acceptable
Use and Laptop Policies will be made available to all staff including trainers, supply
staff, classroom assistants and support staff.
 The school’s consequences for internet and mobile phone/PDA/technology misuse will
be clear so that all trainers are confident to apply this should the situation arise.
 All staff must accept the terms of the Staff and Volunteer ICT Acceptable Use and
Laptop Policy before using any internet resource in the institution.
 All trainees’ data and confidential institution’s information stored on USB drives is to be
encrypted.
 The monitoring of internet use is a sensitive matter. Staff that operate monitoring
procedures should be supervised by senior management.
 All staff should be aware that use of the Internet in the institution is monitored.
 Staff development in safe and responsible internet use and on the institution’s E-Safety
Policy will be provided as required.

You might also like