Professional Documents
Culture Documents
TTL Bsed
TTL Bsed
TTL Bsed
II. PRE-TEST
For Attachment
III. INTODUCTION
Globalization is a reality and ICT has become a fundamental part of the process.
A networked society is one in which the entire planet is organized around
telecommunicated networks of computers. The powerful use of network has broken
boundaries, provided opportunities for inclusion and collaboration. However, there will
also be a struggle for those who do not have access or those who excluded,
marginalized and powerless. Thus a need to establish policies in the use of ICT in
imperative.
As the Department of information, Communication and Technology (DICT) says:
“The future has arrived. Now we have to ensure that we have a place in it.”
IV. CONTENT
2
Definition of ICT Policy
The Oxford English Dictionary has defined "policy" as a course of action, adopted and
pursued by a government, party, ruler, statesman. It is any course of action adopted as
expedient or advantageous. Its operational definition of policy is a plan of action to guide
decisions and achieve outcomes.
Thus, ICT Policies are needed to put a roadmap or course of actions to be pursued and
adopted by various governments, organizations, entities involving ICT. These include principles
and guidelines in the use of ICT which cover three main areas: telecommunications (telephone),
broadcasting (radio and television) and Internet.
3
The ICT for Education (ICT4E) is a program under the DICT that supports all the efforts of
the education sector in incorporating the use of ICT as well as in determining and gaining access
to the infrastructure (hardware, software, telecommunications facilities and others) which are
necessary to use and deploy learning technologies at all levels of education. Among the policy
recommended programs that have applications to education teaching-learning are:
1. ICT in Education Masterplan for all levels, including a National Roadmap for Faculty
Development in ICT in Education. A National Framework Plan for ICTs in Basic Education
was developed.
2. Content and application development through the Open Content in Education Initiative
(OCEI) which converts DepEd materials into interactive multi-media content, develop
applications used in schools, and conduct students and teacher’s competitions to
promote the development of education-related web content.
3. PheDNET, is a "walled" garden that hosts educational learning and teaching materials
and applications for use by Filipino students, their parents and teachers. All public high
schools will be part of this network with only DepEd-approved multi-media applications,
materials and mirrored internet sites accessible from school's PCs.
4. Established Community eLearning Centers called eSkwela for out-of-school youth (OSY)
providing them with ICT-enhanced alternative education opportunities.
5. eQuality Program for tertiary education through partnerships with state universities and
colleges (SUCs) to improve quality of IT education and the use of ICT in education in the
country, particularly outside of Metro Manila.
6. Digital Media Arts Program which builds digital media skills for government using Open
Source technologies. Particular beneficiary agencies include the Philippine Information
Agency and the other government media organizations, the Cultural Center of the
Philippines, National Commission for Culture and Arts and other government art
agencies, State Universities and Colleges and local government units.
7. ICT skills strategic plan which develops an inter-agency approach to identifying strategic
and policy and program recommendations to address ICT skills demand-supply type.
4
All the seven programs were guided by the roadmap that embeds policy statements that
relate to education specifically in the enhancement of human development for teaching and
learning.
Some Issues on ICT and Internet Policy and Regulations
Global Issues
Access and Civil Liberties are two sets of issues in ICT Policy which are crucial to the modern
society. The other concern is civil liberties which refer to human rights and freedom. These
include freedom of expression, the right to privacy, the right to communicate and intellectual
property rights.
The UN Universal Declaration of Human Rights provides that everyone has the right to
freedom of thought, conscience and religion, likewise the right to freedom of opinion and
expression. However, there are practices that violate these provisions in the use of internet.
5
2. Censorship restricts the transmission of information by blocking it or filtering the
information. Blocking is preventing access to whole areas of internet based upon
the "blacklist" of certain Internet address, location or email addresses while
filtering is sifting the packets of data or messages as they move across computer
networks and eliminating those considered "undesirable" materials. The
selection of sites that are blocked or filtered has been considered as an issue.
3. Defamation actions may be used to silence critics. This action deters the freedom
of expression.
Warning!!!!
"When you are surfing the web, you may think you are anonymous, but there are various
ways that information about you or your activities can be collected without your consent."
1. For most, privacy means "personal privacy" the right of individuals not to have their
home, private life or personal life interfered with.
2. Privacy of communication refers to the protection from interference with
communication over the phone or internet. Respect for privacy of communications is an
essential prerequisite for the maintenance of human relationship via technological
communications media.
3. Information privacy is related to the use of computers and communications system
which are able to hold and process information about large numbers of people at a high
speed. It is important to ensure that information will only be used for purposes for
which it was gathered and will not be disclosed to others without consent of the
individuals.
6
Issue No. 3: Surveillance and Data Retention
There is very little that can be done to prevent surveillance. What can be done is to
change the methods of working to make surveillance difficult. This is called "counter
surveillance" or "information security" if it refers to computers and electronic communication.
7
If not controlled then, e-waste will tremendously affect climate change, damage human
lives, and overload the capacity of the earth in carrying solid waste.
How do the policy guidelines, projects and issues relate to the teaching and learning?
There are great implications of this lesson to both the teachers who are teaching and
the learners who are learning. A few of these are as follows:
1. Guide the teachers on what they should teach that relate to ICT, and how to teach it.
Since ICT development comes so rapid and fast, teachers might be overwhelmed by its
rapid speed. Temperance in its use is a caution that should be looked at.
2. Technology should never replace any human teacher. The tools are support instructional
materials for the teachers which are available for use. The teacher should learn how to
appropriately use them. The human touch of the teacher is still a vital component in
teaching. Teachers should always be reminded that there are always limitations in the
use of the different gadget and tools.
3. There are rules and regulations that govern the use of technology. Caution should be
observed to protect individual privacy. As teachers, you must be aware that the use of
technology may jeopardize your privacy and security.
4. All the issues and many more shall be part of the teaching content as each teacher will
be encouraged to use technology in teaching.
The learners of the 21" Century are even more advanced than some of the teachers.
However, learners still need guidance on how to use, regulate technology use. As there are
positive and negative effects of technology use, learners should know the difference. Learners
should not only know the benefits of technology use, but they should also know how they can
be protected from the hazards that technology brings to their lives.
Learners should take advantage of the potential of learning support they can derive
such as the development of higher order thinking skills, the development of learning
8
communities through collaboration, the enhancement of skills to manage the vast resources as
21' century learners and many more.
Both the teachers and learners should be mindful of the e-waste that are being thrown
away to the land and to the atmosphere. Thus, safety in the use of technology shall be
presented in the next lesson.
9
Minor Misuse of ICT
In school, some minor misuse made by learners include the following:
Copying information into assignment and failing to acknowledge the source (plagiarism
and copyright infringement)
Downloading materials not relevant to their studies
Misconduct associated with subject logins, such as using someone else's password
Leaving a mobile phone turned on during class period
Unauthorized taking of pictures or images with mobile phone camera, still or moving
e-Safety
With all of the above concerns and many more, how do we confront all of these so as to
protect our future generation?
e-safety takes care not only of internet technologies but also of electronic
communications via mobile phones, games consoles and wireless technology. It highlights the
need to educate children and young people about the benefits, risks and responsibilities of
using information technology. Here are some issues of e-safety:
e-safety helps safeguard children and young people in the digital world;
e-safety emphasizes learning to understand and new technologies in a positive way;
e-safety educates children about the risks as well as the benefits so we can feel
confident online; and
e-safety supports young learners and adults to develop safer online behaviors, both in
and out of school.
Network Management
10
1.5 Set up a clear disaster recovery system in place for critical data that include secure,
remote back up of critical data.
1.6 Secure wireless network to appropriate standards suitable for educational use.
1.7 Install all computer equipment professionally and meet health and safety standards.
1.8 Review the school ICT system regularly with regard to health and safety and security.
2. Password Policy
2.1 Only authorized users will have individual passwords. Users are not permitted to
disclose their passwords unless they got permission from the owner or from the
management. The equipment that keeps the personal information shall be locked
when unattended to prevent unauthorized access.
Computers should be set to a time out if they become unused for a certain period of
time.
3. Personal mobile phones and mobile devices
1.1 All mobile phones shall be kept away in a box away from the children or learners and
access is only allowed at break time or at the end of classes or when needed during
the class period.
4. Cameras
1.2 Taking pictures only from parents or caregivers and not from any other family
member or friend while the child attends class.
1.3 Any picture taken of children shall be on cameras solely for the purpose.
1. Provide tiltable tables. These tables can be tilted and adjusted to the height of the
users.
2. Provide anti-glare screen filters.
3. Provide adjustable chairs.
4. Provide foot support.
11
5. Make sure lighting is suitable.
6. Make sure work stations are not cramped.
7. Plan work at a computer so that there are frequent breaks.
More specifically safety rules that can reduce risk of accidents in the working stations should
include:
1. No trailing wires across or around the room which people can trip on.
2. Electrical sockets should not be overloaded.
3. Electrical equipment should be safety-tested at least once a year.
4. There should be adequate space around desk for people' to move.
5. Bags and obstacles should be stored out of the way.
6. Food and drinks should not be placed near machines.
7. Heating and ventilation should be suitable for the working environment.
8. Fire extinguishers should be available.
9. Fire exits should be clearly marked and free from clutter.
V. ACTIVITY
Direction: Choose only 1 topic listed below and explain/discuss the chosen topic and
after that answer the following questions.
12
References: Technology for theaching and learning 1 by Purita P. Bilbao, EdD, Ma. Asuncion
Christine V. Dequilla, PhD
13