Group 2 Handout

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

Republic of the Philippines

UNIVERSITY OF EASTERN PHILIPPINES

Laoang Campus

Laoang, Northern Samar

Web: http://uep.edu.ph; Email: ueplaoangcampus2000@gmail.com

COLLEGE OF EDUCATION

1st Semester, SY 2022-2023

Technology in Teaching and Learning 1

ICT Policies and Safety issues

Group no.2

Leader : Agostos Rafael Loverita

Members : Regina B. Cerbito

: Nicole P. Capoquian

: Linda C. Baligwas

: Olivia Candice I. Nebrida

:Lilyah Porteza

Course/Major/Section: BSEd – Social Studies

Leader : Shervin Jay T. Angeles

Members : Marieta Lagrimas

: Daisy Ann Dapug

: Dennis Olchondra
: Angilie Acebuche

: Ronalyn Robinos

Course/Major/Section: BPEd

Leader : Myrene B. Galupo

Members : Jornit Acquiat

: Jerina C. Poso

: Noli Mark V. Caparal

Course/Major/Section: BSEd - Filipino

Leader : Patricia Ann I. Giray

Members : Anna Mei Balanquit

: Roy Balingit

: Chrisel Petalbo

: Angel Mae E. Acebuche

Course/Major/Section: BSEd – English

UNIT II:

ICT POLICIES AND SAFETY ISSUES IN TEACHING AND LEARNING

INTRODUCTION

This topic deals with intensive study of ICT Policies and Safety issues in teaching and learning, ICT
enable teaching in the context for it saves the time of both teacher and the student, this can generate
curiosity in student’s mind making them explore more as they will develop interest by using technology.
However, technology should not replace the human teacher, digital instructional tools are just support
as learning materials for teachers which are available anytime. Teachers and students must also be
aware that there are also limitations in the use of different gadgets and other digital instructional tools,
we must also be aware that the use of technology may jeopardize your privacy and security, caution
must be observed to protect individual privacy.

ICT stands for “Information and Communication Technologies”. It refers to technologies that provide
access to information through telecommunications. It is the field of expertise that connects information
technology (computers) and telecommunication networks (the internet) to provide sophisticated
application. Information and Communications Technology (ICT) is the convergence of computing,
telecommunication and governance policies for how information should be accessed, secured,
processed, transmitted and stored.

ICT includes traditional data center infrastructure components as well as an increasing number of
content, software, hardware and support services delivered over the internet. Information and
Communications Technology (ICT) can impact student learning when teachers are digitally literate and
understand how to integrate it into the curriculum.

Guide Questions:

1. In chronological arrangement, list down all national ICT Laws, policies and regulation that affects the
classroom’s flow of discussion.

2. Delineate the application of ICT Laws, policies and regulations in teaching and learning.

3. Distinguish ICT Laws, policies and regulations that are linked into the application of teaching and
learning assessments that make advancement in students’ achievement.
DISCUSSION

The international policymakers join forces to successfully implement ICT in educational practice to
address the individual needs of students, the implications of technology for student assessment, and
teacher learning to successfully implement technology (Voogt, 2013). In the 1987 constitution, “the
State shall give priority to research and development, invention, innovation, and their utilization; and to
science and technology education, training, and services. It shall support indigenous, appropriate, and
self-reliant scientific and technological capabilities, and their application to the country’s productive
systems and national life.” DepEd Computerization Program - Beginning in 1996, the Department of
Education (DepED) embarked upon an undertaking that would provide computers to all public
secondary schools in the country.

ICT policies document the frameworks and processes required to benchmark and evaluate an
organization's ICT maturity levels -- including adherence to laws, regulations and contracts.

WHY ICT POLICIES ARE NEEDED?

ICT policies are needed to put a roadmap or course of action to be pursued and adopted by various
governments, organizations, entities involving ICT.

In our country, the Department of Information and Communication Technology (DICT) has formulated
a roadmap to guide all agencies in the utilization, regulation and enhancement of ICT. Each project has
corresponding policy statements and guidelines.

Department of Education (DepEd) policies on the use of ICT are:

 Technology must be studied first as a separate subject then applied in other learning areas as a tool for
learning how to learn;

 The application of computer skills to the other learning areas is a curriculum policy that stems from
the principle that teaching-learning must not be textbook-driven and educational processes should take
advantage of technological developments, including the application of ICT in teaching and learning,
where appropriate; and

 An education modernization program will equip schools with facilities, equipment, materials, and skills
and introduce new learning and delivery systems necessary to capitalize on recent technological
developments.

Other ICT Policies

1. REPUBLIC ACT No. 7925


AN ACT TO PROMOTE AND GOVERN THE DEVELOPMENT OF PHILIPPINE TELECOMMUNICATIONS AND
THE DELIVERY OF PUBLIC TELECOMMUNICATIONS SERVICES

2. Republic Act 8792 or The Electronic Commerce Act of 2000 (the "Act") aims to facilitate domestic and
international transactions through the utilization of electronic mediums and technology to recognize the
authenticity and reliability of electronic documents.

3. What are the Electronic evidences?

An electronic document shall be regarded as the equivalent of an original document under the Best
Evidence Rule if it is a printout or output readable by sight or other means, shown to reflect the data
accurately. (b) in the circumstances it would be unjust or inequitable to admit a copy in lieu of the
original.

4. EXECUTIVE ORDER NO. 810, s 2009 INSTITUTIONALIZING THE CERTIFICATION SCHEME FOR DIGITAL
SIGNATURES AND DIRECTING THE APPLICATION OF DIGITAL SIGNATURES IN E-GOVERNMENT SERVICES.

All government agencies and instrumentalities providing electronic services to its clients shall require
the use of digital signatures in their respective e-government services to ensure confidentiality,
authenticity, integrity and non-repudiation of electronic transactions in government.

5. Republic Act (RA) 9775, the Anti-Child Pornography Act of 2009. It prohibits the production, offering,
distribution and possession of “child pornography.”

AN ACT DEFINING THE CRIME OF CHILD PORNOGRAPHY, PRESCRIBING PENALTIES THEREFOR AND FOR
OTHER PURPOSES.

6. In this regard, Congress enacted R.A. 9995 also known as (Anti-Photo and Video Voyeurism Act of
2009). This Republic Act is geared towards protecting the privacy, honor, dignity and integrity of a
person. Investigative Directive No. 2016-09 issued by National Headquarters, PNP Directorate for
investigation and Directive Management, Camp Crame, Quezon City listed RA 9995 as a special law that
addresses Gender-Based Violence or grant special protection to vulnerable sectors.

7.The Data Privacy Act 2012, a comprehensive and strict privacy legislation that is to protect the
fundamental human right of privacy, of communication while ensuring free flow of information to
promote innovation and growth.

8.ACCESS DEVICES REGULATION ACT OF 1998AN ACT REGULATING THE ISSUANCE AND USE OF ACCESS
DEVICES, PROHIBITING FRAUDULENT ACTS COMMITTED RELATIVE THERETO, PROVIDING PENALTIES
AND FOR OTHER

9. The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175, is a law in the
Philippines that was approved on September 12, 2012. It aims to address legal issues concerning online
interactions and the Internet in the Philippines.
SAFETY ISSUES IN ICT

TRAILING CABLES - ICT devices with wires can make a room a potential hazard. Trailing wires are easy to
trip over if they are not secured or tucked away. Causes of tripping over wires. Long wires spread across
a floor. How to prevent tripping over wires. Hide wires in cable ducts. Tuck trailing wires under desks or
carpets. Use wireless technology to eliminate the use of wires altogether.

SPILLED DRINKS OR FOOD - Most ICT devices require an electrical power source. Whenever you have
electrical power sources you run the risk of the electrocution. Causes of Electrocution spilled drinks over
electrical equipment’s. How to Prevent Electrocution keep drinks and foods away from equipment’s.

OVERLOADED POWER SOCKETS - ICT devices require power from a mains outlet. If too many devices are
plugged into a single main at the same time it is possible to overload the circuit and start an electrical
fire. You need to ensure that your room has many plug sockets so you don't have to overload any single
one.

HEAVY OBJECTS FAILING - Some ICT devices are fairly heavy and can cause injury if they fall on you.
Equipment should be positioned securely on strong desks and tables well away from the edge. Causes of
equipment falling, Equipment not positioned securely onto desks. How to prevent equipment failing.
Make sure that equipment is positioned away from the edge of desks. Use strong desks/tables that can
support the weight with ease.

HACKING - is the most popular issues in ICT that circulating in social media nowadays, there are so many
types of hacking someone's software, for example in today’s situation they hacked someone account for
the sake of money and others used to hacked account to humiliate someone.

MALWARE and also known as Malicious ware - Also an instrument that used in hacking someone's
software or account, and sometimes hacker made a suspicious link and if you open that link it will collect
all of your information, that will cause of destroying your software and it might corrupt all of your files.

COMPUTER VIRUS - A computer virus is a malicious program that penetrates vulnerable devices to alter
the way they function, an illegal, harmful program that can change the way your computer runs and
behaves. A computer virus is a piece of software that can 'infect' a computer (install itself) and copy
itself to other computers, without the users' knowledge or permission.

SECURITY OF DATA TRANSFERRED - Using the Internet as has been discussed already, you should always
consider encrypting any sensitive or personal data that is sent or accessed over a public network such as
The Internet.

PHISHING - a type of social engineering attack often used to steal user data, including login credentials
and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim
into opening an email, instant message, or text message.

PHARMING - a scamming practice in which malicious code is installed on a personal computer (PC) or
server, misdirecting users to fraudulent websites without their knowledge or consent. similar to
phishing, but instead of deceiving you (as phishing does), a pharming attack deceives your computer.

ACTIVITY:

PUT MY ACT!

Description

ICT ACT

This is an act foster and enforce the development of Philippine telecommunications and transmission of
public communication services.

The objectives of this act is to address legal concerns with regards to online interactions and the Internet
in the Philippines.
INSTITUTIONALIZING THE CERTIFICATION SCHEME FOR DIGITAL SIGNATURES AND DIRECTING THE
APPLICATION OF DIGITAL SIGNATURES IN E-GOVERNMENT SERVICES.

This act control the creation, oblation, allotment and demesne of "child pornography".

An act where there is a broad-gauge and seclusion of ammendment that protect the essential human
right of privacy, of communication while securing the information flow to upgrade innovation and raise
growth.

6. AN ACT TO PROMOTE AND GOVERN THE DEVELOPMENT OF PHILIPPINE TELECOMMUNICATIONS AND


THE DELIVERY OF PUBLIC TELECOMMUNICATIONS SERVICES.

7. It aims to address legal issues concerning online interactions and the Internet in the Philippines.

8. INSTITUTIONALIZING THE CERTIFICATION SCHEME FOR DIGITAL SIGNATURES AND DIRECTING THE
APPLICATION OF DIGITAL SIGNATURES IN E-GOVERNMENT SERVICES.

9. It prohibits the production, offering, distribution and possession of “child pornography.”

10. A comprehensive and strict privacy legislation that is to protect the fundamental human right of
privacy, of communication while ensuring free flow of information to promote innovation and growth.
LESSON EVALUATION:

Answer the following in the most comprehensive way.

1. What do you think are the best solution to make your account avoid getting hacked?

2. What is the significance of ICT policies in teaching and learning?

3. Why is it important to study safety issues in ICT?

4. What ICT policies are mostly used in teaching and learning?

5. In what way does this lesson help you in realizing the use of ICT policies.

References:

https://www.studocu.com/ph/document/mary-our-help-technical-institute-for-women/social-science/
ict-policies-and-safety-issues-in-teaching-and-learning/17841889

https://www.slideshare.net/erwinmarlonsario/ict-policies-and-issues

https://www.slideshare.net/AllanLloydMartinez/ict-policies-ict-safety-issues-and-uses-of-ict-in-teaching-
and-learning

https://www.scribd.com/document/505259808/ped

https://www.mcafee.com/en-us/antivirus/computer-viruses.html

https://www.imperva.com/learn/application-security/phishing-attack-scam/

https://www.techtarget.com/searchsecurity/definition/pharming?amp=1
https://lawphil.net/statutes/repacts/ra1995/ra_7925_1995.html

https://legacy.senate.gov.ph/lisdata/3333330170!.pdf

https://www.set.gov.ph/resources/rules-on-electronic-evidence/

https://legalresearchph.com/2021/10/02/caught-in-the-act-ra-9995-anti-photo-and-video-voyeurism-
act-of-2009/#:~:text=It%20protects%20the%20victims%20who,make%20public%20the%20said
%20materials.

https://lawphil.net/statutes/repacts/ra1995/ra_7925_1995.html

https://legacy.senate.gov.ph/lisdata/3333330170!.pdf

https://www.set.gov.ph/resources/rules-on-electronic-evidence/

https://www.officialgazette.gov.ph/2009/06/15/executive-order-no-810-s-2009/

https://lawphil.net/statutes/repacts/ra2009/

https://legalresearchph.com/2021/10/02/caught-in-the-act-ra-9995-anti-photo-and-video-voyeurism-
act-of-2009/#:~:text=It%20protects%20the%20victims%20who,make%20public%20the%20said
%20materials.

https://iapp.org/news/a/summary-philippines-data-protection-act-and-implementing regulations/#:
~:text=In%202012%20the%20Philippines%20passed, growth. %E2%80%9D%20(Republic%20Act.

https://acg.pnp.gov.ph/main/quality-policy/17-legal-references/163-ra-8484-access-devices-regulation-
act-of1998.html#:~:text=AN%20ACT%20REGUATING%20THE%20ISSUANCE,PENALTIES%20AND%20FOR
%20OTHER%20PURPOSES.

https://en.m.wikipedia.org/wiki/Cybercrime_Prevention_Act_of_2012#:~:text=The%20Cybercrime
%20Prevention%20Act%20of,the%20Internet%20in%20the%20Philippines.

You might also like