Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 36

Chapter 2:

ICT Policies and


Safety Issues:
Implications to
Teaching and
Learning
Lesson 1: Policies and
Issues on Internet and
Implications to
Lesson Outcomes:
 Name examples of ICT Policies which
are applicable to teaching and learning.
 Discussed some issues that relate to the
ICT policy.
Definition of ICT Policy

The Oxford English Dictionary has defined "policy"


as a course of action, adopted and pursued by a
government, party, ruler, statesman. It is any course of
action adopted as expedient or advantageous. Its
operational definition of policy is a plan of action to
guide decisions and achieve outcomes.
The New ICT Technologies

1. Information Technology - includes the


use of computers, which has become
indispensable in modern societies to
process data and save time and effort.
What are needed will be computer
hardware and peripherals, software and
for the user, computer literacy
2. Telecommunication
Technologies - include
telephones (with fax) and the
broadcasting of radio and
television often through
satellites. Telephone system,
radio and TV broadcasting are
needed in this category.
3.Networking Technologies - The best known of
networking technologies is Internet, but has extended to
mobile phone technology, Voice Over Internet Protocol
(VOIP) satellite communications and other forms of
communications are still in their infancy. In addition to
Internet, this category also includes mobile telephone,
cable, DSL, satellite and other broadband connectivity.
The DICT Roadmap

In our country, the Department of Information


and Communication Technology (DICT) has
formulated a roadmap to guide all agencies in the
utilization, regulation and enhancement of ICT.
ICT for Education (ICT4E) is a program under the
DICT that supports all the efforts of the education
sector in incorporating the use of ICT as well as in
determining and gaining access to the infrastructure
(hardware, software, telecommunications facilities and
others) which are necessary to use and deploy learning
technologies at all levels of education.
Some Issues on ICT and Internet Policy and Regulations

Global Issues

 Access and Civil Liberties (human rights and freedom such as


freedom of expression, right to privacy, right to communicate, and
intellectual property right)
 Access to the Use of Internet and ICT (access means the
possibility for everyone to use the internet and other media.
 Infringement to Civil Liberties or Human Rights (internet issues
on internet policy tat have relationship to human rights)
Issue No. 1: Freedom of Expression and Censorship

Under international human rights conventions, all people are


guaranteed the rights for free expression. However, with the shift
from communicating through letter, newspapers and public
meetings to electronic communications and on-line networking,
a need to look into how these new means modifies the
understanding of freedom of expression and censorship.
Some examples are the following:

• Individual rights are given up in order to have access to


electronic networks. Microsoft Network's (MSN's contracts
provide protection of individuals like "upload, or otherwise
make available files that contain images, photographs or
other materials protected by intellectual property laws,
including but not limiting to copyright or trademark laws,
unless you own or control the rights thereto or have received
all necessary consents to do the same”.
• Censorship restricts the transmission of information by
blocking it or filtering the information. Blocking is
preventing access to whole areas of internet based upon
the "blacklist" of certain Internet address, location or
email addresses while filtering is sifting the packets of
data or messages as they move, across computer networks
and eliminating those considered "undesirable" materials.
The selection of sites that are blocked or filtered has been
considered as an issue.
Warning! ! ! !

"When you are surfing the web, you may think you are
anonymous, but there are various ways that information
about you or your activities can be collected without your
consent."

• Defamation actions may be used to silence critics. This


action deters the freedom of expression.
Issue No. 2: Privacy and Security

Privacy policies are an issue. Most commercial sites


have a privacy policy. When someone uses a site and
clicks "I agree" button, it is as if you have turned over
private information to any authority that may access it.
There are several types of privacy as shown by the following examples:

1. For most, privacy means "personal privacy" the right of individuals not to have
their home, private life or personal life interfered with.
2. Privacy of communication refers to the protection from interference with
communication over the phone or internet. Respect for privacy of communications
is an essential prerequisite for the maintenance of human relationship via
technological communications media.
3. Information privacy is related to the use of computers and communications system
which are able to hold and process information about large numbers of people at a
high speed. It is important to ensure that information will only be used for purposes
for which it was gathered and will not be disclosed to others without consent of the
individuals.
Issue No. 3: Surveillance and Data Retention

The use of electronic communications has enhanced the development of


indirect surveillance. In the indirect surveillance, there is no direct
contact between the agent and the subject of surveillance but evidence of
activities can be traced. The new and powerful form of indirect
surveillance is dataveillance. Dataveillance is the use of personal
information to monitor a person's activities while data retention is the
storage and use of information from communication systems.
Issue No. 4: E-pollutants from E-waste

• Large amount of e-waste is generated by ICT. These are in particular,


terminal equipment used for computing (PCS, laptops), broadcasting
(television and radiosets), telephony (fixed and mobile phones), and
peripherals (fax machines, printers and scanners).
• Remedies include standardization and regulatory measures to increase
the life cycle of equipment before they become obsolete. Efficient
extraction of toxic components and requiring the recycling by both
consumers and equipment vendors are selling must be required.
Implications to Teaching and Learning
For the Teachers and Teaching

1. Guide the teachers on what they should teach that relate to ICT, and how to teach it.
Since ICT development comes so rapid and fast, teachers might be overwhelmed by
its rapid speed. Temperance in its use is a caution that should be looked at.

2. Technology should never replace any human teacher. The tools are support
instructional materials for the teachers which are available for use. The teacher
should learn how to appropriately use them. The human touch of the teacher is still
a vital component in teaching. Teachers should always be reminded that there are
always limitations in the use of the different gadget and tools.
3.There are rules and regulations that govern the use of
technology. Caution should be observed to protect
individual privacy. As teachers, you must be aware that the
use of technology may jeopardize your privacy and security.

4.All the issues and many more shall be part of the teaching
content as each teacher will be encouraged to use
technology in teaching.
For the Learners and Learning

• The learners of the 21st Century are even more advanced than some of the teachers.
However, learners still need guidance on how to use, regulate technology use. As
there are positive and negative effects of technology use, learners should know
the difference. Learners should not only know the benefits of technology use, but
they should also know how they can be protected from the hazards that
technology brings to their lives.

• Learners should take advantage of the potential of learning support they can
derive such as the development of higher order thinking skills, the development of
learning communities through collaboration, the enhancement of skills to manage
the vast resources as 21st century learners and many more.
Lesson 2: Safety
Issues on the
Use of ICT
including e-
Safety Rules
Lesson Outcomes:

 Identified and explained safety issues


on the use of ICT.
 Listed and applied e-safety rules in
the use of ICT.
Some Risks in the Use of ICT and e-Networking

1.Exposure to inappropriate content, including on-line


pornography, extremism (exposure to violence associated
with racist language);
2.Lifestyle websites like self-harms and suicide sites, and
hate sites;
3.Cyber-bullying in all forms, receiving sexually explicit
images or messages;
4.Privacy issues including disclosure of personal
information;
5.Health and well being (amount of time spent on-line,
internet gaming and many more;
6.Prolonged exposure to on-line technologies, particularly at
an early age;
7.Addiction to gambling and gaming;
8.Theft and fraud from activities such as phishing;
9.Viruses, Trojans, spyware and other malware; and
10.Social pressure to maintain online networks via texting
and networking sites.
Minor Misuse of ICT

In school, some minor misuse made by learners include the following:

 Copying information into assignment and failing to acknowledge source


(plagiarism and copyright infringement)
 Downloading materials not relevant to their studies
 Misconduct associated with subject logins, such as using someone else's
password
 Leaving a mobile phone turned on during class period
 Unauthorized taking of pictures or images with mobile phone camera,
still or moving.
e-Safety

• e-safety takes care not only of internet technologies


but also of electronic communications via mobile
phones, games consoles and wireless technology. It
highlights the need to educate children and young
people about the benefits, risks and responsibilities of
using information technology.
Here are some issues of e-safety:

 e-safety helps safeguard children and young people in the digital


world;
 e-safety emphasizes learning to understand and new technologies in a
positive way;
 e-safety educates children about the risks as well as the benefits so
we can feel confident online; and
 e-safety supports young learners and adults to develop safer online
behaviors, both in and out of school.
Network Management

1. Safety in the Use of Network in Schools


• 1.1. Make clear that no one should log on as another user.
• 1.2. Require all users to always log off when they have finished
working.
• 1.3. Maintain equipment to ensure health and safety,
• 1.4. Provide students with access v to content and resources
through guided e-learning.
• 1.5. Set up a clear disaster recovery system in place for critical
data that include secure, remote back up of critical data.
• 1.6. Secure wireless network to appropriate
standards suitable for educational use.
• 1.7. Install all computer equipment professionally
and meet health and safety standards.
• 1.8. Review the school ICT system regularly with
regard to health and safety and security.
2.Password Policy
2.1 Only authorized users will have individual
passwords. Users are not permitted to disclose their
passwords unless they got permission from the owner or
from the management. The equipment that keeps the
personal information shall be locked when unattended to
prevent unauthorized access.
3. Personal mobile phones and mobile devices
3.1 All mobile phones shall be kept away in a box away from the
children or learners and access is only
allowed at breaktime or at the end of classes or when
needed during the class period.

4. Cameras
4.1. Taking pictures only from parents or caregivers and not from
any other family member or friend
while the child attends class.
4.2. Any picture taken of children shall be on cameras solely for
the purpose.
Setting Up An Educational Technology Room

Schools that plan to dedicate a room where the students can access technologies for learning should
include the following basic safety rules:

1. Provide tiltable tables. These tables can be tilted and adjusted to the height of the
users.
2. Provide anti-glare screen filters.
3. Provide adjustable chairs.
4. Provide foot support.
5. Make sure lighting is suitable.
6. Make sure work stations are not cramped.
7. Plan work at a computer so that there are frequent breaks
More specifically safety rules that can reduce risk of accidents in the working
stations should include:

1. No trailing wires across or around the room which people can trip on.
2. Electrical sockets should not be overloaded.
3. Electrical equipment should be safety-tested at least once a year.
4. There should be adequate space around desk for people to move.
5. Bags and obstacles should be stored out of the way.
6. Food and drinks should not be placed near machines.
7. Heating and ventilation should be suitable for the working environment.
8. Fire extinguishers should be available.
9. Fire exits should be clearly marked and free from clutter.
Thank You for Listening

You might also like