SlideShare a Scribd company logo
1 of 6
lOMoAR cPSD|30618392
Module 2 - ICT POLICIES AND SAFETY ISSUES IN TEACHING AND LEARNING
MODULE LEARNING OBJECTIVES
At the end of this Module, you should be able to:
1. Enumerate the national ICT policies affecting classroom practices
2. Describe the implementation of ICT policies in teaching-learning
3. Identify ICT policies that are incorporated to the design and implementation of teaching-
learning activities
NATIONAL AND INTERNATIONAL ICT POLICIES IN TEACHING AND LEARNING
Definition of ICT Policy
The Oxford English Dictionary has defined “policy” as a course of action, adopted and pursued
by a government, party, ruler, and statesman.
Thus, ICT Policies are needed to put a roadmap or course of action to be pursued and adopted
by various governments, organizations, and entities involving ICT. These include principles and
guidelines in the use of ICT which cover three main areas: telecommunications (telephone),
broadcasting (radio and television), and Internet.
ICT “Information and Communication Technologies” refers to the technology that provides access
to information through telecommunications. It is similar to Information Technology (IT) but
focuses primarily on communication technologies. This includes the internet, wireless networks,
cell phones, and other communication mediums.
ICT POLICY IN THE PHILIPPINES The DICT Roadmap
In our country, the Department of Information and Communication Technology (DICT) has
formulated a roadmap to guide all agencies in the utilization, regulation, and enhancement of
ICT. Each project has corresponding policy statements and guidelines.
Republic Act No.10844, otherwise known as the “Department of Information and
Communication Technology Act of 2015” which was signed into law on 23 May 2016.
In accordance to the law, the Department of Information and Communications Technology (DICT)
shall be the primary policy, planning, coordinating, implementing, and administrative entity of
the Executive Branch of the government that will plan, develop, and promote the national ICT
development.
An IT roadmap is a type of technology roadmap that a business uses to develop and share a
strategic level plan for IT initiatives at the organization, such as migrating the company’s data to
a new cloud system or upgrading the organization to a new enterprise software platform.
lOMoAR cPSD|30618392
SAFETY ISSUES ON THE USE OF ICT
It’s probably not immediately obvious to the average child – or many adults for that matter – but
moderate to heavy computer use brings with it a number of areas of risk when it comes to health
and safety. This lesson covers a wide range of aspects of health and safety in the use of ICT –
including ergonomic chairs, the positioning of furniture and computer hardware, cables, use of
keyboard and mouse, posture and the need for breaks, plus includes a range of exercises designed
to prevent injury.
Some Risks in the Use of ICT and E-networking
Technology is a phenomenon that seems to be uncontrollable. Despite the many benefits of
teaching in learning, there are also negative effects or influences on the learners. Hence, as future
teachers, you have to be aware of how to safeguard learners in the school communities where
they spend most of their waking hours and also their homes or facilities that provide opportunities
to use digital technologies like Internet Cafes. Safeguard and protection should be the primordial
role of parents, teachers, and schools. There are so many risks that we must be aware of in the
use of digital technologies. These may include the following:
1. Exposure to inappropriate content, including online pornography, extremism (exposure to
violence associated with racist language).
2. Lifestyle websites including like self-harms and suicide sites and hate sites.
3. Cyberbullying in all forms, receiving sexually explicit images or messages.
4. Privacy issue including disclosure of personal information.
5. Health and well-being (amount of time spent online, internet gaming and many more);
6. Prolonged exposure to online technologies, particularly at an early age.
7. Addiction to gambling and gaming.
8. Theft and fraud from activities such as phishing.
9. Viruses, Trojans and spyware and other malware; and
10. Social pressure to maintain online networks via texting and social networking.
Minor Misuse of ICT
In schools, some minor misuse made by learners include the following:
 Copying information into assignment and failing to acknowledge the source
 Downloading material not relevant to their studies.
 Misconduct associated with subject logins, such as using someone the.
 Leaving a mobile phone turned on during class period.
 Unauthorized taking of picture or image with mobile phone career still or moving.
lOMoAR cPSD|30618392
Minor Misuse of ICT
In school, some minor misuse made by learners include the following:
e-Safety
•
•
Copying information into assignment and failing to acknowledge the source (plagiarism and
copyright infringement)
Downloading materials not relevant to their studies
Misconduct associated with subject logins, such as using someone else's password
Leaving a mobile phone turned on during class period
Unauthorized taking of pictures or images with mobile phone camera, still or moving
With all of the above concerns and many more, how do we confront all of these so as to protect
our future generation?
e-safety takes care not only of internet technologies but also of electronic communications via
mobile phones, games consoles and wireless technology. It highlights the need to educate
children and young people about the benefits, risks and responsibilities of using information
technology. Here are some issues of e-safety:
e-safety helps safeguard children and young people in the digital world;
• e-safety emphasizes learning to understand and new technologies in a positive way;
•
e-safety educates children about the risks as well as the benefits so we can feel confident online;
and
2. Pass
2.1
3. Pers 3.1
4. Cam 4.1. T
f
4.2. A
Setting Up A
Schools
for learning s
1. Prov
of th
2.
Prov
3. Prov
•
e-safety supports young learners and adults to develop safer online behaviors, both in and out
of school.
4. Prov
5. Mak
lOMoAR cPSD|30618392
6. Mak
Network Management
1. Safety in the Use of Network in Schools
1.1. Make clear that no one should log on as another user.
7. Plan
1.2. Require all users to always log off when they have finished working. 1.3. Maintain equipment
to ensure health and safety.
1.4. Provide students with access to content and resources through guided e-learning.
stations shoul
1. No t
2. Elec
More sp
3. Elec
4. Ther
1.5. Set up a clear disaster recovery system in place for critical data that include secure, remote
back up of critical data.
5. Bags
6. Food
1.6. Secure wireless network to appropriate standards suitable for educational
7. Heat
use.
1.7. Install all computer equipment professionally and meet health and safety standards.
8. Fire
9. Fire
1.8. Review the school ICT system regularly with regard to health and safety and security.
ne
ese
nic
It
and
3:
na
2. Password Policy
2.1 Only authorized users will have individual passwords. Users are not permitted to disclose their
passwords unless they got permission from the owner or from the management. The equipment
that keeps the personal information shall be locked when unattended to prevent unauthorized
access.
Computers should be set to a time out if they become unused for a certain period of time.
3. Personal mobile phones and mobile devices
lOMoAR cPSD|30618392
3.1 All mobile phones shall be kept away in a box away from the children or learners and access
is only allowed at breaktime or at the end of classes or when needed during the class period.
4. Cameras
4.1. Taking pictures only from parents or caregivers and not from any other family member or
friend while the child attends class.
4.2. Any picture taken of children shall be on cameras solely for the purpose.
Setting Up An Educational Technology Room
Schools that plan to dedicate a room where the students can access technologies for learning
should include the following basic safety rules:
1. Provide tiltable tables. These tables can be tilted and adjusted to the height
of the users.
we
2.
Provide anti-glare screen filters.
3.
Provide adjustable chairs.
4.
line
Provide foot support.
5.
Make sure lighting is suitable.
that
nal
6. Make sure work stations are not cramped.
7. Plan work at a computer so that there are frequent breaks.
More specifically safety rules that can reduce risk of accidents in the working stations should
include:
1. No trailing wires across or around the room which people can trip on.
2. Electrical sockets should not be overloaded.
ided
3.
Electrical equipment should be safety-tested at least once a year.
4.
There should be adequate space around desk for people to move.
5.
Bags and obstacles should be stored out of the way.
6.
Food and drinks should not be placed near machines.
7.
Heating and ventilation should be suitable for the working environment.
afety
afety
lOMoAR cPSD|30618392
8. Fire extinguishers should be available.
9. Fire exits should be clearly marked and free from clutter.
There are more issues, policies and rules. What have been presented in the lesson may be the
minimum that you should learn. As you explore some more and engage in the different aspects
of Technology for Teaching and Learning, you will
find more details.

More Related Content

Similar to SAFETY ISSUES NOTES.docx

GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
TTL-1 Module 2 lesson 1
TTL-1 Module 2  lesson 1TTL-1 Module 2  lesson 1
TTL-1 Module 2 lesson 1Ira Sagu
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect
 
university-digital-choice-boards (1) (1).pptx
university-digital-choice-boards (1) (1).pptxuniversity-digital-choice-boards (1) (1).pptx
university-digital-choice-boards (1) (1).pptxEdrelynCentino1
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
ICT-POLICIES-Group-1-Report.pptx
ICT-POLICIES-Group-1-Report.pptxICT-POLICIES-Group-1-Report.pptx
ICT-POLICIES-Group-1-Report.pptxHanelynDZAmudio
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
information and comunication technologies
information and comunication technologiesinformation and comunication technologies
information and comunication technologiesselamat permono
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 
Childrens and Mobile Technology -Regulator´s Commitment to Children´s Safety
Childrens and Mobile Technology -Regulator´s Commitment to Children´s SafetyChildrens and Mobile Technology -Regulator´s Commitment to Children´s Safety
Childrens and Mobile Technology -Regulator´s Commitment to Children´s SafetyAntonino Galo
 
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'JISC RSC Eastern
 
TTL Presentation.pdf
TTL Presentation.pdfTTL Presentation.pdf
TTL Presentation.pdfJemalynRafael
 

Similar to SAFETY ISSUES NOTES.docx (20)

Ict Issues
Ict IssuesIct Issues
Ict Issues
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
TTL-1 Module 2 lesson 1
TTL-1 Module 2  lesson 1TTL-1 Module 2  lesson 1
TTL-1 Module 2 lesson 1
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Ict security essay
Ict security essay Ict security essay
Ict security essay
 
Nigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crimeNigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crime
 
university-digital-choice-boards (1) (1).pptx
university-digital-choice-boards (1) (1).pptxuniversity-digital-choice-boards (1) (1).pptx
university-digital-choice-boards (1) (1).pptx
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
ICT-POLICIES-Group-1-Report.pptx
ICT-POLICIES-Group-1-Report.pptxICT-POLICIES-Group-1-Report.pptx
ICT-POLICIES-Group-1-Report.pptx
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
information and comunication technologies
information and comunication technologiesinformation and comunication technologies
information and comunication technologies
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
document
documentdocument
document
 
ICT POLICIES AND ISSUES.pptx
ICT POLICIES AND ISSUES.pptxICT POLICIES AND ISSUES.pptx
ICT POLICIES AND ISSUES.pptx
 
Childrens and Mobile Technology -Regulator´s Commitment to Children´s Safety
Childrens and Mobile Technology -Regulator´s Commitment to Children´s SafetyChildrens and Mobile Technology -Regulator´s Commitment to Children´s Safety
Childrens and Mobile Technology -Regulator´s Commitment to Children´s Safety
 
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
8._safety_and_security.pdf
8._safety_and_security.pdf8._safety_and_security.pdf
8._safety_and_security.pdf
 
TTL Presentation.pdf
TTL Presentation.pdfTTL Presentation.pdf
TTL Presentation.pdf
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

SAFETY ISSUES NOTES.docx

  • 1. lOMoAR cPSD|30618392 Module 2 - ICT POLICIES AND SAFETY ISSUES IN TEACHING AND LEARNING MODULE LEARNING OBJECTIVES At the end of this Module, you should be able to: 1. Enumerate the national ICT policies affecting classroom practices 2. Describe the implementation of ICT policies in teaching-learning 3. Identify ICT policies that are incorporated to the design and implementation of teaching- learning activities NATIONAL AND INTERNATIONAL ICT POLICIES IN TEACHING AND LEARNING Definition of ICT Policy The Oxford English Dictionary has defined “policy” as a course of action, adopted and pursued by a government, party, ruler, and statesman. Thus, ICT Policies are needed to put a roadmap or course of action to be pursued and adopted by various governments, organizations, and entities involving ICT. These include principles and guidelines in the use of ICT which cover three main areas: telecommunications (telephone), broadcasting (radio and television), and Internet. ICT “Information and Communication Technologies” refers to the technology that provides access to information through telecommunications. It is similar to Information Technology (IT) but focuses primarily on communication technologies. This includes the internet, wireless networks, cell phones, and other communication mediums. ICT POLICY IN THE PHILIPPINES The DICT Roadmap In our country, the Department of Information and Communication Technology (DICT) has formulated a roadmap to guide all agencies in the utilization, regulation, and enhancement of ICT. Each project has corresponding policy statements and guidelines. Republic Act No.10844, otherwise known as the “Department of Information and Communication Technology Act of 2015” which was signed into law on 23 May 2016. In accordance to the law, the Department of Information and Communications Technology (DICT) shall be the primary policy, planning, coordinating, implementing, and administrative entity of the Executive Branch of the government that will plan, develop, and promote the national ICT development. An IT roadmap is a type of technology roadmap that a business uses to develop and share a strategic level plan for IT initiatives at the organization, such as migrating the company’s data to a new cloud system or upgrading the organization to a new enterprise software platform.
  • 2. lOMoAR cPSD|30618392 SAFETY ISSUES ON THE USE OF ICT It’s probably not immediately obvious to the average child – or many adults for that matter – but moderate to heavy computer use brings with it a number of areas of risk when it comes to health and safety. This lesson covers a wide range of aspects of health and safety in the use of ICT – including ergonomic chairs, the positioning of furniture and computer hardware, cables, use of keyboard and mouse, posture and the need for breaks, plus includes a range of exercises designed to prevent injury. Some Risks in the Use of ICT and E-networking Technology is a phenomenon that seems to be uncontrollable. Despite the many benefits of teaching in learning, there are also negative effects or influences on the learners. Hence, as future teachers, you have to be aware of how to safeguard learners in the school communities where they spend most of their waking hours and also their homes or facilities that provide opportunities to use digital technologies like Internet Cafes. Safeguard and protection should be the primordial role of parents, teachers, and schools. There are so many risks that we must be aware of in the use of digital technologies. These may include the following: 1. Exposure to inappropriate content, including online pornography, extremism (exposure to violence associated with racist language). 2. Lifestyle websites including like self-harms and suicide sites and hate sites. 3. Cyberbullying in all forms, receiving sexually explicit images or messages. 4. Privacy issue including disclosure of personal information. 5. Health and well-being (amount of time spent online, internet gaming and many more); 6. Prolonged exposure to online technologies, particularly at an early age. 7. Addiction to gambling and gaming. 8. Theft and fraud from activities such as phishing. 9. Viruses, Trojans and spyware and other malware; and 10. Social pressure to maintain online networks via texting and social networking. Minor Misuse of ICT In schools, some minor misuse made by learners include the following:  Copying information into assignment and failing to acknowledge the source  Downloading material not relevant to their studies.  Misconduct associated with subject logins, such as using someone the.  Leaving a mobile phone turned on during class period.  Unauthorized taking of picture or image with mobile phone career still or moving.
  • 3. lOMoAR cPSD|30618392 Minor Misuse of ICT In school, some minor misuse made by learners include the following: e-Safety • • Copying information into assignment and failing to acknowledge the source (plagiarism and copyright infringement) Downloading materials not relevant to their studies Misconduct associated with subject logins, such as using someone else's password Leaving a mobile phone turned on during class period Unauthorized taking of pictures or images with mobile phone camera, still or moving With all of the above concerns and many more, how do we confront all of these so as to protect our future generation? e-safety takes care not only of internet technologies but also of electronic communications via mobile phones, games consoles and wireless technology. It highlights the need to educate children and young people about the benefits, risks and responsibilities of using information technology. Here are some issues of e-safety: e-safety helps safeguard children and young people in the digital world; • e-safety emphasizes learning to understand and new technologies in a positive way; • e-safety educates children about the risks as well as the benefits so we can feel confident online; and 2. Pass 2.1 3. Pers 3.1 4. Cam 4.1. T f 4.2. A Setting Up A Schools for learning s 1. Prov of th 2. Prov 3. Prov • e-safety supports young learners and adults to develop safer online behaviors, both in and out of school. 4. Prov 5. Mak
  • 4. lOMoAR cPSD|30618392 6. Mak Network Management 1. Safety in the Use of Network in Schools 1.1. Make clear that no one should log on as another user. 7. Plan 1.2. Require all users to always log off when they have finished working. 1.3. Maintain equipment to ensure health and safety. 1.4. Provide students with access to content and resources through guided e-learning. stations shoul 1. No t 2. Elec More sp 3. Elec 4. Ther 1.5. Set up a clear disaster recovery system in place for critical data that include secure, remote back up of critical data. 5. Bags 6. Food 1.6. Secure wireless network to appropriate standards suitable for educational 7. Heat use. 1.7. Install all computer equipment professionally and meet health and safety standards. 8. Fire 9. Fire 1.8. Review the school ICT system regularly with regard to health and safety and security. ne ese nic It and 3: na 2. Password Policy 2.1 Only authorized users will have individual passwords. Users are not permitted to disclose their passwords unless they got permission from the owner or from the management. The equipment that keeps the personal information shall be locked when unattended to prevent unauthorized access. Computers should be set to a time out if they become unused for a certain period of time. 3. Personal mobile phones and mobile devices
  • 5. lOMoAR cPSD|30618392 3.1 All mobile phones shall be kept away in a box away from the children or learners and access is only allowed at breaktime or at the end of classes or when needed during the class period. 4. Cameras 4.1. Taking pictures only from parents or caregivers and not from any other family member or friend while the child attends class. 4.2. Any picture taken of children shall be on cameras solely for the purpose. Setting Up An Educational Technology Room Schools that plan to dedicate a room where the students can access technologies for learning should include the following basic safety rules: 1. Provide tiltable tables. These tables can be tilted and adjusted to the height of the users. we 2. Provide anti-glare screen filters. 3. Provide adjustable chairs. 4. line Provide foot support. 5. Make sure lighting is suitable. that nal 6. Make sure work stations are not cramped. 7. Plan work at a computer so that there are frequent breaks. More specifically safety rules that can reduce risk of accidents in the working stations should include: 1. No trailing wires across or around the room which people can trip on. 2. Electrical sockets should not be overloaded. ided 3. Electrical equipment should be safety-tested at least once a year. 4. There should be adequate space around desk for people to move. 5. Bags and obstacles should be stored out of the way. 6. Food and drinks should not be placed near machines. 7. Heating and ventilation should be suitable for the working environment. afety afety
  • 6. lOMoAR cPSD|30618392 8. Fire extinguishers should be available. 9. Fire exits should be clearly marked and free from clutter. There are more issues, policies and rules. What have been presented in the lesson may be the minimum that you should learn. As you explore some more and engage in the different aspects of Technology for Teaching and Learning, you will find more details.