After a comprehensive review, Information Technology Services (ITS) has created a simplified and consolidated framework of policies and procedures. These new resources provide UQ’s staff and students with clearly defined roles and responsibilities in relation to UQ’s ICT resources.
All original policies have been withdrawn and replaced by three new policies (effective immediately):
Information and Communication Technology Policy
Cyber Security Policy
Information Management Policy.
ITS also developed six procedures and one framework to support these policies:
Information and Communication Technology Procedure
Cyber Security Exceptions Procedure
Destruction of Records Procedure
Email and Bulk Messaging Procedure
Information Security Classification Procedure
Software Asset Management Procedure
Information Governance and Management Framework.The deployment of ICT into Education will result in the creation of new possibilities for learners and teachers to engage in new ways of information acquisition and analysis. ICT will enhance access to education and improve the quality of education delivery on equitable basis.
SOME ISSUES ON ICT AND INTERNET POLICY AND REGULATIONS • Issue no.
Freedom of Expression and Censorship • Issue no.
Privacy and Security • Issue no.
Surveillance and Data Retention • Issue no.
E-pollutants from E-waste.
Here are some quick ways to incorporate technology into a classroom setting!
Teach students how to properly use the Internet.
Utilize handheld devices.
Implement computer science classes.
Use Multimedia for creative presentations.
Target small group learning via online programs.
Rapidly developing technological advances in this era have led to multiple
convergences of content, computing, dissemination, communication and distribution.
Leveraged by human capacity, this has led to the creation of the current popular
advantages referred to as ‘Information and Communication Technology (ICT)’.
Combination of technologies have brought rapid changes in some areas, predominantly
in knowledge management, covering aspects of knowledge creation, processing,
storage, sharing, dissemination, collaboration and human resource development, in the
level of education and training as well as work output and productivity. To overcome
the lag in adoption of ICT in the country, the Government of Cambodia has committed
to the development of a National Information and Communication Technology (ICT)
Policy that will build on existing government initiatives and support in achieving
Vision 2015. As a consequence of implementing Policy 2015, it is anticipated that
Cambodia will benefit from persistent growth in the digital era, by serving as a key
mechanism in the achievement
National ICT Vision:
With a unique mélange of historical magnetism and geography, Cambodia is
well placed to become a globally competitive, knowledge and information
based society, capable of providing ICT-based solutions to enhance
sustainable socio-economic development.
1. ICT POLICIES AND ISSUES:
IT’S IMPLICATION TO
TEACHING AND LEARNING
2. WHY ICT POLICIES ARE NEEDED?
•ICT policies are needed to put a
roadmap or course of action to be
pursued and adopted by various
governments, organization, entitles
involving ICT
3. •These includes principles and guidelines in
the use of ICT which cover three areas:
•Telecommunications (telephone)
•Broadcasting (radio and television), and
•Internet
4. NEW ICT TECHNOLOGIES
•The recent technological innovations
increased the reach and speed of
communication which can be grouped in
three categories:
1. Information Technology
2. Telecommunication Technologies
3. Networking Technologies
5. INFORMATION TECHNOLOGY
•This includes the use of computers ,
which has become indispensable in
modern societies to process data and
save time and effort. What are needed
will be computer hardware,
peripherals, software and for the user,
computer literacy
6. TELECOMMUNICATION TECHNOLOGIES
•These includes telephones and the
broadcasting radio and television
often through satellites. Telephone
system, radio, and TV broadcasting
are needed in this category
7. NETWORKING TECHNOLOGIES
• The best known networking technology is
internet, but it has extended to mobile phone
technology, Voice over internet Protocol
(VOIP)satellite communications and other forms
of communications are still in their infancy. In
addition to internet this category also includes
mobile telephone, cable and satellite and other
broadband connectivity
8. THE DICT ROADMAP
•In our country, the Department of
Information and Communication Technology
(DICT) has formulated a roadmap to guide
all agencies in the utilization, regulation
and enhancement of ICT. Each project has
corresponding policy statements and
guidelines
9. • The ICT for Education (ICT4E) is a program under
the DICT that supports all the efforts of the
education sector in incorporating the use of ICT
as well as in determining and gaining access to
the infrastructure( hardware, software,
telecommunications facilities and others) which
are necessary to use and employ learning
technologies at all level of education
10. POLICIES AND ISSUES ON INTERNET AND
IMPLICATIONS TO TEACHING AND LEARNING
•ICT in Education Masterplan for all
levels, including a National Roadmap
for Faculty Development in ICT in
Education. A national framework Plan
for ICTs in Basic Education was
developed
11. • Content and Application development through the
Open Content in Education Initiative (OCEI) which
converts DepED materials into interactive
multimedia content, develop applications used in
schools, and conduct students and teachers
competition to promote the development of
education-related content
12. • PheDNET, is a “walled” garden that hosts
educational learning and teaching materials and
application for use by Filipino students, their
parents and teachers. All public high schools will
be part of this network with only DepED approved
multimedia applications, materials and mirrored
Internet sites accessible from school’s PCs.
14. •eQuality Program for tertiary education
through partnerships with the state
universities and colleges (SUCs) to
improve quality of IT education and the
use of ICT in education in the country,
particularly outside of Metro Manila
15. • Digital Media Arts Program which builds media
skills for government using Open Source
technologies, particular beneficiary agencies
include the Philippine Information Agency and
the other government media organizations, the
Cultural Center of the Philippines, National
Commission for Culture and Arts and other
agencies, SUCs and local government units
16. •ICT skills strategic plan which
develops an interagency approach
tio identifying strategic and policy
and program recommendations to
address ICT skills demand-supply
type
17. •All the seven programs were guided by
the roadmap that embeds policy
statements and relate to education
specifically in the enhancement of
human development for teaching and
learning
19. Global Issues
• Access and civil liberties are two sets of issues in ICT policy
which are crucial to the moderns society. The other concern
is civil liberties which refer to human rights and freedom
• These includes
1. Freedom of Expression
2. The right to privacy
3. The right to communicate
4. Intellectual property rights
20. ISSUE NO.1:FREEDOM OF EXPRESSION AND
CENCORSHIP
• Under international human rights conventions, all
people are guaranteed the right for free
expression, However, with the shift from
communicating through letter, newspaper and
public meetings to electronic communications
and online networking, a need to look into how
these new means modifies the understanding of
freedom of expression and censorship
21. •The UN Universal Declaration of Human
Rights provides that everyone has the
right to freedom of thought,
conscience, and religion, likewise the
right to freedom of opinion and
expression
22. • Censorship restricts the transmission of information by
blocking it or filtering the information . Blocking is
preventing access to whole areas of Internet based upon the
“blacklist” of certain Internet address, location, or email
addresses while filtering is sitting the packets of data or
messages as they move across computer networks and
eliminating those considered “undesirable” materials.
• The selection of sites that are blocked or filtered has been
considered as an issue
23. WARNING!!
• “When you are surfing the web, you may
think you are anonymous, but there are
various ways that information about you
or your activities can be collected without
your consent”
25. •Defamation actions may be
use to silence critics. This
action deters the freedom of
expression
26. •Privacy policies are an issue. Most
commercial sites have a privacy policy.
When someone uses a site and clicks “I
agree” button, it is as if you have turned
over private information to any authority
that may access it
27. THERE ARE TYPES OF PRIVACY AS SHOWN
BY THE FOLLOWING EXAMPLES
•For most, privacy means “personal
privacy” the right of individuals not
to have their home, private life or
personal life interfered with
28. •Privacy of communication refers to the
protection from interference with
communication over the phone or internet.
Respect of privacy communications is an
essential prerequisite for the maintenance
of human relationship via technological
communication media
29. • Information privacy is related to the use of
computers and communications system which are
able to hold and process information about large
numbers of people at a high speed. It is
important to ensure that information will only be
used for purposes for which it was gathered and
will not be disclosed to others without consent of
the individuals.
31. • The use of electronic communications has
enhanced the development of indirect
surveillance
• In the direct surveillance, there is no direct
contact between the agent and the subject of
surveillance but the evidence of activities can be
traced
32. •The new and powerful form of indirect
surveillance is detaveillance. It is the
use of personal information to monitor
a person’s activities while data
retention is the storage and use of
information from communication
system
33. REMINDER!!
• There is very little that can be done to prevent
surveillance. What can be done is to make
surveillance difficult. This is called “counter
surveillance” or “information security” if it
refers to computer and electronic
communication
35. •Large amount of e-waste is generated by
ICT. These are in particular, terminal
equipment used for computing (PCs,
laptops), broadcasting (television and radio
sets), telephony (fixed mobile phones), and
peripherals (fax machines, printers,
scanner)
36. •The accumulated e-waste is due to
rapid turnover of equipment of
software. While material waste can be
destroyed by crushing, toxic materials
brought about by different equipment
requires utmost management
37. • Remedies include standardization and regulatory
measures to incres the life cycle of equipment before
they become obsolete. Efficient extraction of toxic
components and requiring the recycling of both
consumers and equipment vendors are selling must be
required
• If not controlled then, e-waste will tremendously affect
climate change, damage human lives, and overload the
capacity of the earth carrying solid waste
38. IMPLICATION TO TEACHING AND LEARNING
•How do the policy guidelines, projects and
issues relate to the teaching and learning?
39. FOR THE TEACHERS AND TEACHING
•Guide the teachers on what they should
teach that relate to ICT, and how to teach it
•Technology should never replace any human
teacher
40. •There are rules and regulations that govern
the use of technology. Caution should
observed to protect individual policy
•All the issues and many more shall be part
of the teaching content as each teacher will
be encouraged to use techonology in
teaching
41. FOR THE LEARNERS AND LEARNING
•The learners of the 21st century are
even more advanced that some of
the teachers. However, learners still
need guidance on how to use and
regulate technology use.
43. SOME RISKS IN THE USE OF ICT AND E-
NETWORKING
• Exposure to inappropriate content, including on-
line pornography, extremism (exposure to vilence
associated with racist language)
• Lifestyle websites like self-harms and suicide
sites and hates sites
• Cyber-bullying in all forms, receiving sexually
explicit images or messages
44. • Privacy issues including disclosure of personal
information
• Health and well being (among of time spent on-
line, internet gaming and many more)
• Prolonged exposure to on-line technologies,
particularly at an early age
• Addiction to gambling and gaming
45. •Theft and fraud from activities such as
phishing
•Viruses , Trojans, spyware and other
malware: and
•Social pressure to maintain online
networksvia texting and social networking
sites
46. MINOR MISUSE OF ICT
• In school, some minor misuse made by learners:
• Copying information into assignment and failing to
acknowledge the source (plagiarism and copy right
infringment)
• Downloading material not relevant to their studies
• Misconduct associated with subject logins, such as
someone else’s password
47. •Leaving a mobile phone turned on
during class period
•Unauthorized taking of pictures or
images with mobile phone camera, still
or moving
48. e-Safety
•Take care not only of internet
technologies but also electronic
communications via mobile phones,
games consoles and wireless technology
49. E-Safety Tips
• People you don’t know are strangers. They’re not
always who they say they are
• Be nice to people like you would on the
playground
• Keep your personal information private
• If you ever get that “uh oh” feeling, tell a grown-
up you trust
50. Some Issues of e-Safety
• e-Safety helps safeguard children and young people in
the digital world
• e-Safety emphasizes learning to understand and new
technologies in a positive ways
• e-Safety educates children about the risks as well as the
benefits so we can feel confident online
• e-Safety supports young learners and adults to develop
safer online behaviours, both in and out of school
51. NETWORK MANAGEMENT
1. Safety in the use of network in schools
• Make clear that no one should log on as another user
• Require all users to always log off when they have
finish working
• Maintain equipment to ensure health and safety
• Provide students with access to content and resource
through guided e-learning
52. • Set up clear disaster recovery system in place for critical
data that include secure remote back up of critical data
• Secure wireless network to appropriate standards
suitable for educational use
• Install all computer equipment professionally and meet
health and safety standards
• Review the school ICT system regularly with regard to
health and safety and security
53. 2. Password Policy
• Only authorized users will have individual
passwords
3. Personal mobile phones and mobile devices
• All mobile phones shall be kept away in a box
from the learners and access is only allowed at
breaktime or at the end of class or when needed
during the class period
54. 4. Cameras
• Taking pictures only parents or caregivers and not
from any other family members or friend while
the child attends class
• Any pictures taken of children shall be on
cameras solely for the purpose
55. Setting Up an Educational Technology Room
1. Provide tiltable tables
2. Provide anti-glare screen filters
3. Provide adjustable chairs
4. Provide foot support
5. Make sure lighting is suitable
6. Make sure work station are not cramped
7. Plan work at a computers so that there are frequent
breaks
56. More specifically safety rules that can reduce
risk of accidents in the working stations should
include:
1. No trailing wires across or arounf the room while
people can trip
2. Electrical sockets should not be overload
3. Electrical equipment should be safety-tested at least
once a year
4. There should be adequate space around desk for people
to move
5. Bags and obstacles should be stored out of the way
57. 6. Foods and drinks should not be placed near a
machines
7. Heating and ventilation should be suitable for
the working environment
8. Fire extinguishers should be available
9. Fire exits should be clearly marked and free
from clutter