SlideShare a Scribd company logo
Lesson 2: Safety
Issues on the Use of
ICT including
e-Safety Rules
Reporter: Zaide A. Mangondato
EDUC 3
Technology for Teaching and Learning 1
GROUP 2:
Identified and explained safety issues on the use of ICT
01
02
Lesson Outcomes
Listed and applied e-safety rules in the use of ICT
INTRODUCTION
Using technology is not a risk by itself, but how it
is used will be vulnerable to risks. When
improperly used, it will pose danger to the users
in school and at home.
Some risks in the Use of ICT and e-Networking
1. Exposure to inappropriate content, including online pornography and extremism
(racist language)
2. Lifestyle website like self-harms and suicide sites, and hate sites
3. Cyber-bullying in all forms, receiving sexually explicit images or messages
4. Privacy issues including disclosure of personal information
5. Health and well being (amount of time spent online, internet gaming and etc.)
6. Prolonged exposure to online technologies, particularly at an early age
7. Addiction to gambling and gaming
8. Theft and fraud from activities such as phishing
9. Viruses, Trojans, spyware and other malware
10. Social pressure to maintain online networks via texting and social networking sites
Minor Misuse of ICT
In school, some minor misuse made by learners including the following
• Copying Information into assignment and failing to acknowledge the source
(plagiarism and copyright infringement)
• Downloading materials not relevant to their studies
• Misconduct associated with subject logins, such as using someone else’s password
• Leaving a mobile phone turned on during class period
• Unauthorized taking of pictures or images with mobile phone camera still or moving
e-Safety
e-Safety
• A rule that is trying to be safe on the internet.
• Is the act of maximizing a user’s awareness of personal safety and security risks to
private information and property associated with using the internet, and the self-
protection from computer crime.
• Takes care not only of internet technologies but also of electronic communications
via mobile phones, game consoles and wireless technology. It highlights the need to
educate children and young people about the benefits, risks and responsibilities of
using information technology.
Here are some issues of e-safety
 e-safety helps safeguard children and young people in the digital world.
 e-safety emphasizes learning to understand new technologies in a positive way.
 e-safety educates children about the risks as well as the benefits so we can feel
confident online
 e-safety supports young learners and adults to develop safer online behaviours both
in and out of school.
Network Management
• is the process of administering and
managing computer networks
• It covers the procedures, methods,
and tools need to effectively operate,
administrate, and maintain networks.
Network Management
Safety in the Use of Network in Schools
1. Make clear that no one should log on as another user
2. Require all users to always log off when they have finished working.
3. Maintain equipment to ensure health and safety
4. Provide students with access to content and resources through guided e-learning.
5. Set up a clear disaster recovery system in place for critical data that include secure,
remote backup of critical data.
6. Secure wireless network appropriate standards suitable for educational use
7. Install all computer equipment professionally and meet health and safety standards.
8. Review the school ICT system regularly with regard to health and safety and
security.
Network Management
Password Policy
1. Only authorized users will have individual passwords. Users are not permitted to
disclose their password unless they got permission from the owner or from the
management. The equipment that keeps the personal information shall be locked
when unattended to prevent unauthorized access.
2. Computers should be set to a time out if they become unused for a certain period of
time.
Personal mobile phones and mobile devices
1. All mobile phones shall be kept away in a box away from the children or learners
and access is only allowed at break time or at the end of classes or when needed
during the class period.
Network Management
Cameras
1. Taking pictures only from parents or caregivers and not from any other family
member or friend while the child attends class.
2. Any picture taken of children shall be on cameras solely for the purpose.
Setting up an Educational Technology Room
Basic safety rules:
1. Provide tiltable tables. These tables can be tilted and adjustable to height of the
users.
2. Provide anti-glare screen filters.
3. Provide adjustable chairs
4. Provide foot support
5. Make sure lighting is suitable
6. Make sure work stations are not cramped
7. Plan work at a computer so that there are
frequent breaks
More specifically safety rules that can be reduce risk of accidents
in the networking stations should include:
1. No trailing wires across or around the room which people can trip on
2. Electrical sockets should not be overloaded
3. Electrical equipment should be safety-tested at least once a year
4. There should be adequate space around desk for people to move
5. Bags and obstacles should be stored out of the way
6. Food and drinks should not be placed near machines
7. Heating and ventilation should be suitable for the working environment
8. Fire extinguishers should be available
9. Fire exits should be clearly marked and free from clutter.
End

More Related Content

What's hot

Understanding the basic concepts in ict
Understanding the basic concepts in ictUnderstanding the basic concepts in ict
Understanding the basic concepts in ict
MelchorArestaBaniaga1
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
JannahAboulhassan
 
Understanding the Basic Concept in ICT
Understanding the Basic Concept in ICTUnderstanding the Basic Concept in ICT
Understanding the Basic Concept in ICT
Bai Saguira Abdulah-Malik
 
Module 2 lesson 2
Module 2 lesson 2Module 2 lesson 2
Module 2 lesson 2
Ira Sagu
 
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
Andrew Duckworth
 
educ 103
educ 103educ 103
educ 103
TessiaEralith1
 
Creating ePortfolio as a Technology Tool
Creating ePortfolio as a Technology ToolCreating ePortfolio as a Technology Tool
Creating ePortfolio as a Technology Tool
Ira Sagu
 
Understanding hypermedia
Understanding hypermediaUnderstanding hypermedia
Understanding hypermedia
William Inte
 
Online resources, educational sites, and portals
Online resources, educational sites, and portalsOnline resources, educational sites, and portals
Online resources, educational sites, and portals
erwin marlon sario
 
Digital literacy skills in the 21 st century
Digital literacy skills in the 21 st centuryDigital literacy skills in the 21 st century
Digital literacy skills in the 21 st century
erwin marlon sario
 
Evaluating Educational Technology
Evaluating Educational TechnologyEvaluating Educational Technology
Evaluating Educational Technology
Chano Alfornon
 
Computer system servicing
Computer system servicingComputer system servicing
Computer system servicing
Lindyl Geral
 
The 9 elements of digital citizenship
The 9 elements of digital citizenshipThe 9 elements of digital citizenship
The 9 elements of digital citizenship
JimPowers
 
Digital Citizenship vs Global Citizenship
Digital Citizenship vs Global CitizenshipDigital Citizenship vs Global Citizenship
Digital Citizenship vs Global Citizenship
Ira Sagu
 
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Reji Mae Sunot
 
Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptxLesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
Jermaine Mendoza
 
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenship
monazarrinkelk
 
Module 1 lesson 2- Understanding the Basic Concept in ICT
Module 1 lesson 2- Understanding the Basic Concept in ICTModule 1 lesson 2- Understanding the Basic Concept in ICT
Module 1 lesson 2- Understanding the Basic Concept in ICT
Ira Sagu
 
Module 1 lesson 3 - Role of Technology for teaching and learning
Module 1 lesson 3 - Role of Technology for teaching and learningModule 1 lesson 3 - Role of Technology for teaching and learning
Module 1 lesson 3 - Role of Technology for teaching and learning
Ira Sagu
 
Lesson 16 The internet and the education
Lesson 16 The internet and the educationLesson 16 The internet and the education
Lesson 16 The internet and the education
Marian Jose
 

What's hot (20)

Understanding the basic concepts in ict
Understanding the basic concepts in ictUnderstanding the basic concepts in ict
Understanding the basic concepts in ict
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
Understanding the Basic Concept in ICT
Understanding the Basic Concept in ICTUnderstanding the Basic Concept in ICT
Understanding the Basic Concept in ICT
 
Module 2 lesson 2
Module 2 lesson 2Module 2 lesson 2
Module 2 lesson 2
 
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
 
educ 103
educ 103educ 103
educ 103
 
Creating ePortfolio as a Technology Tool
Creating ePortfolio as a Technology ToolCreating ePortfolio as a Technology Tool
Creating ePortfolio as a Technology Tool
 
Understanding hypermedia
Understanding hypermediaUnderstanding hypermedia
Understanding hypermedia
 
Online resources, educational sites, and portals
Online resources, educational sites, and portalsOnline resources, educational sites, and portals
Online resources, educational sites, and portals
 
Digital literacy skills in the 21 st century
Digital literacy skills in the 21 st centuryDigital literacy skills in the 21 st century
Digital literacy skills in the 21 st century
 
Evaluating Educational Technology
Evaluating Educational TechnologyEvaluating Educational Technology
Evaluating Educational Technology
 
Computer system servicing
Computer system servicingComputer system servicing
Computer system servicing
 
The 9 elements of digital citizenship
The 9 elements of digital citizenshipThe 9 elements of digital citizenship
The 9 elements of digital citizenship
 
Digital Citizenship vs Global Citizenship
Digital Citizenship vs Global CitizenshipDigital Citizenship vs Global Citizenship
Digital Citizenship vs Global Citizenship
 
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
 
Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptxLesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
 
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenship
 
Module 1 lesson 2- Understanding the Basic Concept in ICT
Module 1 lesson 2- Understanding the Basic Concept in ICTModule 1 lesson 2- Understanding the Basic Concept in ICT
Module 1 lesson 2- Understanding the Basic Concept in ICT
 
Module 1 lesson 3 - Role of Technology for teaching and learning
Module 1 lesson 3 - Role of Technology for teaching and learningModule 1 lesson 3 - Role of Technology for teaching and learning
Module 1 lesson 3 - Role of Technology for teaching and learning
 
Lesson 16 The internet and the education
Lesson 16 The internet and the educationLesson 16 The internet and the education
Lesson 16 The internet and the education
 

Similar to Safety Issues on the Use of ICT including e-Safety Rules.pptx

JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JovenLopez1
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JovenLopez1
 
Prof Ed 10- Lesson 5.pptx
Prof Ed 10- Lesson 5.pptxProf Ed 10- Lesson 5.pptx
Prof Ed 10- Lesson 5.pptx
JumairaSharief
 
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JovenLopez1
 
SAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docxSAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docx
JanetLipataPajuelas
 
university-digital-choice-boards (1) (1).pptx
university-digital-choice-boards (1) (1).pptxuniversity-digital-choice-boards (1) (1).pptx
university-digital-choice-boards (1) (1).pptx
EdrelynCentino1
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
bwcelearning
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
Point2Protect
 
8._safety_and_security.pdf
8._safety_and_security.pdf8._safety_and_security.pdf
8._safety_and_security.pdf
sula rekah govindan
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
John Oxley
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet Safety
Charina Mostierra
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
Dré Davis
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
Angie Simmons
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy done
kgrosvenor
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2
guest594ea
 
Ict Issues
Ict IssuesIct Issues
Ict Issues
guesta44455
 
Social media policy
Social media policySocial media policy
Social media policy
Har1982
 
Tec207 -final presentation teaching online safety
Tec207 -final presentation teaching online safetyTec207 -final presentation teaching online safety
Tec207 -final presentation teaching online safety
Sarah Sell
 
Nigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crimeNigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crime
Remmy Nweke, mNGE, mNUJ, mGOCOP
 

Similar to Safety Issues on the Use of ICT including e-Safety Rules.pptx (20)

JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
Prof Ed 10- Lesson 5.pptx
Prof Ed 10- Lesson 5.pptxProf Ed 10- Lesson 5.pptx
Prof Ed 10- Lesson 5.pptx
 
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
 
SAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docxSAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docx
 
university-digital-choice-boards (1) (1).pptx
university-digital-choice-boards (1) (1).pptxuniversity-digital-choice-boards (1) (1).pptx
university-digital-choice-boards (1) (1).pptx
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
8._safety_and_security.pdf
8._safety_and_security.pdf8._safety_and_security.pdf
8._safety_and_security.pdf
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet Safety
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy done
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2
 
Ict Issues
Ict IssuesIct Issues
Ict Issues
 
Social media policy
Social media policySocial media policy
Social media policy
 
Tec207 -final presentation teaching online safety
Tec207 -final presentation teaching online safetyTec207 -final presentation teaching online safety
Tec207 -final presentation teaching online safety
 
Nigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crimeNigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crime
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 

Safety Issues on the Use of ICT including e-Safety Rules.pptx

  • 1.
  • 2. Lesson 2: Safety Issues on the Use of ICT including e-Safety Rules Reporter: Zaide A. Mangondato EDUC 3 Technology for Teaching and Learning 1 GROUP 2:
  • 3. Identified and explained safety issues on the use of ICT 01 02 Lesson Outcomes Listed and applied e-safety rules in the use of ICT
  • 4. INTRODUCTION Using technology is not a risk by itself, but how it is used will be vulnerable to risks. When improperly used, it will pose danger to the users in school and at home.
  • 5. Some risks in the Use of ICT and e-Networking 1. Exposure to inappropriate content, including online pornography and extremism (racist language) 2. Lifestyle website like self-harms and suicide sites, and hate sites 3. Cyber-bullying in all forms, receiving sexually explicit images or messages 4. Privacy issues including disclosure of personal information 5. Health and well being (amount of time spent online, internet gaming and etc.) 6. Prolonged exposure to online technologies, particularly at an early age 7. Addiction to gambling and gaming 8. Theft and fraud from activities such as phishing 9. Viruses, Trojans, spyware and other malware 10. Social pressure to maintain online networks via texting and social networking sites
  • 6. Minor Misuse of ICT In school, some minor misuse made by learners including the following • Copying Information into assignment and failing to acknowledge the source (plagiarism and copyright infringement) • Downloading materials not relevant to their studies • Misconduct associated with subject logins, such as using someone else’s password • Leaving a mobile phone turned on during class period • Unauthorized taking of pictures or images with mobile phone camera still or moving
  • 8. e-Safety • A rule that is trying to be safe on the internet. • Is the act of maximizing a user’s awareness of personal safety and security risks to private information and property associated with using the internet, and the self- protection from computer crime. • Takes care not only of internet technologies but also of electronic communications via mobile phones, game consoles and wireless technology. It highlights the need to educate children and young people about the benefits, risks and responsibilities of using information technology.
  • 9. Here are some issues of e-safety  e-safety helps safeguard children and young people in the digital world.  e-safety emphasizes learning to understand new technologies in a positive way.  e-safety educates children about the risks as well as the benefits so we can feel confident online  e-safety supports young learners and adults to develop safer online behaviours both in and out of school.
  • 10. Network Management • is the process of administering and managing computer networks • It covers the procedures, methods, and tools need to effectively operate, administrate, and maintain networks.
  • 11. Network Management Safety in the Use of Network in Schools 1. Make clear that no one should log on as another user 2. Require all users to always log off when they have finished working. 3. Maintain equipment to ensure health and safety 4. Provide students with access to content and resources through guided e-learning. 5. Set up a clear disaster recovery system in place for critical data that include secure, remote backup of critical data. 6. Secure wireless network appropriate standards suitable for educational use 7. Install all computer equipment professionally and meet health and safety standards. 8. Review the school ICT system regularly with regard to health and safety and security.
  • 12. Network Management Password Policy 1. Only authorized users will have individual passwords. Users are not permitted to disclose their password unless they got permission from the owner or from the management. The equipment that keeps the personal information shall be locked when unattended to prevent unauthorized access. 2. Computers should be set to a time out if they become unused for a certain period of time. Personal mobile phones and mobile devices 1. All mobile phones shall be kept away in a box away from the children or learners and access is only allowed at break time or at the end of classes or when needed during the class period.
  • 13. Network Management Cameras 1. Taking pictures only from parents or caregivers and not from any other family member or friend while the child attends class. 2. Any picture taken of children shall be on cameras solely for the purpose.
  • 14. Setting up an Educational Technology Room Basic safety rules: 1. Provide tiltable tables. These tables can be tilted and adjustable to height of the users. 2. Provide anti-glare screen filters. 3. Provide adjustable chairs 4. Provide foot support 5. Make sure lighting is suitable 6. Make sure work stations are not cramped 7. Plan work at a computer so that there are frequent breaks
  • 15. More specifically safety rules that can be reduce risk of accidents in the networking stations should include: 1. No trailing wires across or around the room which people can trip on 2. Electrical sockets should not be overloaded 3. Electrical equipment should be safety-tested at least once a year 4. There should be adequate space around desk for people to move 5. Bags and obstacles should be stored out of the way 6. Food and drinks should not be placed near machines 7. Heating and ventilation should be suitable for the working environment 8. Fire extinguishers should be available 9. Fire exits should be clearly marked and free from clutter.
  • 16. End