0% found this document useful (0 votes)
667 views10 pages

ICT Policies and Safety Issues in Teaching and Learning & Uses of ICT Policies in The Teaching and Learning Environment Module Overview

This document discusses ICT policies and safety issues related to teaching and learning. It outlines national ICT policies in the Philippines that guide classroom practices, including a roadmap from the Department of Information and Communication Technology. The document also discusses issues regarding access, civil liberties, privacy, security, surveillance, and e-waste as they relate to ICT policies and regulations.

Uploaded by

June Di
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
667 views10 pages

ICT Policies and Safety Issues in Teaching and Learning & Uses of ICT Policies in The Teaching and Learning Environment Module Overview

This document discusses ICT policies and safety issues related to teaching and learning. It outlines national ICT policies in the Philippines that guide classroom practices, including a roadmap from the Department of Information and Communication Technology. The document also discusses issues regarding access, civil liberties, privacy, security, surveillance, and e-waste as they relate to ICT policies and regulations.

Uploaded by

June Di
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

ICT Policies and Safety Issues in Teaching and Learning & Uses of ICT Policies in the Teaching

and Learning Environment

MODULE OVERVIEW

Do you panic when you reach into our pockets or bags and realized that our mobile phone is not
there? If yes, then you are experiencing nomophobia – ‘no-mobile phobia’ – the fear or being
without, or losing, your mobile phone (Norton_Team, 2015). This is just one of the indications
that new technologies have become an integral part of everyone's lives.

We use ICT when we talk on the phone, send an email, go to the library, watch television news,
go to the doctor, catch a flight, or watch a movie. In the modern world, new technologies have an
impact on almost everything we do.

Will new technologies affect our lives as educators? Should we let technology control our lives, or should
we have control over how technology is used in our lives? This module will address safety concerns as
well as how they will be addressed through ICT policies – their application and implications for teaching
and learning.

LEARNING OUTCOMES

1. enumerate the national ICT policies affecting classroom practices;


2. describe the implementation of ICT policies in teaching-learning; and
3. identify ICT policies that are incorporated to the design and implementation of teaching

Be Acquainted

DICT Roadmap

The Department of Information and Communication Technology (DICT) in our country has
developed a roadmap to guide all agencies in the utilization, regulation, and enhancement of ICT.
Each project has its own set of policy statements and guidelines.

The ICT for Education (ICT4E) is a DICT program that supports all educational sector efforts to
incorporate the use of ICT as well as determining and gaining access to the infrastructure (hardware,
software, telecommunications facilities, and others) required to use and deploy learning technologies
at all levels of education.

The following are among the policy recommended programs which are applicable to teaching and
learning:

1. ICT in education Masterplan for all levels, including a National Roadmap for faculty
Development in ICT in Education. A National Framework Plan for ICTs in Basic Education was
developed.
2. Content and application development through the Open Content in Education Initiative
(OCEI) which converts DepEd materials into interactive multi-media content, develop
applications used in schools, and conduct students and teachers’ competitions to promote the
development of education-related web content.
3. PhedNET is a “walled” garden that hosts educational learning and teaching materials and
applications for use by the Filipino students, their parents and teachers. All public high schools
will be part of this network with only DepEd-approved multi-media applications, materials and
mirrored internet sites accessible from school’s PCs.
4. Established Community eLearning Centers called eskwela for out-of-school youth (OSY)
providing them with ICT-enhanced alternative education opportunities.
5. eQuality Program for Tertiary education through partnerships with state universities and
colleges (SUCs) to improve quality of IT education and the use of ICT in education in the
country, particularly outside of Metro Manila.
6. Digital Media Arts Program which builds digital media skills for government using Open
Source technologies. Particular beneficiary agencies include the Philippine Information Agency
and the other government media organizations, the Cultural Center of the Philippines, National
Commission for Culture and Arts and other government art agencies, State Universities and
Colleges and other local government units.
7. ICT skills strategic plan which develops an inter-agency approach to identifying strategic and
policy and program recommendations to address ICT skills demand-supply type.

All the seven programs were guided by the roadmap that embeds policy statements that relate to
education specifically in the enhancement of human development for teaching and learning.

Some Issues on ICT and Internet Policy and Regulations

● Global Issues

Two sets of issues in ICT Policies which are crucial in today’s society are Access and Civil Liberties.

Access of the Use of Internet and ICT. Access means the possibility for everyone to use the internet and
other media. Everyone should have access to the internet and other forms of media. With faster
broadband connections, basic internet access is almost universal in richer countries. There are
still countries where access to the internet is difficult.

Civil liberties refer to human rights and freedom which include freedom of expression, the right to
privacy, the right to communicate and intellectual property rights.

Issue No 1: Freedom of Expression and Censorship

(Paraphrased)

All people are guaranteed the right to free expression under international human rights
conventions. However, with the shift from letter-writing, newspapers, and public meetings to
electronic communications and online networking, there is a need to investigate how these new
means alter our understanding of freedom of expression and censorship.
According to the United Nations Universal Declaration of Human Rights, everyone has the right
to freedom of thought, conscience, and religion, as well as the right to freedom of opinion and
expression. However, there are practices on the internet that violate these provisions.

Some examples are the following:

1. Individual rights are given up in order to have access to electronic networks. Microsoft Network’s
(MSN) contracts provide protection of individuals. However, Microsoft reserves the rights, in its
sole direction, to terminate access to any or all MSN sites or services.
2. Censorship restricts the transmission of information by blocking it or filtering the information.
Blocking is preventing access to whole areas of internet based upon the “blacklist” of certain
Internet address, location or email addresses while filtering is sifting the packets of data or
messages as they move across computer networks and eliminating those considered “undesirable”
materials.
3. Defamation actions may be used to silence critics. This action deters the freedom of expression.

Issue No. 2: Privacy and Security

Privacy policies are a concern. Most commercial websites have a privacy statement. When you use a
website and click "I agree," you are essentially handing over private information to any authority that may
have access to it.

The following examples demonstrate various types of privacy:

Most people define privacy as "personal privacy," or the right of individuals not to have their home,
private life, or personal life invaded.

Communication privacy refers to the protection from interception when communicating over the phone or
the internet. Respect for communication privacy is a necessary prerequisite for the maintenance of human
relationships via technological communication media.

The use of computers and communication systems capable of storing and processing information about
large numbers of people at high speeds is associated with information privacy. It is critical to ensure that
information is only used for the purposes for which it was collected and that it is not disclosed to others
without the individuals' consent.

Issue No. 3: Surveillance and Data Retention

As there is no direct contact between the agent and the subject of surveillance when electronic
communication is used, it doesn't mean that evidence of activities cannot be traced. Dataveillance is a
new and powerful form of indirect surveillance. Dataveillance is the monitoring of a person's activities
using personal information, whereas data retention is the storage and use of information from a
communication system.

There isn't much that can be done to avoid surveillance. What can be done is to change working methods
to make surveillance more difficult. If computers and electronic communication are involved, this is
referred to as "counter surveillance" or "information security."

Issue No. 4: E-pollutants from E-waste


ICT generates a significant amount of e-waste. These are terminal devices used for computing (PCs and
laptops), broadcasting (television and radio sets), telephony (fixed and mobile phones), and peripherals
(fax machines, printers, and scanners).

The accumulated e-waste is the result of rapid equipment turnover due to rapid software improvement.
While material waste can be destroyed by crushing, toxic material produced by various equipment
requires careful management.

E-waste production is increasing in both developed and developing countries. A particularly bleak
situation is that a significant amount of electronic waste has been shipped from industrial countries to
developing countries using less environmentally responsible methods.

Implications to Teaching and Learning

There are great implications of this lesson to both the teachers who are teaching and the learners who are
learning. A few of these are as follows:

This lesson has significant implications for both teachers and learners. Let us discuss few of these
implications.

For the Teachers and Teaching

1. Guide the teachers on what they should teach that relate to ICT, and how to teach it. Since ICT
development comes so rapid and fast, teachers might be overwhelmed by its rapid speed.
Temperance in its use is a caution that should be looked at.
2. Technology should never replace any human teacher. The tools are support instructional materials
for the teachers which are available for use. The teacher should learn how to appropriately use
them. The human touch of the teacher is still a vital component in teaching. Teachers should
always be reminded that there are always limitations in the use of the different gadget and tools.
3. There are rules and regulations that govern the use of technology. Caution should be observed to
protect individual privacy. As teachers, you must be aware that the use of technology may
jeopardize your privacy and security.
4. All the issues and many more shall be part of the teaching content as each teacher will be
encouraged to use technology in teaching.

For the Learners and Learning

The learners of the 21st Century are even more advanced than some of the teachers. However, learners
still need guidance on how to use, regulate technology use. As there are positive and negative effects of
technology use, learners should know the difference. Learners should not only know the benefits of
technology use, but they should also know how they can be protected from the hazards that technology
brings to their lives.

Learners should take advantage of the potential of learning support they can derive such as the
development of higher order thinking skills, the development of learning communities through
collaboration, the enhancement of skills to manage the valid resources as 21st century learners and many
more. Both teachers and learners should be mindful of the e-waste that are being thrown away to the land
and to the atmosphere.
The students of the twenty-first century are even more advanced than some of their teachers.
However, students still require guidance on how to use and regulate technology. Because there
are both positive and negative effects of technology use, students should understand the
distinction. Learners should understand not only the benefits of using technology, but also how
to protect themselves from the dangers that technology can bring into their lives. According to
Bickham, et al (n. d.), "equipment means nothing unless teachers and other ICT professionals
within school districts can productively use it to supplement teaching. "

Learners should take advantage of the potential learning support they can obtain, such as the
development of higher order thinking skills, the development of learning communities through
collaboration, the enhancement of skills to manage valid resources as 21st century learners, and
many other benefits. The teachers should not only be the one who is mindful of the e-waste that are
being thrown away to the land and to the atmosphere but also the learners.

Safety Issues on the Use of ICT

Technology is a phenomenon that seems to be uncontrollable. Despite the so many benefits for teaching
and learning, there are also negative effects or influence on the learners. Hence as future teachers, you
have to be aware of how to safeguard learners in the school communities where they spend most of their
waking hours and also in their homes or facilities that provide opportunities to use digital technologies
like Internet Cafes. Safeguard and protection should be the primordial role of parents, teachers and
schools. There are so many risks that we have to be aware of in the use of digital technologies. These may
include the following:

Technology appears to be an uncontrollable phenomenon. Despite the numerous benefits to


teaching and learning, there are some negative effects or influences on students. As a result, as
future teachers, you must be aware of how to protect students in school communities, where they
spend the majority of their waking hours, as well as in their homes or facilities that provide
opportunities to use digital technologies, such as Internet Cafes. Parents, teachers, and schools
should prioritize safeguarding and protection. There are numerous dangers to be aware of when
using digital technologies. The following are examples:

1. Exposure to inappropriate content, including on-line pornography, extremism (exposure to


violence associated with racist language);
2. Lifestyle websites like self-harms and suicide sites, and hate sites;
3. Cyber-bullying in all forms, receiving sexually explicit images or messages;
4. Privacy issues including disclosure of personal information;
5. Health and well being (amount of time spent on-line, internet gaming and many more;
6. Prolonged exposure to on-line technologies, particularly at an early age;
7. Addiction to gambling and gaming;
8. Theft and fraud from activities such as phishing;
9. Viruses, Trojans, spyware and other malware; and
10. Social pressures to maintain online networks via texting and social networking sites.
1. Extremism (exposure to violence associated with racist language); exposure to inappropriate content,
including online pornography;

2.

Self-harm and suicide websites, as well as hate sites, are examples of lifestyle websites.

3.

Cyberbullying in all its forms, as well as receiving sexually explicit images or messages;

4.

Concerns about privacy, including the disclosure of personal information

5.

Health and well-being (amount of time spent on the internet, internet gaming, and so on;

6. Prolonged exposure to online technologies, especially at a young age;

7. Gambling and gaming addiction;

8. Theft and fraud from phishing activities;

9. Viruses, Trojans, spyware, and other malicious software; and

10. Social pressures to keep online networks active through texting and social networking sites. 10. Social
pressures to keep online networks active through texting and social networking sites.

Minor Misuse of ICT

Some minor misuse of ICT committed by learners:

 Copying information into assignment and failing to acknowledge the source (plagiarism and

copyright infringement)

 Downloading materials not relevant to their studies


 Misconduct associated with subject logins, such as using someone else’s password
 Leaving a mobile phone turned on during class period
 Unauthorized taking of pictures or images with mobile phone camera, still or moving

Some examples of minor ICT misuse by students:


• Pasting information into an assignment without citing the source (plagiarism and plagiarism).

infringement on intellectual property)

• Downloading materials that are unrelated to their studies

• Misconduct associated with subject logins, such as using someone else’s password

• Leaving a cell phone turned on during class

• Unauthorized use of a mobile phone camera to take pictures or images, either still or moving

E-Safety Rules

What is e-safety? The term can also be called ‘internet safety’, ‘online safety’ or ‘web safety’. E-safety is often
defined as the safe and responsible use of technology. This includes the use of the internet and also other
means of communication using electronic media (eg text messages, gaming devices, email etc) (Safeguarding
Essentials, 2015).

As teachers, it is essential to teach students few essential cyber life skills. Here’s a list of skills that
not only children but also adults should know.
Never leave your device unattended
Click with caution
Whether subtle or bold, phishing is dangerous. One careless click is all it takes for malicious
software to get into devices and wreak havoc. 
Never ever share your password
Be a good online citizen
Remember, the Internet is forever. So anything said online stays online. Nothing really gets
deleted, not even on Snapchat. 

Network Management

1. Safety in the Use of Network in Schools

Make clear that no one should log on as another user.


Require all users to always log off when they have finished working.
Maintain equipment to ensure health and safety.
Provide students with access to content and resources through guided e-learning.

5. 1.5  Set up a clear disaster recovery system in place for critical data that include secure, remote
back up of critical data.
6. 1.6  Secure wireless network to appropriate standards suitable for educational use.
7. 1.7  Install all computer equipment professionally and meet health and safety and security.
2. Password Policy
2.1 Only authorized users will have individual passwords. Users are not permitted to disclose

their passwords unless they got permission from the owner or from the management. The equipment that
keeps the personal information shall be locked when unattended to prevent unauthorized access.

Computers should be set to a time out if they become unused for a certain period of time.

3. Personal mobile phones and mobile devices


3.1 All mobile phones shall be kept away in a box away from the children or learners and access
is only allowed at breaktime or at the end of the classes or when needed during the class period.
4. Cameras
1. 4.1  Taking pictures only from parents or caregivers and not from any other family
member or friend while the child attends class.
2. 4.2  Any picture taken of children shall be on cameras solely for the purpose.

Setting Up An Educational Technology Room

Schools planning to provide space for students to access technology for learning
should include the following basic safety rules:

Provide tables which can be tilted. These tables can be tilted or adjusted to the height of the users These
tables can be adjusted to fit the user's height.

Aside from tables which can be tilted or adjusted, anti-glare screen filters, adjustable chairs, and foot
support should also be provided.

Make sure that lighting is suitable and work stations are not cramped or congested.

Plan work at a computer so that there are frequent breaks.

To reduce the risk of accidents in working stations, safety rules should include:

No trailing wires across or around the room which people can trip on.

Electrical sockets should not be overloaded.

Electrical equipment should be safety-tested at least once a year.

There should be adequate space around desk for people to move.

Bags and obstacles should be stored out of the way.

Food and drinks should not be placed near machines.

Heating and ventilation should be suitable for the working environment.

Fire extinguishers should be available.


Fire exits should be clearly marked and free from clutter.

EVALUATION
Directions: Create an infographic containing ICT classroom policies that may be implemented in your
future classroom. Use the space provided for your plan and design your infographic.

1. Lesson Title:
2. Concept being focused:
3. Identify bits of important information/facts/ideas for the content material.
4. Design an infographic that captures the essential information.

REFERENCES

Rubric for Infographic

Content - 50%

Appropriate details support main idea


Accurate and detailed information
Information adequately supports purpose of visual

Focus – 20%

Topic and title clear and easily identified


Main idea is clearly appropriate to topic
All illustrations complement purpose of visual

Visual Appeal – 20%

Outstanding use of color, design and space Original and unique design
Overall design is pleasing and harmonious

Grammar & Mechanics – 10%

Free of grammatical errors


Capitalization and punctuation are correct throughout. Words are legible and pertinent to topic

Books
Bernardo, A., & Gonzales, H. (2017). Educational technology 1. Rex Book Store, Inc.

Bilbao, et. al., (2019). Technology for teaching and learning 1. Lorimar Publishing.

Websites
December 2019. Module 2: Lesson 1: Policies and issues on internet and implicatrions to teaching and
learning. Blogspot.

https://jessiemaycastillo.blogspot.com/2019/12/dec.html
Safeguarding Essentials. (2015). What is e-safety? Retrieved December 10, 2020 from
https://www.e-safetysupport.com/stories/166/what-is-e-safety#.YphvJRNBzVp

Norton_Team (2015). Nomophobia – Why You Can’t Live Without Your Smartphone
https://uk.norton.com/norton-blog/2015/08/nomophobia_why_you.html#:~:text=You've
%20just%20experienced%20nomophobia,it%20goes%20everywhere%20with%20us.

Bickham, M, et al (n. d.) Learning in the 21st Century: Teaching Today’s Students on Their
Terms. Retrieved December 10, 2020 from
https://www.certiport.com/portal/common/documentlibrary/ieab_whitepaper040808.pdf

You might also like