0% found this document useful (0 votes)
119 views2 pages

Safety Issues On The Use of ICT Including e

This document outlines several safety issues related to the use of information and communication technologies (ICT) including e-safety rules. It identifies 10 main risks such as exposure to inappropriate content, cyberbullying, privacy issues, and addiction. The document also discusses minor misuse of ICT like plagiarism and unauthorized device use. It emphasizes that e-safety educates users about both risks and benefits online. Finally, it provides guidelines for networking management, password policies, device use, photography, and basic ergonomic safety rules to reduce accident risks when working with ICT.

Uploaded by

clarice
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
119 views2 pages

Safety Issues On The Use of ICT Including e

This document outlines several safety issues related to the use of information and communication technologies (ICT) including e-safety rules. It identifies 10 main risks such as exposure to inappropriate content, cyberbullying, privacy issues, and addiction. The document also discusses minor misuse of ICT like plagiarism and unauthorized device use. It emphasizes that e-safety educates users about both risks and benefits online. Finally, it provides guidelines for networking management, password policies, device use, photography, and basic ergonomic safety rules to reduce accident risks when working with ICT.

Uploaded by

clarice
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Safety Issues on the Use of ICT including e-Safety Rules

RISKS THAT WE HAVE TO BE AWARE OF IN THE USE OF DIFITAL


TECHNOLOGIES:
1. Exposure to inappropriate content, including on-line pornography, extremism,
(exposure to violence associated with racist lang.)
2. Lifestyles websites like self-harms, suicide sites, and hate sites.
3. Cyber-bullying in all forms, receiving sexually images or messages.
4. Privacy issues including disclosure of personal information.
5. Health and well-being (amount of time spent on-line, internet gaming and many
more);
6. Prolonged exposure to on-line technologies, particularly at an early age.
7. Addiction to gambling and gaming.
8. Theft and fraud from activities such as phishing.
9. Viruses, Trojans, Spyware, and other malware, and
10. Social pressure to maintain online networks via texting and social networking sites.

MINOR MISUSE OF ICT:

 Copying information into assignment and failing to acknowledge the source


(plagiarism and copying infringement)
 Downloading materials and not relevant to their studies
 Misconduct associated with subject logins, such as using someone else’s
password.
 Leaving a mobile phone turned on during class period.
 Unauthorized taking of pictures or images with mobile phone cameras still
or moving.

e-Safety:

 e-safety helps safeguard children and young people in the digital world;
 e-safety emphasizes learning to understand and new technologies in a
positive way.
 e-safety educates children about the risks as well as the benefits so we can
feel confident online; and
 e-safety supports young learners and adult to develop safer online
behaviors, both in and out of school.

NETWORKING MANAGEMENT

1. Safety in the Use of Network in Schools


1.1. Make clear that no one should log on as another user.
1.2. Require all users to always log off when they have finished working.
1.3. Maintain equipment to ensure health and safety.
1.4. Provide students with access to content and resources through
guided e-learning.
1.5. Set up a clear disaster recovery system in place for critical data that
include secure, remote back up of critical data.
1.6. Secure wireless network to appropriate standards suitable for
educational use.
1.7. Install computer equipment professionally and meet health and
safety standards.
1.8. Review the school ICT system regularly with regard to health and
safety and security.
2. Password Policy
2.1. Only authorized users will have individual passwords.
3. Personal mobile phone and mobile devices
3.1. All mobile phones shall keep away in a box away from the children
or learners and access is only allowed at breaktime or at the end of
classes or when needed during the class period.
4. Cameras
4.1. Taking pictures only from parents or caregiver and not from any
other family member or friend while the child attends class.
4.2. Any picture taken of children shall be on camera solely for the
purpose.

SETTING UP AN EDUCATIONAL TECHNOLGOIES

Basic Safety Rules:

1. Provide tiltable tables.


2. Provide anti-glare screen filters.
3. Provide adjustable chairs.
4. Provide foot support.
5. Make sure lighting is suitable.
6. Make sure work situations are not cramped.
7. Plan work at a computer so that there are frequent breaks.

RULES THAT CAN REDUCE RISK OF ACCIDENT IN THE WORKING SITUATIONS


SHOULD INCLUDE:

1. No trailing wires across or around the room which people can


trip on.
2. Electrical sockets should not be overloaded.
3. Electrical equipment should be safety-tested at least once a
year.
4. There should be adequate space around desk for people to
move.
5. Bags and obstacle should be stored out of the way.
6. Food and drinks should not be placed near machines.
7. Heating and Ventilation should be suitable for the working
environment.
8. Fire extinguishers should be available.
9. Fire exits should be clearly marked and free from clutter.

HANNA GRACE S. OCLIASA BSED-3B

You might also like