Technology For Teaching and Learning 1
Technology For Teaching and Learning 1
and Safety
Issues in
Teaching and
Learning
LESSON 2 EDUC313E
At the end of the lesson, you should be able
to:
1. establish awareness on the different policies pertaining to ICT in education;
MONEY DATA
Examples of Breaches of Data
1. COMEleak
2. Log-In Procedure
5. Online Lending
6. Raffle
Introduction
While the potential and promise of ICT in the use for education is clear in many regards, so too
are 'perils' related to the disruption of existing traditional teaching and learning practices, high
costs, increased burdens on teachers, equity and issues around data privacy and security.
Policies related to technology use in change and evolve over time, often along a somewhat
predicable path, and technological innovations often outpace the ability of policymakers to
innovate on related policy issues. Such policies take different forms and are formulated and
proposed by different institutions in different countries. No matter the country, a lack of rigorous,
relevant evidence typically complicates attempts to draft impactful ICT/education policies.
ICT National Policies That are Applicable
to Teaching and Learning
• The 1987 Philippine Institution Article XIV
• Republic Act No. 10173, known as the “Data Privacy Act of 2012”
(1) Establish, maintain, and support a complete, adequate, and integrated system of education
relevant to the needs of the people and society;
(2) Encourage non-formal, informal, and indigenous learning systems, as well as self-learning,
independent, and out-of-school study programs particularly those that respond to community
needs;
Republic Act 10650
AN ACT EXPANDING ACCESS TO EDUCATIONAL SERVICES BY
INSTITUTIONALIZING OPEN DISTANCE LEARNING IN LEVELS OF TERTIARY
EDUCATION AND APPROPRIATING FUNDS THEREFOR
Section 1. Short Title. – This Act shall be known as the “Open Distance Learning Act”.
(a) Distance education refers to a mode of learning in which students and teachers are physically
separated from each other. It is student-centered, guided independent study, making use of
well-studied teaching and learning pedagogies to deliver well-designed learning materials in
various media. It is also sometimes described as flexible learning and distributed learning;
b) Open Distance Learning (ODL) refers to the merger of two (2) concepts, that of open
learning and distance education. It is a system which combines the methodology of distance
education with the concepts of open learning and flexible learning;
c) Open learning refers to a philosophy of learning that is based on flexibility of access for equity
in education, an educational system accessible to every individual with minimal restrictions
and emphasizing the flexibility of the system to eradicate problems caused by barriers like age,
geographical location, time constraints and economic situation;
Section 9. Mode of Delivery. – The ODL programs may be delivered using information and
communications technology and other approaches, such as the following:
(a) Print – textbooks, study guides, workbooks, course syllabi, correspondence feedback and other
print formats;
(b) Audio-Visual – radio, audio cassettes, slides, film, videotapes, television, telephone, fax,
audio-conferencing and video-conferencing;
Section 1. Short. Title. – This Act shall be known as the “Department of Information and
Communications Technology Act of 2015”.
(a) To promote the use of ICT for the enhancement of key public services, such as education,
public health and safety, revenue generation, and socio-civic purposes;
Republic Act 8293
Republic Act 8293
Section 1. Title. ‑ This Act shall be known as the “Intellectual Property Code of the Philippines.”
Chapter II
Original Works
Section 172. Literary and Artistic Works. ‑ 172.1. Literary and artistic works, hereinafter referred
to as “works”, are original intellectual creations in the literary and artistic domain protected from
the moment of their creation and shall include in particular:
Republic Act 8293
(a) Books, pamphlets, articles and other writings;
(c) Lectures, sermons, addresses, dissertations prepared for oral delivery, whether or not reduced
in writing or other material form;
(d) Letters;
(g) Works of drawing, painting, architecture, sculpture, engraving, lithography or other works of
art; models or designs for works of art;
h) Original ornamental designs or models for articles of manufacture, whether or not registrable as an
industrial design, and other works of applied art;
i) Illustrations, maps, plans, sketches, charts and three-dimensional works relative to geography,
topography, architecture or science;
k) Photographic works including works produced by a process analogous to photography; lantern slides;
l) Audiovisual works and cinematographic works and works produced by a process analogous to
cinematography or any process for making audio-visual recordings;
The law upholds the right to privacy by protecting individual personal information.
The National Privacy Commission protects individual personal information by regulating the
processing of personal information.
Republic Act 10175
AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION,
INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR
AND FOR OTHER PURPOSES
Section 1. Title. — This Act shall be known as the “Cybercrime Prevention Act of 2012”.
Section 2. Declaration of Policy. — recognizes “...the need to protect and safeguard the integrity
of computer, computer and communications systems, networks, and databases, and the
confidentiality, integrity, and availability of information and data stored therein, from all forms of
misuse, abuse, and illegal access by making punishable under the law such conduct or conducts.”
Safety Issues in ICT
We, as educators, need to understand these issues and how it may might influence what and how
we teach. These issues might be copyright and fair use issues to issues involving access to
information. We need to be aware of society’s view on the use of technology and how these
issues might affect what we can do in the classroom.
In the use of technologies, both teachers and students must acknowledge and observe the ethical
use of school technologies to achieve rightfully the main purpose of technology – to support
teaching and learning.
The Ten Commandments of Computer
Ethics
Written by the Computer Ethics Institute
The name of your mother and father Risky, yet not as risky as posting their full names, especially your mother’s maiden name. In fact,
you may have already encountered many websites that require your mother’s maiden name as an
answer to a secret question whenever you lose your password.
The name of your siblings Disclosing this is a huge risk. Strangers may pretend or use their identity to dupe you.
Your Address Hopefully, you answered “no” to this one. Giving the Internet your number is one thing; giving
them your address is a whole other level. It would be much easier for criminals to find to you.
Your home phone number This shared information is riskier than sharing your personal phone number. Scams usually use
this information to deceive you, one of which is when a stranger pretends to know your parents or
pretends to be you.
Your Birthday Letting people know your birthday is probably a must if you want to get as many gifts as
possible. But having it in your profile makes you vulnerable to identify theft.
The Internet is defined as the information superhighway. This means that anyone who has an
access to this highway, can place information, and can grab that information. Any information,
even things that you have set privately, can be accessed one way or another. The threat of
cybercrime is very real. While you may not experience the threat now, whatever information we
share today could affect our future.
Ethical Issues in technology and
Software
1. Unauthorized Access Use of Hardware, Software, Network, and
Computer Files
There are many cases when we want some things to be hidden to public and would not allow everyone to
use it, such as journals, messages in our mobile devices and e-mails, and many others. Same true when it
comes to accessing of computer units and other hardware devices, software, network, and computer files.
If somebody would use someone’s computer and its files without the permission from the owner, that’s
called unauthorized access. A person is called a cracker or a hacker if he/she tries to access a computer or
network illegally to access data and commit malicious acts like identity theft.
Hacker is a computer enthusiast who does well in computer that benefits other people. However, the term
hacker now has an adverse connotation which refers to a person who breaks into the computer system to
steal or corrupt the data in it.
We are advised most of the time to protect our computer unit, mobile phones, gadgets, and files by providing
a password on our devices so that no once can get into it and block them from accessing and using our
devices and even our files. Below are some tips in carefully creating a reliable password.
To prevent hardware theft and vandalism, security system and precautionary measures are employed in schools
such as setting up of security cameras, installing locks in computer units, devices and its wires to keep these in
place. For LCD projectors that stay in the classrooms, they must be kept on a secured space or by using steel
bracket with locks. Desktop computer and laptops that are being borrowed by teachers and students for class
purposes must be closely monitored.
The best precautionary measure in keeping the electronic hardware secure is to have full awareness on its
security by not leaving it anywhere and unattended.
3. Software Theft
Software piracy is a form of software theft. This occurs when a person copies illegally
copyrighted software for personal or business use.
When we purchase software, he/she actually purchases the right to use the software but does not
own the software. Software that has been purchased has with t a software license which provides
conditions for its use. These conditions must first be agreed upon by the user prior to its use.
Users are prohibited to install the software on a network (school computer lab network).
Going against the agreement is a violation of copyright law, thus committing a federal crime. In US, penalties
reach up to $250,000 and up to five years imprisonment. In the Philippines penalties reach up to Php 1,500,000
and up to six to nine years imprisonment.
Schools enforce policies regarding the installation and use of computer software to make sure that the conditions
that have agreed upon strictly monitored and followed. To make these policies known to all, it would be better if
teachers are given orientation by the academic heads, after which teachers orient their students regarding the use
of technologies with its software to prevent such violations.
Types of Software Licenses
Commercial software: Copyrighted software developed, usually by a commercial company,
for sale to others
Shareware: Copyrighted software distributed on the honor system; consumers should either
pay for it or uninstall it after the trial period
Freeware: Copyrighted software that may be used free of charge
Public domain software: Software that is not copyrighted and may be used without restriction
Open source software: Programs with source code available to the general public
4.Information Theft
Information theft is a computer crime when someone deliberately steals information for purposes
of studying how to compete with other organizations or companies. Getting confidential
information about school administrators, academic officials, teachers, staff, and students without
legal authorization is considered as information theft.
One of the keys in order to prevent information theft is the use of encryption. Encryption is the
process of converting readable data into unreadable one.
5. Malicious Acts in Software
The following malicious acts are commonly experienced in e-mails, cellphones, instant or text messaging devices and blogs.
a. Virus- a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or
data storage like flash drives and CDs.
b. Worm – a malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself.
For example, the I LOVE YOU worm (Love bug Worm) created by a Filipino.
c. Trojan – a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows
hackers to get your information.
d. Rogue security software – tricks the user into posing that is a security software. It asks the user to pay to improve his/her security but in reality,
they are not protected at all.
e. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently
doing and typing through keylogging.
f. Keyloggers – used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can be record
email, messages, or any information you type using your keyboard.
3. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details.
This is done by sending you an email that will direct the users to visit a website and be asked to update
his/her username, password, credit card, or personal information.
4. Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name Service)
system
Acceptable and Unacceptable Uses of
School Technology
Schools may have different approach in implementing policies in accordance of the use of school
technology. It maybe acceptable or unacceptable to others, but it is important to set these policies
so that everyone in school, administrators, academic officials, teachers, staff, and students may
be guided and act accordingly in the proper use of school technologies. Here are some examples
of acceptable and unacceptable uses of school technology.
Acceptable Use of School Technology Unacceptable Use of School Technology
Being polite and using appropriate language. Altering software by deleting files, downloading
Deleting unwanted messages or old data from the programs, or copying or installing unauthorized
computers and servers. files or programs.
Running antivirus software on downloaded files, Pretending to be someone or using the passwords
attachments, peripherals, or disks. or materials of another.
Using internet ethically and legally. Downloading text, graphics, or software, or
engaging in behaviors that may be considered
obscene, abusive libelous, indecent, vulgar,
profane, or lewd.
Harassing an individual using the internet.
Plagiarizing.
REFERENCES:
Book
Vindollo S.C. and Buendia M.M.C. Educational Technology 2. Quezon City: Adriana Publishing Co., Inc.
Online
https://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics
https://www.worldbank.org/en/topic/edutech/brief/ict-education-policies
https://www.officialgazette.gov.ph/
https://sites.google.com/site/cupbsoftwarelicensing/types-of-licenses