The document discusses the benefits of ICT policies in the Philippines for learners, teachers, and the teaching-learning process. Some of the key policies mentioned include the Telecommunications Act, which provides educational applications and protects learners from inappropriate content. The Data Privacy Act ensures secure use of technology and protection of personal information. RA 10175 establishes rules for appropriate online behavior to prevent cybercrimes. Overall, the policies aim to enhance education through collaborative technologies while maintaining privacy and security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100%(1)100% found this document useful (1 vote)
231 views
The Benefits of ICT Policies in The Philippines
The document discusses the benefits of ICT policies in the Philippines for learners, teachers, and the teaching-learning process. Some of the key policies mentioned include the Telecommunications Act, which provides educational applications and protects learners from inappropriate content. The Data Privacy Act ensures secure use of technology and protection of personal information. RA 10175 establishes rules for appropriate online behavior to prevent cybercrimes. Overall, the policies aim to enhance education through collaborative technologies while maintaining privacy and security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3
The benefits of ICT policies in the Philippines
ICT POLICIES To the Learners To the Teachers To the teaching- learning
process Tele- Educational Transferring Promotes communications Act applications and files as collaboration services. attachments and cooperative learning
Research Provides current
databases Emails information and web sites. Saves on Video resources conferencing
Protection in Gives the idea Sets boundaries
RA9775 Anti child various of what to in protecting Pornography Act unpleasant uses show the both teachers of media students to and learners protect their throughout the Provides credibility learning and comfortable promote learning learning Enhancing the only. quality of teaching Improving management system Access device Collaboration They can use Provides and different different communication devices to help resources increases. to enhance the It can give an Student can traditional way information or learn useful life of teaching idea skills through and to keep the devices. student interested. Data Privacy Act of As RA No. As RA No. As RA No. 2012 (RA No. 10173) 10173 ensures 10173 101173 allows An act protecting the free flow of emphasized the encoding and individual personal information to the use of decoding of information in promote technological information information and innovation and devices securely, it will communications growth, it will be securely, it be advantageous systems in the a tool for a better will be a for the teaching- government and the opportunity for flexible learning process private sector, learners to grasp instrument for to be flexible creating for this for a wider the educators and effective. purpose a national reference of to collect Through the privacy commission. information, creative and technological data, facts, and unique devices that it ideas without references of provides the encountering their methods communication hassle of and of data, gathering approaches to information, important make the facts, and ideas apprehension. learning will be easily Importantly, the process accessed without security of functional and the worries of personal effectual. being sabotage information of Examples are because all data learners is tablets, video are secured and secured and be conferencing, private. able to use their smart boards, social media 3D printings platforms and etc. creatively and convenient. RA no.10175 Prevents or Guide the Security Offences that are lessen the earners to have to protect the cyber committed against misuse of the knowledge environment and individual or groups devices about organization and user’s of individuals with a To be aware in netiquette to assets. criminal motive to using social prevent any Provides rules of intentionally harm the media accounts, type of crime conduct and reputation of the giving in the society standards of victim or cause information’s, especially 21st behavior for the physical or mental using fake century use of internet or harm to the victim accounts, wherein technologies and directly or indirectly morphing children are to attain free, using modern pictures and full of easy, and telecommunication posting in social curiosity, but intelligible networks (internet, networking sites limited in access to mobile phones). to defame others maturity and exchange and/or and etc. That awareness, can delivery of would have led fall victim to information; them in trouble the dangers of the internet.
Submitted by: GROUP 4
ABALOS, JUDILYN MANGLIGOT, MARIGOLD NATNAT, NOVY ANNE MYRWANI RIMANDO, JAYFAINA P. (Group Monitor) SALDAYAN, MAY ANN A. SILOY, BEIA JY C. YANHUA, YUAN ZARATE, TRYSHA MARIELLE W.
F5 Networks Application Delivery Fundamentals Study Guide Black and White Edition Philip Jönsson Steven Iveson - Download the complete ebook in PDF format and read freely