100% found this document useful (2 votes)
6K views

Safety Issues Including Digital Safety Rules

The document discusses safety issues and digital safety rules related to using ICT and e-networking. It identifies risks like exposure to inappropriate content, cyberbullying, privacy issues, and addiction. It also discusses minor misuse of ICT in schools, e-safety practices, network management safety rules, and setting up a safe educational technology room.

Uploaded by

Jedidiah Garcia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
6K views

Safety Issues Including Digital Safety Rules

The document discusses safety issues and digital safety rules related to using ICT and e-networking. It identifies risks like exposure to inappropriate content, cyberbullying, privacy issues, and addiction. It also discusses minor misuse of ICT in schools, e-safety practices, network management safety rules, and setting up a safe educational technology room.

Uploaded by

Jedidiah Garcia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Lesson 2.

Safety Issues on the Use of ICT including Digital Safety Rules

Pre-discussion.
Using technology is not a risk by itself, but how it is used the users will be vulnerable to
risk. Digital technology in particular, when improperly used, will pose danger to the
users in school and at home. What are the safety issues that should be addressed by
the safety policies and guidelines? As future teachers, is it important be familiar with all
of these?

What to Expect?
At the end of the lesson, the students had:
1. Identified some risks when using ICT and e-networking.
2. Familiarized the practices usually considered misuse of ICT that may
seriously threaten safety of the users or other people.
3. Identify safety rules for the use of Internet

Lesson Outline
Would your life as a teacher be also influenced by the new technologies? What
would be better, our lives controlled by technology or we have the control over the
utilization of technologies? How to have control over technology?

Some Risk in the Use of ICT and e-Networking

Technology breakthroughs are escalating to a phenomenal speed. Despite the


many advantages for teaching and learning, there are also negative feedbacks, effects
or influences on the users. Learners are particularly exposed to technologies either in
school, where they spend most of their waking hours, or even in their homes where they
are also provided with facilities and opportunities to use digital technologies and they
can openly access services of Internet Cafes. Precautions should be kept in mind by the
parents, teachers and school administrators to protect the learners from the negative
exposures. It is important to recognize the many serious risks brought by the use of
digital technologies. To mention some:

1. Exposure to inappropriate content, including on-line pornography, extremism


(exposure to violence associated with racist language);
2. Lifestyle websites like self-harms and suicide sites, and hate sites;
3. Cyber-bullying in all forms, receiving sexually explicit images or messages;
4. Privacy issues including disclosure of personal information;
5. Health and well-being (amount of time spent on-line, internet gaming and many
more);
6. Prolonged exposure to on-line technologies, particularly at an early age;
7. Addiction to gambling and gaming
8. Theft and fraud from activities such as phishing;
9. Viruses, Trojans, spyware and other malware; and
10. Social pressure to maintain online networks via texting and social networking
sites.

Minor Misuse of ICT

In school, some minor misuse made by learners include the following:

● Copying information into assignment and failing to acknowledge the source


(plagiarism and copyright infringement)
● Downloading materials not relevant to their studies
● Misconduct associated with subject logins as using someone else’s password
● Leaving a mobile phone turned on during class period
● Unauthorized taking of pictures or images with mobile phone camera, still or
moving
e-Safety

With all the above concerns and many more, how do we confront all of these so as to
protect our future generation.

e-safety takes care not only of internet technologies but also of electronic
communications via mobile phones, game consoles and wireless technology. It
highlights the need to educate children and young people about the benefits, risk and
responsibilities of using information technology. Here are some issues of e-safety:

● e-safety protects children and young people from the threats of the digital world;
● e-safety emphasizes the use of digital technology for learning and ways to use
technologies in a positive way;
● e-safety educates children about the risks as well as the benefits so we can feel
confident that they are secure when they are online; and
● e-safety supports young learners and adults to develop appropriate behaviors,
both in and out of school.

Network Management

1, Safety in the Use of Network in School


1.1 Make sure that no one should log on as another user.
1.2 Require all users to always log off when they have finished working.
1.3 Maintain equipment to ensure health and safety.
1.4 Provide students with access to content and resources through guided e-
learning.
1.5 Set up a clear disaster recovery system in place for critical data that include
secure, and remote back up of critical data.
1.6 Secure wireless network to appropriate standards suitable for educational use.
1.7 Install all computer equipment professionally that meet health and safety
standards.
1.8 Review the school ICT system regularly with regards to health, safety, and
security.

2. Password Policy
2.1 Only authorized users will have individual passwords. Users are not permitted to
disclose their passwords, unless they got permission from the owner or from the
management. The equipment that keeps the personal information shall be locked when
unattended to prevent unauthorized access.
2.2 Computers should be set to a time out if not in use for a long period of time.

3. Personal mobile phones and mobile devices


3.1 All mobile phones shall be kept away from children or learners and limit use of
gadgets may be only during break time or at the end of classes or when needed during
the class period.

4. Cameras
4.1 Taking pictures of the learners only by parents or caregivers and never allow
anybody even relatives and friends of the family while the learner is in school.
4.2 Any picture taken of children on cameras shall be exclusively for the purpose.

Setting Up an Educational Technology Room

Schools that plan to dedicate a room where the students can access technologies for
learning should include the following basic safety rules.
1. Provide tilt tables adjustable to the height of the users.
2. Provide anti-glare screen filters
3. Provide adjustable chairs
4. Provide foot support
5. Make sure lighting is suitable
6. Make sure work stations are not cramped
7. Plan work at a computer so that there are frequent breaks.

More specifically safety rules that can reduce risks of accidents in the working stations
should include:

1. No trailing wires across or around the room which people can trip on
2. Electrical sockets should not be overloaded
3. Electrical equipment should be safety-tested at least once a year.
4. There should be adequate space around disk for people to move
5. Bags and obstacles should be stored out of the way
6. Foods and drinks should not be placed near machines
7. Heating and ventilation should be suitable for the working environment
8. Fire extinguishers should be available
9. Fire exits should be properly marked and free from clutter.

Assessment
Choose the correct answer from the given options.

1. A friend would like to ask for your email password, because your mail address
was used for an urgent matter. As a rule, in privacy, what action will you take?
I. Voluntarily give my password to my friend
II. Deny the request of my friend even if it is urgent
III. Open my email by myself and print the email that is addressed to my
friend
A. I only
B. II only
C. III only
D. I, II and III
2. Which of these is a minor infraction in the use of digital facility?
A. Unauthorized taking of pictures or images with mobile phone camera
B. Logging off when finished working
C. Making sure the lighting is adequate
D. Using anti-glare screen filters
3. Which is the risk in the use of ICT, thus a need to establish policies and rules for
safety?
I. Prolonged exposure to online technologies, particularly at an early age
II. Cyberbullying in all forms
III. Lifestyle websites like self-harms and suicide sites, and hate sites
A. I only
B. II only
C. III only
D. 1, II, and III
4. Which is NOT TRUE about e-safety in the use of digital technology?
A. Restricts the use of digital technology
B. Facilitates better understanding how to use online facilities
C. Protects young learners and adults from the digital risks
D. Helps users to understand the new technology
5. When working inside a computer laboratory, all of the choices EXCEPT one is
allowed.
A. Food and drinks should be handy on the computer table.
B. One external electrical outlet should have 5 computers connected.
C. Fire extinguishers should be made available.
D. Computer desk should be near each other to allow sharing of information

You might also like