Safety Issues Including Digital Safety Rules
Safety Issues Including Digital Safety Rules
Pre-discussion.
Using technology is not a risk by itself, but how it is used the users will be vulnerable to
risk. Digital technology in particular, when improperly used, will pose danger to the
users in school and at home. What are the safety issues that should be addressed by
the safety policies and guidelines? As future teachers, is it important be familiar with all
of these?
What to Expect?
At the end of the lesson, the students had:
1. Identified some risks when using ICT and e-networking.
2. Familiarized the practices usually considered misuse of ICT that may
seriously threaten safety of the users or other people.
3. Identify safety rules for the use of Internet
Lesson Outline
Would your life as a teacher be also influenced by the new technologies? What
would be better, our lives controlled by technology or we have the control over the
utilization of technologies? How to have control over technology?
With all the above concerns and many more, how do we confront all of these so as to
protect our future generation.
e-safety takes care not only of internet technologies but also of electronic
communications via mobile phones, game consoles and wireless technology. It
highlights the need to educate children and young people about the benefits, risk and
responsibilities of using information technology. Here are some issues of e-safety:
● e-safety protects children and young people from the threats of the digital world;
● e-safety emphasizes the use of digital technology for learning and ways to use
technologies in a positive way;
● e-safety educates children about the risks as well as the benefits so we can feel
confident that they are secure when they are online; and
● e-safety supports young learners and adults to develop appropriate behaviors,
both in and out of school.
Network Management
2. Password Policy
2.1 Only authorized users will have individual passwords. Users are not permitted to
disclose their passwords, unless they got permission from the owner or from the
management. The equipment that keeps the personal information shall be locked when
unattended to prevent unauthorized access.
2.2 Computers should be set to a time out if not in use for a long period of time.
4. Cameras
4.1 Taking pictures of the learners only by parents or caregivers and never allow
anybody even relatives and friends of the family while the learner is in school.
4.2 Any picture taken of children on cameras shall be exclusively for the purpose.
Schools that plan to dedicate a room where the students can access technologies for
learning should include the following basic safety rules.
1. Provide tilt tables adjustable to the height of the users.
2. Provide anti-glare screen filters
3. Provide adjustable chairs
4. Provide foot support
5. Make sure lighting is suitable
6. Make sure work stations are not cramped
7. Plan work at a computer so that there are frequent breaks.
More specifically safety rules that can reduce risks of accidents in the working stations
should include:
1. No trailing wires across or around the room which people can trip on
2. Electrical sockets should not be overloaded
3. Electrical equipment should be safety-tested at least once a year.
4. There should be adequate space around disk for people to move
5. Bags and obstacles should be stored out of the way
6. Foods and drinks should not be placed near machines
7. Heating and ventilation should be suitable for the working environment
8. Fire extinguishers should be available
9. Fire exits should be properly marked and free from clutter.
Assessment
Choose the correct answer from the given options.
1. A friend would like to ask for your email password, because your mail address
was used for an urgent matter. As a rule, in privacy, what action will you take?
I. Voluntarily give my password to my friend
II. Deny the request of my friend even if it is urgent
III. Open my email by myself and print the email that is addressed to my
friend
A. I only
B. II only
C. III only
D. I, II and III
2. Which of these is a minor infraction in the use of digital facility?
A. Unauthorized taking of pictures or images with mobile phone camera
B. Logging off when finished working
C. Making sure the lighting is adequate
D. Using anti-glare screen filters
3. Which is the risk in the use of ICT, thus a need to establish policies and rules for
safety?
I. Prolonged exposure to online technologies, particularly at an early age
II. Cyberbullying in all forms
III. Lifestyle websites like self-harms and suicide sites, and hate sites
A. I only
B. II only
C. III only
D. 1, II, and III
4. Which is NOT TRUE about e-safety in the use of digital technology?
A. Restricts the use of digital technology
B. Facilitates better understanding how to use online facilities
C. Protects young learners and adults from the digital risks
D. Helps users to understand the new technology
5. When working inside a computer laboratory, all of the choices EXCEPT one is
allowed.
A. Food and drinks should be handy on the computer table.
B. One external electrical outlet should have 5 computers connected.
C. Fire extinguishers should be made available.
D. Computer desk should be near each other to allow sharing of information