You are on page 1of 5

Eastern Mindoro College

BONGABONG, ORIENTAL MINDORO


Tel. No.(043)-283-5479; email_1945 @ yahoo.com
COLLEGE DEPARTMENT

NAME: COURSE:
DATE: TECHNOLOGY FOR TEACHING & LEARNING 1 ROOM:
CONTACT NO. PROFESSOR:
EMAIL ADD: RATING:

LESSON 2: SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES


WEEK 5_ , 3 HOURS
I. FOCUS:
At the end of this module, you should be able to:
• Identified and explained safety issues on the use of ICT
• Listed and applied e-safety rules in the use of ICT

II. INTRODUCTION: Using technology is not a risk by itself, but how it is used will be vulnerable to risks.
When improperly used, it will pose danger to the users in school and at home. What are the safety issues
that are needed to be addressed by safety policy and guidelines? As future teachers, do you need to
know all of these?

III. STRATEGIES
A. ABSTRACTION AND GENERALIZATION

GEAR UP YOUR MIND!


Highlights:
➢ LESSON 2: SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY
RULES

Some Risks in the Use of ICT and e-Networking


Technology is a phenomenon that seems to be uncontrollable. Despite the so many benefits for teaching
and learning, there are also negative effects or influence on the learners. Hence as future teachers you have
to be aware of how to safeguard learners in the school communities where they spend most of their waking
hours and also in their homes or facilities that provide opportunities to use digital technologies like Internet
Cafes. Safeguard and protection should be the primordial role of parents, teachers and schools. There are so
many risks that we have to be aware of in the use of digital technologies. These may include the following:

1. Exposure to inappropriate content, including on-line pornography, extremism (exposure to violence


associated with racist language);
2. Lifestyle websites like self-harms and suicide sites, and hate sites;
3. Cyber-bullying in all forms, receiving sexually explicit images or messages;
4. Privacy issues including disclosure or personal information;
Page 1 of 5

Enriching Minds of Champions


TECHNOLOGY FOR TEACHING AND LEARNING 1

5. Health and wellbeing (amount of time spent on-line, internet gaming and many more;
6. Prolonged exposure to on-line technologies, particularly at an early age;
7. Addiction to gambling and gaming;
8. Theft and fraud from activities such as phishing;
9. Viruses, Trojans, spyware and other malware; and
10. Social pressures to maintain online networks via texting and social networking sites.

Minor Misuse of ICT


In school, some minor misuse made by learners include the following:
• Copying information into assignment and failing to acknowledge source (plagiarism and copyright
infringement)
• Downloading materials not relevant to their studies
• Misconduct associated with subject logins, such as using someone else’s password
• Leaving a mobile phone turned on during class period
• Unauthorized taking of pictures or images with mobile phone camera still or moving.
e-Safety
With all of the above concerns and many more, how do we confront all of these so as to protect our
future generation?

e-safety takes care not only of internet technologies but also of electronic communications via mobile
phones, games consoles and wireless technology. It highlights the need to educate children and young people
about the benefits, risks and responsibilities of using information technology. Here are some issues of e-safety:
• e-safety helps safeguard children and young people in the digital world;
• e-safety emphasizes learning to understand and new technologies in a positive way;
• e-safety educates children about the risks as well as the benefits so we can feel confident online;
and
• e-safety supports young learners and adults to develop safer online behaviors, both in and out of
school.
Network Management

1. Safety in the Use of Network in Schools


1.1 Make clear that no one should log on as another user.
1.2 Require all users to always log off when they have finished working.
1.3 Maintain equipment to ensure health and safety.
1.4 Provide students with access to content and resources through guided e-learning.
1.5 Set up a clear disaster recovery system in place for critical data that include secure, remote back
up of critical data.
1.6 Secure wireless network to appropriate standards suitable for educational use.
1.7 Install all computer equipment professionally and meet health and safety standards.
1.8 Review the school ICT system regularly with regard to health and safety and security.

2. Password Policy
2.1 Only authorized users will have individual passwords. Users are not permitted to disclose their
passwords unless they got permission from the owner or from the management. The equipment
2

Enriching Minds of Champions


TECHNOLOGY FOR TEACHING AND LEARNING 1

that keeps the personal information shall be locked when unattended to prevent unauthorized
access. Computers should be set to a time out if they become unused for a certain period of time.

3. Personal mobile phones and mobile devices


3.1 All mobile phones shall be kept away in a box away from the children or learners and access is
only allowed at break time or at the end of classes or when needed during the class period.

4. Cameras
4.1 taking pictures only from parents or caregivers and not from any other family member or friend
while the child attends class.
4.2 Any picture taken of children shall be on cameras solely for the purpose.

Setting Up an Educational Technology Room

Schools that plan to dedicate a room where the students can access technologies for learning should
include the following basic safety rules:

1. Provide tiltable tables. These tables can be tilted and adjusted to the height of the users.
2. Provide anti-glare screen filters.
3. Provide adjustable chairs.
4. Provide foot support,
5. Make sure lighting is suitable.
6. Make sure work stations are not cramped.
7. Plan work at a computer so that there are frequent breaks.

More specifically safety rules that can reduce risks of accidents in the working stations should include:

1. No trailing wires across or around the room which people can trip on.
2. Electrical sockets should not be overloaded.
3. Electrical equipment should be safety-tested at least once a year.
4. There should be adequate space around desk for people to move.
5. Bags and obstacles should not be placed near machines.
6. Food and drinks should not be placed near machines.
7. Heating and ventilation should be suitable for the working environment.
8. Fire extinguishers should be available.
9. Dire exits should be clearly marked and free from clutter.

There are more issues, policies and rules. What have been presented in the lesson may be the minimum
that you should learn. As you explore some more and engage in the different aspects of Technology for
Teaching and Learning you will find more details.

B. APPLICATION/ ANALYSIS/ASSESSMENT
Experience

Enriching Minds of Champions


TECHNOLOGY FOR TEACHING AND LEARNING 1

Task 1: Survey of the e-Safety Rules in Schools


Steps:

1. Visit as school where they have a e-Safety Rules. Interview the following persons:
1 ICT Manager
1 Student
1 Teacher

2. Ask the following questions for each:


2.1 Do you have an ICT facility in the school? What composes this facility?
2.2 Who are allowed to use the facility?
2.3 What are the policy, guidelines and rules in the use of the facility?
2.4 What are the e-safety rules that need to be followed by any user?

3. Record all the information. Separate the answers of the ICT Manager, Students and Teachers.
4. What are common in their answers? What are different?
5. Submit your report and share with the class.

Exchange

Let us share our findings.

Activity 1: Sharing Through Power-Point Presentations. Using a power point presentation in not more than 10
slides, share the result of your survey to the whole class.

Examine
TASK 1: REFLECTIONS:

1. What have I learned?


2. What I want to know more?
3. What will I do with what I learned?

Task 2- Self Check


Choose the correct answer from the option given.
____1. A friend would like to ask for your email password, because your email address was used for an
urgent matter. As a rule, in privacy, what action will you take?
I. Voluntarily give my password to my friend.
II Deny the request of my friend even if it is urgent
III Open my email by myself and print the email that is addressed to my friend.

A. I only C. III only


B. II only D. I, II and III

Enriching Minds of Champions


TECHNOLOGY FOR TEACHING AND LEARNING 1

____2. Which of these is a minor infraction in the use of digital facility?


A. Unauthorized taking of pictures or images with mobile phone camera
B. Logging off when finished working
C. Making sure that lighting is adequate
D. Using anti-glare screen filters

____3. Which is a risk in the use of ICT, Tus a need to establish policies and rules for e-safety?
I Prolonged exposure to online technologies, particularly at an early age
II Cyberbullying in all forms
III Lifestyle websites like self-harms and suicide sites, and hate sites

A. I only C. III only


B. II only D. I, II and III

____4. Which is NOT TRUE about e-safety in the use of digital technology?
A. Restricts the use of digital technology
B. Facilitates better understanding how to use online facilities
C. Protects young learners and adults from the digital risks
D. Helps users to understand the new technology

____5. When working inside a computer laboratory, all of the choices EXPECT one, is allowed. Which
one is allowed?
A. Foods and drinks should be handy on the computer table.
B. One external electrical should be made available.
C. Fire extinguishers should be made available.
D. Computer desks should be near each other to allow sharing of information

Prepared by:
MR. JAYMAR B. MAGTIBAY
Instructor

Enriching Minds of Champions

You might also like