You are on page 1of 3

FM-AA-CIA-15 Rev.

0 10-July-2020

PROF ED 108 - TECHNOLOGY FOR TEACHING AND LEARNING 1 Module No.2

SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES

It’s probably not immediately obvious to the average child – or many adults for that matter – but
moderate to heavy computer use brings with it a number of areas of risk when it comes to health and safety.
This lesson covers a wide range of aspects of health and safety in the use of ICT – including ergonomic
chairs, the positioning of furniture and computer hardware, cables, use of keyboard and mouse, posture and
the need for breaks, plus includes a range of exercises designed to prevent injury.

Some Risks in the Use of ICT and e-networking


Technology is the phenomenon that seems to be uncontrollable. Despite the so many benefits of
teaching in learning, there are also negative effect or influence on the learners. Hence, as future teachers you
have to be aware of how to safeguard learners in the school communities where they spend most of their
waking hours and also their homes or facilities that provide opportunities to use digital technologies like
Internet Cafes. Safeguard and protection should be the primordial role of parents, teachers, and school. There
are so many risks that we must be aware of in the use of digital technologies. These may include the
following:

1. Exposure to inappropriate content, including online pornography, extremism (exposure to violence


associated
with racist language).
2. Lifestyle websites including like self-harms and suicide sites and hate sites.
3. Cyberbullying in all forms, receiving sexually explicit images or messages.
4. Privacy issue including disclosure of personal information.
5. Health and well-being (amount of time spent online, internet gaming and many more);
6. Prolonged exposure to online technologies, particularly at an early age.
7. Addiction to gambling and gaming.
8. Theft and fraud from activities such as phishing.
9. Viruses, Trojans and spyware and other malware; and
10. Social pressure to maintain online networks via texting and social networking.

Minor Misuse of ICT

In schools, some minor misuse made by learners include the following:


 Copying information into assignment and failing to acknowledge the source
 Downloading material not relevant to their studies.
 Misconduct associated with subject logins, such as using someone the password.
 Leaving a mobile phone turned on during class period.
 Unauthorized taking of picture or image with mobile phone career still or moving.

E-safety
Task: Seach for the definition of what is e-safety.

E-safety takes care not only of internet technologies but also of electronics communication via mobile
phones. Here are some issues of e-safety:
 E-safety helps safeguard children and young people in the digital world.
 E-safety emphasizes learning to understand and new technologies a positive way.
 E-safety educates children about the risk as well as the benefits so we can feel confident online.
 E-safety support young learners and adult to develop safe online behavior, both in or out of school.

Network Management

Network management is defined as the process of managing a network for fault and performance
using various tools and technologies to keep up with the business requirements.

1. Safety in the use of network in schools


1.1. Make clear that no one should log in as another user.
1.2. Require all users to always log off when they have finished working.
1.3. Maintain equipment clean to ensure health and safety.
1.4. Provide students with access to content and resources through guided e-learning.

PANGASINAN STATE UNIVERSITY 1


FM-AA-CIA-15 Rev. 0 10-July-2020

PROF ED 108 - TECHNOLOGY FOR TEACHING AND LEARNING 1 Module No.2

1.5. Set up a clear disaster recovery system in place for critical data that include secure, remote back
up of critical data.
1.6. Secure wireless network to appropriate standards suitable for educational use.
1.7. Install all computer equipment professionally and meet health and safety standards.
1.8. Review the school ICT system regularly regarding health and safety and security.

2. Password Policy
Only authorized users will have individual passwords. Users are not permitted to disclose their
passwords unless they got permission from the owner or from the management. The equipment that keeps
the personal information shall be locked when unattended to prevent unauthorized access. Computers
should be set to a time out if they become unused for a certain period.

3. Personal mobile phones and mobile devices


All mobile phones shall be kept away in a box away from the children or learners and access is only
allowed at break time or at the end of classes or when needed during the class period.

4. Cameras
4.1. Taking picture only from parents or caregivers and not from any other family member or friend while
the child attend class.
4.2. Any picture taken of children shall be on cameras solely for the purpose.

Setting up an Educational Technology Room


Task: Search for the definition of what is a Educational Technology Room.

Schools that plan to dedicate a room where the students can access technologies for learning should
include the following safety rules.
1. Provide tables, these tables can be tilted and adjustable to the height of the users.
2. Provide anti-glare screen filters.
3. Provide adjustable chairs.
4. Provide foot support.
5. Make sure lighting is suitable.
6. Make sure workstations are spacious.
7. Create a work plan at a computer laboratory to maximize its use.

More specifically, safety rules that can reduce risk of accidents in the working stations should include:
1. No trailing wires across or around the room which people can trip on.
2. Electrical sockets should not be overloaded.
3. Electrical equipment should be safety-tested at least once a year.
4. There should be an adequate space around desk for people to move.
5. Bags and obstacles should be stored out of the way.
6. Food and drinks should not be placed near machines.
7. Heating and ventilation should be suitable for the working environment.
8. Fire extinguishers should be available.
9. Fire exists should be clearly marked and free from clutter.

SUMMARY

Here are some pointers to remember:

• ICT Policies are needed to put a roadmap or course of actions to be pursued and adopted by various
governments, organizations, entities involving ICT.
• Department of Information and Communications Technology (DICT) shall be the primary policy,
planning, coordinating, implementing, and administrative entity of the Executive Branch of the
government that will plan, develop, and promote the national ICT development.
• The ICT for Education (ICT4E) is a program under the DICT that supports all the efforts of the
education sector in incorporating the use of ICT as well as in determining and gaining access to the
infrastructure (hardware, software, telecommunication facilities and others) which are necessary to
use and deploy learning technologies at all levels of education.
• Current issues on technology includes freedom of expression and censorship privacy and security

PANGASINAN STATE UNIVERSITY 2


FM-AA-CIA-15 Rev. 0 10-July-2020

PROF ED 108 - TECHNOLOGY FOR TEACHING AND LEARNING 1 Module No.2

surveillance and data retention pollutants from e waste.


• The new ICT technologies are grouped into three categories namely information technology,
telecommunication technologies, and networking technologies.
• Technology should never replace any human teacher. Each teacher is encouraged to use technology
in teaching.
• Learners should take advantage of the potential of learning support they can derive from technology.
• When technology is not properly use it will pose danger to the users in school and at home.
• Safety issues are needed to be addressed by safety policy and guidelines.

REFERENCES

Bilbao, et al. (2019). Technology for teaching and learning 1. Quezon City, PH: Lorimar Publishing,
Inc. Pages: 26-41

Anderson, J (2010) ICT Transforming Education A Regional Guide UNESCO, Bangkok Asia and the
Pacific Regional Bureau of Education

Lucido, P. & Corpuz B. (2012) Educational Technology 2, Quezon City, Lorimar Publishing

https://www.oecd-ilibrary.org/docserver/9789264239555-11
en.pdf?expires=1594263305&id=id&accname=guest&checksum=F52D93A50B32FC042B33379298
4E59D1

https://www.education.vic.gov.au/school/teachers/teachingresources/digital/Pages/safety.aspx

PANGASINAN STATE UNIVERSITY 3

You might also like