Professional Documents
Culture Documents
Introduction
Globalization is a reality and ICT has become a fundamental part of the process. A
networked society is one in which the entire planet is organized around telecommunicated
networks of computers.
According to Department of Information, Communication Technology (DICT) “The future has
ICT policies are needed to put a roadmap or course of actions to be pursued and adopted
indispensable in modern societies of processing data and saving time and effort.
internet, this category also includes mobile telephone, cable, DSL, satellite and other
broadband connectivity.
roadmap to guide all agencies in the utilization, regulation and enhancement of ICT .The
ICT for education sector in incorporating the use of ICT as well in determining and gaining
Among the policy recommended programs that have applicants of education teaching
learning are:
(OCEI)
3. PheDNET
4.Establish Community learning Centers called eskwela for out of School youth (OSY)
5.Equality Program for tertiary education through partnership with state universities and
colleges (SUCS)
7.ICt Skills strategic plan which develops an interest agency approach to identifying
strategic and policy and program recommendation to address ICT skills demand supply
type.
Global Issues
Access and civil liberties are two sets of issues ICT Policy which are crucial to the modern
society. The other concern is civil liberties which refer to human rights and freedom. Access
the use of Internet and Ict .Access means the possibility for everyone to use the Internet
and other media. In richer countries basic access to Internet almost available to all with
faster broadband connection. There are still countries where access to Internet is still a
challenge.
• The United Nations Universal Declaration of Human Rights provides everyone the right to
freedom of thought, conscience, religion, and opinion, yet some internet behaviors
contradict these rights.
1. Individual rights are given up in order to have access to electronic networks. Microsoft
Network (MSN) contracts protect individuals from uploading or making available files
containing protected intellectual property materials, unless they own or control the rights
or have consent. However, Microsoft can terminate access to MSN sites or services at its
discretion.
3. Defamation actions may be used to silence critics. This action deters the freedom of
expression.
• Privacy policies are an issue. Most commercial sites have a privacy policy. When someone
uses a site and clicks "I agree" button, it is as if you have turned over private information to
any authority that may access it.
There are several types of privacy as shown by the following examples:
1. For most, privacy means "personal privacy" the right of individuals not
How do the policy guidelines, projects and issues related to the teaching and learning?
There are great implications of this lesson to both the teachers who are teaching and
1. Guide the teachers on what they should teach that is related to ICT, and how to
teach it. Since ICT development comes so rapidly, teachers might be overwhelmed
by its rapid speed. Temperance in its use is caution that should be looked at.
2. Technology should never replace any human teachers. The tools support
instructional materials for teachers which are available for use. The teacher should
learn how to appropriately use them. Human touch of the teacher is still a vital
component in teaching. Teachers should always be reminded that there are always
3. There are rules and regulations that govern the use of technology. Caution should
be observed to protect individuals privacy. As teachers, you must be aware that the
1. The learners of the 21st Century are even more advanced than more of the
teachers. However, learners still need guidance on how to use, regulate technology
use. As there are positive and negative effects of technology use, learners should
2. Learners should not only know the benefits to technology use, but they should also
know how they can be protected from the hazards that that technology brings to
their lives.
3. Learners should take advantage of the potential of learning support they can derive
such as the development of higher order thinking skill, the development of learning
4. Both the teachers and learners should be mindful of the e-waste that is being
thrown away to the land and to the atmosphere. Thus, safety in the use of
2.) Lifestyle websites like self-harms and suicide sites, and hate sites;
5.) Health and wellbeing (amount of time spent on-line, internet gaming and many more;
10.) Social pressure to maintain online networks via texting and social networking sites.
->Copying information into assignment and failing to acknowledge the source (plagiarism
and copyright infringement).
->Misconduct associated with subject logins, such as using someone else's password.
->Unauthorized king of pictures or images with mobile phone camera still or moving.
e-Safety
e-safety takes care not only of internet technologies but also of electronic communications
via mobile phones, games consoles and wireless technology. It highlights the need to
educate children and young people about the benefits, risks and responsibilities of using
information technology. Here are some issues of e-safety:
e-safety helps safeguard children and young people in the digital world;
positive way;
e-safety educates children about the risks as well as the benefits so we can feel confident
online; and e-safety supports young learners and adults to develop safer online behaviors,
both in and out of school.
Network Management
1.2. Require all users to always log off when they have finished working.
1.4. Provide students with access to content and resources through guided e-learning.
1.5. Set up a clear disaster recovery system in place for critical data that include secure,
remote back
up of critical data.
1.6. Secure wireless network to appropriate standards suitable for educational use.
1.7. Install all computer equipment professionally and meet health and safety standards.
1.8. Review the school ICT system regularly with regard to health and safety and security.
2. Password Policy
2.1 Only authorized users will have individual passwords. 3. Personal mobile phones and
mobile devices
3.1 All mobile phones shall be kept away in a box away from the children or learners and
access is only allowed at break time or at the end of classes or when needed during the
class period.
4. Camera
4.2 Taking pictures only from parents or caregivers and not from any other family member
or friend while the child attends class.
4.2. Any picture taken of children shall be on cameras solely for the purpose.
Schools that plan to dedicate a room where the students can access technologies for
learning should include the following basic safety rules:
1.) Provide tiltable tables. This can be tilted and adjusted to the height of the users.
More specifically safety rules that can reduce risk of accidents in the working
1.) No trailing wires across or around the room which people can trip on.
2.) Electrical sockets should not be overload.
4.) There should be adequate space around desk for people to move.
7.) Heating and ventilation should be suitable for the working environment.
9.) Fire exits should be clearly marked and free from clutter.