ICT Policies and Issues

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following is NOT one of the three main areas covered by ICT policies?

  • Telecommunications
  • Digital Art (correct)
  • Internet
  • Broadcasting

The DICT's roadmap aims to regulate the use of ICT but not enhance it.

False (B)

What is the term for the use of personal information to monitor a person's activities, which stems from electronic communications?

Dataveillance

The ICT program that supports the education sector in incorporating ICT and accessing necessary infrastructure is called ______.

<p>ICT4E</p> Signup and view all the answers

Match the following types of privacy with their descriptions:

<p>Personal Privacy = The right of individuals not to have their home life interfered with. Privacy of Communication = Protection from interference with communication over the phone or internet. Information Privacy = Related to the use of computers and systems to process personal information.</p> Signup and view all the answers

Which of the following best describes 'filtering' in the context of internet censorship?

<p>Sifting through data packets to eliminate 'undesirable' materials. (C)</p> Signup and view all the answers

Access to the internet and other media is equally available to everyone across all countries.

<p>False (B)</p> Signup and view all the answers

What is the dictionary definition of "policy"?

<p>A course of action adopted and pursued by a government, party, ruler, or statesman.</p> Signup and view all the answers

According to MSN's contracts, individual rights are given up in order to have access to electronic networks. MSN reserves the rights to terminate access to any or all MSN sites or services at its ______.

<p>sole discretion</p> Signup and view all the answers

Match the following technologies to their descriptions:

<p>Information Technology = Use of computers to process data and save time. Telecommunication Technologies = Telephones and broadcasting of radio and television through satellites. Networking Technologies = Internet, mobile phone technology, and VoIP.</p> Signup and view all the answers

Which of the following is NOT mentioned as a type of e-waste generated by ICT?

<p>Printed Documents (B)</p> Signup and view all the answers

The text suggests that technology should replace human teachers to enhance the learning process.

<p>False (B)</p> Signup and view all the answers

What is the main goal of the Open Content in Education Initiative (OCEI)?

<p>To convert DepEd materials into interactive multi-media content.</p> Signup and view all the answers

Remedies for e-waste include standardization and ______ measures to increase the life cycle of equipment.

<p>regulatory</p> Signup and view all the answers

Match the following concepts related to misuse of ICT with their descriptions:

<p>Plagiarism = Copying information without acknowledging the source. Misconduct = Using someone else's password. Unauthorized Taking of Pictures = Taking images with a mobile phone camera without permission.</p> Signup and view all the answers

Which of the following is NOT a main concern addressed by e-safety?

<p>Providing hardware for digital literacy. (B)</p> Signup and view all the answers

Schools are not required to review their ICT system periodically with regard to health and safety and security.

<p>False (B)</p> Signup and view all the answers

What should schools provide in an educational technology room to accommodate users of different heights?

<p>Tiltable tables that can be adjusted to the height of the users.</p> Signup and view all the answers

PheDNET is described as a ______ garden that provides educational materials for Filipino students.

<p>walled</p> Signup and view all the answers

Match the following safety rules for educational technology rooms with their purpose:

<p>No trailing wires = Prevent tripping accidents. Adequate space around desks = Allow easy movement. Clearly marked fire exits = Ensure safe evacuation.</p> Signup and view all the answers

Signup and view all the answers

Signup and view all the answers

Flashcards

What are ICT Policies?

ICT policies are guidelines to be followed by governments, organizations, and entities involving ICT.

Information technology

Includes the use of computers to process data and save time. Needs hardware, software, and computer literacy.

Telecommunication technologies

Telephone and broadcasting (radio, TV) via satellites. Requires telephone systems, radio, and TV broadcasting setup.

Networking technologies

Includes internet, mobile phone technology, Voice Over Internet Protocol (VOIP), and satellite communications.

Signup and view all the flashcards

ICT for Education (ICT4E)

A program under DICT to support ICT use in education, access to infrastructure, and use of learning technologies.

Signup and view all the flashcards

ICT in Education Masterplan

Masterplan for all levels including faculty development and a framework in basic education.

Signup and view all the flashcards

Open Content in Education Initiative (OCEI)

Converts DepEd materials into interactive multi-media content, develops applications, and promotes ICT education.

Signup and view all the flashcards

What is eSkwela?

It provide alternative ICT-enhanced educational opportunities.

Signup and view all the flashcards

eQuality Program

A program for tertiary education improving IT education through partnerships with state universities and colleges (SUCs).

Signup and view all the flashcards

Digital Media Arts Program

Develops digital media skills for government.

Signup and view all the flashcards

Civil Liberties

Issues in ICT Policy related to human rights and freedoms.

Signup and view all the flashcards

Freedom of Expression and Censorship

The UN declaration provides that everyone has freedom of expression; however, practices violate this on the internet.

Signup and view all the flashcards

Censorship

Restricting information by blocking or filtering access to whole areas of the internet.

Signup and view all the flashcards

Defamation Actions

Actions that may be used to silence critics that deters the freedom of expression.

Signup and view all the flashcards

Privacy Policies on Websites

Most commercial sites have a privacy policy and require an agreement to access private information.

Signup and view all the flashcards

Personal privacy

The right of individuals not to have their home, private life, or personal life interfered with.

Signup and view all the flashcards

Privacy of communication

Protection from interference with communication over the phone or internet.

Signup and view all the flashcards

Dataveillance

The use of personal information to monitor a person's activities, while data retention is the storage of information.

Signup and view all the flashcards

E-pollutants from E-waste

Terminal equipment used for computing, broadcasting, telephony, and peripherals which contains potentially pollutive materials.

Signup and view all the flashcards

Implications to Teaching

Temperance in ICT use and technology should supports teachers.

Signup and view all the flashcards

Study Notes

  • Globalization and ICT are fundamental, leading to a networked society with opportunities for collaboration
  • Policies in ICT use are imperative to address inclusion, access, and marginalization.
  • The Department of Information, Communication, and Technology (DICT) states: "The future has arrived. Now we have to ensure that we have a place in it."

ICT Policies and Issues

  • Enhancing ICT use requires formulating and implementing guiding policies.
  • The Oxford English Dictionary defines "policy" as "a course of action, adopted and pursued by a government, party, ruler, statesman."
  • The operational definition of policy is a plan of action to guide decisions and achieve outcomes.
  • ICT Policies help guide actions involving ICT by governments, organizations, and entities.
  • ICT policies include principles and guidelines covering telecommunications, broadcasting, and the Internet.

New ICT Technologies

  • Recent technological innovations have increased communication reach and speed.
  • Information Technology includes the use of computers for data processing, requiring computer hardware, software, peripherals, and computer literacy.
  • Telecommunication technologies include telephones and broadcasting via satellites.
  • Networking technologies include the Internet, mobile phone technology, Voice Over Internet Protocol (VOIP), and satellite communications.
  • Networking also includes mobile telephone, cable, DSL, satellite, and broadband connectivity.

DICT Roadmap

  • The Department of Information and Communication Technology (DICT) has a roadmap to guide agencies in ICT utilization and regulation.
  • ICT roadmap aims to enhance ICT use, statements and guidelines.
  • The ICT for Education (ICT4E) program supports education sector efforts in incorporating ICT use and infrastructure access.
  • ICT in Education Masterplan for all levels.
  • Content and application development through the Open Content in Education Initiative (OCEI).
  • PheDNET hosts educational materials and applications for Filipino students and teachers, accessible in public high schools.
  • Established Community eLearning Centers (eSkwela) provides ICT-enhanced alternative education for out-of-school youth (OSY).
  • eQuality Program improves IT education quality in tertiary education via partnerships with state universities and colleges (SUCs).
  • Digital Media Arts Program builds digital media skills for government using Open Source technologies.
  • ICT skills strategic plan develops an inter-agency approach to address ICT skills demand.
  • All programs are guided by a roadmap embedding education-related policy statements for teaching and learning enhancement.

Issues on ICT and Internet Policy and Regulations

  • Access and Civil Liberties are crucial issues, including freedom of expression, privacy, communication, and intellectual property rights.
  • Basic access to the internet and other media.
  • Infringement to Civil Liberties or Human Rights that relate to civil liberties or human rights have to be studied.
  • Under international human rights conventions, free expression is guaranteed.

Freedom of Expression and Censorship

  • Individual rights are given up to access electronic networks e.g. Microsoft contract that allows termination of access to MSN sites.
  • Censorship restricts information transmission by blocking or filtering.
  • Blocking prevents access to areas of the Internet and filtering sifts packets of data.
  • Defamation actions may be used to silence critics, which deters freedom of expression.

Privacy and Security

  • Privacy policies are an issue on commercial sites; clicking "I agree" can release private information.
  • Privacy refers to personal privacy, protecting against interference with home and personal life.
  • Privacy of communication protects against interference.
  • Information privacy is related to processing data and ensuring its use is limited to its original purpose.

Surveillance and Data Retention

  • Electronic communications leads to indirect surveillance, dataveillance.
  • Dataveillance is the use of personal information to monitor a person's activities.
  • Data retention is the storage and use of information from communication systems.
  • "Counter surveillance" or "information security" is done to make surveillance difficult in computers and electronic communication.

E-pollutants from E-waste

  • Large amounts of e-waste is generated by ICT, like computers, laptops, broadcasting equipment, phones, and peripherals.
  • E-waste accumulates due to rapid turnover of equipment.
  • Toxic material waste requires management.
  • E-waste quantities are increasing in developed and developing countries.
  • Industrial countries often ship e-waste to developing countries.
  • Standardization and regulatory measures can increase equipment life cycles.
  • Efficient extraction of toxic components and recycling must be required.
  • Uncontrolled e-waste affects climate change, damages human lives, and overloads the earth.

Implications to Teaching and Learning

  • Teachers and learners should understand policy guidelines and projects related to teaching and learning, as well as the issues.

For the Teachers and Teaching

  • ICT relates to technology and teaching.
  • Teachers must be guided on what to teach and how to teach it,.
  • Teachers must be careful with rapid ICT development and use technology appropriately.
  • Technology should support teachers, not replace them, and human teacher touch is vital.
  • Teachers should be aware of rules and regulations governing technology use and individual privacy.

For the Learners and Learning

  • Learners need guidance on using technology and knowing its positive and negative effects.
  • Learners should understand and should be protected from technology's hazards.
  • Learners can develop analytical and problem solving through working in their learning communities..
  • Teachers and learners should be aware of e-waste issues, waste that should not directly be in the environment.

Risks in the Use of ICT and e-Networking

  • Exposure to inappropriate content, extremism, and pornography are digital technology risks.
  • Lifestyle websites like self-harm and suicide sites, and hate sites should avoided.
  • Cyber-bullying, sexually explicit images or messages are a danger.
  • Personal information and privacy are safety issues that must be protected.
  • Health and well-being need considered, including time spent online, gaming, and more.
  • Prolonged exposure to online technologies, particularly at an early age, is dangerous.
  • Addiction to gambling and gaming has negative impact.
  • Theft and fraud from activities such as phishing is a risk.
  • Viruses, Trojans, spyware and other malware are dangerous.
  • Social pressure to maintain online networks via texting and social networking sites.

Minor Misuse of ICT

  • Copying information with plagiarism, downloading irrelevant materials, and subject login misconduct.
  • Leaving a mobile phone turned on during class, unauthorized mobile device images.

E-safety

  • E-safety covers internet, mobile phones, game consoles, and wireless technology.
  • It highlights the need to educate about IT benefits, risks and use.
  • E-safety helps safeguard children and young people in the digital world.
  • E-safety emphasizes learning and understanding new technologies positively.
  • E-safety educates children about risks and benefits to build confidence online.
  • E-safety supports safer online behaviors for learners and adults.

Network Management: Safety in the Use of Network in Schools

  • Clear protocol that makes sure no one should log on as other user.
  • Require to always log off when finished.
  • Maintain equipment to ensure health and safety.
  • Provide students access to content and resources through guided e-learning.
  • Set up a clear disaster recovery system in place for critical data with secure, remote backups.
  • Secure wireless network to appropriate standards for educational use.
  • Install all computer equipment according to standards and in a professional manner.
  • Professional instillation meets health and safety standards.
  • Review regularly that ICT system should always care for health and safety of people.

Password Policy

  • Only authorized users will have individual passwords.
  • Users are not permitted to disclose their passwords unless they got permission from the owner or from the management.
  • The equipment that keeps the personal information shall be locked when unattended to prevent unauthorized access.
  • Computers should be set to a time out if they become unused for a certain period of time.

Personal Mobile Phones and Mobile Devices

  • All mobile phones shall be kept away in a box away from the children or learners and access is only allowed at breaktime or at the end of classes or when needed during the class period.

Cameras

  • Taking pictures only from parents or caregivers and not from any other family member or friend while the child attends class.
  • Any picture taken on cameras solely for the purpose.

Setting Up an Educational Technology Room

  • Tiltable tables should be provided for adjustment, along with anti-glare screen filters and adjustable chairs .
  • Foot support should be provided.
  • Lighting should be suitable and the workstation is not cramped.
  • Students must take frequent breaks while working at the computer.
  • No trailing wires, electrical sockets should not be overloaded, and electrical equipment must be safety-tested annually.
  • There should be adequate desk space, obstacles should be stored, and no food or drinks near machines.
  • There should be heating, ventilation, fire extinguishers, and marked fire exits.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser