Unit 2: Policies and Issues On Internet and Implications To Teaching and Learning
Unit 2: Policies and Issues On Internet and Implications To Teaching and Learning
Unit 2
YOUth Challenge:
Hello pre-service teachers! Welcome to the second unit of our course. In this Learning Material
2, challenge yourself to attain the following learning outcomes:
1. Discuss some ICT policies and explain their implications to teaching and learning
2. Explain some issues that relate to ICT policies
3. Reflect on the significance of safety concerns on Internet through individual reflection
writing
Teacher’s O’clock:
Hi everyone! I am back! This will be the second set of topics for this course. All of the activities
and discussions here are lifted from the books of Habulan 2016 and Bilbao et. al., 2019.
Before you start the challenge, please be encouraged to take all the contents of this LM seriously,
including the activities. It has been said that when you work all by your heart and might, you will
learn more. So, what are you waiting for? Start working hard and enjoy learning!
All the seven programs were guided by the roadmap that embeds policy statements that relate to
education specifically in the enhancement of human development for teaching and learning.
National, regional, and international laws can govern behavior in cyberspace and regulate
criminal justice matters relating to cybercrimes. These laws not only set rules and expectations
for behavior, but also the procedures to be followed in the event that the rules are broken and
behavior expectations are not met. In this LM, you will be provided with the brief descriptions of
the ICT laws, policies and regulations. However, at the end of this learning material, you will see
the complete copy of each law for further readings.
The law prohibits recording videos of taking photos of a sexual act, the male
or female genitalia, and of the female breast, among others, without consent
Brief Description of the persons featured in the material. The law ultimately seeks to prevent
the reproduction, distribution, and publication of said material regardless of
whether or not the persons featured consented to the recording.
https:///elegal.ph/the-anti-photo-and-video-voyeurism-act-of-2009-a-
Reference
primer/
This is an Act defining the crime of Child Pornography, prescribing penalties and
other purposes. This law creates an Inter-Agency Council Against Child
Brief Description
Pornography, which is tasked by the law itself with promulgating rules and
regulations.
Reference https://www.officialgazette.gov.ph
Brief Description This is an Act providing for the recognition and use of electronic commercial and
non-commercial transactions, penalties for unlawful use thereof, and other
purposes.
Reference https://digitalfilipino.com/
This is an Act regulating the issuance and use of access devices, prohibiting
Brief Description fraudulent acts committed relative thereto, providing penalties and for other
purposes.
Reference https://www.lawphil.net/
This is an Act to prohibit and penalize wiretapping and other related violations of the
Brief Description
privacy of communication, and for other purposes.
Reference https://www.senate.gov.ph
e-safety takes care not only of internet technologies but also of electronic communications via
mobile phones, games consoles and wireless technology. It highlights the need to educate
children and young people about the benefits, risks and responsibilities of using information
technology. Here are some issues of e-safety.
• e-safety helps safeguard children and young people in the digital world;
• e-safety emphasizes learning to understand and new technologies in a positive way;
• e-safety educates children about the risks as well as the benefits so we ca feel
confident online; and
• e-safety supports young learners and adults to develop safer online behaviors, both
in and out of school.
NETWORK MANAGEMENT
1. Safety in the Use of Network in Schools
1.1 Make clear that no one should log on as another user.
1.2 Require all users to always log off when they have finished working.
1.3 Maintain equipment to ensure health and safety.
1.4 Provide students to access to content and resources through guided e-learning.
1.5 Set up a clear disaster recovery system in place for critical date that include secure, remote
back
up of critical data.
1.6 Secure wireless network to appropriate standards suitable for educational use.
1.7 Install computer equipment professionally and meet health and safety standards.
1.8 Review the school ICT system regularly with regard to health and safety and security.
2. Password Policy
2.1 Only authorized users will have individual password. Users are not permitted to disclose
their password unless they got permission from the owner or from the management. The
equipment that keeps the personal information shall be locked when unattended to prevent
unauthorized access.
Computers should be set to a time out if they become unused for a certain period of time.
4. Cameras
4.1 Taking pictures only from parents or caregivers and not from any other family member or
friend while the child attends class.
4.2 Any picture taken of children shall be on cameras solely for the purpose.
Individual Activity #4
New technologies have become central to the lives of every individual in this planet. Whether you
are talking on the phone, sending an electronic mail, going to the bank, using the library, watching
news on television, going to the doctor, catching a flight, or seeing a movie, you are using ICT.
Almost everything that we do in the modern world is influenced by the new technologies.
Would your life as a teacher be also influenced by the new technology?
Should we live our lives to be controlled by technology or should we control the utilization of
technology in our lives? How?
Individual Activity #5
In 2000, the infamous LOVE BUG virus was distributed via email with the subject title ‘ILOVEYOU”
by clicking on an attachment, malware was downloaded onto the user’s system and the virus
spread by sending itself to the email addresses listed in the compromised user’s email address
book. The creator and distributor of the LOVE BUG virus, Onel De Guzman, resided in the
Philippines, which, at the time, did not have a law criminalizing this act (Maras, 2014).
Questions:
1. What are the implications of the absence of national cybercrime laws?
2. Are there any other countries where this might occur today?
Reflection Writing #3
Using technology is not a risk by itself, but how it is used will be vulnerable to risks. When
improperly used, it will pose danger to the users in school and at home. What are the safety issues
that are needed to be addressed by safety policy and guidelines? As future teachers, do you need
to know all of these?
References:
Habulan, Nenita, V., 2016, Pedagogical foundations in educational technology, Lorimar
Publishing Incorporated.
Bilbao, Purita, et. al., 2019. Technology for teaching and learning 1, Lorimar Publishing
Incorporated
https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/
https://www.lawphil.net/statutes/repacts/ra2010/ra_9995_2010.html
https://www.officialgazette.gov.ph/2009/11/17/republic-act-no-9775-s-2009/
http://www.mondaq.com/x/9200/Electronic+Commerce+Act+Republic+Act+No+8792
https://www.lawphil.net/statutes/repacts/ra1998/ra_8484_1998.html
https://www.lawphil.net/statutes/repacts/ra1965/ra_4200_1965.html
https://www.deped.gov.ph/wp-content/uploads/2010/06/DO-No.-78-s.-2010.pdf