Safe+and+Ethical


 * Safe & Ethical **

==In terms of safe and ethical procedures, the Learning Managers need consider that when students are using technology tools online that they need to be tested and reviewed to see if the content on the program is acceptable and that the program is correct for that particular age group. The Learning Manager further needs to consider that before they start to use the technology tools, that they have informed parents and guardians that their children are going to be using these programs in class.==

==Formal permission needs to be obtained from parents or guardians when their child’s photo, names or work are going to be displayed on the internet or through social network communication such as Skype. The reason for this is as there may be some students who have privacy protection issues or orders.==

==A strategy to assist the Learning Manager for when students surf the internet has been implemented into these teaching activities by sourcing and selecting appropriate photos for the students to access. “Ensure avoidance of unwanted or adult materials.”(Department of Education and Early Childhood Development, 2010) When the internet is being accessed, information needs to be provided to both Learning Managers and students about the “issues of creditability on the Internet.” (Department of Education and Early Childhood Development, 2010) Many sources which appear on the Internet are not credible and therefore, there is a means in which Learning Managers and students can make sure the sources they are using are credible and reliable information. “Credible websites that have been reliable peer reviewed and are monitored sources (.org, .gov sites etc) compared to commercial sites (Wikipedia, etc)”. (Department of Education and Early Childhood Development, 2010)==

==Students need to consider that when they are using ICTs at school, they need to remember to “comply with the school expectations and protocols when using ICT.” (Department of Education and Training, 2011.) Students need to be aware of cyber bulling through ICTs as it is a common occurrence. Cyber bullying, “involves the use of information and communication technology such as mobile phones, video cameras, e- mails, and web pages to post or send harassing or embarrassing messages to another person.” (Ybarra & Mitchell, 2004). It has been indicated from research completed by Cross (2010), that “About 10 percent of young people report that they’re being cyber bullied in Australia at the moment, every few weeks or more often.” ==

== Whilst adhering to correct procedures should reduce the potential for a breach of privacy and ethics, the Australian Government has identified cyber bulling as a major issue and therefore have created a cyber safety help brochure and access method. Further information is available from the Department of Education and Training (2011). ==