Know and understand safety issues including electrocution from spilling drinks near electrical equipment and touching live cables, fire from sockets being overloaded or equipment overheating, tripping over trailing cables, heavy equipment falling and

Safety and Security (ICT 0417 – Topic 8)

Learning Objective

Know and understand the safety and security issues that can arise when using ICT equipment, including:

  • Physical hazards – electrocution, fire, trips, slips, falls and impact injuries.
  • e‑Safety – protection of personal and sensitive data, legal obligations (Data Protection Act / GDPR) and safe internet/email use.
  • Data‑security threats – malware, phishing, hacking, ransomware, DoS and related protective measures (encryption, certificates, biometrics, etc.).
  • Responsible ICT use – copyright, software licensing, audience‑appreciation and ethical behaviour.

1. Physical Safety

1.1 Electrocution

An electric shock occurs when a person becomes part of an electrical circuit. In a classroom the most common causes are:

  1. Spilling liquids on or near electrical devices.
  2. Touching exposed live conductors, damaged cables or plugs.
  3. Using equipment with missing or damaged insulation.

Preventive measures

  • Keep all drinks and liquids away from ICT equipment – designate a “no‑drink” zone.
  • If a spill occurs, switch off the mains supply (or the nearest fused spur) before cleaning.
  • Dry the area thoroughly; only reconnect power when it is completely dry.
  • Inspect cables, plugs and power supplies regularly – replace any with frayed or cracked insulation.
  • Never handle live cables with wet hands; use insulated tools or disconnect the supply first.

1.2 Fire

Electrical fire can start when components overheat or when a circuit is overloaded.

  • Plugging too many devices into a single socket or power strip.
  • Blocking ventilation on computers, monitors, printers or projectors.
  • Faulty wiring, damaged plugs or cracked cable sheathing.

Preventive measures

  • Observe the rated current of a socket (normally 13 A in the UK, 15 A in many other countries).
  • Use power strips with built‑in circuit breakers or RCDs (Residual‑Current Devices).
  • Maintain clear airflow around all equipment – do not cover vents.
  • Turn off and unplug devices that are not in use.
  • Regularly check for signs of overheating: warm plugs, discoloured insulation, unusual smells.

1.3 Trips, Slips and Falls

Trailing cables, unsecured equipment and cluttered walkways create tripping hazards.

  • Loose cables across aisles or under desks.
  • Unsecured power strips or extension leads.

Preventive measures

  • Route cables along walls, under carpets or through cable ducts where possible.
  • Secure cables with clips, cable ties, or floor‑mounted cable covers.
  • Keep walkways clear – store unused cables in cabinets or on shelves.
  • Label cables to avoid accidental unplugging or pulling.

1.4 Impact Injuries from Heavy Equipment

Monitors, printers, projectors and other heavy devices can fall if not properly mounted.

  • Improper wall‑mounting or desk placement.
  • Failure to use safety brackets or anti‑tip devices.

Preventive measures

  • Secure all heavy equipment with manufacturer‑approved brackets or anti‑tip devices.
  • Never place heavy items on unstable surfaces such as rolling chairs.
  • Follow the installation instructions supplied by the manufacturer.
  • Check the stability of mounted equipment regularly.

1.5 Other Physical Hazards

  • Sharp edges and moving parts – e.g., printer rollers, scanner glass. Prevention: keep hands away while the device is operating; use protective guards.
  • Ergonomic risks – repetitive‑strain injury (RSI), eye strain, poor posture.

    • Causes: prolonged typing, incorrect monitor height, inadequate lighting.
    • Symptoms: wrist pain, neck/back discomfort, blurred vision or headaches.
    • Prevention: adjust chair and desk height, keep the monitor top at eye level, use a document holder, take a 5‑minute break every hour, apply the 20‑20‑20 rule for eye relief (every 20 min look at something 20 ft away for 20 s).

2. e‑Safety (Protection of Personal and Sensitive Data)

2.1 Legal Framework

In the UK the Data Protection Act 2018 (which incorporates the EU General Data Protection Regulation – GDPR) sets out the legal duties for handling personal data. Schools must:

  • Process data fairly, lawfully and only for a specific purpose.
  • Keep data accurate, up‑to‑date and secure.
  • Retain data only as long as necessary.
  • Provide individuals (students, parents, staff) with rights to access, correct or erase their data.

These rules exist to protect privacy, prevent identity theft and ensure that personal information is not misused.

2.2 Core Data‑Protection Principles (CIAA)

  1. Confidentiality – store data securely and share only with authorised persons.
  2. Integrity – keep data accurate and un‑altered without permission.
  3. Availability – ensure data can be accessed when needed, but not by unauthorised users.
  4. Accountability – be able to demonstrate compliance with the law.

2.3 Practical Classroom Practices

  • Do not write passwords on sticky notes attached to computers.
  • Log out of accounts and lock the screen when leaving a workstation.
  • Use strong, unique passwords (minimum 8 characters, mix of upper‑/lower‑case letters, numbers and symbols).
  • Enable two‑factor authentication (2FA) for school accounts where available.
  • Never open email attachments or click links from unknown senders – this prevents phishing and malware.
  • When sharing a file, use the school’s approved cloud service and set appropriate access permissions (view‑only, edit, expiry date).
  • Report any suspected data breach to a teacher or IT officer immediately.

3. Data‑Security Threats and Protective Measures

3.1 Common Threats

ThreatWhat it doesTypical source
Malware (viruses, worms, trojans)Infects, damages or steals dataInfected downloads, compromised USB drives
RansomwareEncrypts files and demands paymentPhishing emails, malicious websites
Phishing / Social engineeringTricks users into revealing passwords or personal dataFake emails, instant‑message scams
Hacking / Unauthorized accessGains control of a system or networkWeak passwords, unpatched software
Denial‑of‑Service (DoS)Overloads a server, making it unavailableBotnets, malicious traffic

3.2 Protective Measures

  • Anti‑virus / anti‑malware software – keep definitions up to date; run regular scans.
  • Firewalls – hardware or software firewalls filter incoming/outgoing traffic.
  • Regular updates & patches – apply operating‑system and application updates promptly.
  • Encryption

    • Data in transit – use SSL/TLS (HTTPS) for web traffic; look for the pad‑lock icon.
    • Data at rest – encrypt sensitive files with tools such as BitLocker, FileVault or third‑party AES‑256 utilities.
    • Removable media – enable built‑in encryption on USB sticks or external drives.

  • Digital certificates – verify the identity of websites and servers; ensure the certificate is issued by a trusted Certificate Authority (CA).
  • Biometric and token‑based authentication – fingerprint readers, facial recognition, smart‑card or USB security tokens add a physical factor beyond passwords.
  • Two‑factor authentication (2FA) – a second verification step (e.g., a one‑time code sent to a mobile device).
  • Secure passwords & password managers – generate and store complex passwords safely.
  • Backup strategy – automated daily backups stored on a separate device or secure cloud service; test restores periodically.
  • Safe browsing habits – check URLs, avoid downloading from unknown sites, use reputable browsers with built‑in phishing protection.

4. Responsible ICT Use (Ethical & Legal Considerations)

4.1 Audience Appreciation

When communicating safety or security procedures, tailor the message to the audience:

  • Students – short, visual reminders (posters, colour‑coded cables, “no‑food‑near‑computers” signs).
  • Teachers & staff – detailed policies, incident‑report forms, training on emergency procedures.
  • Visitors / contractors – clear signage, brief verbal instructions, escorted access to ICT areas.

4.2 Copyright & Licensing

  • Only use software, images, music and videos that are licensed for school use or are openly licensed (e.g., Creative Commons, public domain).
  • Always acknowledge the source of any text, data or media incorporated into a project – this avoids plagiarism.
  • Do not install cracked or unlicensed software; use the school’s approved licences.
  • Respect the rights of content creators – seek permission where required.

4.3 Ethical Behaviour Online

  • Do not engage in cyber‑bullying, harassment or the distribution of harmful content.
  • Maintain confidentiality of classmates’ personal information.
  • Report inappropriate or illegal material to a teacher immediately.

5. Summary of Hazards, Causes, Immediate Actions & Prevention

HazardTypical CauseImmediate ActionLong‑term Prevention
ElectrocutionSpilled liquid on equipment; touching live or damaged cablesSwitch off mains, dry area, do not touch wet equipment; inform teacherKeep liquids away, inspect/replace damaged cables, use dry hands, use insulated tools
FireOverloaded socket; blocked ventilation; faulty wiringDisconnect power, use fire extinguisher if trained, evacuate if necessaryDo not exceed socket rating, use RCD‑protected strips, maintain ventilation, regular inspections
Trips/Slips/FallsTrailing cables, cluttered walkways, wet floorsClear the area, secure cables, warn others, mop up spillsRoute cables along walls, use cable covers, keep walkways tidy, label cables
Impact injury (heavy equipment)Improper mounting, missing brackets, unstable surfacesStay clear, secure equipment, report faultUse manufacturer‑approved brackets, anti‑tip devices, check stability regularly
Data breach (e‑Safety)Weak passwords, sharing personal data, phishingChange compromised passwords, report to teacher, log outStrong unique passwords, 2FA, educate on phishing, lock screens when unattended
Malware infectionDownloading from untrusted sites, using infected USB drivesDisconnect from network, run anti‑virus scan, inform teacherKeep anti‑virus updated, only download from trusted sources, scan removable media
Ergonomic injuryPoor posture, prolonged typing, improper monitor heightStop activity, stretch, adjust workstationErgonomic workstation set‑up, regular breaks, 20‑20‑20 eye rule, use wrist rests

Suggested diagram: A safe classroom layout showing cable management, placement of RCD‑protected power strips, secured heavy equipment, ergonomic workstations, and a “no‑food‑or‑drink” zone around ICT stations.

Check Your Understanding

  1. If a drink is spilled on a computer keyboard, what is the first action you should take?
  2. Explain why plugging more devices into a single socket than its rated current is hazardous.
  3. List two methods for preventing trips caused by cables in a classroom.
  4. Describe the steps required to safely install a wall‑mounted projector.
  5. Identify three common e‑safety threats and one protective measure for each.
  6. Why is it important to use two‑factor authentication for school accounts?
  7. Give an example of a situation where copying an image without permission would breach copyright.
  8. Briefly state why the Data Protection Act / GDPR exists and how it relates to ICT use in school.