Know and understand safety issues including electrocution from spilling drinks near electrical equipment and touching live cables, fire from sockets being overloaded or equipment overheating, tripping over trailing cables, heavy equipment falling and
Safety and Security (ICT 0417 – Topic 8)
Learning Objective
Know and understand the safety and security issues that can arise when using ICT equipment, including:
Symptoms: wrist pain, neck/back discomfort, blurred vision or headaches.
Prevention: adjust chair and desk height, keep the monitor top at eye level, use a document holder, take a 5‑minute break every hour, apply the 20‑20‑20 rule for eye relief (every 20 min look at something 20 ft away for 20 s).
2. e‑Safety (Protection of Personal and Sensitive Data)
2.1 Legal Framework
In the UK the Data Protection Act 2018 (which incorporates the EU General Data Protection Regulation – GDPR) sets out the legal duties for handling personal data. Schools must:
Process data fairly, lawfully and only for a specific purpose.
Keep data accurate, up‑to‑date and secure.
Retain data only as long as necessary.
Provide individuals (students, parents, staff) with rights to access, correct or erase their data.
These rules exist to protect privacy, prevent identity theft and ensure that personal information is not misused.
2.2 Core Data‑Protection Principles (CIAA)
Confidentiality – store data securely and share only with authorised persons.
Integrity – keep data accurate and un‑altered without permission.
Availability – ensure data can be accessed when needed, but not by unauthorised users.
Accountability – be able to demonstrate compliance with the law.
2.3 Practical Classroom Practices
Do not write passwords on sticky notes attached to computers.
Log out of accounts and lock the screen when leaving a workstation.
Use strong, unique passwords (minimum 8 characters, mix of upper‑/lower‑case letters, numbers and symbols).
Enable two‑factor authentication (2FA) for school accounts where available.
Never open email attachments or click links from unknown senders – this prevents phishing and malware.
When sharing a file, use the school’s approved cloud service and set appropriate access permissions (view‑only, edit, expiry date).
Report any suspected data breach to a teacher or IT officer immediately.
3. Data‑Security Threats and Protective Measures
3.1 Common Threats
Threat
What it does
Typical source
Malware (viruses, worms, trojans)
Infects, damages or steals data
Infected downloads, compromised USB drives
Ransomware
Encrypts files and demands payment
Phishing emails, malicious websites
Phishing / Social engineering
Tricks users into revealing passwords or personal data
Fake emails, instant‑message scams
Hacking / Unauthorized access
Gains control of a system or network
Weak passwords, unpatched software
Denial‑of‑Service (DoS)
Overloads a server, making it unavailable
Botnets, malicious traffic
3.2 Protective Measures
Anti‑virus / anti‑malware software – keep definitions up to date; run regular scans.
Firewalls – hardware or software firewalls filter incoming/outgoing traffic.
Data in transit – use SSL/TLS (HTTPS) for web traffic; look for the pad‑lock icon.
Data at rest – encrypt sensitive files with tools such as BitLocker, FileVault or third‑party AES‑256 utilities.
Removable media – enable built‑in encryption on USB sticks or external drives.
Digital certificates – verify the identity of websites and servers; ensure the certificate is issued by a trusted Certificate Authority (CA).
Biometric and token‑based authentication – fingerprint readers, facial recognition, smart‑card or USB security tokens add a physical factor beyond passwords.
Two‑factor authentication (2FA) – a second verification step (e.g., a one‑time code sent to a mobile device).
Secure passwords & password managers – generate and store complex passwords safely.
Backup strategy – automated daily backups stored on a separate device or secure cloud service; test restores periodically.
Safe browsing habits – check URLs, avoid downloading from unknown sites, use reputable browsers with built‑in phishing protection.
4. Responsible ICT Use (Ethical & Legal Considerations)
4.1 Audience Appreciation
When communicating safety or security procedures, tailor the message to the audience:
Students – short, visual reminders (posters, colour‑coded cables, “no‑food‑near‑computers” signs).
Teachers & staff – detailed policies, incident‑report forms, training on emergency procedures.
Suggested diagram: A safe classroom layout showing cable management, placement of RCD‑protected power strips, secured heavy equipment, ergonomic workstations, and a “no‑food‑or‑drink” zone around ICT stations.
Check Your Understanding
If a drink is spilled on a computer keyboard, what is the first action you should take?
Explain why plugging more devices into a single socket than its rated current is hazardous.
List two methods for preventing trips caused by cables in a classroom.
Describe the steps required to safely install a wall‑mounted projector.
Identify three common e‑safety threats and one protective measure for each.
Why is it important to use two‑factor authentication for school accounts?
Give an example of a situation where copying an image without permission would breach copyright.
Briefly state why the Data Protection Act / GDPR exists and how it relates to ICT use in school.
Support e-Consult Kenya
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.