UGC Drafts Handbook on ‘Digital Hygiene’, Details Redefined Protocols for Virtual Classrooms

Safe web searching, closing webcam and laptop audio when not in use, not downloading content material whereas utilizing public wifi and utilizing a password supervisor are among the many suggestions made by College Grants Fee in its draft handbook on “Digital Hygiene”. The UGC has drafted a handbook for Larger Instructional Establishments (HEIs) to allow college students and lecturers to remain secure in “Cyber Space”.

The handbook which additionally particulars “Redefined behaviour protocols for students and objectives of teachers in virtual classes” comes towards the backdrop of the shift to on-line studying prompted by the COVID-19 pandemic.

“In the emerging era of digitalization, education requires tech-assisted teaching, learning solutions, and fast-paced innovations. Students and teachers now have access to smart mobile devices as well as a variety of remote e-learning and evaluation options. Virtual classrooms have brought a distinct perspective on the teaching-learning process as we move to teach online,” the draft said.

“There are numerous crucial characteristics of remote teaching that might be detrimental to the entire school community. Teachers, on the other hand, should be concerned about attacks that occur during virtual classroom lectures while the discussion is in progress,” it learn.

The fee famous that it’s abundantly clear that we dwell in a Big Data world the place “Right to be Forgotten” or “Right to be Erased” shouldn’t be that straightforward because the identification of a person is disclosed not solely privately however on public platforms too.

“The metadata plays an important role due to which digital footprints are always left behind in one form or another to find the digital trail towards an individual. Your likes on social media posts, the content material that you just watch, net cookies on the web sites you go to, and so forth., could make up your digital footprints,” it mentioned.

Trusting strangers, unawareness and underestimating the chance are among the many main causes listed by the fee which makes the customers weak in our on-line world.

Social engineering assaults, misinformation and propaganda, deep fakes, impersonation, spoofing, morphing, identity theft, cyber espionage, phishing, UPI fraud, are among the major cyber crimes that users need to be aware of,” the handbook said including an inventory of dos and don’ts for every of the crimes.

Preserving social media profiles’ privateness settings as strict as doable, particularly for the general public and others, remembering that something shared on-line will stay in our on-line world and may be misused anytime, not downloading books and apps from unreliable assets, not sharing monetary info, putting in a dependable anti-virus software program, utilizing a hearth wall and clearing searching historical past and browser cache sometimes to forestall using outdated types, shield private info and assist purposes run higher, are among the many suggestions made within the handbook.

“Another form of fraud is employment-related fraud, as people have started looking for job opportunities online. It has allowed scammers to trick people into scams. Scammers offer fake job opportunities to job seekers through various online services claiming to hold positions in recognized companies and this makes it difficult for people to find out if the offer is legitimate or no,” it said.

The UGC has also prepared a draft syllabus of Cybersecurity Course for undergraduate and post-graduation along with credit scheme.

“The 2 paperwork will quickly be put in public area to hunt suggestions from stakeholders. The HEIs ought to designate a school member as Cyber Safety Officer and in addition attempt for ISO certification. The establishments ought to focus on having cyber safety protocols in place,” a senior official said.

“HEIs could contemplate providing a course on cybersecurity to all the scholars to create consciousness and capability constructing for instructing of cybersecurity course needs to be performed,” he added.

Source link

Leave a Reply

Your email address will not be published.