Authorised by: Head ICT Faculty Document Name: Participant_ICTICT418v1.01.docx Date prepared: 20th Oct 2017 Version number: 1.01 P a g e | 1 ICTICT418 Contribute to copyright, ethics and privacy in an...

1 answer below »
Contribute to copyright, ethics and privacy in an ICT environment


Authorised by: Head ICT Faculty Document Name: Participant_ICTICT418v1.01.docx Date prepared: 20th Oct 2017 Version number: 1.01 P a g e | 1 ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment All work contained in the assessment must be your own work, and not copied from other sources or been previously submitted for assessment Where any significant portion of submitted work has been copied without proper acknowledgement from other sources, including published works, the internet, existing programs, the work of other students, or work previously submitted for other awards or assessments penalties may be imposed. You must upload your document(s) in the required format, and as individual files. Do not compress (zip) the documents when uploading it for assessment, or include within folders. Equipment Requirements Word processor application Internet Broadband Webcam / Microphone Speakers and/or headset Need Help with your Assessment? Post your query to your fellow participants in the Discussion Forum. Use this forum to post any question about any part of the assessment. Perhaps, you need help answering a question, or sourcing the information. Perhaps, you need some informal feedback on your assessment before you submit it. You can upload your assessment and ask your instructor for a constructive and supportive review. Upload the assessment, but do not submit it. Then send an email to your trainer asking them to review your draft document. Sharing information is the key to success. Remember the only silly question is the one that remains unasked!!! Participant Assessment Authorised by: Head ICT Faculty Document Name: Participant_ICTICT418v1.01.docx Date prepared: 20th Oct 2017 Version number: 1.01 P a g e | 2 Assessment Assignment Activities This assessment will look at how you, when working within an information, communications technology (ICT) environment, maintain professional and ethical conduct, and ensure that personal information is handled in a confidential and professional manner. You will review existing policies and procedures and develop or create these to the required standards, as well as examining organisational systems to ensure they meet legislative and organisational requirements. There are fourAssessment_Parts parts to this assignment. Part A is a scenario relating to intellectual property and copyright, and involves researching on the internet and writing a report addressing specified requirements. Part B is a is a scenario relating to privacy, and involves researching on the internet and writing a report addressing specified requirements. Part C is a scenario that relates to ethics, and involves researching on the internet and writing a report addressing specified requirements. Part D requires you to hold a meeting with another person, where you will record a conversation. You will need a webcam, microphone, phone, or similar, to record the conversation. Use the appropriate software program to develop your documents or files. You must upload your document in the required format. Do not compress the document(s) when uploading it/them for assessment. They must be uploaded as individual files. Authorised by: Head ICT Faculty Document Name: Participant_ICTICT418v1.01.docx Date prepared: 20th Oct 2017 Version number: 1.01 P a g e | 3 Part A – Intellectual property and copyright Instructions 1. Access and become familiar with the current Australian Copyright Act and any Amendments such as the Copyright Amendment (Digital Agenda) Act 2000. For example - Copyright Act 1968 Part III, Part IV and Part V. 2. Using a search engine, find and navigate to the ‘Copyright Australia’ website and make notes about the purpose of copyright and the processes involved. Ensure that you review Information Sheet G010v19 ‘An Introduction to Copyright in Australia’ produced January 2017. You will need this in instruction dot point 4 below. 3. Locate the current organisational copyright policy and procedures, within your organisation, and familiarise yourself with these. If you are not currently working, locate and use a copyright policy for an Australian organisation from the internet, or contact your trainer for support. 4. Prepare a report to management addressing the following areas: a. The report is to be 12pt font, with single line spacing. b. Identify the current Australian legislation (including Amendments) that relates to intellectual property and copyright, briefly explaining what the legislation and amendments cover. c. Provide one to two paragraphs explaining how the ‘An Introduction to Copyright in Australia’ may apply to the organisation you work in. d. Identify at least three areas covered by copyright legislation that relate to the organisation you work in, and provide an explanation for each about: i. the organisational policy that applies to each, and ii. how you apply the policy in day to day work. e. Review the existing copyright policy from your organisation and recommend changes to align the policy with legislation and industry standards. f. Create a procedure document that outlines one area of copyright and how this is managed – for example, a process to ensure that images used in the organisation’s website meet copyright laws. g. Outline how you will distribute the new or revised policy, and procedures, (from steps 4e and 4f) to: i. Existing staff ii. New staff iii. Management iv. External stakeholders. Authorised by: Head ICT Faculty Document Name: Participant_ICTICT418v1.01.docx Date prepared: 20th Oct 2017 Version number: 1.01 P a g e | 4 Part B – Privacy Privacy requirements in Australia: The near mandatory need to be “online” in the increasingly global economy has driven business forward in leaps and bounds within Information and Communication Technology. This technological growth has been an enabling tool for business. Increases in the speed of response of systems and the internet have provided flexibility and accessibility bringing great benefits to business and clients. Client information and requirements are now accessible from all corners of the globe. This presents a dilemma; that of how we secure information that we, as business IT professionals, are charged with caring for. Australia has a Privacy Act that governs what we must do to ensure protection of personal, sensitive data. The act is constantly being updated to cater for new technological advances. Keeping up to date with these changes is paramount in being successful in securing private data. You will need access to the internet, and will need to go to https://www.oaic.gov.au/privacy-law/privacy-act/ and https://www.oaic.gov.au/privacy-law/privacy-act/australian-privacy-principles and https://www.oaic.gov.au/agencies-and-organisations/guides/app-quick-reference-tool and examine the content in each area. Ensure that you understand the Australian Privacy Principles. Now read the article ‘Privacy Impact Assessment Guide’. You can search the internet for this, or retrieve it from the government’s privacy website. Pay particular attention to the section named ‘What is personal information?’ to explore what may be deemed as personal, private information. The article also has some very relevant information on how we can address and plan for change whilst protecting personal information. Note when it was written and decide if it is up to date. Is it still useful? Now go to the Australian Computer Society (ACS) website https://www.acs.org.au and gain an understanding of what ACS does. After gaining an understanding of the role of ACS, head to the ‘Governance’ ‘Rules and Regulations’ section of the site and review the ‘Code of Professional Conduct’ and ‘Code of Ethics’. We, as IT professionals, have a responsibility to maintain a high standard of Professional Conduct or ethical behaviour in the workplace. We are entrusted with a large amount of control over and access to information and data of our clients. Often, we are communicating with clients who know little of our industry and we have a responsibility not to take advantage of this situation. Instructions This part of the assignment will require you to review an Australian organisation’s privacy policy and compare this to the Privacy Act of Australia and Australian Privacy Principles (APPs) (hint:- most websites have one). We do not recommend examining anything with international owners, as legislation then crosses internal borders. If you cannot locate a suitable Australian policy, your trainer will be able to provide one. https://www.oaic.gov.au/privacy-law/privacy-act/ https://www.oaic.gov.au/privacy-law/privacy-act/australian-privacy-principles https://www.oaic.gov.au/agencies-and-organisations/guides/app-quick-reference-tool https://www.acs.org.au/ Authorised by: Head ICT Faculty Document Name: Participant_ICTICT418v1.01.docx Date prepared: 20th Oct 2017 Version number: 1.01 P a g e | 5 Internet research is the main vehicle to gather required content for your assignment. Ensure you have researched sufficiently to provide a detailed, relevant report. Ensure correct referencing is used: Harvard type. With particular focus on the Australian Privacy Principles (APPs), you must prepare a report that includes and addresses: a) A business style report to be presented in 12pt font, with single line spacing. b) One paragraph providing an overview of the organisation whose privacy policy you have examined. Ensure you reference information sources – Harvard style. c) One paragraph summarising who the privacy policy is aimed at, the broad scope of the policy, and where it is located within the organisation (eg website, Human Resources, etc.). d) How information that relates to privacy legislation is stored, maintained, and managed within the organisation, and how the integrity of information is ensured. This could include system security, whether data is stored off site, use of international data storage, who has access to information etc. e) Specific procedures relating to
Answered Same DayAug 10, 2021ICTICT418Training.Gov.Au

Answer To: Authorised by: Head ICT Faculty Document Name: Participant_ICTICT418v1.01.docx Date prepared: 20th...

Amit answered on Aug 14 2021
134 Votes
Title of the assignment: Assignment – 1 Contribute to copyright, ethics and privacy in an ICT environment
Student’s name:
Student ID:
Professor’s name:
Course title: ICTICT418
Date: 8/14/2020
Table of Contents
1.    Part -A: Intellectual property and copyright    3
2.    Australian legislation for copyright and intellectual property    3
3.    Copyright implementation to my work place    3
4.    Covered areas by copyright legislation to my work place    3
5.    Existing policy of copyrights and rec
ommended changes    3
6.    Outlined copyright area and management    3
7.    Distribution of revised policy to stakeholders, management, new and existing staff    4
8.    Part -B: Privacy    4
1.    Privacy policy of REA Group    4
2.    Scope and aim of used privacy policy to REA group    4
3.    Privacy legislation for management, storage and security of data    4
4.    Information accessing procedures at REA Group    4
5.    APP and privacy policy    4
6.    Recommended changes for privacy policy    5
7.    Distribution of new privacy policy, recording feedbacks monitoring practices    5
9.    Part -C: Ethics    5
1.    Code of ethics at REA Group    5
2.    Comparison with ACS ethics code    5
3.    Newly developed ethics code    6
4.    Implementation of new ethics code    6
5.    Reviewing implemented ethics code    7
8.    References:    8
1. Part -A: Intellectual property and copyright
2. Australian legislation for copyright and intellectual property
The copy right act 1968 is the main act in Australia which is mainly developed to provide legislation for copy right of individual property. This act is amended in 2000 for maintaining effective operations of online industry, providing online access to copy right based material and to ensure the copy rights of end users. The changed definition of broadcast is mainly provided by this amendment. This law maintains different sections which are developed to protect the copy rights of individual even in the online industry.
3. Copyright implementation to my work place
All the organizations which may be working in any area has to maintain the copy rights related to their developed products, logos and other involved material. My current organization is responsible to develop technical manuals for the developed software applications. The complete working application is provided by the developers of the client and technical manual of that application is developed in my organization. There are so many different identical applications are developed and used in market but we have to create a fresh manual for each product or application. Using the already developed technical manual of any other organization can violet the copy right act.
4. Covered areas by copyright legislation to my work place
The digital act of 2000 developed by Australian government defines the copy right legislation for the digital content. The main areas which are being covered by this act in my organization are explained below:
1. Not coping the logo: The logo of each application is different and coping the logo can lead to violation of copy right act. My organization is developed a policy to not make use of any other organizations logo without taking prior permissions.
2. Not coping the content of technical manual: Each developed application creates a technical manual for defining its operations and my organization does not allow to make direct copy from any other technical manual.
3. Not coping the developed code: My organization does not allows coping code of any already developed application.
A well defined copy right policy is used by my organization. The violation of copy rights is not allowed in any cost. The senior manager appointed by my organization makes regular checks regarding the copy right.
5. Existing policy of copyrights and recommended changes
The existing policy of copy right in my organization covers all professional requirements based on industry standards. This policy covers the digital content, logos, applications and client material. The recommended changes in the existing policy are listed underneath:
· The implemented copy right policy covers the offline material but most of the modern digital content is online, so, changes to cover the online material are required.
· Any guidelines to access the copy right material from online resources are not maintained in it.
· The rights of end users regarding the copy right material are not defined in it.
6. Outlined copyright area and management
The logo images are used to define the application and all logo images are unique in nature. There are different applications developed in my organization and separate logo is developed for each application. My organization ensures that logo of one application is not being used for any other application in any case. The top management makes assure the use of logo image for any developed application. A specific policy regarding the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here