This assessment task is to be submitted online by the due date specified by your Trainer/Assessor which is labelled on Moodle. Your assessor must approve any variations to this arrangement in writing.
Submit a file with the required evidence attached as per
Assessment Overview
This Assessment will assess Evidence of the ability to:
ELEMENT | PERFORMANCE CRITERIA |
Elements describe the essential outcomes. | Performance criteria describe the performance needed to demonstrate achievement of the element. |
1. Manage adherence to copyright regulations | 1.1 Review current Australian copyright law, and in particular its relationship to information and communications technology (ICT) |
2. Manage ethical behaviour | 2.1 Review appropriate code of ethics, both organisational and ICT specific |
3. Manage privacy | 3.1 Institute a regular review of the relevance of legislation and standards to organisational outcomes, the organisation's privacy policy and procedures, and the work practices of team members with regard to these requirements |
Performance Evidence |
Evidence of the ability to:
|
Knowledge Evidence |
To complete the unit requirements safely and effectively, the individual must:
|
Assessment Conditions |
Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the general ICT industry and include access to:
|
General Instructions
Assessment Task 1
Research via the internet in order to find the following answers about manage copyrights policy to protect ICT resources in an organisation. Australian Copyright Law, ACS (Australian Computer Society), The Commonwealth ACT and individual ICT company’s websites could be handy to complete the following task:
Assessment Task 2
Research via internet to find the following answers in order to manage ethical behaviour in an organisation.Assessment
ACS (Australian Computer Society), The Commonwealth ACT, Australian Government IP code of ethics and policies as well as individual ICT organization's websites could be used to complete the following task:
Assessment Task 3
Background Information: Research via internet to find the following answers in order to manage privacy in an ICT environment as
Assessment Task 3.a
Australian Copyright Law, ACS (Australian Computer Society), The Commonwealth ACT and individual ICT companies websites could be handy to complete the following task:
Assessment Task 3.b
Australian Copyright Law, ACS (Australian Computer Society), The Commonwealth ACT and individual ICT companies websites could be handy to complete the following task.
Case study:
You are designing a database management system for the personnel office for your company. The system will store extremely sensitive information such as performance evaluations, medical records for filing insurance claims, salaries, and so forth. With weak security, employees working on client machines may be able to figure out ways to get access to this data, not to mention the possibility of on-line access from hackers. You feel strongly that the system should be much more secure. However, the CEO, director of computing and director of personnel all agree that less security will do since it is going to very expensive to build high security system.
Assessment Task 4
Background Information: The Australian College of Business Intelligence, (ACBI) is a very young institute which has establish in Sydney, Australia in 2015. A youthful organization, enthusiastic, optimistic and accessible which believes in quality education and research can change the world for the better. ACBI usually offers number of courses across Business, Management, Information Technology disciplines as well as commercial training for corporate and different industries. ACBI has very targeted mission - " To be the dominant training provider in Australia by 2017, and be positioned to be a global player thereafter".
As a growing organization ACBI is facing number of challenges every day. To manage copyright, ethics and privacy ICT resources is one of the biggest challenge. Institute governing body has identified that institute website's does not have clear message in order to manage ICT resources.
ACBI decides to appoint a project management team to develop and manage Copyright, ethics and privacy policy for IT environment. Governing body also found last few years there are number of copyright and policy breaching incident happened among students and staff members. Institute is very keen to develop a standard code of ethics, copyright and privacy policy for everyone in the organization.
In order to manage copyright, ethics and privacy in ICT environment project team needs to assess current ICT industry requirements and governing bodies legislation. Student needs to follow Australian Copyright Law, ACS (Australian Computer Society) Code of conduct, The Commonwealth ACT, and ACBI requirements.
Assessment Task
Students need to read assessment background information and understand Australian Copyright Law, ACS (Australian Computer Society), The Commonwealth ACT, Australian Government IP code of ethics and policies which can ensure standard code of conduct, ethics, copyright and privacy for ACBI. Student needs to complete the following task:
Manage Copyright Policy
Manage Ethical Behaviour
Manage Privacy Policies
Assessment Task Helping Questionaries:
In order to understand the assessment task student may need to search for the following information:
legislation and standards to organizational outcomes, the organization's privacy policy and procedures
Assignment 2
ACS code of ethics
Australian Computer Society code of ethics is an element of the Australian Computer Society constitution. It promotes interest of public, honesty, enhanced quality of life, competence, professional development and professionalism.
CSR
CSR is Corporate Social Responsibility and it is associated with the ethical standards and entails that the organizations have not only the responsibility of profit maximization but also have legal, ethical and philanthropic responsibility (Carroll A.B. 1991). CSR encourages the organizations to practice ethical procedures in their business so that all the stakeholders of the organization are benefitted (Carroll, A.B., 1999).
Importance of ethics
Ethics are important to this profession because it maintains that the tools of information and technology are not used for harming anyone (De George, R.T., 2008). The use of code of ethics in the ICT environment also helps in finding the right and wrong act of an ICT professional.
Awareness of code of ethics
In order to ensure that all the staff and members in any IT organization are aware and understand the code of ethic laid down by the company the company can publish it online in a format. The code of ethics has to be rooted in trust, honesty and integrity (Ermann, M.D. and Shauf, M.S., 2002). Regular training and other enforcement techniques can be used to instil the code of ethics.
Code of ethics in ICT industry
The code of ethics in ICT industry provides a guideline for the individual conduct which are acceptable for any IT professional. It is thus complimentary to the ideals, values and standards of good conduct (Mason, R.O., 1995). The code of ethics in this industry require the professionals to demonstrate integrity, professional responsibilities, competence, work responsibilities and societal responsibilities associated with their profession (McDermid, D., 2015).
Distribution of an updated code
The new and updated code of ethics can be shared with all the IT professionals using digital tools and print media. But proper implementation of code of ethics require the professionals to imbibe the ethical codes for which training is necessary.
Ethics
The standards and codes of ethics can be used for finding out whether an act is ethical or not. The ethics of ICT industry and of the organization have to be used for judging an act as ethical or unethical (Reynolds, G., 2011).
Ethical responsibility
In the given scenario, my ethical responsibility is not to sell the most expensive model available in the store but I have to comply with the needs of the customer. As per the code of ethics of ACS there is primacy of public interest (Bowern, M., Burmeister, O., Gotterbarn, D. and Weckert, J., 2006) and hence I shall have to give all the concerns for the needs of the customer in buying the technical product. I will have to suggest that product which fulfils the requirement of the customers it may or may not be expensive.
Assignment 3(a)
The Privacy Act of 1988 is the legislation which governs the privacy of the personal information of the citizens in Australia (Patrick, A.S. and Kenny, S., 2003).
These are the principles given in schedule 3 of the Privacy Act in Australia (Doyle, C. and Bagaric, M., 2005). There are ten NPP which governs the processes used by the healthcare service providers, non-government, small businesses and large business for handling the personal information of the individuals in Australia (Pardo, A. and Siemens, G., 2014).
Personal information
Personal information is that information or any opinion of any identified person. In terms of privacy the protection of personal information entails that it is secure and is protected from unauthorised access by any other person.
Distribution of a new policy
A new or revised procedure and policy can be distributed by using both the print and digital media to all the stakeholders of a company and its employees. Further for the employees training programs can be used to reinforce the new policy and procedures in organizational practice.
Protection of the personal information
The organization has to follow strict procedures for observing the proprietary rights and confidentiality of the stakeholder’s personal information. For protecting the personal information of the stakeholders an organization must put in place guidelines for its employees as to who can have access to data and what type of data. It can also limit the use of personal information of the stakeholders to ensure safety to their information. IT tools for protecting the personal information must be used to protect the information from outside parties like the hackers.
The intention of ACS privacy policy.
The privacy policy is given in the schedule 1 of the Privacy act of 2012 in Australia. The intention of this policy is provide protection to the personal information of the different stakeholders in an organization. And also it guides the organization to frame their privacy policies accordingly to safeguard the personal information of the different stakeholders.
Management of privacy complaint
The privacy complaint is given to the privacy officer including the date, time and the concerned matter. The privacy officer usually resolves the complaint in five business days observing standards of fairness and honesty. If the complaint is not resolved, then it is sent to the Office of the Australian Information Commissioner.
The importance of disseminating your code of ethics throughout the organisation.
It is important to disseminate the code of ethics in the entire organization so that all the stakeholders become aware of it and imbibe in their business practice. It is important to let other acknowledge the codes as to implement it properly it is not only to be formulated on paper rather it has to be made a part of organizational culture. For this to take place it is necessary to distribute the code of ethics among the different stakeholders of the organization.
Assignment 4
It is important for the educational institution to formulate a copyright policy to protect its work.
In Australia the copyright is given in the Commonwealth Copyright Act of 1968. According to this law the creative works like software, films, artistic works, music, text etc are protected to be reproduced by any unauthorised party (Khan, A.N. and Hancock, P., 2001). The duplication of such creative work is only to be done by taking permission from the creator.
The duration of copyright as per the Australian legislation is 70 years from the death of the creator as maintained in 2019. A court may impose penalties for the offences and infringement of any copyright material. An infringement is when a person without taking permission of the creator take on the exclusive rights like the right to reproduce the material, display or perform any further work on it.
Students have to observe the copyright laws of the materials they are accessing for their work. The students are required not to copy any authors work which is protected under the copyright laws. Apart from the institution also gives copyright policy for all the creative work created in this institution and thereby it remains protected from any infringement from any unauthorised person.
The education institute holds an infringement policy for the copyright materials. In case of any offences found the person liable might be offered with penalties and damages.
The digital transmission of creative works adds to the problems of maintain copyright laws. Therefore, the use of internet for transmitting the creative work has to be done in such a manner that the exclusive rights of the creator are sustained.
It is the exclusive right of the creator to play or perform a song or a piece of music in public. The music can be played by person other than the creator if a prior permission is taken from him or ir qualifies to be played in public domain.
Pictures and images are protected under the copyright law and also the policy of the institution as creative works. The use of such creative works like copying or sharing it can only be done if permission is taken from the creator.
The trademarks and logos used by the educational institution is also protected by the copyright laws of the country. Also the copyright policy of the institute guides the use of its trademark and logos on internet and on various institute documents. Any illegal use of the trademark and logos are liable to attract penalties.
The educational institute requires the students to manage their own work and do not indulge in copying and taking work done by some other person. They need to check for the plagiarism in their work which is the copied part. Students are required to produce their own work and cite the source in their work properly.
It is important to inform all the stakeholders of the educational institute about the revision in the copyright policy. The stakeholders must be aware that their information is protected by the institute and that their creative work cannot be reproduced or displayed without taking their prior permission.
The students are required to observe the following code of ethics in the educational institution:
The organization with all its members and staff is required to adhere to the code of ethics. The staff has-
The breach of ethical conduct is liable to attract penalties and may also award damages to the responsible person. The penalty and punishment will depend upon the severity of the damage and offence and may also cause expulsion of the student from the institute.
The complaints management policy entails that the complaints submitted must have date and time, detail of the matter and the name of the person. The complaints shall be handled by the privacy officer and is to be resolved within seven business days.
The social media policy and electronic collaboration maintains that the materials which are protected under the copyright act are used on the social media or in electronic collaboration. The institute also holds the right to offer penalties if social media is used for harming any person of the institute by any means.
The authorised users can use the institute domain for electronic mail and messaging. The data of the email is the intellectual property of the institute and any inappropriate use of the domain by any person internal or external to the institute is liable to attract punishments and penalties.
The information of the institute in the different systems and on the cloud are protected. Any unauthorized access to the protected data shall be dealt with strict measures.
The student and staff of the institute can use the internet for legitimate purpose in the college campus.
The users of the IT resources have to comply with the guidelines of the institute and adhere to the ethical and moral standards
The IT infrastructure are protected from any unauthorized access and only the permitted users have the access to the IT infrastructure of the institute.
This policy protects the IT assets of the institute and aims to maintain the security of the stored data. It provides a structure for governance and complies with the legislations.
This notice covers all the technology product, websites, domains, applications and services. It gives the details of the practices for the collection and use of visitor’s information like storing the preferences of the visitors, alerting, recording past activity etc.