ICTICT610 Manage Copyright, Ethics and Privacy in ICT Environment: IT Assessment Answer
ACS code of ethics
Australian Computer Society code of ethics is an element of the Australian Computer Society constitution. It promotes interest of public, honesty, enhanced quality of life, competence, professional development and professionalism.
CSR is Corporate Social Responsibility and it is associated with the ethical standards and entails that the organizations have not only the responsibility of profit maximization but also have legal, ethical and philanthropic responsibility (Carroll A.B. 1991). CSR encourages the organizations to practice ethical procedures in their business so that all the stakeholders of the organization are benefitted (Carroll, A.B., 1999).
Importance of ethics
Ethics are important to this profession because it maintains that the tools of information and technology are not used for harming anyone (De George, R.T., 2008). The use of code of ethics in the ICT environment also helps in finding the right and wrong act of an ICT professional.
Awareness of code of ethics
In order to ensure that all the staff and members in any IT organization are aware and understand the code of ethic laid down by the company the company can publish it online in a format. The code of ethics has to be rooted in trust, honesty and integrity (Ermann, M.D. and Shauf, M.S., 2002). Regular training and other enforcement techniques can be used to instil the code of ethics.
Code of ethics in ICT industry
The code of ethics in ICT industry provides a guideline for the individual conduct which are acceptable for any IT professional. It is thus complimentary to the ideals, values and standards of good conduct (Mason, R.O., 1995). The code of ethics in this industry require the professionals to demonstrate integrity, professional responsibilities, competence, work responsibilities and societal responsibilities associated with their profession (McDermid, D., 2015).
Distribution of an updated code
The new and updated code of ethics can be shared with all the IT professionals using digital tools and print media. But proper implementation of code of ethics require the professionals to imbibe the ethical codes for which training is necessary.
The standards and codes of ethics can be used for finding out whether an act is ethical or not. The ethics of ICT industry and of the organization have to be used for judging an act as ethical or unethical (Reynolds, G., 2011).
In the given scenario, my ethical responsibility is not to sell the most expensive model available in the store but I have to comply with the needs of the customer. As per the code of ethics of ACS there is primacy of public interest (Bowern, M., Burmeister, O., Gotterbarn, D. and Weckert, J., 2006) and hence I shall have to give all the concerns for the needs of the customer in buying the technical product. I will have to suggest that product which fulfils the requirement of the customers it may or may not be expensive.
- The privacy legislation
The Privacy Act of 1988 is the legislation which governs the privacy of the personal information of the citizens in Australia (Patrick, A.S. and Kenny, S., 2003).
- National Privacy Principles
These are the principles given in schedule 3 of the Privacy Act in Australia (Doyle, C. and Bagaric, M., 2005). There are ten NPP which governs the processes used by the healthcare service providers, non-government, small businesses and large business for handling the personal information of the individuals in Australia (Pardo, A. and Siemens, G., 2014).
- Three points of National Privacy Principles.
- Collection- this principle describes the what should be done when information is collected from the individuals by the organization, what steps have to be taken when information is to be collected from third parties and what the organizations have to inform the individual regarding the collection of the information.
- Use of information and its disclosure- this principle describes how an organization must use and disclose the personal information of an individual.
- Quality and security of information- this principle covers the steps to be taken by the organization to ensure that personal information is accurate and is up-to-date. It is also to be kept secure from the unauthorised users and access.
Personal information is that information or any opinion of any identified person. In terms of privacy the protection of personal information entails that it is secure and is protected from unauthorised access by any other person.
Distribution of a new policy
A new or revised procedure and policy can be distributed by using both the print and digital media to all the stakeholders of a company and its employees. Further for the employees training programs can be used to reinforce the new policy and procedures in organizational practice.
Protection of the personal information
The organization has to follow strict procedures for observing the proprietary rights and confidentiality of the stakeholder’s personal information. For protecting the personal information of the stakeholders an organization must put in place guidelines for its employees as to who can have access to data and what type of data. It can also limit the use of personal information of the stakeholders to ensure safety to their information. IT tools for protecting the personal information must be used to protect the information from outside parties like the hackers.
Management of privacy complaint
The privacy complaint is given to the privacy officer including the date, time and the concerned matter. The privacy officer usually resolves the complaint in five business days observing standards of fairness and honesty. If the complaint is not resolved, then it is sent to the Office of the Australian Information Commissioner.
The importance of disseminating your code of ethics throughout the organisation.
It is important to disseminate the code of ethics in the entire organization so that all the stakeholders become aware of it and imbibe in their business practice. It is important to let other acknowledge the codes as to implement it properly it is not only to be formulated on paper rather it has to be made a part of organizational culture. For this to take place it is necessary to distribute the code of ethics among the different stakeholders of the organization.
- Managing Copyright Policy
It is important for the educational institution to formulate a copyright policy to protect its work.
- Copyright Act
In Australia the copyright is given in the Commonwealth Copyright Act of 1968. According to this law the creative works like software, films, artistic works, music, text etc are protected to be reproduced by any unauthorised party (Khan, A.N. and Hancock, P., 2001). The duplication of such creative work is only to be done by taking permission from the creator.
- Duration of Copyright and Infringement
The duration of copyright as per the Australian legislation is 70 years from the death of the creator as maintained in 2019. A court may impose penalties for the offences and infringement of any copyright material. An infringement is when a person without taking permission of the creator take on the exclusive rights like the right to reproduce the material, display or perform any further work on it.
- Copyright laws for students
Students have to observe the copyright laws of the materials they are accessing for their work. The students are required not to copy any authors work which is protected under the copyright laws. Apart from the institution also gives copyright policy for all the creative work created in this institution and thereby it remains protected from any infringement from any unauthorised person.
- Copyright infringement policy
The education institute holds an infringement policy for the copyright materials. In case of any offences found the person liable might be offered with penalties and damages.
- The Internet
The digital transmission of creative works adds to the problems of maintain copyright laws. Therefore, the use of internet for transmitting the creative work has to be done in such a manner that the exclusive rights of the creator are sustained.
It is the exclusive right of the creator to play or perform a song or a piece of music in public. The music can be played by person other than the creator if a prior permission is taken from him or ir qualifies to be played in public domain.
Pictures and images are protected under the copyright law and also the policy of the institution as creative works. The use of such creative works like copying or sharing it can only be done if permission is taken from the creator.
- Trademarks and Logos
The trademarks and logos used by the educational institution is also protected by the copyright laws of the country. Also the copyright policy of the institute guides the use of its trademark and logos on internet and on various institute documents. Any illegal use of the trademark and logos are liable to attract penalties.
- Students must manage their work
The educational institute requires the students to manage their own work and do not indulge in copying and taking work done by some other person. They need to check for the plagiarism in their work which is the copied part. Students are required to produce their own work and cite the source in their work properly.
- Informing the stakeholders
It is important to inform all the stakeholders of the educational institute about the revision in the copyright policy. The stakeholders must be aware that their information is protected by the institute and that their creative work cannot be reproduced or displayed without taking their prior permission.
- Manage Ethical Behaviour
- Student Code of ethics
The students are required to observe the following code of ethics in the educational institution:
- To represent honesty and respect.
- To observe academic integrity.
- To abide the federal and state laws.
- To respect the free exchange of ideas.
- To abide the rules and regulations of the institute.
- Code of Ethics
The organization with all its members and staff is required to adhere to the code of ethics. The staff has-
- the academic responsibility to teach students.
- to give respect to human dignity.
- to respect the confidentiality and privacy of their students and other members.
- to respect the justice and safety of the students.
- To balance the harm and benefit associated with any teaching activity in a prudent manner.
- Action against breach
The breach of ethical conduct is liable to attract penalties and may also award damages to the responsible person. The penalty and punishment will depend upon the severity of the damage and offence and may also cause expulsion of the student from the institute.
- A template to record ethical incident used for reporting
- Name of the person
- Date and time
- Witnesses and proofs
- Ethical code breached
- Details of the incident
- Management of the Privacy Policies
- Complaints Management Policy
The complaints management policy entails that the complaints submitted must have date and time, detail of the matter and the name of the person. The complaints shall be handled by the privacy officer and is to be resolved within seven business days.
- Electronic Collaboration and Social Media Policy
The social media policy and electronic collaboration maintains that the materials which are protected under the copyright act are used on the social media or in electronic collaboration. The institute also holds the right to offer penalties if social media is used for harming any person of the institute by any means.
- Email and Messaging Policy
The authorised users can use the institute domain for electronic mail and messaging. The data of the email is the intellectual property of the institute and any inappropriate use of the domain by any person internal or external to the institute is liable to attract punishments and penalties.
- Policy for Information Security
The information of the institute in the different systems and on the cloud are protected. Any unauthorized access to the protected data shall be dealt with strict measures.
- Internet Usage Policy
The student and staff of the institute can use the internet for legitimate purpose in the college campus.
- IT Conditions of Use Policy
The users of the IT resources have to comply with the guidelines of the institute and adhere to the ethical and moral standards
- IT Infrastructure Policy
The IT infrastructure are protected from any unauthorized access and only the permitted users have the access to the IT infrastructure of the institute.
- IT Security Policy
This policy protects the IT assets of the institute and aims to maintain the security of the stored data. It provides a structure for governance and complies with the legislations.
- Website privacy notice
This notice covers all the technology product, websites, domains, applications and services. It gives the details of the practices for the collection and use of visitor’s information like storing the preferences of the visitors, alerting, recording past activity etc.