ICTICT618_
docx
keyboard_arrow_up
School
Deakin University *
*We aren’t endorsed by this school
Course
606
Subject
Business
Date
Feb 20, 2024
Type
docx
Pages
43
Uploaded by BrigadierAnteaterMaster276
Student
Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT
environments
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Copyright 2022
Australian College of Business Intelligence
All rights reserved
Version: 22.0
Date Modified: Dec 2022
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior written permission of Australian College of Business Intelligence.
Disclaimer:
The Australian College of Business Intelligence does not invite reliance upon, nor accept responsibility for, the information it provides. The Australian College of Business Intelligence makes every effort to provide a high-quality service. However, neither the Australian College of Business Intelligence, nor the providers of data, gives any guarantees, undertakings or warranties concerning the accuracy, completeness or up-to-date nature of the information provided. Users should confirm information from another source if it is of sufficient importance for them to do so.
Student Assessment Guide: ICTICT618
Version: v22.0
Page 2 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Content
s
1. Assessment Information
......................................................................................................
4
A. Purpose of assessment
........................................................................................................................
4
B. Competencies being assessed
.............................................................................................................
4
C. What you are required to do
...............................................................................................................
5
D. Adjustment and Support
.....................................................................................................................
7
E. Assessment submission
.......................................................................................................................
7
F. Assessment results and feedback
........................................................................................................
8
G. Technical tools for completing this assessment
..................................................................................
9
2. Assessment Coversheet
.....................................................................................................
10
3. Assessment Requirements
.................................................................................................
11
A. Overview
...........................................................................................................................................
11
B. Task 1 – Short Answer Knowledge Questions
....................................................................................
12
C. Task 2 – Project Case Study
...............................................................................................................
28
4. Student Checklist
...............................................................................................................
40
Student Assessment Guide: ICTICT618
Version: v22.0
Page 3 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
1. Assessment Information
A. Purpose of assessment
This assessment will develop your skills and knowledge to manage the issues of intellectual property (IP), copyright and professional and ethical conduct in a team and to ensure that personal information of
stakeholders is handled in a confidential and professional manner.
The unit applies to those operating at a senior level in an organisation with a high degree of autonomy in
managing policies and system security.
No licensing, legislative or certification requirements apply to this unit at the time of publication.
The assessment is designed to help you gather evidence of your competence against the requirements of the unit of competency, as outlined below. Your evidence may take a variety of forms and must be:
Authentic – your own work
Valid – related to the competency
Sufficient – appropriate quantity and quality
Current – recent proof of your skills and knowledge
B. Competencies being assessed
Elements
To achieve competency in this unit students must demonstrate their ability to:
Manage adherence to IP regulations
Manage ethical behaviour
Manage privacy
Performance Evidence
Evidence of the ability to:
analyse legislation and standards and contribute to the review of at least three different policies including IP, ethical conduct and privacy in an organisation.
In the course of the above, the candidate must:
communicate policy change to required personnel.
Student Assessment Guide: ICTICT618
Version: v22.0
Page 4 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Knowledge Evidence
To complete the unit requirements safely and effectively, you must:
federal and state/territory legislation and policy relevant to an ICT environment relating to:
o
copyright and intellectual property
o
privacy
processes and procedures by which an organisation communicates its policies and procedures
organisational requirements for customer service relating to managing copyright, ethics and privacy in ICT environments
industry standard ICT system security systems and procedures relating to managing IP, copyright, ethics and privacy in ICT environments.
For further information on the competencies of this unit, please refer to: https://training.gov.au/Training/Details/ICTICT618
C. What you are required to do
This assessment requires you to analyse legislation and standards and contribute to the review of at least three different policies including IP, ethical conduct and privacy in an organisation, communicate policy change to required personnel, manage adherence to IP regulations, manage ethical behaviour, manage privacy
Task 1
For Task 1 you are required to answer a number of short answer questions related to federal and state/territory legislation and policy relevant to an ICT environment relating to: copyright and intellectual property, privacy. Processes and procedures by which an organisation communicates its policies and procedures, organisational requirements for customer service relating to managing copyright, ethics and privacy in ICT environments, industry standard ICT system security systems and procedures relating to managing IP, copyright, ethics and privacy in ICT environments.
Task 2
For Task 2 you are required to undertake project were you analyse legislation and standards and contribute to the review of at least three different policies including IP, ethical conduct and privacy in an
organisation, communicate policy change to required personnel, manage adherence to IP regulation, manage ethical behaviour, manage privacy
For further details, please refer to the “Assessment Requirements” section of this document. Student Assessment Guide: ICTICT618
Version: v22.0
Page 5 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Assessment resources
To enable you to complete this assessment, the following documents have been provided in the unit course page on Moodle unit on Moodle:
Assessment Resource - ICTICT618
Student Assessment Guide: ICTICT618
Version: v22.0
Page 6 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
A note on plagiarism and referencing
Plagiarism is a form of theft where the work, ideas, inventions etc. of other people are presented as your
own. When quoting or paraphrasing from a source such as the Internet, the source must be recognised. If you
are quoting a source, make sure to acknowledge this by including “quotation marks” around the relevant words/sentences or ideas. Note the source at the point at which it is included within your assessment, such as by using a citation. Then list the full details of the source in a ‘references’ section at the end of your assessment. All sources used for your assessment should be detailed in the ‘references’ section. It is advisable to never copy another person’s work. D. Adjustment and Support
i. Reasonable adjustment
ACBI supports individual differences in the learning environment and provides ‘reasonable adjustment’ in training and assessment activities to support every learner. If you have any special needs that make it difficult for you to complete your learning or assessments, you should discuss this with your assessor. ACBI will endeavour to provide you with reasonable alternatives to assist you to complete the required tasks such as completing tests verbally or using an interpreter.
NOTE: If you have any special needs, you should discuss this with your assessor before starting your assessment. ii. Support
While ACBI may not be able to assist you with language training or specific Language, Literacy and Numeracy (LLN) training, our assessors will work with you to ensure that you are supported throughout your qualification. If you require individual tutoring this may attract an additional fee (please refer to the
ACBI Student Handbook available from https://www.acbi.edu.au). Support may be offered by your assessor, or for more specialist support you may need to contact the RTO administration.
E. Assessment submission
Always submit assessments on time by the due date. You can find the due date in the unit course page on Moodle. Student Assessment Guide: ICTICT618
Version: v22.0
Page 7 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
i. Assessment Coversheet
Once you have completed all the tasks of the assessment, you must complete the Assessment Cover Sheet, including signing the declaration. ii. File naming conventions
When submitting assessments electronically follow the following standard for naming document files and subject line. You must insert the following information:
Unit of Competency code (ie. ICTICT618)
‘A’ for word assessment then followed by the assessment number and a dash
Your first name and initial of last name. Capitalise only the first letter of names. Then insert a hashtag, followed by submission attempt. Hence as an example of incorporating the four points above your file name or subject line should appear
this way: ICTICT618 A1– JessieA #1
iii. Submission via Moodle
Please refer to the “Instructions for Submitting Your Assessment” on the unit course page in Moodle. NOTE: Please take care to follow all instructions listed. Assessments uploaded with a draft status on Moodle may not be graded.
F. Assessment results and feedback
i. Assessment results
Once you have submitted this assessment online via Moodle, your assessor will grade it and provide you with feedback. For each task of the assessment, you will receive a grade of ‘Satisfactory’ or ‘Not Satisfactory’. You will also receive a grade for the entire assessment of ‘Competent’ or ‘Not Competent’. Each task of the assessment must be ‘Satisfactory’ in order to receive a grade of ‘Competent’. ii. Resubmission
If your assessment is graded ‘Not Competent’, you receive instructions via the feedback form on components to be amended. Your assessor is committed to providing you with detailed feedback on the outcomes of the assessment and will provide guidance on areas for improvement. In most instances, you should need only complete the sections of the assessment that were deemed ‘Not Satisfactory’. However, it is important to remember that depending on the task, it may be necessary to repeat the whole task (for example presentations or the delivery of a training session).
Student Assessment Guide: ICTICT618
Version: v22.0
Page 8 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
If resubmission is required, you will need to amend or update your assessment as a different version by the required term cut-off date, as detailed on Moodle.
NOTE: For further information on late assessment, please refer to the ‘Assessment Policy’ available on Moodle.
iii. What happens if you do not agree with the assessment result
If you do not think the assessment process is valid, or disagree with the decision once it is made, or believe that you have been treated unfairly, you can appeal. The first step is to discuss the matter with your trainer. If you still do not agree with the assessment, you
are able to request a re-assessment. It is possible to have your evidence assessed by a different trainer. If you remain dissatisfied after the re-assessment, you should contact the Director of Studies. Full details
of the Appeals process are contained in your Student Handbook.
G. Technical tools for completing this assessment
To complete this assessment, you need access to:
Computer
Internet access
Internet browser
Word processing software : Microsoft Office or equivalent
Student Assessment Guide: ICTICT618
Version: v22.0
Page 9 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
2. Assessment Coversheet
3. Assessment Requirements
Student Assessment Guide: ICTICT618
Version: v22.0
Page 10 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
A. Overview
For this assessment, you are required to complete 2 tasks:
For Task 1 you are required to answer a number of short answer questions related to federal and state/territory legislation and policy relevant to an ICT environment relating to: copyright and intellectual property, privacy. Processes and procedures by which an organisation communicates its policies and procedures, organisational requirements for customer service relating to managing copyright, ethics and privacy in ICT environments, industry standard ICT system security systems and procedures relating to managing IP, copyright, ethics and privacy in ICT environments.
For Task 2 you are required to undertake project were you analyse legislation and standards and
contribute to the review of at least three different policies including IP, ethical conduct and privacy in an organisation, communicate policy change to required personnel, manage adherence to IP regulation, manage ethical behaviour, manage privacy
Please note: Task 2 of this assessment requires you to use the provided case study.
Student Assessment Guide: ICTICT618
Version: v22.0
Page 11 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
B. Task 1 – Short Answer Knowledge Questions i.
Instructions for students
Task 1 of this assessment requires you to demonstrate understanding related to federal and state/territory legislation and policy relevant to an ICT environment relating to: copyright and intellectual property, privacy. Processes and procedures by which an organisation communicates its policies and procedures, organisational requirements for customer service relating to managing copyright, ethics and privacy in ICT environments, industry standard ICT system security systems and procedures relating to managing IP, copyright, ethics and privacy in ICT environments.
You must complete 1 part
Task 1 is structured into one part:
10 Short Answer Questions Important resources for Task 1
To complete Task 1, undertake your own research and refer to the resources below provided on Moodle:
Assessment Resource- ICTICT618
Student Assessment Guide: ICTICT618
Version: v22.0
Page 12 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
ii. Task 1, Short Answer Questions Task 1, Part A of this assessment requires you to demonstrate understanding related to federal and state/territory legislation and policy relevant to an ICT environment relating to: copyright and intellectual property, privacy. Processes and procedures by which an organisation communicates its policies and procedures, organisational requirements for customer service relating to managing copyright, ethics and privacy in ICT environments, industry standard ICT system security systems and procedures relating to managing IP, copyright, ethics and privacy in ICT environments.
Answer the questions below using the space provided:
Answer all parts of each question
Use your own words and give examples wherever possible
The quality of your answer is more important than how long it is
Enter your answers in this document
You may use various sources of information to inform your answers, including your resources provided by ACBI, books, and online sources. You must acknowledge and cite your sources. A1. Identify and explain federal and state or territory legislation and policy relevant to an ICT environment relating to:
access and equity
copyright and intellectual property
workplace health and safety (WHS)
privacy Answer using 50-100 words.
Resource:
What is access and equity?
https://www.fairtrading.nsw.gov.au/about-fair-trading/access-and-equity
Smartcopying
https://www.smartcopying.edu.au/copyright-guidelines/copyright---a-general-overview/1-1-
what-is-copyright-
Australian Copyright Council
https://www.copyright.org.au/
Safework NSW
https://www.safework.nsw.gov.au/
What is privacy?
https://www.oaic.gov.au/privacy/your-privacy-rights/what-is-privacy/
Write your answer here
Student Assessment Guide: ICTICT618
Version: v22.0
Page 13 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Access and equity - this concept denotes fair and equitable access to services in sectors necessary for achieving and sustaining social, cultural, and economic well-being. Equity refers to the equitable distribution of economic, social, and political resources without regard to factors such as age, gender, race, ethnicity, aptitude, income, or sexual orientation.
Laws pertaining to the expression of ideas protect intellectual property. The legislation governing the expression of ideas through the use of images or sound is known as copyright. Copyright protects a distinct expression of thinking, in contrast to a trademark, which designates that a particular product or design is protected.
Occupational health and safety, or OH&S, is another name for work health and safety (WHS), which is the management of threats to everyone's health and safety at work. Those that work
for you, as well as your clients, guests, and suppliers, are all included in this.
A person's or a group's right to seclude themselves or information about themselves and so express themselves in a selected manner is known as privacy.
A2. What are the 4 types of intellectual property?
Answer using 50-100 words.
Resource:
Types of IP
https://www.ipaustralia.gov.au/understanding-ip/getting-started-ip/types-of-ip
Write your answer here
Copyright – In Australia, a thought or creative idea is automatically protected by copyright the moment it is written down or transmitted electronically. 2021 IP Australia
Trade secrets - You are responsible for protecting any proprietary innovations that contain sensitive information. Making sure employees or wholesalers sign confidentiality agreements is one method you can prevent competitors from getting their hands on this information. 2021 IP Australia
Circuit Layouts - Circuit formats are the design schematics or layouts (geographies) of integrated circuits used in hardware produced by personal computers. They are occasionally mentioned in conjunction with microprocessor or semiconductor chip designs. 2021 IP Australia
Student Assessment Guide: ICTICT618
Version: v22.0
Page 14 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
A3. Explain common creative, fair dealing and open source in terms of copyright. What are the materials exempted from copyright policy?
Answer using 50-100 words.
Resource:
Australian Copyright Council
https://www.copyright.org.au/
Assessment Resource- ICTICT618: Copyright - Exceptions to Copyright (G121v04).pdf
Australian copyright law overview
https://creativecommons.org.au/materials/copyrightlawoverviewinfopack.pdf
Write your answer here
Under some conditions, a copyrighted work may be used without the copyright holder's consent under a copyright law provision known as fair use. Activities such as news reporting, teaching, and parody are all examples of what may be considered fair use. Fair use is assessed on a case-by-case basis, taking into account the intended use, the extent to which the original work is used, and the effect on the original work's market.
Student Assessment Guide: ICTICT618
Version: v22.0
Page 15 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
A4.
What are the rights of a copyright owner? How long does copyright protection last in Australia?
Answer using 50-100 words.
Resource:
Australian Copyright Council
https://www.copyright.org.au/
Write your answer here
The copyright holder is permitted to: copy or scan the work for personal use; reproduce the work in material form; (Provide copies to the general public) To share the work with the public, use email, intranet or the Internet to post it, make it accessible online, or broadcast it on free-to-air or pay TV.
Copyright in published works in Australia typically lasts for the author's lifetime plus an additional 70 years. The length of a copyright for unpublished works depends on whether it was made public while the author was still alive.
A5.
What are the procedures should be undertaken to manage organisational copyright requirements are
up-to-date and team members are adhering to these requirements?
Answer using 50-100 words.
Resource:
Copyright - Procedures
https://www.usc.edu.au/about/policies-and-procedures/copyright-procedures
6 Tips for Creating an Effective Copyright Policy
http://www.copyright.com/learn/6-tips-creating-effective-copyright-policy/
8 Steps to Copyright Compliance
https://www.copyrightlaws.com/8-steps-to-copyright-compliance/
Write your answer here
The following advice will help you develop a successful copyright policy.
Show respect for other people's copyrights and lessen the chance of infringement.
Request advice from a copyright specialist.
Student Assessment Guide: ICTICT618
Version: v22.0
Page 16 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Disclose the details of copyright legislation.
Address the world's copyright problems.
Clearly state the compliance policies.
Explain to staff how to use things that belong to your company but are protected by copyright.
Provide workers with guidance on how to handle violations properly.
A6.
How the updated versions of copyright law will be distributed?
Answer using 50-100 words.
Resource:
Smartcopying
https://www.smartcopying.edu.au/copyright-guidelines/what-can-i-copy-communicate-
Write your answer here
Use the following guidance to create a successful copyright policy.
Be respectful of others' copyrights and reduce the likelihood of infringement.
Consult a copyright expert for advice.
Provide information on copyright regulations.
Address copyright issues on a global scale.
Clearly outline the rules for compliance.
Describe to employees how to make use of corporate property that is copyrighted.
Educate employees on how to properly handle infractions.
A7.
What is the Australian Computer Society code of ethics? Describe the importance of code of ethics in ICT environment.
Student Assessment Guide: ICTICT618
Version: v22.0
Page 17 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Answer using 50-100 words.
Resource:
Australian Computer Society code of ethics : Ethics documentation & resources
https://www.acs.org.au/governance/ethics-committee.html
Write your answer here
A national Management Committee oversees the administration of the Australian Computer Society. Eight State and Territory Branch Executive Committees, a National Congress, and three expert advisory boards—the Member Advisory Board, the Profession Advisory Board, and the Technical Advisory Board—all provide assistance to this body.
Through their Vice Presidents, each of the three Boards advises the Management Committee on strategy related to their areas of competence.
The cumulative knowledge and abilities of the ACS's members are one of its greatest assets, and the expert advisory boards provide the structure for maximising this knowledge.
It is significant because, within the parameters established by the Associations Incorporations Act (ACT) and the Society's Objects, Rules, and National Regulations, the ACS Management Committee controls and manages the Society.
A8.
How to ensure all the members and staff in an IT organization aware and understand companies code of ethics?
Answer using 50-100 words.
Resource:
Implementing a code of conduct
https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
conduct/implementing
Student Assessment Guide: ICTICT618
Version: v22.0
Page 18 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Write your answer here
The process of putting in place a code of conduct at work entails explaining its rules and regulations to
every employee and giving them any necessary training to make sure they are aware of it. Management should model the code for employees by practising it and promoting it.
Additionally, there are ways to distribute the code correctly.-
One-on-one training - A representative from the company, such as the owner, manager, supervisor, HR staff member, or trainer, could go over the code of conduct and other standards and expectations with current employees.
Codes of conduct can be presented online in a way that allows personnel to go over subjects at their own pace.
Company intranet - By making the code of conduct available on the intranet, all employees will have access to it whenever they need it.
Employee handbook - A copy of your employee handbook that is printed
Noticeboards - Staff can be reminded of the full code of conduct by posting a condensed version on the noticeboard.
Understanding the code - Ask your team for input to make sure they are aware of the code of conduct.
Accepting the code - Request that employees sign a statement acknowledging their acceptance of the code of conduct.
A9.
You are the customer support manager for a small software manufacturer. The newest addition to your 10-person team is Sofia, a recent college graduate. She is a little overwhelmed by the volume of calls, but is learning quickly and doing her best to keep up. Today, as you performed your monthly review of employee email, you were surprised to see that Sofia has received several messages from employment agencies. One message says, “Sofia, I’m sorry you don’t like your new job. We have lots of opportunities that I think would much better match your interests. Please call me, and let’s talk further.” You’re shocked and alarmed. You had no idea she was unhappy, and your team desperately needs her help to handle the onslaught of calls generated by the newest release of software. If you’re going to lose her, you’ll need to find a replacement quickly. You know that Sofia did not intend for you
to see the email, but you can’t ignore what you saw.
Should you confront Sofia and demand to know her intentions? Should you avoid any confrontation and simply begin seeking her replacement? Could you be misinterpreting the email? What should you do? Write your answer in steps of actions you would take.
Answer using 50-100 words.
Resource:
Implementing a code of conduct
https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
Student Assessment Guide: ICTICT618
Version: v22.0
Page 19 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
conduct/implementing
Communicating effectively for business
https://www.business.qld.gov.au/running-business/marketing-sales/managing-
relationships/communicating-effectively
Write your answer here
It's a good idea to start the process of finding her replacement while putting some applicants on hold.
As a next step, I need to develop a survey for employees asking them about their jobs, how they feel about working for our company, and what needs to change to improve conditions for our organisation.
The last phase is that, following the conclusion of the survey, I will have in-person meetings with every employee to go over the results and discuss the fixes and modifications that will be
made.
A10.
Describe ICT industry code of ethics. How do we know whether something or not is ethical?
Answer using 50-100 words.
Resource:
Code of Ethics
https://www.itpa.org.au/code-of-ethics/
Write your answer here
Because every business has slightly distinct codes of conduct and ethics, it relies on the organisation. Therefore, it is best to constantly refer to the company's ethical policy when an employee is lost or seeking additional information, regardless of whether it is ethical or not based on culture, country, and policy. The collection of guidelines has been created to help members and staff make wise professional decisions while following ethical ideals and commitments. The ICT's forerunner should draught the code of ethics.
According to the code of ethics, our members and staff are obligated to protect the privacy and integrity of the computer systems they oversee for the good of everyone who uses and is impacted by
them. While IT professionals must always rely on their own professional judgement, we believe that taking this code into consideration will be helpful when issues arise. There is no one set of principles that could apply to the great diversity of situations and duties that exist.
Student Assessment Guide: ICTICT618
Version: v22.0
Page 20 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
A11.
How to distribute an update ethical code of conduct in an organization?
Answer using 50-100 words.
Resource:
Implementing a code of conduct
https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
conduct/implementing
Write your answer here
Employees of an organisation should receive hard copies of the company's code of conduct and informational sessions about it. New hires should be introduced to the organization's policies and codes of behaviour as soon as they start working there. The procedure for disseminating updates to the code of conduct should generally remain the same: it should be done through meetings and the distribution of physical copies explaining the updates.
A12.
You have a customer who knows nothing about a technical product which he is buying. You have found that he will buy any model you recommend. Is it your duty to sell her the most expensive model in the store? Explain what is your ethical responsibility.
Answer using 50-100 words.
Resource:
Implementing a code of conduct
https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
conduct/implementing
Write your answer here
Absolutely not; instead, we must advise them to purchase simple technological tools that are Student Assessment Guide: ICTICT618
Version: v22.0
Page 21 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
affordable and durable and allow them to quickly learn what they want to do. To help people select the model that best suits their needs, the distinctions between the models should also be highlighted.
A13.
a. What is the legislation that refers to privacy? What are the National Privacy Principles?
b. List 3 points of National Privacy Principles. c. What you understand in terms of privacy to protect your “Personal information”?
Answer using 50-100 words.
Resource:
Australian Privacy Principles
https://www.oaic.gov.au/privacy/australian-privacy-principles/
ACS Privacy policy
https://www.acs.org.au/privacy-policy
a.
Write your answer here
Australian law, known as the Privacy Act of 1988 (Privacy Act), governs how personal information about persons is handled. Information or an opinion that identifies a person or makes them fairly identifiable is considered personal information.
b.
Write your answer here
There are 13 privacy principles in Australia, some of which include the following:
Management of personal information in an open and transparent manner.
Pseudonyms and anonymity
gathering of requested personal data
handling personal information that was not requested
Notification of the gathering of personal data.
c.
Write your answer here
1. Information quality
2. Collection
3. Use and discloser
A14.
Student Assessment Guide: ICTICT618
Version: v22.0
Page 22 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Assume that you are the technical support for an Internet Service Provider. You are visiting a customer’s premises, on a speed complaint request. Upon testing, you find that the issue is with the router your company provided. Your supervisor tells you to tell the customer that they might have damaged the router and they need to buy a new router from the company. Would you charge the customer for damaging the router? What should you do? Write your answer in steps of actions you would take.
Answer using 50-100 words.
Resource:
ACS Privacy policy
https://www.acs.org.au/privacy-policy
Implementing a code of conduct
https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
conduct/implementing
Write your answer here
I must lay the groundwork for efficient customer communication.
Get to know the customer on a personal level and earn their trust.
Express a sincere apologies for the issue that arose.
Learn how the consumer utilised the item.
You should clarify that this is not the proper use for the router, outline the proper use, and help them comprehend that the router's malfunction is due to damage.
Tell the consumer that if they damage the equipment, the company will replace it, but there will be an additional fee and no shipping fee.
A15.
How the new or revised policy and procedures will be distributed or up-to-date?
Answer using 50-100 words.
Resource:
Implementing a code of conduct
https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
conduct/implementing
Write your answer here
Employees of an organisation should be informed about new or updated policies and procedures through communication meetings. The distribution procedure for policy changes should largely be the
Student Assessment Guide: ICTICT618
Version: v22.0
Page 23 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
same and take place through meetings.
A16.
How an organization should protect stakeholders' personal information to ensure continued confidentiality and proprietary rights?
Answer using 50-100 words.
Resource:
The Privacy Act
https://www.oaic.gov.au/privacy/the-privacy-act/
Your right to privacy
https://www.servicesaustralia.gov.au/individuals/privacy
Australian Federal Privacy Laws https://privacy.org.au/resources/privacy-law/plawsclth/
Write your answer here
Like all other individuals, the personal information of stakeholders should be protected. Personal information should only be gathered with consent and used for the specific objectives for which it was
obtained. If it is to be used for any other purpose, the stakeholder should be informed and given the opportunity to express their opinion.
A17.
Visit https://www.acs.org.au/privacy-policy and assess the intention of ACS privacy policy.
Answer using 50-100 words.
Resource:
ACS Privacy policy
https://www.acs.org.au/privacy-policy
Student Assessment Guide: ICTICT618
Version: v22.0
Page 24 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Write your answer here
The Australian Privacy Principles, which are part of Schedule 1 of the Privacy Amendment (Enhancing Privacy Protection) Act 2012, which amends the Privacy Act 1988, serve as the foundation for this privacy policy.Personal information is treated in the utmost trust by ACS since protecting it is crucial to them.
Only the purposes for which they were acquired or the ways in which the provider has granted ACS permission to use them are utilised for personal information.
In order to: a) offer members a wide range of membership products and services as well as helpful information about pertinent products and services from ACS and appropriate ACS contracted third parties;
b) fulfil its role as an organisation that conducts "Skills Assessment for Migration,"
A18.
Describe how to manage privacy complaint?
Answer using 50-100 words.
Resource:
ACS Privacy policy
https://www.acs.org.au/privacy-policy
Write your answer here
As soon as possible after receiving the complaint, acknowledge receiving it. Even if the complaint calls
for additional research or will be handled informally, a fast acknowledgement of receipt can lay the groundwork for fruitful dialogue with the complainant.
-To make sure you completely get the complainant's stance, ask them questions or give them a summary of how you interpret the situation.
-Building trust with a complaint personally through telephone or, when necessary, face-to-face contact is essential for advancing the resolution process. For instance, calling a complainant before sending them a letter with a disappointing judgement can assist them manage their disappointment and improve the likelihood that they will be more accepting of the outcome.
Student Assessment Guide: ICTICT618
Version: v22.0
Page 25 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
A19.
Describe the importance of disseminating your code of ethics throughout the organisation.
Answer using 50-100 words.
Resource:
Implementing a code of conduct
https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
conduct/implementing
Write your answer here
The best means to inform the workforce of long-lasting changes inside an organisation are through internal training and communications, given through various tools and channels. Our initial goal must be clear: we must engage and inspire our employees to accept new behaviours and regulations that, in most circumstances, would disturb their daily lives.
When a code of conduct is put into place at work, all employees must be informed of its rules and norms, and any relevant training must be given to make sure they are familiar with it. Management should model the code for employees by practising it and promoting it.
A20.
How can you secure a system? Explain the password setup procedure
Answer using 50-100 words.
Resource:
8 easy steps to secure your computer
https://privacy.net/how-to-secure-your-computer/
Write your answer here
By concentrating on software and security updates, systems can be safeguarded. A firewall that serves as a barrier between a computer and a network can be enabled. Student Assessment Guide: ICTICT618
Version: v22.0
Page 26 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Use of a virtual private network (VPN) is a great way to set up protection for online browsing.
Encrypt Data: Encrypt Data will concentrate on protecting computer files and web traffic communication.
The following steps must be followed in order to set up a password: Click on Settings after choosing Start, then sign in choices after clicking Settings.
Then choose a new password or enter an existing one, and click on the password option. You can then
change your password or reset it if you've already chosen one. It's important to use a password management tool and to store passwords in both the most secure way possible on both a professional and personal level.
C. Task 2 – Project Case Study
i. Instructions for students
Student Assessment Guide: ICTICT618
Version: v22.0
Page 27 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Task 2 of this assessment requires you to undertake project were you analyse legislation and standards and contribute to the review of at least three different policies including IP, ethical conduct and privacy in an organisation, communicate policy change to required personnel, manage adherence to IP regulation, manage ethical behaviour, manage privacy
You need to complete 1 part
Task 2 is structured into the 1 part below:
Project Activities
Important resources for Task 2
To complete Task 2, undertake your own research and refer to the information provided in the following
documents available on Moodle:
Assessment Resource – ICTICT618
ii. Task2 – Project Activities
Task 2, Part A of this assessment requires you to analyse legislation and standards and contribute to the review of at least three different policies including IP, ethical conduct and privacy in an organisation, communicate policy change to required personnel, manage adherence to IP regulation, manage ethical behaviour, manage privacy.
Student Assessment Guide: ICTICT618
Version: v22.0
Page 28 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Answer the questions below using the space provided:
Answer all parts of each question
Use your own words and give examples wherever possible
The quality of your answer is more important than how long it is
Enter your answers in this document
You may use various sources of information to inform your answers, including your resources provided by ACBI, books, and online sources. You must acknowledge and cite your sources. Activity 1: Manage privacy
C
ase study:
You are designing a database management system for the personnel office for your company. The system will store extremely sensitive information such as performance evaluations, medical
records for filing insurance claims, salaries, and so forth. With weak security, employees working on client machines may be able to figure out ways to get access to this data, not to mention the possibility of on-line access from hackers. You feel strongly that the system should be much more secure. However, the CEO, director of computing and director of personnel all agree that less security will do since it is going to very expensive to build high security system.
Resource:
The Privacy Act https://www.oaic.gov.au/privacy/the-privacy-act/
Australian Privacy Principles
https://www.oaic.gov.au/privacy/australian-privacy-principles/
ACS Privacy policy
https://www.acs.org.au/privacy-policy
Privacy Policy
https://managedapp.com.au/privacy-policy
Privacy Policy
https://technologyonecorp.com/privacy-policy
1. Write at least 3 privacy policies to ensure the integrity, confidentiality, security and availability of information and adhere to current privacy legislation.
Write your answer here
Australian privacy rules require organisations and government entities to disclose or use personal information only for the purposes for which it was obtained, including direct marketing. The privacy statute of 1988 and the privacy protection framework include Australian privacy concepts. Respond to the private act's organisation or agency. It addresses the following rights, obligations, and standards:
-
Information collection, disclosure, or use
Student Assessment Guide: ICTICT618
Version: v22.0
Page 29 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
-
Accountability or agency governance
-
Correction or integrity of personal information
-
Individuals' right to access information.
Agency or organisation of the privacy legislation must adhere to the Australian privacy concept. It includes organisations with a yearly revenue of more than $3 million that are government agency. Personal information that has been sought may be collected in accordance with Australian privacy laws, according to this statement. The acquisition of private or sensitive information is where it is most relevant. Direct marketing: Under certain conditions, an organisation may share personal information for direct marketing.
Notification of collecting personal data: This statement explains that ABP is required to acquire personal data and that it was necessary to notify the individual by disclosing particular information.
2. By not implementing high security in the system, is the CEO breaching the Privacy law? Justify
your answer with examples.
Write your answer here
It is then up to the CEO to decide how effective a security system he wants to create. As long as the security complies with the standards, there won't be a breach. Employees should be informed about the
security system in use when they start working for the organisation. After receiving this information, they can decide whether or not they want to use that system at work. As sensitive information, the CEO is required by privacy law to maintain security measures.
3. Name the privacy act that applies to your state and explain how can companies maintain privacy policies?
Write your answer here
Australia's Privacy Act of 1988 governs how personal information about persons is handled. The
handling of personal information is governed by this law. Companies must abide by the Privacy Act, but
they are responsible for implementing any additional security measures beyond the minimum
requirements.
Student Assessment Guide: ICTICT618
Version: v22.0
Page 30 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Activity 2: Manage adherence to IP regulations, Copyright, ethical behaviour and privacy
CyberTech Case Study
CyberTech
is a very young cybersecurity company which was established in Sydney, Australia in
2019. A youthful organization, enthusiastic, optimistic and accessible which believes in quality
software solutions that can change the world for the better. CyberTech usually offers number of
cybersecurity solutions for corporate and different industries. CyberTech has very targeted mission - “
To
be the dominant cybersecurity solutions provider in
Australia by 2023, and be positioned to be a global player thereafter
".
As a growing organization CyberTech
is facing number of challenges every day. To manage
intellectual property, copyright, ethics and privacy ICT resources is one of the biggest
challenges. CyberTech decides to appoint a project management team to develop and manage intellectual
property, copyright, ethics and privacy policy for IT environment. CyberTech’s governing body
found that in the last few years, there are number of copyright and policy breaching incidents
by staff members and contractors. The company is very keen to develop a standard code of
ethics, intellectual property, copyright and privacy policy for everyone in the organization.
In order to manage intellectual property, copyright, ethics and privacy in ICT environment
project team needs to assess current ICT industry requirements and governing bodies
legislation. Student needs to follow Australian Copyright Law, ACS (Australian Computer
Society) Code of conduct, The Commonwealth ACT, and CyberTech
requirements.
Students need to read assessment background information and understand Australian
Copyright Law, ACS (Australian Computer Society), The Commonwealth ACT, Australian
Government IP code of ethics and policies which can ensure standard code of conduct, ethics,
Student Assessment Guide: ICTICT618
Version: v22.0
Page 31 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
copyright and privacy for CyberTech
.
Assessment Task Research Activities:
In order to understand the assessment task student may need to search for the following information:
1.
Assess current Australian IP and copyright law
and ensure that implies in your organization IT environment
2.
Ensure that team members are aware of Australian IP and copyright law
and how it affects their work
3.
Institute measures to ensure that Australian IP and copyright law is not breached
4.
Institute regular reviews
to ensure organizational Australian IP and copyright law requirements are up-to-date and team members are adhering to these requirements
5.
Develop appropriate code of ethics, both organizational and IT-specific
6.
Acquaint team members with ethical requirements
7.
Institute regular reviews of team member's ethical work practices and feedback to ensure correct application of the code
8.
Implement new work procedures
according to review plan
9.
Ensure that stakeholders are aware of ethics code, and adjust appropriately following stakeholder feedback
10.
Institute regular reviews of stakeholder understanding and application of code of ethics legislation and standards to organizational outcomes, the organization's privacy policy and procedures.
Resource:
IP Australia
https://www.ipaustralia.gov.au/
Australian Intellectual Property laws
https://www.austrade.gov.au/International/Invest/Guide-to-investing/Running-a-
business/Understanding-Australian-business-regulation/Australian-Intellectual-
Property-laws
Intellectual Property
https://business.gov.au/Planning/Intellectual-Property
Intellectual Property explained
https://business.gov.au/Planning/Intellectual-Property/Intellectual-Property-explained
Short Guide to Copyright- Attorney-General's Department: https://www.ag.gov.au/RightsAndProtections/Documents/ShortGuidetoCopyright-
October2012.pdf
Infringement: Action, Remedies, Offences & Penalties:
Student Assessment Guide: ICTICT618
Version: v22.0
Page 32 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
http://www.copyright.org.au/acc_prod/ACC/Information_Sheets/
Infringement__Action__Remedies__Offences___Penalties.aspx?
WebsiteKey=8a471e74-3f78-4994-9023-316f0ecef4ef
Australian Computer Society
https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Professional-
Conduct_v2.1.pdf
Student needs to complete the following task:
1)
Manage Intellectual Property and Copyright Policy
Intellectual Property and Copyright Act
Duration of Copyright and Infringement
Copyright law for Information Technology organisation
Copyright infringement policy
o
The Internet
o
Music
o
Picture/Images
o
Trademarks and Logos
Manage your own work (Plagiarism)
Inform stakeholders copyrights update and review information
2)
Manage Ethical Behaviour
Contractor Code of ethics
Staff and organization code of Ethics
Grievance procedure and confidential reporting
Action against breaching ethical conduct
Reporting template to record ethical incident
3)
Manage Privacy Policies
Complaints Management Policy
Electronic Collaboration and Social Media Policy
Email and Messaging Policy
Information Security Policy
Internet Use Policy
IT Conditions of Use Policy
IT Infrastructure Policy
IT Security Policy
Website privacy notice.
Manage Intellectual Property and Copyright Policy Write your answer here
Student Assessment Guide: ICTICT618
Version: v22.0
Page 33 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Copyright act:
In accordance with the Copyright Act, the original expression of an Idea is protected as long as it is documented. It safeguards writings on advertising, movies, and music.
Duration of copyright and infringement:
Copyright is in the context of successful theatrical, literary, artistic, and musical works for the author's lifetime plus an additional 70 years as perspective 33. The protection period is computed from the author's death at the end of the calendar year and any subsequent work caused by illness or by an unknown author that was first made public before January 1st, 2019.
Copyright laws for organisations: Under the Fair Dealing exceptions, students are permitted to copy copyright material, especially while doing the following: A student may copy a "reasonable portion" of copyrighted items for private study or research, such as 10% of a work, 1 chapter, or 1 article from a journal issue (or more if they relate to the same research topic or course of study). Copyright work may be duplicated for inclusion in, for example, an essay, conference paper, or journal article in order to remark critically on the material. This is known as fair dealing for review or critique. Unless the author is unknown or has authorised or instructed that they not be cited, any such use should
include the work's title and author.
Copyright infringement policy: CyberTech anticipates that its staff will use protected content responsibly. Additionally, we promote staff education on copyright compliance among their peers. Please notify the person involved as well as our Director, who serves as our copyright compliance officer, if any employee notices what they believe to be a copyright violation. Employees who unlawfully
copy works protected by copyright may face disciplinary action, including termination.
The Internet: Internet content is shielded by copyright legislation. The usage of the internet grants you an implied permission to visit websites, link to them from outside websites, and print content for your own use. The majority of websites provide a copyright statement or terms and conditions outlining the parameters of the licence given to users. Material obtained through the internet should not be used for any other purpose without express permission from the copyright owner, with the exception of any fair dealing for personal use or educational use, as permitted under the Copyright Act and the CyberTech's statutory licences.
Music: I
ncludes song lyrics, jingles, and incidental music, whether in the physical form of sheet music, broadsheets, or other notation; and musical scores for opera, operetta, symphonic, ensemble, band, and
other musical performances.
Pictures: The law permits teachers to exhibit copyright-eligible content for students in non-profit, face-
to-face classroom settings without restriction. (Without this exclusion, displaying items in a classroom would constitute a public exhibition that would call for money and/or permission.)
Trademark Logo: Unless it is for editorial or informational purposes, such as when a logo is featured in a written article or is a part of a comparative product statement, you need permission to use a logo.
Plagiarism: According to the 1968 Copyright Act, the author is granted full ownership of their creations. Paraphrasing is a form of plagiarism that involves taking someone else's ideas and rephrasing them. Student Assessment Guide: ICTICT618
Version: v22.0
Page 34 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
There is a risk that the author of the original work may file a lawsuit to defend their intellectual property
rights in cases of plagiarism.
Inform stakeholders to review and update information: Because of out-of-date or confusing laws, many educational institutions' libraries and cases of recent difficulty using copyright material. It is guaranteed that institutions in the Australian community can reasonably access content in accordance with changes and the Copyright Act of 1968. Additionally, it's critical to ensure that university search engines and libraries can abide by the requirements set forth in order to minimise online copyright infringement.
Manage Ethical Behaviour Write your answer here
There are several characteristics that are mentioned below that can help manage ethical behaviour in cybertech:
Code of ethics for contractors:
1. To provide goods and services that are in line with the practical and financial requirements of stakeholders.
2. Knowledge of pertinent norms and legislation; 3. Do not misrepresent abilities or knowledge.
4. Respect, items, receive orders, and address proprietary
5. Inform guests about a proposed project service or product.
6. Take responsibility for your job 7. Respect your colleagues' professional judgement in your areas of expertise
Staff and organisations code of ethics
:
Encourage co-workers of chair employee to continue their professional development by providing support for raining educational professional development that takes into account each professional's unique needs. Continue to improve their knowledge and skills. Raise awareness of issues affecting their profession.
Grievance procedure and confidential reporting
Informal procedure:
In cyber tech, the management will talk with the individual who is the target of the complaint about the problem. The line manager will arrange a meeting between the parties to settle the
problem and continue.
Formal procedure:
this entails an official investigation of the complaint. First, an enquiry will be conducted by gathering historical data and then locating current data.
If the person in question is unhappy with the results of the formal investigation, they can appeal to the organization's HOD.
External mediator:
The grievance may be referred to an external mediator if everyone involved in the dispute agrees that one is necessary.
Confidentiality:
In terms of cyber technology, the confidentiality will be upheld by the human resource management. In order to maintain fairness and address complaints, there will be interaction with employees and workplace participants. Employees who have filed a complaint as well as all other Student Assessment Guide: ICTICT618
Version: v22.0
Page 35 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
participants and employees at the workplace are expected to respect confidentiality. The complainant will speak with the appropriate support representative about their complaint. The customer service worker must uphold element confidentiality.
Action against breaching ethical conduct
Temporary reassignment or suspension: In the event of a suspension or poor performance, the delegation may opt to allocate the employee to another task or suspend them from doing their current one. The following are some of the elements that influence the decision:
• The seriousness of the alleged violation
• The maintenance of an efficient work force or cohesiveness affecting the employed in a certain workplace.
• The integrity and standing of the APS and the employee agency
• Termination of employment: This more severe measure is suitable
• The delegate has determined that the employee's continued employment in the organisation is no longer desirable
• The employee has rejected a fundamental component of the employment relationship.
Manage Privacy Policies Write your answer here
Complaint management policy
Universities aim to handle concerns in a just and open way.
There are two options for complaint settlement.
Informal Complaint- University and college staff members can handle unofficial complaints by getting in touch with the complainant informally.
Formal Complaint - A formal complaint procedure is used when a situation is serious or complex and cannot be settled formally.
Social media policy and online collaboration.
Australian social media policy is based on detailed instructions that the government has posted on the National Library of Australia website.
Be mindful: Personal assaults on contributors and staff members are checked online by real people.
Avoid posting any private information on social media to protect your privacy. Subject to the 1980 Privacy Act, which mandates adherence to the Australian Privacy Principle
Keep the conversation relevant to the original post; while people may focus on questions and discussions, this is vital.
Respect copyright: In accordance with this legislation, only creative work that is unique and protected by
intellectual property rights may be posted.
E mail and messaging policy:
The Spam Act of 2003 governs email and messaging policies.
According to the law, every commercial message must contain an unsubscribe option that is available, with instructions, and functioning for five working days after the message's delivery.
Information security policy:
Cybertech needs to put an emphasis on ethical business practises that respect employees' and customers' rights to privacy. In Australia, the Cyber Crime Act of 2001 modifies and oversees the Student Assessment Guide: ICTICT618
Version: v22.0
Page 36 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
legislation pertaining to software offences and data security.
Internet use policy:
Cyber technology must be used responsibly, and organisations are accountable for their activities based on how they use their current system and network equipment.
IT conditions of use policy
:
This policy is focused on outlining specific guidelines for information technology branches like cybertech when using information:
Not to disseminate offensive content or materials that are illegal or restricted
Stores and disseminates information that violates her privacy and denigrates her reputation.Any
work protected by copyright or other objective intellectual property rights that contains confidential information
Access another person's account by using their name, password, or username.
Affect the network system's integrity or security
IT Infrastructure policy
:
The content that cybertech makes available on internet services needs to be explicitly identified.
The content cannot be distributed or used in accordance with the National Classification Court's
or the relevant industry code's applicable classification requirements.
Cybertech organisations are required to protect the security of their internet services under IT
security policies.
It offers defence against unlawful third-party use of the service.
There are suitable security precautions, such as installing a firewall or installing antivirus
software.
Website privacy notice
According to Australian privacy laws, Cybertech was obligated to make a private statement on their
website and to stably gather any data pertaining to website visitors or customers. A privacy notice is a
chance to let potential clients and website visitors know that the company is reputable and that they
should be concerned about their privacy and the security of their personal information.
Activity 3: Present and obtain feedback and sign-off from required personnel
Student Assessment Guide: ICTICT618
Version: v22.0
Page 37 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
In this part of the assessment activity, you are required to present and obtain the sign-off from the required personnel. Presentation may be between 3-5 mins. You will provide a link to the presentation video for the assessor to observe. Each student will individually present, recorded and submitted this activity.
During the presentation you will be required to demonstrate effective interpersonal and communication skills including:
Speaking clearly and concisely
Using effective non-verbal communication skills to encourage audience interest
Asking questions to seek feedback
Your task In
the
presentation, you will explain the Intellectual
Property and Copyright Policy, Code of ethics, Ethical Behaviour, Privacy policies
to required CyberTech
personnel [your classmate will assume role
of CyberTech
personnel]
You will record the presentation.
You can use a phone or other recording device to record your presentation. Request feedback and obtain sign-off from relevant personnel.
Note for student:
You can upload video to Google drive, Dropbox or other cloud services.
Provide screenshot of you conducting the program.
Do not delete the link until you have received grade for the unit.
You must record all responses correctly to the template provided below. Resource:
Assessment Resource- ICTICT618: CyberTech
organisational documents - Activity Sign-off template
PowerPoint slides screenshot or submit as attachment in zip file.
Write your answer here
Document Attached Video Link
Write your answer here
Student Assessment Guide: ICTICT618
Version: v22.0
Page 38 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Sign-off document ] can copy the document in the space below or submit as attachment]
Write your answer here
Document Attached Submission Instructions Please proofread your work and include ICTICT618
– A1 - Your Name
in the document header. Submission Document Checklist:
Student Assessment Guide ICTICT618
Other assessment related documents in zip folder.
Make a copy of your assessment. Submit your completed assessment to your Tutor/Assessor for marking via the eLearning Platform – Moodle using the following file name: ICTICT618
– A1 Your Name Student Assessment Guide: ICTICT618
Version: v22.0
Page 39 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
4. Student Checklist
Student name:
Unit of Competency:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Assessment and marking criteria:
The Trainer & Assessor is to place a tick ‘
✓
’ in appropriate column for each criteria for Satisfactory (S)
or Not Satisfactory (NS) assessment
Task 1 – Short Answer Knowledge Questions
Short Answer Questions Did the Candidate:
Yes
✓
Comments
A1. Identify and explain federal and state or territory legislation and policy relevant to an ICT environment relating to: access and equity, copyright and intellectual
property, workplace health and safety (WHS), privacy. Answer using 50-100 words.
A2. What are the 4 types of intellectual property? Answer using 50-100 words.
A3. Explain common creative, fair dealing and open source in terms of copyright. What are the materials are
exempted from copyright policy? Answer using 50-100 words.
A4.
What are the rights of a copyright owner? How long does copyright protection last in Australia? Answer using 50-100 words.
A5.
What are the procedures should be undertaken to manage organisational copyright requirements are up-
to-date and team members are adhering to these requirements? Answer using 50-100 words.
A6.
How the updated versions of copyright law will be distributed? Answer using 50-100 words.
A7. What is the Australian Computer Society code of ethics? Describe the importance of code of ethics in ICT environment. Answer using 50-100 words.
A8.
How to ensure all the members and staff in an IT organization aware and understand companies code of ethics? Answer using 50-100 words. Student Assessment Guide: ICTICT618
Version: v22.0
Page 40 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
A9.
You are the customer support manager for a small software manufacturer. The newest addition to your 10-
person team is Sofia, a recent college graduate. She is a little overwhelmed by the volume of calls, but is learning
quickly and doing her best to keep up. Today, as you performed your monthly review of employee email, you were surprised to see that Sofia has received several messages from employment agencies. One message says, “Sofia, I’m sorry you don’t like your new job. We have lots of opportunities that I think would much better match your interests. Please call me, and let’s talk
further.” You’re shocked and alarmed. You had no idea she was unhappy, and your team desperately needs her help to handle the onslaught of calls generated by the newest release of software. If you’re going to lose her, you’ll need to find a replacement quickly. You know that
Sofia did not intend for you to see the email, but you can’t ignore what you saw.
Should you confront Sofia and demand to know her intentions? Should you avoid any confrontation and simply begin seeking her replacement? Could you be misinterpreting the email? What should you do? Write your answer in steps of actions you would take.
A10.
Describe ICT industry code of ethics. How do we know whether something or not is ethical? Answer using 50-100 words.
A11.
How to distribute an update ethical code of conduct in an organization? Answer using 50-100 words.
A12.
You have a customer who knows nothing about a technical product which he is buying. You have found that he will buy any model you recommend. Is it your duty to sell her the most expensive model in the store? Explain what is your ethical responsibility. Answer using 50-100 words.
A13.
a. What is the legislation that refers to privacy? What are the National Privacy Principles? b.List 3 points
of National Privacy Principles. c. What you understand in terms of privacy to protect your “Personal information”? Answer using 50-100 words.
A14.
Assume that you are the technical support for an Internet Service Provider. You are visiting a customer’s premises, on a speed complaint request. Upon testing, you find that the issue is with the router your company provided. Your supervisor tells you to tell the customer that they might have damaged the router and they need
Student Assessment Guide: ICTICT618
Version: v22.0
Page 41 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
to buy a new router from the company. Would you charge the customer for damaging the router? What should you do? Write your answer in steps of actions you would take. Answer using 50-100 words.
A15.
How the new or revised policy and procedures will
be distributed or up-to-date? Answer using 50-100 words.
A16.
How an organization should protect stakeholders' personal information to ensure continued confidentiality and proprietary rights? Answer using 50-
100 words.
A17.
Visit https://www.acs.org.au/privacy-policy and assess the intention of ACS privacy policy. Answer using 50-100 words. A18.
Describe how to manage privacy complaint? Answer using 50-100 words.
A19.
Describe the importance of disseminating your code of ethics throughout the organisation. Answer using 50-100 words.
A20.
How can you secure a system? Explain the password setup procedure. Answer using 50-100 words.
Task 2– Project Case Study
Project Activities
Did the Candidate:
Yes
✓
Comments
Activity 1: Manage privacy
1. Write at least 3 privacy policies to ensure the
integrity, confidentiality, security and availability of
information and adhere to current privacy
legislation.
2. By not implementing high security in the system,
is the CEO breaching the Privacy law? Justify your
answer with examples.
3. Name the privacy act that applies to your state
and explain how can companies maintain privacy
policies?
Activity 2: Manage adherence to IP regulations,
Copyright, ethical behaviour and privacy
Manage Intellectual Property and Copyright Policy Manage Ethical Behaviour Student Assessment Guide: ICTICT618
Version: v22.0
Page 42 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT environments
Manage Privacy Policies Activity 3: Present and obtain feedback and sign-off from required personnel
PowerPoint slides
Video Link
Sign-off document
Student Assessment Guide: ICTICT618
Version: v22.0
Page 43 of 43
Developed by: ACBI
Approved by: DoS
Issued: Dec 2022
Review: Dec 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Documents
Recommended textbooks for you

Management, Loose-Leaf Version
Management
ISBN:9781305969308
Author:Richard L. Daft
Publisher:South-Western College Pub
Recommended textbooks for you
- Management, Loose-Leaf VersionManagementISBN:9781305969308Author:Richard L. DaftPublisher:South-Western College Pub

Management, Loose-Leaf Version
Management
ISBN:9781305969308
Author:Richard L. Daft
Publisher:South-Western College Pub