ASSESSMENT TASK Intellectual Property, Copyright, Privacy and Ethics Participant assessment Intellectual Property, Copyright, Privacy and Ethics All work contained in the assessment must be your own...

1 answer below »
please see attached document



ASSESSMENT TASK Intellectual Property, Copyright, Privacy and Ethics Participant assessment Intellectual Property, Copyright, Privacy and Ethics All work contained in the assessment must be your own work, and not copied from other sources, or been previously submitted for assessment Where any significant portion of submitted work has been copied without proper acknowledgement from other sources, including published works, the internet, existing programs, the work of other students, or work previously submitted for other awards or assessments, penalties may be imposed. You must upload your document(s) in the required format, and as individual files. Do not compress (zip) the documents when uploading it for assessment or include within folders. You need to ensure that when working on this assessment, you and your work area meet Work Health and Safety (WHS) safe practices. If working in an organisation you need to follow any organisational policies that apply. Equipment & Resource Requirements • Word processor application • Internet Broadband • Webcam/Smart Phone with Camera • Speakers and/or headset • Relevant organisational policies and procedures • Relevant legislation, regulation and codes of practice Need Help with your Assessment? Post your query to your fellow participants in the Discussion Forum. Use this forum to post any question about any part of the assessment. Perhaps, you need help answering a question, or sourcing the information. Perhaps, you need some informal feedback on your assessment before you submit it. You can upload your assessment and ask your instructor for a constructive and supportive review. Upload the assessment, but do not submit it. Then send an email to your trainer asking them to review your draft document. Sharing information is the key to success. Remember the only silly question is the one that remains unasked! Assessment Assignment Activities There are four (4) parts to this assignment. Part A is a scenario relating to intellectual property and copyright and involves researching on the internet and writing a report addressing specified requirements. Part B is a scenario relating to privacy and involves researching on the internet and writing a report addressing specified requirements. Part C is a scenario that relates to ethics and involves researching on the internet and writing a report addressing specified requirements. Part D is an online meeting, where you will need to conduct the meeting and involve other participants. You will need access to a webcam and speakers, or headset. Use the appropriate software program to develop your documents or files. You must upload your document in the required format. Do not compress the document(s) when uploading it/them for assessment. They must be uploaded as individual files. Background This assessment will look at how you, when working within an information, communications technology (ICT) environment, maintain professional and ethical conduct, and ensure that personal information is handled in a confidential and professional manner. You will review existing policies and procedures and develop or create these to the required standards, as well as examining organisational systems to ensure they meet legislative and organisational requirements. Part A – Intellectual Property and Copyright Instructions Complete the following tasks, addressing all requirements. ** If you are not currently working apply the copyright policy and procedures you obtain from task 3 below to each task as indicated by ** in the task below. 1. Access and become familiar with the current Australian Copyright Act and any Amendments such as the Copyright Amendment (Digital Agenda) Act 2000. For example - Copyright Act 1968 Part III, Part IV and Part V. 2. Using a search engine, find and navigate to the ‘Copyright Australia’ website and make notes about the purpose of copyright and the processes involved. Ensure that you review Information Sheet G010v19 ‘An Introduction to Copyright in Australia’ produced January 2017. You will need this in instruction dot point 4 below. 3. Locate the current organisational copyright policy and procedures, within your organisation, and familiarise yourself with these. If you are not currently working, locate and use a copyright policy for an Australian organisation from the internet, or contact your trainer for support. 4. Prepare a report to management addressing the following areas: a. The report is to be 12pt font, with single line spacing. b. Identify the current Australian legislation (including Amendments) that relates to intellectual property and copyright, briefly explaining what the legislation and amendments cover. (200 words) c. Provide one to two paragraphs explaining how the ‘An Introduction to Copyright in Australia’ may apply to the organisation you work in. ** d. Identify three areas covered by copyright legislation that relate to the organisation you work in, and provide an explanation for each about: i. the organisational policy that applies to each, and ii. how you apply the policy in day to day work. (300 words) ** b. Review the existing copyright policy from your organisation and recommend changes to align the policy with legislation and industry standards. (200 words). ** c. Create a procedure document that outlines one area of copyright and how this is managed – for example, a process to ensure that images used in the organisation’s website meet copyright laws. (200 words) Hint use bullet points where you can. ** d. Outline how you will distribute the new or revised policy, and procedures (from steps 4b and 4c) to: 1. Existing staff 2. New staff 3. Management 4. External stakeholders. (200 words) Part B – Privacy Scenario Privacy requirements in Australia: The near mandatory need to be “online” in the increasingly global economy has driven business forward in leaps and bounds within the Information and Communication Technology (ICT) sector. This technological growth has been an enabling tool for business. Increases in the speed of response of systems and the internet have provided flexibility and accessibility bringing great benefits to business and clients. Client information and requirements are now accessible from all corners of the globe. This presents a dilemma; that of how we secure information that we, as business IT professionals, are charged with caring for. Australia has a Privacy Act that governs what we must do to ensure protection of personal, sensitive data. The act is constantly being updated to cater for new technological advances. Keeping up to date with these changes is paramount in being successful in securing private data. You will need access to the internet, and will need to go to https://www.oaic.gov.au/privacy-law/privacy-act/ and https://www.oaic.gov.au/privacy-law/privacy-act/australian-privacy-principles and https://www.oaic.gov.au/agencies-and-organisations/guides/app-quick-reference-tool • You will need to examine the content in each area. • Ensure that you understand the Australian Privacy Principles. • Now read the article ‘Privacy Impact Assessment Guide’. You can search the internet for this or retrieve it from the government’s privacy website. Pay particular attention to the section named ‘What is personal information?’ to explore what may be deemed as personal, private information. The article also has some very relevant information on how we can address and plan for change whilst protecting personal information. Note when it was written and decide if it is up to date. Is it still useful? • Now go to the Australian Computer Society (ACS) website https://www.acs.org.au and gain an understanding of what ACS does. After gaining an understanding of the role of ACS, head to the ‘Governance’ ‘Rules and Regulations’ section of the site and review the ‘Code of Professional Conduct’ and ‘Code of Ethics’. Instructions We, as IT professionals, have a responsibility to maintain a high standard of Professional Conduct or ethical behaviour in the workplace. We are entrusted with a large amount of control over and access to information and data of our clients. Often, we are communicating with clients who know little of our industry and we have a responsibility not to take advantage of this situation. https://www.oaic.gov.au/privacy-law/privacy-act/ https://www.oaic.gov.au/privacy-law/privacy-act/australian-privacy-principles https://www.oaic.gov.au/agencies-and-organisations/guides/app-quick-reference-tool https://www.acs.org.au/ This part of the assignment will require you to review an Australian organisation’s privacy policy and compare this to the Privacy Act of Australia and Australian Privacy Principles (APPs) (hint:- most websites have one). We do not recommend examining anything with international owners, as legislation then crosses internal borders, and you task will be a lot harder. If you cannot locate a suitable Australian policy, your trainer will be able to provide one. Internet research is the main vehicle to gather required content for your assignment. Ensure you have researched sufficiently to provide a detailed, relevant report. Ensure correct referencing is used: Harvard type. With a focus on the Australian Privacy Principles (APPs) you must prepare a report that includes and addresses: a. A business style report to be presented in 12pt font, with single line spacing. b. One paragraph providing an overview of the organisation whose privacy policy you have examined. c. Ensure you reference information sources – Harvard style. d. One paragraph summarising who the privacy policy is aimed at, the broad scope of the policy, and where it is located within the organisation (eg website, Human Resources, etc.). e. How information that relates to privacy legislation is stored, maintained, and managed within the organisation, and how the integrity of information is ensured. • This could include system security, whether data is stored off site, use of international data storage, who has access to information etc. (200 words) f. Specific procedures relating to access of information, requests to change information, etc. If these do not exist, this must be noted. g.
Answered 49 days AfterSep 24, 2021

Answer To: ASSESSMENT TASK Intellectual Property, Copyright, Privacy and Ethics Participant assessment...

Shubham answered on Nov 12 2021
113 Votes
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here