Contribute to copyright, ethics and privacy in an ICT environment
Authorised by: Head ICT Faculty Document Name: Participant_ICTICT418v1.01.docx Date prepared: 20th Oct 2017 Version number: 1.01 P a g e | 1 ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment All work contained in the assessment must be your own work, and not copied from other sources or been previously submitted for assessment Where any significant portion of submitted work has been copied without proper acknowledgement from other sources, including published works, the internet, existing programs, the work of other students, or work previously submitted for other awards or assessments penalties may be imposed. You must upload your document(s) in the required format, and as individual files. Do not compress (zip) the documents when uploading it for assessment, or include within folders. Equipment Requirements Word processor application Internet Broadband Webcam / Microphone Speakers and/or headset Need Help with your Assessment? Post your query to your fellow participants in the Discussion Forum. Use this forum to post any question about any part of the assessment. Perhaps, you need help answering a question, or sourcing the information. Perhaps, you need some informal feedback on your assessment before you submit it. You can upload your assessment and ask your instructor for a constructive and supportive review. Upload the assessment, but do not submit it. Then send an email to your trainer asking them to review your draft document. Sharing information is the key to success. Remember the only silly question is the one that remains unasked!!! Participant Assessment Authorised by: Head ICT Faculty Document Name: Participant_ICTICT418v1.01.docx Date prepared: 20th Oct 2017 Version number: 1.01 P a g e | 2 Assessment Assignment Activities This assessment will look at how you, when working within an information, communications technology (ICT) environment, maintain professional and ethical conduct, and ensure that personal information is handled in a confidential and professional manner. You will review existing policies and procedures and develop or create these to the required standards, as well as examining organisational systems to ensure they meet legislative and organisational requirements. There are fourAssessment_Parts parts to this assignment. Part A is a scenario relating to intellectual property and copyright, and involves researching on the internet and writing a report addressing specified requirements. Part B is a is a scenario relating to privacy, and involves researching on the internet and writing a report addressing specified requirements. Part C is a scenario that relates to ethics, and involves researching on the internet and writing a report addressing specified requirements. Part D requires you to hold a meeting with another person, where you will record a conversation. You will need a webcam, microphone, phone, or similar, to record the conversation. Use the appropriate software program to develop your documents or files. You must upload your document in the required format. Do not compress the document(s) when uploading it/them for assessment. They must be uploaded as individual files. Authorised by: Head ICT Faculty Document Name: Participant_ICTICT418v1.01.docx Date prepared: 20th Oct 2017 Version number: 1.01 P a g e | 3 Part A – Intellectual property and copyright Instructions 1. Access and become familiar with the current Australian Copyright Act and any Amendments such as the Copyright Amendment (Digital Agenda) Act 2000. For example - Copyright Act 1968 Part III, Part IV and Part V. 2. Using a search engine, find and navigate to the ‘Copyright Australia’ website and make notes about the purpose of copyright and the processes involved. Ensure that you review Information Sheet G010v19 ‘An Introduction to Copyright in Australia’ produced January 2017. You will need this in instruction dot point 4 below. 3. Locate the current organisational copyright policy and procedures, within your organisation, and familiarise yourself with these. If you are not currently working, locate and use a copyright policy for an Australian organisation from the internet, or contact your trainer for support. 4. Prepare a report to management addressing the following areas: a. The report is to be 12pt font, with single line spacing. b. Identify the current Australian legislation (including Amendments) that relates to intellectual property and copyright, briefly explaining what the legislation and amendments cover. c. Provide one to two paragraphs explaining how the ‘An Introduction to Copyright in Australia’ may apply to the organisation you work in. d. Identify at least three areas covered by copyright legislation that relate to the organisation you work in, and provide an explanation for each about: i. the organisational policy that applies to each, and ii. how you apply the policy in day to day work. e. Review the existing copyright policy from your organisation and recommend changes to align the policy with legislation and industry standards. f. Create a procedure document that outlines one area of copyright and how this is managed – for example, a process to ensure that images used in the organisation’s website meet copyright laws. g. Outline how you will distribute the new or revised policy, and procedures, (from steps 4e and 4f) to: i. Existing staff ii. New staff iii. Management iv. External stakeholders. Authorised by: Head ICT Faculty Document Name: Participant_ICTICT418v1.01.docx Date prepared: 20th Oct 2017 Version number: 1.01 P a g e | 4 Part B – Privacy Privacy requirements in Australia: The near mandatory need to be “online” in the increasingly global economy has driven business forward in leaps and bounds within Information and Communication Technology. This technological growth has been an enabling tool for business. Increases in the speed of response of systems and the internet have provided flexibility and accessibility bringing great benefits to business and clients. Client information and requirements are now accessible from all corners of the globe. This presents a dilemma; that of how we secure information that we, as business IT professionals, are charged with caring for. Australia has a Privacy Act that governs what we must do to ensure protection of personal, sensitive data. The act is constantly being updated to cater for new technological advances. Keeping up to date with these changes is paramount in being successful in securing private data. You will need access to the internet, and will need to go to https://www.oaic.gov.au/privacy-law/privacy-act/ and https://www.oaic.gov.au/privacy-law/privacy-act/australian-privacy-principles and https://www.oaic.gov.au/agencies-and-organisations/guides/app-quick-reference-tool and examine the content in each area. Ensure that you understand the Australian Privacy Principles. Now read the article ‘Privacy Impact Assessment Guide’. You can search the internet for this, or retrieve it from the government’s privacy website. Pay particular attention to the section named ‘What is personal information?’ to explore what may be deemed as personal, private information. The article also has some very relevant information on how we can address and plan for change whilst protecting personal information. Note when it was written and decide if it is up to date. Is it still useful? Now go to the Australian Computer Society (ACS) website https://www.acs.org.au and gain an understanding of what ACS does. After gaining an understanding of the role of ACS, head to the ‘Governance’ ‘Rules and Regulations’ section of the site and review the ‘Code of Professional Conduct’ and ‘Code of Ethics’. We, as IT professionals, have a responsibility to maintain a high standard of Professional Conduct or ethical behaviour in the workplace. We are entrusted with a large amount of control over and access to information and data of our clients. Often, we are communicating with clients who know little of our industry and we have a responsibility not to take advantage of this situation. Instructions This part of the assignment will require you to review an Australian organisation’s privacy policy and compare this to the Privacy Act of Australia and Australian Privacy Principles (APPs) (hint:- most websites have one). We do not recommend examining anything with international owners, as legislation then crosses internal borders. If you cannot locate a suitable Australian policy, your trainer will be able to provide one. https://www.oaic.gov.au/privacy-law/privacy-act/ https://www.oaic.gov.au/privacy-law/privacy-act/australian-privacy-principles https://www.oaic.gov.au/agencies-and-organisations/guides/app-quick-reference-tool https://www.acs.org.au/ Authorised by: Head ICT Faculty Document Name: Participant_ICTICT418v1.01.docx Date prepared: 20th Oct 2017 Version number: 1.01 P a g e | 5 Internet research is the main vehicle to gather required content for your assignment. Ensure you have researched sufficiently to provide a detailed, relevant report. Ensure correct referencing is used: Harvard type. With particular focus on the Australian Privacy Principles (APPs), you must prepare a report that includes and addresses: a) A business style report to be presented in 12pt font, with single line spacing. b) One paragraph providing an overview of the organisation whose privacy policy you have examined. Ensure you reference information sources – Harvard style. c) One paragraph summarising who the privacy policy is aimed at, the broad scope of the policy, and where it is located within the organisation (eg website, Human Resources, etc.). d) How information that relates to privacy legislation is stored, maintained, and managed within the organisation, and how the integrity of information is ensured. This could include system security, whether data is stored off site, use of international data storage, who has access to information etc. e) Specific procedures relating to