ICTICT610 Manage Copyright, Ethics and Privacy in an ICT Environment Assignment - ECA Graduate Institute, Australia
ORDER NEW ICTICT610 MANAGE COPYRIGHT, ETHICS AND PRIVACY IN AN ICT ENVIRONMENT ASSIGNMENT AT NOMINAL PRICE!
Assessment Task 1 - Unit Knowledge Test
Question 1: In context of the Australian Computer Society Code of Ethics, explain your responsiblies for the following values:
a. The Primacy of the Public Interest
Answer: The member of Australian Computer society will place the public interest above his or her personal interest. This means that if there is a conflicting situation where either public interest or personal interest is jeopardised, the member should held fast the code of ethics and give priority to the public interest and work for it consistently.
b. Professional Development
Answer: The member of Australian Computer Society will held fast the principle of enhancement of skills and education for professional development of self as well as his or her fellow colleagues. This will help to check the redundancy in the field of work and will keep the members potentially ready to face any industrial or technological challenges.
Question 2: Explain the processes that an organisation can use to communicate its policies and procedures to its employees?
Answer: The communication method to intimate the employees is the Handbook designed for the organisation. The handbook should be in the printed format or in form or e-book that should be given to the employees on their joining. The rules, regulations, norms and vision and mission of the company should be reflected in the handbooks.
There should be intranet platform of the company where the employees and the administration can share information pertaining to self and the organisation for each other.
Now a days watsapp is having a shared platform to communicate in groups in small organisations or larger one and also a good platform it is for sharing personal and group information
The e-mail created for the members of the organisation still has relevant importance in sharing of news, instructions and directions. It is still the best medium of written communication.
Question 3: Answer the following:
a. Explain the purpose of organisational standards for customer service.
Ans. The need to standardise customer service is to give the best desired service to the customers. It is pertinent to lay down rules for the deliverance of customer service so that the employees can follow the rules and adhere to those. As customer is the bread-giver, it is important to serve him well with standardised practices.
GET BENEFITTED WITH QUALITY ICTICT610 MANAGE COPYRIGHT, ETHICS AND PRIVACY IN AN ICT ENVIRONMENT ASSIGNMENT HELP SERVICE OF EXPERTSMINDS.COM!
b. Prepare a list of at least seven (7) potential sources of information to help define the customer service standards for an organisation.
Ans. The seven potential sources of information to define customer service are
The customer feed-backs which provide excellent data regarding the grey areas and the potential strengths to improve customer service are a source.
The customer surveys are second sources
The company website and the interacting platforms on those websites are the third souce
Information generated from the company mails are the fourth source
Social media information are the 5th source which brings in potential information
Research methods are the sixth source
Google talks and google analytics are the seventh source for defining the customer service of the organisation.
c. Provide an example of organisational requirements for answering phone call.
The organisational requirement for answering phone calls should be laid down with the tele-communicator. For example the phone should be answered within 10 rings. It is necessary for good customer service and retaining customers who need and expect ready responses.
Question 4: Answer the following:
a. What is an ICT system? What are the three (3) core components of ICT system?
Ans. ICT system is the abbreviation for the system of information and communication technology. Any technology that helps in the propagation of communication of the human world falls under the ICT system. The core components of the ICT system are the internet, the mobile phone and the robotics. Digital TVs are also a part of the ICT system. The list of components that can comprise the ICT are increasing day by day and are exhaustive in nature.
b. What are ICT system security systems?
Ans. ICT system security system is a way that the hackers will not be able to seize information about the users of ICT. It uses devices as the screen lock and password protection etc. to ensure the hackers are not able to hack the ICT systems
ORDER NEW COPY OF ICTICT610 MANAGE COPYRIGHT, ETHICS AND PRIVACY IN AN ICT ENVIRONMENT ASSIGNMENT & GET HIGH QUALITY SOLUTIONS FROM SUBJECT'S TUTORS!
c. Summarise any five (5) industry practices/procedures for security systems.
Ans. The five important steps to protect the ICT are given as follows
Screen lock of computer and mobile phone.
Password protection of devices and e-mail
Encryption of the messages send through internet.
Periodic audit of the information system of the organisation
Using packet tracers to analyse the data of the internet of an organisation and see if any effort has been made by the hackers to hack the system
Another method is using Ajax in the website so that informations cannot be stolen through false entries.
Question 5: Identify the federal and state WHS legislation applicable to your state and explain its purpose.
Answer: In Australia the model code of law was enacted on 2911 as WHS laws and regulates the practices for WHS. It ensures the protection of workers from harm related to work hazards or other things during the work. It ensures cooperation and collaboration among the administrator and the workers. The model code of law also facilitates the rightful presentation of the workers in the union and protects their right to bargain regarding the wage.
Question 6: Identify, document and explain the state and federal legislations related to the key concepts given in the table.
State and federal legislations
|
Explanation
|
Access and equity
|
|
In the year 1985 the Access and Equity law was established by the Federal government of Australia for giving the equal and right opportunity to people generally apartheid in the country like those from Non-English speaking background
|
Copyright and intellectual property
|
|
Copyright is the protection for the distribution and promotion of original work extended to the creator of the work. It has some time limit after which it is to be renewed or the copyright can be passed to another. Intellectual property right is an endeavour to protect the rights for commercialisation of the products and services created by the intellect or the mind. It can be done through four ways: Patents, industrial designs, trademarks and copyrights.
|
Privacy
|
|
In Australia there is no separate law for privacy and it is not clear whether the same would go under the state or federal legislations. However in 2007 there has been suggested to include privacy under the jurisdiction of Australian law. These privacy concept can be divided into four pattern - the information privacy, the physical privacy, privacy of communications and territorial privacy
|
SAVE TOP GRADE USING ICTICT610 MANAGE COPYRIGHT, ETHICS AND PRIVACY IN AN ICT ENVIRONMENT ASSIGNMENT HELP SERVICE OF EXPERTSMINDS.COM!
Question 7: Answer the following: a. What do you mean by Australian Copyright Law?
Ans. The Australian copyright Law protects the distribution and promotion of original work of the creator which is made within the territory of Australia.
b. List the four (4) examples of ICT related work, protected by the copyright act.
The new software development, the new hardware development, books and telecommunications on Information technology
Question 8: Prepare a list of any seven (7) methods to communicate new or revised policies and procedures to the stakeholders.
Ans. The revised policies can be communicated to the stakeholders through information brochure which can be in the form of printed copies.
Update through mail is another form of communication.
The updating on the company website about new rules and regulations is another effort.
The employee handbook revised can be given with the new rules and policies.
There can be seminars where verbally the new rules can be made announced and shared with the stake holders.
Official mails can be sending with new policies.
The intranet can be used to update about the policies and rules of an organisation.
Question 9: What do you mean by confidentiality, integrity and availability according to CIA triad?
Answer: To guide policies of information security within an organisation the model concept of CIA triad is formed. Confidentiality is equivalent to the privacy of the stakeholders. The personal information will not be shared by anyone about any stakeholder. Integrity relates to the maintenance of trust and consistency in the performance while availability relates to availability of data by ensuring regular maintenance of the hardware and software.
DO YOU WANT TO EXCEL IN ICTICT610 MANAGE COPYRIGHT, ETHICS AND PRIVACY IN AN ICT ENVIRONMENT ASSIGNMENT - ORDER AT EXPERTSMINDS!
Question 10: Answer the following: a. Prepare a list of steps that you would follow to implement new ICT policies and procedures at the workplace.
Answer: The new steps will be first to mail all regarding the new ICT policies.
End step will be also to conduct an open house forum and discuss about the pros and cons of the new process clearly.
Third step would be to train the employees regarding the new policies.
Fourth will be to choose the change agents and encourage them to motivate their peers to adapt to the new process.
Fifth stage would be to gather feedback from the stake holders about the implementation of the new process.
Last but not the least a review mechanism should be there to plug in the lose holes.
b. What are the five (5) factors to be considered while gathering feedback from the stakeholders during the implementation process?
Answer: To gather the feedback on the process . employee survey, customer survey and vendor surveys are necessary along with that there should be open discussion that should be encouraged about the process and the same should be discussed in an open house forum. There should be also training imparted to make the stake holders used to the new ICT policies.
Question 11: Answer the following: a. What are the five (5) factors to ensure confidentiality of stakeholder's interest?
Ans. The five factors to ensure the confidentiality of stake holders interest are to protect the data and save them from pilferage.
Provide encryption for data ; ask the stake holders to protect their data with passwords that are difficult; advice the stakeholders to change the pass-words over time. Periodic audit of the website and the Big data are to be made to see that it has not been accessed by hackers.
b. What do you understand by the term proprietary rights of stakeholder's interest?
Ans. The stake holders in an organisation come to access various data and devices that are of the organisation's property and are of organisation's interest. The proprietary rights of the stakeholder's interest decide to what extent the stakeholders can use those data and avail them for personal interest over a time period.
DON'T MISS YOUR CHANCE TO EXCEL IN ICTICT610 MANAGE COPYRIGHT, ETHICS AND PRIVACY IN AN ICT ENVIRONMENT ASSIGNMENT! HIRE TUTOR OF EXPERTSMINDS.COM FOR PERFECTLY WRITTEN ICTICT610 MANAGE COPYRIGHT, ETHICS AND PRIVACY IN AN ICT ENVIRONMENT ASSIGNMENT SOLUTIONS!
Question 12: What are the ten (10) considerations, for drafting or updating organisation's privacy policy and procedures?
The different considerations for drafting a privacy policy are 1. To appoint a privacy officer or a privacy committee. 2. To make a privacy audit before making the privacy policy. 3. Ensure that the privacy information collected is authentic. 4. Ensure that the privacy information is secured. 5. Develop and implement privacy policy and practices. 6. Develop and implement safeguards for privacy policy. 7. Respond to the privacy inquiries. 8. Train the staff for effective launching of privacy policy. 9. Monitor the privacy policy. 10 . Review the privacy policy.
Question 13: Explain different measures that can be implemented to avoid a breach of copyright complaint.
Answer: When a person is using the material of a different individual, permission should be sought to use it. If a third party is appointed for any collection of data or photograph or like materials, it should be ensured that ownership and copyright should be transferred. Similarity should be avoided while making the write-up or the material and it should be as distinct as possible.
Question 14: Answer the following: a. Why is it important to review the code of ethics of the organisation?
Ans. Ethics change over time and place, if a company is going global it is important to change its code of ethics
b. How should the review of the code of the ethics to be conducted?
Ans. The culture of the land where the company is operating, its codes, norms and rules are to be reviewed and then the code of ethics should be reformed.
c. How can you review the staff understanding of the code of ethics?
Ans. There should be a questionnaire attached with the written code of ethics or that on the mail and the staff should be asked to fill up the options of the questions to make the management understand that he has understood the code of ethics.
WORK TOGETHER WITH EXPERTSMIND'S TUTOR TO ACHIEVE SUCCESS IN ICTICT610 MANAGE COPYRIGHT, ETHICS AND PRIVACY IN AN ICT ENVIRONMENT ASSIGNMENT!
Assessment Task 2 - Unit Project
Part A: Develop and implement copyright, ethics and privacy policies and procedures that addressed the issues identified during the internal audit.
Answer-
Introduction
Copyright is the act through which credit is given to the creator of an original work for his creation. It is extended for a time period and the copyright is extended to the creator of the work which none else can claim for a particular period.
Copyright
Copyright compliance policy
The copyright compliance policy is a draft made for protecting the copyright for an organisation or an individual and implemented under the copyright protection law of the country.
Legislative requirements
The legislative requirements for copyrights are having an original work. The work must be recorded on a tangible medium. It must not have any similarity with any existing copyright. Register work with the copyright office. Using the notice for copyright
Infringement of Copyright
Infringemement of copyright happens when there occurs similarity with or copying of the copyright protected material happens
Expiry of Copyright
Copyright is given for a certain period after which it needs to be renewed of extended. When the term ends, the expiry of the copyright happens
Procedures to address the issues
In case of infringement of the copyright, it must be addressed to the copyright office.
Ethics
Purpose Ethics are the rules or norms that a member of an institution is required to follow which will safeguard the interest of the organisation, society and other stake holders keeping in place the self- interest as legitimate.
Scope
The scope of ethics encompasses the organisation, the society, the other stake holders and the self.
Legislative requirements
Ethics should be codified and circulated as a mandate and given to all members of the organisation so that they can adhere to it.
Code of ethics notice
The code of ethics puts in place certain points and important facets like the priority of public interest, honesty, enrichment of the quality of life, competence, professional development and professionalism.
Procedures
There is a overlooking body in any organisation and this governing body ensures that the code of ethics is maintained by the organisation members. Any inclusion in the code is notified to all members and a commitment from all members is taken for the adherence of the same.
ARE YOU LOOKING FOR RELIABLE ICTICT610 MANAGE COPYRIGHT, ETHICS AND PRIVACY IN AN ICT ENVIRONMENT ASSIGNMENT HELP SERVICES? EXPERTSMINDS.COM IS RIGHT CHOICE AS YOUR STUDY PARTNER!
Part B: Prepare a meeting agenda and distribute it at least 2 days prior to scheduled meeting.
MEETING AGENDA:
Meeting/Project Name:
|
Understanding ethics, copyright and privacy
|
Date of Meeting: (MM/DD/YYYY)
|
02/06/2019
|
Time:
|
10 .00 am
|
Meeting Facilitator:
|
Mr. X Gomes
|
Location:
|
Adelaide
|
1. Meeting Objective
|
Meeting to discuss about the code of ethics, the privacy policy and the copyright act
|
2. Attendees
|
|
|
|
Name
|
Department/Division
|
E-mail
|
Phone
|
Mr. A Jones
|
International Sales
|
jones @gmail.com
|
+1234567
|
Mrs. Brown
|
Information Technology
|
[email protected]
|
+234587
|
Mr. Turnip
|
Accounts
|
[email protected]
|
+9101112
|
Mr. White
|
Corporate Legal
|
White @rediffmail.com
|
+732145
|
3. Meeting Agenda
|
|
|
Topic
|
Owner
|
Time
|
The necessity information about code of ethics
|
ACS institute
|
10.30 a.m
|
Knowing the privacy policy
|
ACS institute
|
1.00 p.m
|
The titbits of copyright act
|
ACS institute
|
3 p.m
|
4. Pre-work/Preparation (documents/handouts to bring, reading material, etc.)
|
Description
|
Prepared by
|
The code of ethics
|
ACS Institute
|
The privacy policy
|
ACS Institute
|
Know about copyright acts
|
ACS Institute
|
SAVE YOUR HIGHER GRADE WITH ACQUIRING ICTICT610 MANAGE COPYRIGHT, ETHICS AND PRIVACY IN AN ICT ENVIRONMENT ASSIGNMENT HELP & QUALITY HOMEWORK WRITING SERVICES OF EXPERTSMINDS.COM!
Assessment Task 3 - Unit Project
Part A: Create three (3) set of "Questionnaires", once each for copyright, code of ethics and privacy policy and procedures to test the knowledge of the project team members. The questionnaire must test the knowledge of the team members knowledge of the organisation's copyright, code of ethic and privacy policy and procedure.
Template 1:
Team members questionnaire Survey Template (Copyright policy and procedures)
1. _____The work is original___________________________________________________________?
2. _______The work has no similarity with other pre-existing works
3. _______There has been an appointment of a copyright officer for suggestion to make the work original
4. ________The work has been reviewed by the copy right committee __________________________?
5. ____________The work is presented on a tangible medium
6. ______Copyright has a time period agreed______________________________________________?
7. _______The creator has demanded the copy right_____________________________________?
8. ________Request has been sent to the copyright office____________________________________?
9. _______The draft has been made for procuring the copy right
10. _____Caution has been taken to protect the copy right___________________________________?
Template 2:
Team members questionnaire Survey Template (Code of ethics policy and procedures)
1. _____The ethics body should be known by all members_____________________________________?
2. ______There needs to be written draft circulated for code of ethics ______________?
3. ________All members should be notified about the code of ethics__________________________?
4. ______The public interest should be held in priority over self interest__________________________?
5. _______there needs to be honesty in every dealing
6. There needs to be professional growth in maintaining the ethics
7. ________There should be showcase of competence
8. _______The quality of life will be enhanced for the ethics maintenance
9. _____________The professionalism will be enhanced
10. _______Ethics will inculcate the sense to be better human beings _______________________?
DO YOU WANT TO EXCEL IN ICTICT610 MANAGE COPYRIGHT, ETHICS AND PRIVACY IN AN ICT ENVIRONMENT ASSIGNMENT? HIRE TRUSTED TUTORS FROM EXPERTSMINDS AND ACHIEVE SUCCESS!
Template 3:
Team members questionnaire Survey Template (Privacy policy and procedures)
1. ______Is the privacy policy enacted in Australian law___________________________________?
2. _____Does the purview of the privacy policy fall under the jurisdiction of the state______________?
3. ______Does the privacy policy fall under the jurisdiction of the legislation_____________________?
4. ________Is a physical threat a breach of privacy policy__________________________________?
5. ____________Is an encroachment in the territory a breach of privacy policy___________________?
6. __________Sharing of personal information of other person is always a breach in privacy policy ________________?
7. ___________Sharing of information of institutions or individuals without their permission is a breach in the privacy policy_____________________________________________________?
8. ________The jurisdiction can take punitive actions for offenders of privacy ____________________?
9. _______The _Australian privacy law holds provision about handling of tax file numbers and credit principles_____________________________________?
10. ______ The office of the Information commission have authority to deal with privacy_complaints in Australia_______________________________________?
What would you like to see offered/improved?
EXPERTSMINDS.COM ACCEPTS INSTANT AND SHORT DEADLINES ORDER FOR ICTICT610 MANAGE COPYRIGHT, ETHICS AND PRIVACY IN AN ICT ENVIRONMENT ASSIGNMENT - ORDER TODAY FOR EXCELLENCE!
Hire Expertsminds Tutors and get best ECA Graduate Institute, Australia Assignment Help Service for other courses and units such as -
- BSBWHS501 Ensure a safe workplace Assignment Help
- BSBSUS501 Develop workplace policy and procedures for sustainability Assignment Help
- ICTSAS502 Establish and maintain client user liaison Assignment Help
- ICTICT509 Gather data to identify business requirements Assignment Help
- ICTICT511 Match ICT needs with the strategic direction of the enterprise Assignment Help
- ICTWEB501 Build a dynamic website Assignment Help
- ICTWEB502 Create dynamic web pages Assignment Help
- ICTWEB503 Create web-based programs Assignment Help
- ICTPRG527 Apply intermediate object-oriented language skills Assignment Help
- ICTPRG501 Apply advanced object-oriented language skills Assignment Help
- ICTPRG524 Develop high-level object-oriented class specifications Assignment Help
- ICTSAD501 Model data objects Assignment Help
- ICTSAD502 Model data processes Assignment Help
- ICTNWK514 Model preferred system solutions Assignment Help
- ICTPMG501 Manage ICT projects Assignment Help
- BSBCRT501 Originate and develop concepts Assignment Help
- BSBINN601 Lead and manage organisational change Assignment Help
- BSBWOR502 Lead and manage team effectiveness Assignment Help
- ICTICT608 Interact with clients on a business level Assignment Help