Ilovepdf Merged
Ilovepdf Merged
assessment tasks
ICTICT618
Manage IP, ethics and
privacy in an ICT
environment
CONTENTS
Introduction ................................................................................................................................... 3
Student assessment agreement .................................................................................................... 4
Assessment Task Cover Sheet ...................................................................................................... 5
Assessment Task 1: Knowledge Questions.................................................................................... 6
Assessment Task 1: Checklist ....................................................................................................... 9
Assessment Task Cover Sheet .................................................................................................... 10
Assessment Task 2: Project Portfolio ........................................................................................... 11
Assessment Task 2: Checklist ..................................................................................................... 16
Final Results Record ................................................................................................................... 18
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment
Introduction
The assessment tasks for ICTICT618 - Manage IP, ethics and privacy in an ICT environment are
outlined in the assessment plan below. These tasks have been designed to help you demonstrate
the skills and knowledge that you have learnt during your course.
Please ensure that you read the instructions provided with these tasks carefully. You should also
follow the advice provided in the IT Works Student User Guide. The Student User Guide provides
important information for you relating to completing assessment successfully.
For you to be assessed as competent, you must successfully complete two assessment tasks:
Assessment Task 1: Knowledge questions – You must answer all questions correctly.
Assessment Task 2: Project – You must work through a range of activities and complete a
project portfolio.
Have you read the assessment requirements for this unit? Yes No
Do you understand the requirements of the assessments for this unit? Yes No
Do you agree to the way in which you are being assessed Yes No
Do you have any specific needs that should be considered Yes No
If so, explain these in the space below.
Student signature
Date 15/09/2024
Assessor signature
Date 15/09/2024
TPI0002577
Student ID number
Student signature
15/09/2024
Date
Assessor declaration
I hereby certify that this student has been assessed by me and that the assessment has been
carried out according to the required assessment procedures.
Assessor name
Assessor signature
Date
Feedback
Student signature
Date 15/09/2024
A copy of this page must be supplied to the office and kept in the student’s file with the evidence.
review the advice to students regarding answering knowledge questions in the IT Works
Student User Guide
comply with the due date for assessment which your assessor will provide
i Assessment information
Information about how you should complete this assessment can be found in Appendix
A of the IT Works Student User Guide. Refer to the appendix for information on:
Questions
Provide answers to all of the questions below:
2. Complete the table below to identify two types of legislation relevant to intellectual property.
3. Complete the table below to identify the legislation relevant to privacy. Identify both the federal
act, as well as the act for the state or territory in which you are located.
4. List three ways that a business could choose to communicate new IP, privacy or ethics
processes and procedures to staff
1. Provide and set up an induction meeting with staff that outline the company's policies and
procedures.
2. Holding meeting or presentation, and re-informing the changes of policies through
electronic letter such as emails, or text messages.
3. Create a survey to gather information and feedback from staff.
5. Give an example of a customer service standard or procedures that can be followed to ensure
copyright, ethics and privacy.
Bryan Peach Institute Pty. Ltd. T/A Peach Institute
RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 7
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment
6. Identify and explain two typical ICT security systems and procedures that can be used to
manage IP, ethics and privacy in an ICT environment.
System/procedure Explanation
Information security policy and This policy and procedure are defined as a set of rules and guidelines that
procedure govern the use, management, and protection of information technology
(IT) assets and resources. It applies to all users within an organization or
its networks, as well as all digitally stored data under its control. A policy
for information security addresses threats and defines strategies and
procedures for mitigating IT security risks. The procedure in this case
would be if a person attempts to access electronic information, they will
be asked to provide a password
Security systems and procedures Security systems and procedures for providing information to third parties
can be put in place. To mitigate security and technological risks,
information security requirements are developed, maintained, and
implemented. External users will thus require a security classification,
which will decide what, when, and how information is provided to them.
This implies that strictly limited information is provided to third parties
and procedures are in place to ensure this, such as authorizations
(passwords) or only specific information is provided and documented
procedures specify who could obtain what.
Student’s name:
Question 1
Question 2
Question 3
Question 4
Question 5
Question 6
Assessor signature:
Assessor name:
Date:
TPI0002577
Student ID number
Student signature
15/09/2024
Date
Assessor declaration
I hereby certify that this student has been assessed by me and that the assessment has been
carried out according to the required assessment procedures.
Assessor name
Assessor signature
Date
Feedback
Student signature
15/09/2024
Date
A copy of this page must be supplied to the office and kept in the student’s file with the evidence.
review the advice to students regarding responding to written tasks in the IT Works Student
User Guide
comply with the due date for assessment which your assessor will provide
adhere with Peach Institute’s submission guidelines
Assessment information
i
Information about how you should complete this assessment can be found in Appendix
A of the IT Works Student User Guide. Refer to the appendix for information on:
Activities
Complete the following activities:
2. Preparation
Make sure you are familiar with the business you are basing this assessment on
and have read through the necessary background information and policies and
procedures. For the case study business, this is all of the documents included in
the ICT Simulation Pack. If it’s your own business or a business where you are
working or are familiar with, it’s important at this step that you have your business
or case study approved by your assessor.
3. Research
You are now to complete Section 1 of your Project Portfolio by researching and
identifying:
ICT industry standards relevant to code of ethics. You should also ensure that
you research typical procedures for review and grievance procedures relevant
to ethics breaches as you will need this information for activity 5.
assess the integrity of the information you are using as part of your research
i.e. so that you can be sure it is reliable information.
You also need to document this information in your Portfolio.
Now that you have researched and identified relevant ICT intellectual property,
ethics and privacy legislation, standards and codes of ethics, you are to develop a
plan to review the organisation’s adherence to IP, ethical and privacy requirements
as per your research.
This is to include a review of the organisation’s existing policies and procedures
relating to intellectual property, ethics and privacy. If you are completing this for the
ICT Simulation Pack this will be the policies and procedures in the ICT Simulation
Pack. If it’s for your own business or a business where you are working or are
familiar with this will be the business’ policies and procedures relating to intellectual
property, ethics and privacy.
Use the Action Plan template to document your plan. Choose an appropriate
timeframe for the plan, for example, 12 months.
Complete Section 2 of your Project Portfolio. Submit this to your assessor for
feedback. Your assessor will respond to you with feedback as required.
5. Policy review
You are now to implement your plan by reviewing the organisation’s existing
policies and procedures relating to intellectual property, ethics and privacy and
confidentiality and whether they meet current industry standards/legislative
requirements for intellectual property/copyright, privacy and ethics. You are to
recommend and make improvements.
You are also required to develop a review and grievances procedure for
managing ethical breaches, including confidential reporting of ethical issues.
This should be developed in the style of the case study business’ policies and
procedures or the business you are working on for this assessment. It can be
approximately 1 – 2 pages.
Now that you have updated your policies and procedures you are to set up
appropriate folders in a filing sharing system (such as Dropbox, Google Drive or
OneDrive). Then file all the updated documents you have created within these
folders.
This can either be viewed in person by your assessor or you may like to video
i
record the session for your assessor to watch later. Your assessor can provide you
with more details at this step. Make sure you follow the instructions above and
meet the timeframes allocated.
Following the meeting you should complete the reflection section of your Portfolio
(Section 4)
Make sure you have completed all sections of your Project Portfolio, answered all
questions, provided enough detail as indicated and proofread for spelling and
grammar as necessary.
Student’s name:
Completed
successfully? Comments
Responding to questions as
required and to exchange ideas
Assessor signature:
Assessor name:
Date:
Result
Feedback
I hereby certify that this student has been assessed by me and that the assessment has been
carried out according to the required assessment procedures.
ICTICT618
Manage IP, ethics and privacy in ICT
environments
ICTICT618 - Project Portfolio
CONTENTS
Section 1: Research............................................................................................................................... 4
Section 2: Action Plan for review of organisational adherence to IP, ethics/conduct and privacy
requirements.......................................................................................................................................... 7
Section 3: Policy update........................................................................................................................11
Section 4: Reflection .............................................................................................................................15
2
ICTICT618 - Project Portfolio
Date: 15/09/2024
3
ICTICT618 - Project Portfolio
Section 1: Research
Intellectual property and Research and identify ICT industry standards for intellectual
copyright standard/legislation
property
Research and identify ICT
Requirements for ICT products and services to be accessible are
industry standards for
intellectual property, as well as among the industry standards. In a format appropriate for use in
copyright legislation. European public procurement, this paper lays out the specifications
Describe at least one standard for functional access to ICT products and services. It also describes
for intellectual property and the
main legislation for copyright. each accessibility requirement's testing and evaluation processes.
Describe how you know the For instance, this paper might be helpful for private sector
source of this information is procurement needs.
reliable thereby ensuring the
The main legislation related to copyright is Copyright Act 1968.
integrity of information.
The primary goal of the copyright legislation is to safeguard an
Explain the outcomes of
complying with and not individual's originality and inventiveness. Copyright gives authors
complying with intellectual
the freedom to decide what happens to their works. A person's
property requirements (at least
creations may only be used with permission from the copyright
one example of each).
holder or in compliance with legal requirements. As the owner, you
have the authority to determine what happens to it. All of your
creative work will thus be automatically safeguarded and secured if
you are a creator. This implies that you have the freedom to
determine how others may use your work and that you must obtain
consent before using your position. It makes no difference if you are
a "professional" or not—the law applies to everyone equally.
The sources of these information are:
https://www.ipaustralia.gov.au/about-us/legislation/ip-
legislation
https://www.standards.org.au/standards-catalogue/sa-
snz/other/it-040/as--en--301--549-colon-2024
Since these are the official websites, the accuracy of the content is
guaranteed.Respecting the intellectual property requirement has the
benefit of
preventing others from claiming our creation and using it without
our will.
Failure to comply with the Copyright Act may result in fines of up to
$117,000 for individuals and $585,000 for corporations.
4
ICTICT618 - Project Portfolio
Describe typical review and professionals are expected to handle challenges are all outlined in a
grievance procedures for code
ethical breaches. of ethics.
Describe how you know the Any typical review and grievance procedures for ethical breaches
source of this information is
consist of following steps:
5
ICTICT618 - Project Portfolio
https://www.abs.gov.au/
6
ICTICT618 - Project Portfolio
Include any comments you need Time frames/ deadlines To mark off once
What activities will you be completing
to note completed
2. Review Copyright Policy and Procedures Verify that it complies with the 1 month
most recent copyright laws. Check
☐
for clarification on copyright
clearance and fair use policies.
3. Conduct a gap analysis comparing internal Update policy reflecting any legal 1 month
policy to relevant legislation. or best practice changes. ☐
7
ICTICT618 - Project Portfolio
Review and Update Code of Ethics Review and Update Code of 1 month
Ethics such the ACM Code of
Ethics, with
the present code of ethics. In ☐
5. Conduct Ethics Training for Staff Plan training sessions for all staff 2 weeks
members to acquaint them with
the most recent version of the ☐
code of ethics and the significance
of moral behaviour.
8
ICTICT618 - Project Portfolio
6. Establish Ethics Review and Grievance Develop and implement clear 1 month
Procedures procedures for reporting,
reviewing, and addressing ethical
breaches within the organization. ☐
9. Schedule Regular Compliance Reviews Establish a schedule for periodic Every Six Month
reviews to ensure ongoing
compliance with IP, ethics, and
privacy requirements.
9
ICTICT618 - Project Portfolio
10
ICTICT618 - Project Portfolio
11
ICTICT618 - Project Portfolio
permissions
Feedback Most of the comments I got on the policies and processes were favourable . A
Summarise the few members felt that several policies were ambiguous and did not provide a
feedback that you
clear explanation of the range of topics they would cover. In order to avoid
were provided with
on policies and confusion and to make the policies more apparent to the reader at a glance, I
procedures and clarified the policies after considering the input. and how you used it.
how you used it.
Presentation To ensure that everyone is aware of the subject I will be discussing, I have
Describe how you chosen to send everyone a soft copy of the action plan ahead of time.
have decided to
Additionally, attendees will have the opportunity to discuss any unclear points
present the policies
and procedures at and prepare questions in order to get any doubts answered.
your roundtable In order to clarify the policies and explain my opinions, I will also make a power
meeting. Explain
why you believe this
method is
appropriate for your
audience.
12
ICTICT618 - Project Portfolio
point presentation.
13
ICTICT618 - Project Portfolio
Presentation ☐
14
ICTICT618 - Project Portfolio
Section 4: Reflection
Insights The things I learned form the round table discussion are:
Write down what you - The value of intellectual property, ethics, and privacy in the current era
learnt at the cannot be
roundtable
overstated.
discussion by
listening to other - As the modern era progresses, things are becoming more electronic.
students’ - These days, with everything being computerized, intellectual property, ethics,
presentations and and
discussing ideas.
privacy need to be taken into account more than before.
15