0% found this document useful (0 votes)
24 views33 pages

Ilovepdf Merged

ppt

Uploaded by

savneetk662
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views33 pages

Ilovepdf Merged

ppt

Uploaded by

savneetk662
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

student

assessment tasks

ICTICT618
Manage IP, ethics and
privacy in an ICT
environment
CONTENTS
Introduction ................................................................................................................................... 3
Student assessment agreement .................................................................................................... 4
Assessment Task Cover Sheet ...................................................................................................... 5
Assessment Task 1: Knowledge Questions.................................................................................... 6
Assessment Task 1: Checklist ....................................................................................................... 9
Assessment Task Cover Sheet .................................................................................................... 10
Assessment Task 2: Project Portfolio ........................................................................................... 11
Assessment Task 2: Checklist ..................................................................................................... 16
Final Results Record ................................................................................................................... 18
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment

Introduction
The assessment tasks for ICTICT618 - Manage IP, ethics and privacy in an ICT environment are
outlined in the assessment plan below. These tasks have been designed to help you demonstrate
the skills and knowledge that you have learnt during your course.
Please ensure that you read the instructions provided with these tasks carefully. You should also
follow the advice provided in the IT Works Student User Guide. The Student User Guide provides
important information for you relating to completing assessment successfully.

Assessment for this unit


ICTICT618 - Manage IP, ethics and privacy in ICT environments describes the performance
outcomes, skills and knowledge required to manage the issues of intellectual property (IP),
copyright and professional and ethical conduct in a team and to ensure that personal information of
stakeholders is handled in a confidential and professional manner.

For you to be assessed as competent, you must successfully complete two assessment tasks:

 Assessment Task 1: Knowledge questions – You must answer all questions correctly.

 Assessment Task 2: Project – You must work through a range of activities and complete a
project portfolio.

Bryan Peach Institute Pty. Ltd. T/A Peach Institute


RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 3
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment

Student assessment agreement


Make sure you read through the assessments in this booklet before you fill out and sign the
agreement below.
If there is anything that you are unsure of, consult your assessor prior to signing this agreement.

Have you read the assessment requirements for this unit?  Yes  No
Do you understand the requirements of the assessments for this unit?  Yes  No
Do you agree to the way in which you are being assessed  Yes  No
Do you have any specific needs that should be considered  Yes  No
If so, explain these in the space below.

Do you understand your rights to reassessment? Yes  No


Do you understand your right to appeal the decisions made in an  Yes  No
assessment?

Student name Savneet kaur

Student ID number TPI0002577

Student signature

Date 15/09/2024

Assessor name Mohan ganavarapu

Assessor signature

Date 15/09/2024

Bryan Peach Institute Pty. Ltd. T/A Peach Institute


RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 4
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment

Assessment Task Cover Sheet


Student declaration
To be filled out and submitted with assessment responses
 I declare that this task is all my own work and I have not cheated or plagiarised the work or
colluded with any other student(s).
 I understand that if I am found to have plagiarised, cheated or colluded, action will be taken
against me according to the process explained to me.
 I have correctly referenced all resources and reference texts throughout these assessment
tasks.

Student name Savneet kaur

TPI0002577
Student ID number

Student signature
15/09/2024
Date

Assessor declaration
 I hereby certify that this student has been assessed by me and that the assessment has been
carried out according to the required assessment procedures.

Assessor name

Assessor signature

Date

Assessment outcome S NS DNS Resubmission Y N

Feedback

Student result response


 My performance in this assessment task has been discussed and explained to me.
 I would like to appeal this assessment decision.

Student signature

Date 15/09/2024

A copy of this page must be supplied to the office and kept in the student’s file with the evidence.

Bryan Peach Institute Pty. Ltd. T/A Peach Institute


RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 5
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment

Assessment Task 1: Knowledge Questions

Information for students


Knowledge questions are designed to help you demonstrate the knowledge which you have
acquired during the learning phase of this unit. Ensure that you:

 review the advice to students regarding answering knowledge questions in the IT Works
Student User Guide

 comply with the due date for assessment which your assessor will provide

 adhere with Peach Institute’s submission guidelines

 answer all questions completely and correctly

 submit work which is original and, where necessary, properly referenced

 submit a completed cover sheet with your work

 avoid sharing your answers with other students.

i Assessment information
Information about how you should complete this assessment can be found in Appendix
A of the IT Works Student User Guide. Refer to the appendix for information on:

 where this task should be completed

 the maximum time allowed for completing this assessment task

 whether or not this task is open-book.


Note: You must complete and submit an assessment cover sheet with your work. A
template is provided in Appendix C of the Student User Guide. However, if Peach
Institute has provided you with an assessment cover sheet, please ensure that you use
that.

Bryan Peach Institute Pty. Ltd. T/A Peach Institute


RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 6
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment

Questions
Provide answers to all of the questions below:

1. Complete the table below to identify the legislation relevant to copyright.

Copyright legislation Purpose


Copyright Act 1968 This Act is established to create an area of law that grants
creators plenty of rights over how others use their works.
Whereas these rights differ based on the kind of material
in question, a copyright owner can generally prevent uses
that would infringe copyright in their material and
authorize use of the material by another party. When
granting permission for others to reuse material, they have
the right to be compensated for the use of the material.

2. Complete the table below to identify two types of legislation relevant to intellectual property.

Intellectual property legislation Purpose


Patents Act 1990 The purpose of this Act is to establish a patent system in
Australia that promotes technology advancement as well
as the transfer and dissemination of technology. In this
way, the patent system could also balance the interests of
producers, owners, users of technology, and the general
public cover time.
Trade Marks Act 1995. The main objective of trademark law is to prevent unfair
competition by securing the use of a symbol, word, logo,
slogan, design, domain name, or other distinctive feature
of a company's goods or services

3. Complete the table below to identify the legislation relevant to privacy. Identify both the federal
act, as well as the act for the state or territory in which you are located.

Privacy legislation Purpose


Privacy Act 1988 The Privacy Act of 1988 (Privacy Act) was established to
protect individuals' personal information when it is
handled. This includes the collection, use, storage, and
disclosure of personal information in both the federal and
private sectors.
Privacy Act 2014 To make sure that ACT agencies properly handle personal
information accurately, efficiently and effectively.

4. List three ways that a business could choose to communicate new IP, privacy or ethics
processes and procedures to staff

1. Provide and set up an induction meeting with staff that outline the company's policies and
procedures.
2. Holding meeting or presentation, and re-informing the changes of policies through
electronic letter such as emails, or text messages.
3. Create a survey to gather information and feedback from staff.

5. Give an example of a customer service standard or procedures that can be followed to ensure
copyright, ethics and privacy.
Bryan Peach Institute Pty. Ltd. T/A Peach Institute
RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 7
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment

Customer service Example


standard/procedure
In writing, inform clients of the organization's copyright in relation to the
Copyright products/services provided. This could be included in a contract.

Inform customers about the organization's values, which including respect


Ethics and confidentiality, for example, by posting this information on a website
or writing a code of ethics for the organization.

Create a privacy policy and procedure to ensure that all customers'


Privacy personal information is kept confidential and secure.

6. Identify and explain two typical ICT security systems and procedures that can be used to
manage IP, ethics and privacy in an ICT environment.

System/procedure Explanation
Information security policy and This policy and procedure are defined as a set of rules and guidelines that
procedure govern the use, management, and protection of information technology
(IT) assets and resources. It applies to all users within an organization or
its networks, as well as all digitally stored data under its control. A policy
for information security addresses threats and defines strategies and
procedures for mitigating IT security risks. The procedure in this case
would be if a person attempts to access electronic information, they will
be asked to provide a password
Security systems and procedures Security systems and procedures for providing information to third parties
can be put in place. To mitigate security and technological risks,
information security requirements are developed, maintained, and
implemented. External users will thus require a security classification,
which will decide what, when, and how information is provided to them.
This implies that strictly limited information is provided to third parties
and procedures are in place to ensure this, such as authorizations
(passwords) or only specific information is provided and documented
procedures specify who could obtain what.

Bryan Peach Institute Pty. Ltd. T/A Peach Institute


RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 8
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment

Assessment Task 1 : Checklist

Student’s name:

Did the student provide a Completed


sufficient and clear answer successfully? Comments
that addresses the
suggested answer for the Yes No
following?

Question 1

Question 2

Question 3

Question 4

Question 5

Question 6

Task outcome:  Satisfactory  Not satisfactory

Assessor signature:

Assessor name:

Date:

Bryan Peach Institute Pty. Ltd. T/A Peach Institute


RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 9
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment

Assessment Task Cover Sheet


Student declaration
To be filled out and submitted with assessment responses
 I declare that this task is all my own work and I have not cheated or plagiarised the work or
colluded with any other student(s).
 I understand that if I am found to have plagiarised, cheated or colluded, action will be taken
against me according to the process explained to me.
 I have correctly referenced all resources and reference texts throughout these assessment
tasks.

Student name Savneet kaur

TPI0002577
Student ID number

Student signature
15/09/2024
Date

Assessor declaration
 I hereby certify that this student has been assessed by me and that the assessment has been
carried out according to the required assessment procedures.

Assessor name

Assessor signature

Date

Assessment outcome S NS DNS Resubmission Y N

Feedback

Student result response


 My performance in this assessment task has been discussed and explained to me.
 I would like to appeal this assessment decision.

Student signature

15/09/2024
Date

A copy of this page must be supplied to the office and kept in the student’s file with the evidence.

Bryan Peach Institute Pty. Ltd. T/A Peach Institute


RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 10
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment

Assessment Task 2: Project Portfolio

Information for students


In this task, you are required to demonstrate your skills and knowledge by working through a
number of activities and completing and submitting a project portfolio.
You will need access to:

 a suitable place to complete activities that replicates a business environment including a


meeting space and computer and internet access

 your learning resources and other information for reference

 legislation, standards, codes of practice and ethics records/documentation such as at:


o https://www.ipaustralia.gov.au/about-us/legislation/ip-legislation
o https://www.oaic.gov.au/privacy/the-privacy-act/
o https://www.acs.org.au/home.html
o https://www.itpa.org.au/code-of-ethics/
o https://www.geeksforgeeks.org/ethical-issues-in-information-technology-it/
o https://vpsc.vic.gov.au/resources/gifts-benefits-and-hospitality-resource-suite/
 Project Portfolio template

 ICT Simulation Pack.


Ensure that you:

 review the advice to students regarding responding to written tasks in the IT Works Student
User Guide

 comply with the due date for assessment which your assessor will provide
 adhere with Peach Institute’s submission guidelines

 answer all questions completely and correctly

 submit work which is original and, where necessary, properly referenced

 submit a completed cover sheet with your work

 avoid sharing your answers with other students.

Assessment information
i
Information about how you should complete this assessment can be found in Appendix
A of the IT Works Student User Guide. Refer to the appendix for information on:

 where this task should be completed

 how your assessment should be submitted.


Note: You must complete and submit an assessment cover sheet with your work. A
template is provided in Appendix B of the Student User Guide. However, if Peach
Institute has provided you with an assessment cover sheet, please ensure that you use
that.

Bryan Peach Institute Pty. Ltd. T/A Peach Institute


RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 11
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment

Activities
Complete the following activities:

1. Carefully read the following:

This project requires you to analyse legislation and standards relevant to


intellectual property, ethics and privacy in the ICT industry and then to develop and
document a review plan and contribute to policy and procedures improvements
relevant to intellectual property, ethics and privacy.
This project can be based on the case study business in the Simulation pack or you
may like to base this on your own business, or a business you are currently working
for or are familiar with. It is important that this business has existing policies and
procedures in place relating to intellectual property, ethics and privacy. Speak to
your assessor to get approval if you want to base this on your own business or one
you work for.
You will be collecting evidence for this unit in a Project Portfolio. The steps you
need to take are outlined below.

2. Preparation

Make sure you are familiar with the business you are basing this assessment on
and have read through the necessary background information and policies and
procedures. For the case study business, this is all of the documents included in
the ICT Simulation Pack. If it’s your own business or a business where you are
working or are familiar with, it’s important at this step that you have your business
or case study approved by your assessor.

Complete Page 4 of your Project Portfolio for this unit.


Read through the requirements of Section 1, 2 3 and 4 of your Project Portfolio
which include detailed guidance relevant to all the assessment activities.

3. Research

You are now to complete Section 1 of your Project Portfolio by researching and
identifying:

 ICT industry standards for intellectual property, as well as copyright legislation.

 Existing legislation relevant to privacy.

 ICT industry standards relevant to code of ethics. You should also ensure that
you research typical procedures for review and grievance procedures relevant
to ethics breaches as you will need this information for activity 5.

While researching this information:

 consider the implication of not complying with this legislation in an ICT


environment.

Bryan Peach Institute Pty. Ltd. T/A Peach Institute


RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 12
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment

 assess the integrity of the information you are using as part of your research
i.e. so that you can be sure it is reliable information.
You also need to document this information in your Portfolio.

Complete Section 1 of your Project Portfolio. Submit this to your assessor.

4. Review and planning

Now that you have researched and identified relevant ICT intellectual property,
ethics and privacy legislation, standards and codes of ethics, you are to develop a
plan to review the organisation’s adherence to IP, ethical and privacy requirements
as per your research.
This is to include a review of the organisation’s existing policies and procedures
relating to intellectual property, ethics and privacy. If you are completing this for the
ICT Simulation Pack this will be the policies and procedures in the ICT Simulation
Pack. If it’s for your own business or a business where you are working or are
familiar with this will be the business’ policies and procedures relating to intellectual
property, ethics and privacy.
Use the Action Plan template to document your plan. Choose an appropriate
timeframe for the plan, for example, 12 months.

Complete Section 2 of your Project Portfolio. Submit this to your assessor for
feedback. Your assessor will respond to you with feedback as required.

5. Policy review

You are now to implement your plan by reviewing the organisation’s existing
policies and procedures relating to intellectual property, ethics and privacy and
confidentiality and whether they meet current industry standards/legislative
requirements for intellectual property/copyright, privacy and ethics. You are to
recommend and make improvements.
You are also required to develop a review and grievances procedure for
managing ethical breaches, including confidential reporting of ethical issues.
This should be developed in the style of the case study business’ policies and
procedures or the business you are working on for this assessment. It can be
approximately 1 – 2 pages.

Work on Section 3 of your Project Portfolio.

6. File and share policies and procedures

Now that you have updated your policies and procedures you are to set up
appropriate folders in a filing sharing system (such as Dropbox, Google Drive or
OneDrive). Then file all the updated documents you have created within these
folders.

Bryan Peach Institute Pty. Ltd. T/A Peach Institute


RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 13
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment

Check the filing system to determine if the information is accessible, confidential


and secure (you will report on this in your Portfolio) and then share the folder with
management (your assessor).
When you share the folder, you should also ask for feedback on the updated
policies and procedures and the new review and grievance procedure.
Management (your assessor) will respond to you with comments which you will be
required to integrate into your documents.

Complete Section 3 of your Project Portfolio. Submit this to your assessor.

7. Training and information session.

In a group round-table style discussion with a student group of approximately five,


you will present your policies and procedures (as though this is a staff training and
information session). You may do this in any format you wish such as developing a
PowerPoint Presentation or providing handouts.
You should consider the group of individualised you are to present the policies and
procedures to so that you can select and use the most appropriate communication
method, format, tone and content.
Other students in your group will also present their training which will allow you to
collaborate as a team and also to gain further insights into intellectual property,
ethics and privacy.
Each person will have a turn (approximately 15 minutes per person) to present their
policies and procedures. Either during the presentation or at the end you are to
seek the views and opinions of your team on the policies and procedures. This will
ensure an exchange of ideas too.
Your assessor will be looking to see that you can:

 demonstrate effective communication skills including:


o Speaking clearly and concisely
o Using non-verbal communication to assist with understanding
o Asking questions to identify required information
o Responding to questions as required
o Using active listening techniques to confirm understanding

This can either be viewed in person by your assessor or you may like to video
i
record the session for your assessor to watch later. Your assessor can provide you
with more details at this step. Make sure you follow the instructions above and
meet the timeframes allocated.
Following the meeting you should complete the reflection section of your Portfolio
(Section 4)

8. Submit your completed Project Portfolio

Bryan Peach Institute Pty. Ltd. T/A Peach Institute


RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 14
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment

Make sure you have completed all sections of your Project Portfolio, answered all
questions, provided enough detail as indicated and proofread for spelling and
grammar as necessary.

Submit to your assessor for marking.

Bryan Peach Institute Pty. Ltd. T/A Peach Institute


RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 15
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment

Assessment Task 2 : Checklist

Student’s name:

Completed
successfully? Comments

Did the student: Yes No

Review and analyse Australian IP and


copyright law as relevant to the ICT
environment and organisation?

Review and analyse ICT specific code of


ethics as relevant to the ICT
environment and organisation?

Review and analyse privacy legislation


as relevant to the ICT environment and
organisation?

Summarise outcomes of compliant and


non-compliant practice with Australian IP
and copyright law, ethics and privacy as
relevant to the ICT environment?

Determine how existing Australian IP


law, code of ethics/conduct and privacy
relate to the business and its
requirements?

Determine the integrity of the information


researched?

Develop and document a plan to


determine the workplace’s adherence to
Australian IP law, code of ethics/conduct
and privacy?

Develop and document a plan to


determine the workplace’s adherence to
Australian IP law, code of ethics/conduct
and privacy (including confidentiality)?

Submit review plan and updated


procedures to the assessor and seek
and respond to feedback?

Update three different policies and


procedures to ensure alignment with
Australian IP law, code of ethics/conduct
and privacy requirements?

Bryan Peach Institute Pty. Ltd. T/A Peach Institute


RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 16
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment

Establish a review and grievance


procedure and that also ensures
confidential reporting of ethical issues?

Determine confidentiality, security and


availability of information by checking
the file sharing system and reporting on
this?

Implement new work procedures by


conducting an information and training
session on the new procedures?

During the training and information


session, demonstrate effective
communication skills including:

 Speaking clearly and concisely

 Using non-verbal communication to


assist with understanding

 Asking questions to get the view an


opinions of others

 Responding to questions as
required and to exchange ideas

 Using active listening techniques to


confirm understanding

Task outcome:  Satisfactory  Not satisfactory

Assessor signature:

Assessor name:

Date:

Bryan Peach Institute Pty. Ltd. T/A Peach Institute


RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 17
Student Assessment Tasks ICTICT618 - Manage IP, ethics and privacy in an ICT environment

Final Results Record

Student name: Savneet kaur

Assessor name: Mohan ganavarapu


15/09/2024
Date

Final assess ment results

Result

Task Type Satisfactory Unsatisfactory Did not submit

Assessment Task 1 Knowledge questions S U DNS

Assessment Task 2 Project Portfolio S U DNS

Overall unit results C NYC

Feedback

 My performance in this unit has been discussed and explained to me.


 I would like to appeal this assessment decision.

Student signature: Date: 15/09/2024

 I hereby certify that this student has been assessed by me and that the assessment has been
carried out according to the required assessment procedures.

Assessor signature: Date:

Bryan Peach Institute Pty. Ltd. T/A Peach Institute


RTO No: 31822, CRICOS Provider No: 03604C, ABN: 82 106 814 439 18
PORTFOLIO
Student Version

ICTICT618
Manage IP, ethics and privacy in ICT
environments
ICTICT618 - Project Portfolio

CONTENTS
Section 1: Research............................................................................................................................... 4
Section 2: Action Plan for review of organisational adherence to IP, ethics/conduct and privacy
requirements.......................................................................................................................................... 7
Section 3: Policy update........................................................................................................................11
Section 4: Reflection .............................................................................................................................15

2
ICTICT618 - Project Portfolio

Student name: Savneet kaur

Assessor: Mr. Mohan ganavarapu

Date: 15/09/2024

Business this assessment is This assessment is based on it biz solution company


based on:

Documentation reviewed as ICT Simulation Pack


preparation:

3
ICTICT618 - Project Portfolio

Section 1: Research

Intellectual property and Research and identify ICT industry standards for intellectual
copyright standard/legislation
property
Research and identify ICT
Requirements for ICT products and services to be accessible are
industry standards for
intellectual property, as well as among the industry standards. In a format appropriate for use in
copyright legislation. European public procurement, this paper lays out the specifications
Describe at least one standard for functional access to ICT products and services. It also describes
for intellectual property and the
main legislation for copyright. each accessibility requirement's testing and evaluation processes.

Describe how you know the For instance, this paper might be helpful for private sector
source of this information is procurement needs.
reliable thereby ensuring the
The main legislation related to copyright is Copyright Act 1968.
integrity of information.
The primary goal of the copyright legislation is to safeguard an
Explain the outcomes of
complying with and not individual's originality and inventiveness. Copyright gives authors
complying with intellectual
the freedom to decide what happens to their works. A person's
property requirements (at least
creations may only be used with permission from the copyright
one example of each).
holder or in compliance with legal requirements. As the owner, you
have the authority to determine what happens to it. All of your
creative work will thus be automatically safeguarded and secured if
you are a creator. This implies that you have the freedom to
determine how others may use your work and that you must obtain
consent before using your position. It makes no difference if you are
a "professional" or not—the law applies to everyone equally.
The sources of these information are:
https://www.ipaustralia.gov.au/about-us/legislation/ip-
legislation
https://www.standards.org.au/standards-catalogue/sa-
snz/other/it-040/as--en--301--549-colon-2024
Since these are the official websites, the accuracy of the content is
guaranteed.Respecting the intellectual property requirement has the
benefit of
preventing others from claiming our creation and using it without
our will.
Failure to comply with the Copyright Act may result in fines of up to
$117,000 for individuals and $585,000 for corporations.

4
ICTICT618 - Project Portfolio

Privacy legislation Privacy legislation


Research and identify existing The Privacy Act of 1988 is the act that is pertinent to privacy. This
legislation relevant to privacy. act's
Identify the name of the Act objectives are to:
and describe the key purpose
Recognize that protecting people's privacy while they carry out their
of this legislation.
duties or activities is in the best interests of the companies; o
Describe how you know the
Provide a foundation for uniform national privacy laws and the
source of this information is
handling of personal data; and Encourage the responsible and open
reliable thereby ensuring the
management of personal information.
integrity of information.
The information is taken form the official government site
https://www.legislation.gov.au/
So, the information is valid.

Explain the outcomes of


Outcome of complying and not complying
complying with and not
complying with privacy The outcome of compliance with privacy requirements allows you
requirements (at least one to know why your personal information is collected, how it is used
example of each).
and to whom it will be released under the Privacy Act. have the
option, under certain circumstances, not to identify yourself or to use
a pseudonym.
The outcome of not complying with privacy act differs in different
spectrums. The less serious end will be between $5000 and
$10,000, the more severe cases between $10,000 and about
$50,000. The more severe cases are between $50,000 and more
severe upwards.

Ethics code of ethics


Research and identify ICT The Australian Ethical Code is one such code. This code is meant to
industry standards relevant to serve
code of ethics, including
as a set of rules for honest and ethical business practices. The
typical procedures for review
purpose and
and grievance procedures
relevant to ethics breaches. ideals of the company or organization, professional standards,
ethical
List at least one code of ethics
and describe its key purpose. principles based on the core values of the organization, and how

Describe typical review and professionals are expected to handle challenges are all outlined in a
grievance procedures for code
ethical breaches. of ethics.
Describe how you know the Any typical review and grievance procedures for ethical breaches
source of this information is
consist of following steps:

5
ICTICT618 - Project Portfolio

reliable thereby ensuring the - Identify complaints - The management's identification by


integrity of information.
observation, past complaints, policy open door, opinion poll,
Explain the outcomes of
interview, etc. grievances.
complying with and not
complying with ethics - Defining the problem correctly – the next step is to correctly
requirements (at least one and accurately define the problem.
example of each).
- Data collection – It involves information collection from all
parties involved. Data collection
- Analysis and resolution — It comprises the analysis by

group and brainstorming of all information collected and


development of alternative solutions to grievances.
- Prompt redress - The solution selected by management
must be implemented.
- Implementation and monitoring - follow-up is required to
ensure complete resolution of the grievance.
The source of this information was taken form verified sites
https://www.australianethical.com.au/

https://www.abs.gov.au/

the outcomes of complying with and not complying with ethics


requirements

Following ethical guidelines has the benefit of ensuring seamless


corporate operations, creating a positive work environment, and
fostering
trust and reputation.
Losing credibility and trust in the marketplace is the result of
breaking
ethical rules

6
ICTICT618 - Project Portfolio

Section 2: Action Plan for review of organisational adherence to IP, ethics/conduct


and privacy requirements
Include actions in order of priority.

What Comments When Completed

Include any comments you need Time frames/ deadlines To mark off once
What activities will you be completing
to note completed

1. Conduct IP Audit Examine all of the intellectual 2 weeks


property that is currently in
existence, such as trade secrets,
copyrights, patents, and ☐
trademarks. Make sure they are
adequately recorded and
safeguarded.

2. Review Copyright Policy and Procedures Verify that it complies with the 1 month
most recent copyright laws. Check

for clarification on copyright
clearance and fair use policies.

3. Conduct a gap analysis comparing internal Update policy reflecting any legal 1 month
policy to relevant legislation. or best practice changes. ☐

7
ICTICT618 - Project Portfolio

4. Review Compliance with Copyright Verify that all software, 3 weeks


Legislation
instructions, and other materials

adhere to copyright regulations.
Verify that all licenses are current.

Update IP Policies and Procedures Based on the findings of the IP 1 month


audit, update the organization's IP
policies and procedures to ensure ☐
all IP assets are adequately
protected.

Review and Update Code of Ethics Review and Update Code of 1 month
Ethics such the ACM Code of
Ethics, with
the present code of ethics. In ☐

order to comply with best


practices, update as needed.

5. Conduct Ethics Training for Staff Plan training sessions for all staff 2 weeks
members to acquaint them with
the most recent version of the ☐
code of ethics and the significance
of moral behaviour.

8
ICTICT618 - Project Portfolio

6. Establish Ethics Review and Grievance Develop and implement clear 1 month
Procedures procedures for reporting,
reviewing, and addressing ethical
breaches within the organization. ☐

7. Conduct Privacy Compliance Audit Perform an audit to ensure the 2 weeks


organization complies with
relevant privacy legislation, such
as GDPR, CCPA, or local privacy
laws.

8. Implement Privacy Training for Staff Conduct training sessions to 2 weeks


educate staff about the updated
privacy policies and the
importance of protecting personal
information.

9. Schedule Regular Compliance Reviews Establish a schedule for periodic Every Six Month
reviews to ensure ongoing
compliance with IP, ethics, and
privacy requirements.

9
ICTICT618 - Project Portfolio

 Include more rows as required.

10
ICTICT618 - Project Portfolio

Section 3: Policy update

Policy updates IT Biz Solutions - Copyright Policy and Procedures (v2.0)


List the title of the IT Biz Solutions - Privacy Policy and Procedures (v2.0)
policy and
IT Biz Solutions - Staff Code of Conduct (v2.0)
procedures you
have developed, as IT Biz Solutions - Review and Grievance Procedures
well as the review
and grievance
procedure for
ethical breaches.
Then attach them to
your portfolio as
below.

Policy distribution Security and Accessibility


Take a screenshot To ensure that the information is both secure and accessible:
of the folders you
1. Access Control:
have set up.
• Use a secure cloud storage service Google Drive, with access control
Describe how the
information is features.
secure and • Set permissions for each folder and document. Only authorized
accessible.
personnel should have editing rights, while others may have view-only
Include logins for
this information. access.
2. Security Measures:
• Encryption: Ensure that all files are encrypted both in transit and at
rest.
• Authentication: Require multi-factor authentication (MFA) for all users
accessing the folders.
• Regular Audits: Conduct regular audits to ensure that access
permissions are up-to-date and appropriate.
3. Login Information:
• Use a central authentication system (e.g., Single Sign-On - SSO) to
manage access.
• Create individual logins for each user with specific roles and

11
ICTICT618 - Project Portfolio

permissions

Feedback Most of the comments I got on the policies and processes were favourable . A
Summarise the few members felt that several policies were ambiguous and did not provide a
feedback that you
clear explanation of the range of topics they would cover. In order to avoid
were provided with
on policies and confusion and to make the policies more apparent to the reader at a glance, I
procedures and clarified the policies after considering the input. and how you used it.
how you used it.

Presentation To ensure that everyone is aware of the subject I will be discussing, I have
Describe how you chosen to send everyone a soft copy of the action plan ahead of time.
have decided to
Additionally, attendees will have the opportunity to discuss any unclear points
present the policies
and procedures at and prepare questions in order to get any doubts answered.
your roundtable In order to clarify the policies and explain my opinions, I will also make a power
meeting. Explain
why you believe this
method is
appropriate for your
audience.

12
ICTICT618 - Project Portfolio

point presentation.

13
ICTICT618 - Project Portfolio

Attach: Updated policies and procedures ☐

Review and grievance procedures ☐

Presentation ☐

14
ICTICT618 - Project Portfolio

Section 4: Reflection

Insights The things I learned form the round table discussion are:
Write down what you - The value of intellectual property, ethics, and privacy in the current era
learnt at the cannot be
roundtable
overstated.
discussion by
listening to other - As the modern era progresses, things are becoming more electronic.
students’ - These days, with everything being computerized, intellectual property, ethics,
presentations and and
discussing ideas.
privacy need to be taken into account more than before.

15

You might also like