PORTFOLIO
Student Version
ICTICT618
Manage IP, ethics and privacy in ICT
environments
ICTICT618 - Project Portfolio
CONTENTS
Section 1: Research............................................................................................................................... 4
Section 2: Action Plan for review of organisational adherence to IP, ethics/conduct and privacy
requirements.......................................................................................................................................... 7
Section 3: Policy update........................................................................................................................11
Section 4: Reflection .............................................................................................................................15
2
ICTICT618 - Project Portfolio
Student name: Savneet kaur
Assessor: Mr. Mohan ganavarapu
Date: 15/09/2024
Business this assessment is This assessment is based on it biz solution company
based on:
Documentation reviewed as ICT Simulation Pack
preparation:
3
ICTICT618 - Project Portfolio
Section 1: Research
Intellectual property and Research and identify ICT industry standards for intellectual
copyright standard/legislation
property
Research and identify ICT
Requirements for ICT products and services to be accessible are
industry standards for
intellectual property, as well as among the industry standards. In a format appropriate for use in
copyright legislation. European public procurement, this paper lays out the specifications
Describe at least one standard for functional access to ICT products and services. It also describes
for intellectual property and the
main legislation for copyright. each accessibility requirement's testing and evaluation processes.
Describe how you know the For instance, this paper might be helpful for private sector
source of this information is procurement needs.
reliable thereby ensuring the
The main legislation related to copyright is Copyright Act 1968.
integrity of information.
The primary goal of the copyright legislation is to safeguard an
Explain the outcomes of
complying with and not individual's originality and inventiveness. Copyright gives authors
complying with intellectual
the freedom to decide what happens to their works. A person's
property requirements (at least
creations may only be used with permission from the copyright
one example of each).
holder or in compliance with legal requirements. As the owner, you
have the authority to determine what happens to it. All of your
creative work will thus be automatically safeguarded and secured if
you are a creator. This implies that you have the freedom to
determine how others may use your work and that you must obtain
consent before using your position. It makes no difference if you are
a "professional" or not—the law applies to everyone equally.
The sources of these information are:
https://www.ipaustralia.gov.au/about-us/legislation/ip-
legislation
https://www.standards.org.au/standards-catalogue/sa-
snz/other/it-040/as--en--301--549-colon-2024
Since these are the official websites, the accuracy of the content is
guaranteed.Respecting the intellectual property requirement has the
benefit of
preventing others from claiming our creation and using it without
our will.
Failure to comply with the Copyright Act may result in fines of up to
$117,000 for individuals and $585,000 for corporations.
4
ICTICT618 - Project Portfolio
Privacy legislation Privacy legislation
Research and identify existing The Privacy Act of 1988 is the act that is pertinent to privacy. This
legislation relevant to privacy. act's
Identify the name of the Act objectives are to:
and describe the key purpose
Recognize that protecting people's privacy while they carry out their
of this legislation.
duties or activities is in the best interests of the companies; o
Describe how you know the
Provide a foundation for uniform national privacy laws and the
source of this information is
handling of personal data; and Encourage the responsible and open
reliable thereby ensuring the
management of personal information.
integrity of information.
The information is taken form the official government site
https://www.legislation.gov.au/
So, the information is valid.
Explain the outcomes of
Outcome of complying and not complying
complying with and not
complying with privacy The outcome of compliance with privacy requirements allows you
requirements (at least one to know why your personal information is collected, how it is used
example of each).
and to whom it will be released under the Privacy Act. have the
option, under certain circumstances, not to identify yourself or to use
a pseudonym.
The outcome of not complying with privacy act differs in different
spectrums. The less serious end will be between $5000 and
$10,000, the more severe cases between $10,000 and about
$50,000. The more severe cases are between $50,000 and more
severe upwards.
Ethics code of ethics
Research and identify ICT The Australian Ethical Code is one such code. This code is meant to
industry standards relevant to serve
code of ethics, including
as a set of rules for honest and ethical business practices. The
typical procedures for review
purpose and
and grievance procedures
relevant to ethics breaches. ideals of the company or organization, professional standards,
ethical
List at least one code of ethics
and describe its key purpose. principles based on the core values of the organization, and how
Describe typical review and professionals are expected to handle challenges are all outlined in a
grievance procedures for code
ethical breaches. of ethics.
Describe how you know the Any typical review and grievance procedures for ethical breaches
source of this information is
consist of following steps:
5
ICTICT618 - Project Portfolio
reliable thereby ensuring the - Identify complaints - The management's identification by
integrity of information.
observation, past complaints, policy open door, opinion poll,
Explain the outcomes of
interview, etc. grievances.
complying with and not
complying with ethics - Defining the problem correctly – the next step is to correctly
requirements (at least one and accurately define the problem.
example of each).
- Data collection – It involves information collection from all
parties involved. Data collection
- Analysis and resolution — It comprises the analysis by
group and brainstorming of all information collected and
development of alternative solutions to grievances.
- Prompt redress - The solution selected by management
must be implemented.
- Implementation and monitoring - follow-up is required to
ensure complete resolution of the grievance.
The source of this information was taken form verified sites
https://www.australianethical.com.au/
https://www.abs.gov.au/
the outcomes of complying with and not complying with ethics
requirements
Following ethical guidelines has the benefit of ensuring seamless
corporate operations, creating a positive work environment, and
fostering
trust and reputation.
Losing credibility and trust in the marketplace is the result of
breaking
ethical rules
6
ICTICT618 - Project Portfolio
Section 2: Action Plan for review of organisational adherence to IP, ethics/conduct
and privacy requirements
Include actions in order of priority.
What Comments When Completed
Include any comments you need Time frames/ deadlines To mark off once
What activities will you be completing
to note completed
1. Conduct IP Audit Examine all of the intellectual 2 weeks
property that is currently in
existence, such as trade secrets,
copyrights, patents, and ☐
trademarks. Make sure they are
adequately recorded and
safeguarded.
2. Review Copyright Policy and Procedures Verify that it complies with the 1 month
most recent copyright laws. Check
☐
for clarification on copyright
clearance and fair use policies.
3. Conduct a gap analysis comparing internal Update policy reflecting any legal 1 month
policy to relevant legislation. or best practice changes. ☐
7
ICTICT618 - Project Portfolio
4. Review Compliance with Copyright Verify that all software, 3 weeks
Legislation
instructions, and other materials
☐
adhere to copyright regulations.
Verify that all licenses are current.
Update IP Policies and Procedures Based on the findings of the IP 1 month
audit, update the organization's IP
policies and procedures to ensure ☐
all IP assets are adequately
protected.
Review and Update Code of Ethics Review and Update Code of 1 month
Ethics such the ACM Code of
Ethics, with
the present code of ethics. In ☐
order to comply with best
practices, update as needed.
5. Conduct Ethics Training for Staff Plan training sessions for all staff 2 weeks
members to acquaint them with
the most recent version of the ☐
code of ethics and the significance
of moral behaviour.
8
ICTICT618 - Project Portfolio
6. Establish Ethics Review and Grievance Develop and implement clear 1 month
Procedures procedures for reporting,
reviewing, and addressing ethical
breaches within the organization. ☐
7. Conduct Privacy Compliance Audit Perform an audit to ensure the 2 weeks
organization complies with
relevant privacy legislation, such
as GDPR, CCPA, or local privacy
laws.
8. Implement Privacy Training for Staff Conduct training sessions to 2 weeks
educate staff about the updated
privacy policies and the
importance of protecting personal
information.
9. Schedule Regular Compliance Reviews Establish a schedule for periodic Every Six Month
reviews to ensure ongoing
compliance with IP, ethics, and
privacy requirements.
9
ICTICT618 - Project Portfolio
Include more rows as required.
10
ICTICT618 - Project Portfolio
Section 3: Policy update
Policy updates IT Biz Solutions - Copyright Policy and Procedures (v2.0)
List the title of the IT Biz Solutions - Privacy Policy and Procedures (v2.0)
policy and
IT Biz Solutions - Staff Code of Conduct (v2.0)
procedures you
have developed, as IT Biz Solutions - Review and Grievance Procedures
well as the review
and grievance
procedure for
ethical breaches.
Then attach them to
your portfolio as
below.
Policy distribution Security and Accessibility
Take a screenshot To ensure that the information is both secure and accessible:
of the folders you
1. Access Control:
have set up.
• Use a secure cloud storage service Google Drive, with access control
Describe how the
information is features.
secure and • Set permissions for each folder and document. Only authorized
accessible.
personnel should have editing rights, while others may have view-only
Include logins for
this information. access.
2. Security Measures:
• Encryption: Ensure that all files are encrypted both in transit and at
rest.
• Authentication: Require multi-factor authentication (MFA) for all users
accessing the folders.
• Regular Audits: Conduct regular audits to ensure that access
permissions are up-to-date and appropriate.
3. Login Information:
• Use a central authentication system (e.g., Single Sign-On - SSO) to
manage access.
• Create individual logins for each user with specific roles and
11
ICTICT618 - Project Portfolio
permissions
Feedback Most of the comments I got on the policies and processes were favourable . A
Summarise the few members felt that several policies were ambiguous and did not provide a
feedback that you
clear explanation of the range of topics they would cover. In order to avoid
were provided with
on policies and confusion and to make the policies more apparent to the reader at a glance, I
procedures and clarified the policies after considering the input. and how you used it.
how you used it.
Presentation To ensure that everyone is aware of the subject I will be discussing, I have
Describe how you chosen to send everyone a soft copy of the action plan ahead of time.
have decided to
Additionally, attendees will have the opportunity to discuss any unclear points
present the policies
and procedures at and prepare questions in order to get any doubts answered.
your roundtable In order to clarify the policies and explain my opinions, I will also make a power
meeting. Explain
why you believe this
method is
appropriate for your
audience.
12
ICTICT618 - Project Portfolio
point presentation.
13
ICTICT618 - Project Portfolio
Attach: Updated policies and procedures ☐
Review and grievance procedures ☐
Presentation ☐
14
ICTICT618 - Project Portfolio
Section 4: Reflection
Insights The things I learned form the round table discussion are:
Write down what you - The value of intellectual property, ethics, and privacy in the current era
learnt at the cannot be
roundtable
overstated.
discussion by
listening to other - As the modern era progresses, things are becoming more electronic.
students’ - These days, with everything being computerized, intellectual property, ethics,
presentations and and
discussing ideas.
privacy need to be taken into account more than before.
15