logo

Contribute to Copyright, Ethics and Privacy in an ICT Environment: ABC IT Company Case

7 Pages1863 Words220 Views
   

VICTORIA UNIVERSITY

   

ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment (ICTICT418)

   

Added on  2019-11-12

Contribute to Copyright, Ethics and Privacy in an ICT Environment: ABC IT Company Case

   

VICTORIA UNIVERSITY

   

ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment (ICTICT418)

   Added on 2019-11-12

ShareRelated Documents
Running head: CONTRIBUTE TO COPYRIGHT, ETHICS AND PRIVACY IN AN ICTENVIRONMENT 1Contribute to Copyright, Ethics and Privacy in an ICT Environment: ABC ITCompany CaseNameDate
Contribute to Copyright, Ethics and Privacy in an ICT Environment: ABC IT Company Case_1
Running head: CONTRIBUTE TO COPYRIGHT, ETHICS AND PRIVACY IN AN ICTENVIRONMENT 2Task 1The ABC IT Company is obligated to ensure that the private information it holds about clients and people, including names, addresses, ethnicity, contact details, and other personal information, as outlined under the Australian Privacy principlesThe ‘What do we collect’ policy of the ABC IT Company IT security policy matches to the NPP (National Privacy Principles) One (Principle 1) that requires an elaborate definition of what companies should do when collecting information and what they can collect, ABC IT Company states that it collects data relevant to business dealings The company also complies with NPP 2 which requires a description of use and disclosure of the collected information; ABC covers this under ‘Who Do We Disclose Information To?’where it states that it (ABC) only discloses relevant information they collect to sub contractors and suppliersABC complies with NPP 3-4 on information quality and security under its principles under ‘How Do We Store The Data We Collect?’ and ‘How Do We Protect The Information We Store? ‘ABC IT Company also complies with the NPP 5 under all its company security policies where they disclose what they do with information, who can access it, and what information is collectedFor NPP 6; access and correction; ABC company explicitly defines how the data is accessed using authentication requirements on who can log on and access the stored information, under the title ‘How Do We Protect The Information We Store?’For NPP7, ABC IT Company states under ‘What ABC IT Company Must Do’ that it must comply with the Privacy Act of 1988 that defines rules for identifiersFor NPP8, ABC describes how they deal with customers anonymously under its regulation titled ‘How Do We Protect The Information We Store?’For NPP 9, ABC outlines the policies for transfers outside Australia under ‘How Do We Protect The Information We Store?’ ABC Complies with NPP 10 under the ‘How Do We Protect The Information We Store?’ policyThe alterations I would make on their policy is to explicitly state that the information cannotbe shared outside the geographical borders of Australia to fully comply with NPP 9 and also define how to assign clients ‘anonymous numbers’ to comply better with NPP 7 and 8.
Contribute to Copyright, Ethics and Privacy in an ICT Environment: ABC IT Company Case_2
Running head: CONTRIBUTE TO COPYRIGHT, ETHICS AND PRIVACY IN AN ICTENVIRONMENT 3The policy by ABC addresses relevant security concerns, including restricted access requiring authentication, measures to stop external exploitation such as malware attacks; however, it is not exhaustive on how to handle internal threats and risks such as accidental disclosure, although it does explain strict policies on how internal staff can handle the data/ information. Policies to add would include ensuring anonymity and better protocols to ensure internal threats such as theft is restricted. Task 2ABC must identify issues and opportunities to collect data and all the relevant procedures, practices as applicable to employees and other audience must be reviewed. The organizational culture must be evaluated for best practices in data collection, including encryption of collected dataand using secure interfaces to collect this information. The ABC company must select the opportunities and issues relevant to the information and set goals for every category of data and ensure the data collected is relevant to needs/ usesThe next step requires planning an approach on how to collect the data and the methods to use in collecting the data. This should define from who the data will be collected from, and understanding issues like discrimination and categories of people to collect information from. Further, the persons whose data is being collected must be informed why the data is being collected The buy-in for the data should be obtained from senior management support and selecting a steeringgroup to be responsible for, and be consulted on all collected data and information. The collected data should then be analyzed as well as interpretedEstablish policies for storage, access, and transfer of data to ensure it remains secure such as through encryption and storing paper copies in secured rooms that require physical authentication toaccess ('Office of the Australian Information Commissioner', 2015)Task 3In implementing the data collection procedure, a steering committee responsible for the data was created and mandated to handle all the aspects of collecting the data. The team first established data collection opportunities and defined the kind of information required to be collected and why that data is necessary. The team then defined how the data was to be collected, starting from means for capturing the information; the information was to be collected through an online portal and also on-site where information was captured physically. The team also developed an online portal through which customers would enter their details n an interactive manner, with an option for quick help. The customers were detailed to why the information was necessary and given assurances that
Contribute to Copyright, Ethics and Privacy in an ICT Environment: ABC IT Company Case_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Online Privacy: Protecting Your Personal Data and Security
|8
|2203
|260

Review of Privacy Policy of ABC IT Company
|2
|600
|465

ICTICT418 Ethics and Privacy in ICT Environment
|24
|5679
|453

Australian Privacy Principles
|3
|1165
|47

Data Security Standards in Australia and Challenges of AWS Data Security
|8
|2657
|165

Maintaining Confidentiality and Integrity in Qualitative Research
|10
|2588
|451