ICT Copyrights and Ethics: Compliance Report for BC Software Pty Ltd
Verified
Added on 2023/06/10
|9
|2024
|83
AI Summary
This report analyzes the compliance issues related to copyright, ethics, and privacy policies in BC Software Pty Ltd. It provides recommendations for the organization to abide by the ICT codes of conduct and Australian laws.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
T-1.8.1 ICT Copyrights and Ethics Student Assessment Report for BC Software Pty Ltd ICT Copyrights and Ethics, Assessment 1, v_2.0Page1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
T-1.8.1 Table ofContents Introduction........................................................................................................................3 Copyright...........................................................................................................................3 Ethics..................................................................................................................................4 Privacy...............................................................................................................................5 Conclusion.........................................................................................................................6 References........................................................................................................................7 Document Sign-off Sheet................................................................................................8 Fill the document with details.........................................................................................8 Appendix............................................................................................................................9 ICT Copyrights and Ethics, Assessment 1, v_2.0Page2
T-1.8.1 Introduction The primary responsibility of any organization is to complete a proposed project for theirclientswithtotalresponsibilityandcomplyingwithallthesocial,legal, professional and ethical aspects behind it. It should be always kept in mind that may there be any adverse situation; the entire task related to the project must be handled with all of the ethical, legal and professional conducts in order. The following report should analyze a situation for the organization BC Software Pty. Ltd. or BCSoft through the perspective of a Compliance Manager. The company generally has expertise in developing softwares for educational purposes. The report should follow the ICT codes of conduct for the copyright purposes, the ethics and privacy policies regarding the case study concluding the report having a thorough knowledge of ICT policies of an organization. Copyright Copyright Law:The Australian Copyright law enforces the creative right of original creators and other artistic works classified under the Australian Law. According to the case study,there have been identified issues in the copyrighting ethics and privacy policies in the organization of BCSoft, and theseviolatetheCopyrightLawofAustraliawhichdisallowsallthe violations of original creations, including piracy of software, missing of the copyright register, downloading of licensed material, missing copyright notice, using photos without permissions and plagiarizing amongst few. Copyright policy and procedure:According to the Privacy policy and copyright law of Australia, the creative right of an original content resides withtheoriginalcontentcreator,beitaliteraryworkordeveloped software. The piracy of software that has been found in the case study states that the IT department had set up the computer networks with the help of Pirated Softwares. These are copies of the original software which offers zero credibility to the original developer. Therefore, the copyright policy and procedures are violated heavily. Copyright notice [Poster, banner etc.]:The copyright notice for Posters and Banners according to the Australian Law depicts that the original works of an original creator must appear along with a statutory prescription defining the authority of the person over the original content. The case study bring about the violation of such notice as there has been incidences ofpostingofimagesonthewebsitewithnocredibilitygiventothe ICT Copyrights and Ethics, Assessment 1, v_2.0Page3
T-1.8.1 authorized creator nor permission being taken for posting the original content under the website. Copyright permission form:Any original document or creation needs permission to be used in another form by the Copyright Permission Form and that should entirely abide by the Copyright Policies of Australia. According to the copyright law of Australia, a proper form needs to be establishedbeforeaskingthepermissiontousetheoriginalcopy elsewhere. The Copyright Permission Form has not been called for in this casewhere the photos and posters havebeen taken randomly from different sources without delivering proper credibility to the original content creators. Copyrightregister:Copyrightregistersarerecordsthatholdthe information about the originality of contents with the help of its date of creation and content of the work. This register would help in providing evidence of violating copyrights when reported. Copyright compliance policy:A copyright compliance policy holds the information for the users about the legal obligations in case of violating copyrightsandprovidesguidancetokeepawayfromviolatingany copyright. BCSoft could infringe original content because of the absence of a Copyright Compliance Policy. Copyright checklist:A copyright checklist carries the information about thedraftingofdealingwithanotherorganizationbeforeattaininga copyright on their material. This contains all the information about the considerations an organization has before having a claim of copyright. Minutes of meeting:Minutes of meeting is a document kept in order to holdtheinformationaboutthetopicsdiscussedinthemeeting.The organization of BCSoft is in desperate need of a meeting to sort out the matters about the copyright infringements it has made. The Minutes of Meeting or MoM document would hold the information about the topics that have been discussed to stop further violations of copyright laws. Ethics Code of ethics: The Australian Codes of Ethics and Laws states that any developmental work or documentation needs to be absolutely original and if any work is derived or copied to other works, it should be given proper credibility including the original creator. Code of ethics policy and procedure: Every organization should have a provision for applying policy and procedure for code of ethics. This would ensure the workforce in the organization to abide by the Laws of Ethics accordingtothecountryinwhichthecompany is established. BCSoft’s ICT Copyrights and Ethics, Assessment 1, v_2.0Page4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
T-1.8.1 software developer did not abide by the codes of ethics policy and procedure andhencethedeveloperhaddocumentedotherpeople’sworkwithout referring the source of the original document. Code of ethics notice: BCSoft must have a notice prepared for the codes of ethics to be maintained by the organization. This would enable the employees in the organization to not indulge in going beyond the codes of ethics and laws. Ethical standards checklist: The ethical standards checklist is a document that provides information about all the possible ethical laws associated with a certain task along with the obligatory implications it brings along. This should be provided to all the employees working for the company so that while working on any task they would follow the norms of the organization and would not try to violate any of the laws. Reviewandgrievanceprocedure:BCSoftmusthaveareviewand grievance procedure that would help the company to have information about the employees in the organization and their grievances regarding the policies and procedures followed in the organization altogether. This would help the organization to take the employee attitude into account as well. Privacy Privacy law: Privacy Law should be imposed in the organization of BCSoft since there has been data breaches reported in the organization regarding the information secrecy as one of the employees have been reported to steal records by improperly taking them to home. Privacy policy and procedure Privacy internal review document: BCSoft had been reported to have many databreachesintheorganizationalongwithrevelationsofimportant passwords and many other malicious activities like insecure transmission of PII, virus infected systems and compromising of contractor computers. There shouldhavebeenadocumentedformofprocedurestounderstandthe privacy laws for reviewing internals tasks so that these flaws would have been eradicated. Privacy checklist: A privacy checklist is a document that would have the information regarding the privacy laws and the implications along with it when thelawsareintercepted.BCSoftwouldincludeimplicationsforData Breaches, Insecure storage or Transmission, Revelation of Passwords, Virus attacksandcompromisingofcomputersinthechecklisttopreventthe incidences that occurred. Minutes of meeting: The minutes of meeting should discuss about the ways to eradicateData Breaches, Insecure storage or Transmission, Revelation of Passwords, Virus attacks and compromising of computers in the organization of BCSoft. ICT Copyrights and Ethics, Assessment 1, v_2.0Page5
T-1.8.1 Conclusion Thus, the report can be concluded as a detailed idea on the documents that BCSoft organization should have considered in order stopping the discrepancies that emerged in the company regarding ethical, copyright and privacy issues. This has been done by analyzing the situations for the organization BC Software Pty. Ltd. or BCSoft through the perspective of a Compliance Manager. The company generally has expertise in developing softwares for educational purposes. The report followed the ICT codes of conduct for the copyright purposes, the ethics and privacy policies regarding the case study concluding the report having a thorough knowledge of ICT policies of an organization. ICT Copyrights and Ethics, Assessment 1, v_2.0Page6
T-1.8.1 References Clay-Williams, R., N. Taylor, E. Hogden, and J. Braithwaite. "ISQUA16-2861 UNDERTAKING LARGE-SCALE RESEARCH IN AUSTRALIA: ENCOUNTERING THE COMPLEX WEB OF ETHICS AND GOVERNANCE IN HOSPITALS AND HEALTH SERVICES."International Journal for Quality in Health Care28, no. suppl_1 (2016): 57-58. Mayes, Christopher, Jane Williams, I. Kerridge, and W. Lipworth. "Scientism, conflicts of interest, and the marginalization of ethics." (2017). Van den Hoven, Jeroen, P. Vermaas, and Ibo Van de Poel.Handbook of ethics, values and technological design. Dordrecht: Springer, 2015. Tjiptono, Fandy, and Denni Arli. "Gender and digital privacy: examining determinants of attitude toward digital piracy among youths in an emerging market."International journal of consumer studies40, no. 2 (2016): 168-178. Mittelstadt, Brent Daniel, Patrick Allo, Mariarosaria Taddeo, Sandra Wachter, and Luciano Floridi. "The ethics of algorithms: Mapping the debate."Big Data & Society3, no. 2 (2016): 2053951716679679. Fricker, Samuel A., Christoph Thümmler, and Anastasius Gavras, eds.Requirements engineering for digital health. Springer International Publishing, 2015. Verner, June M., O. Pearl Brereton, Barbara A. Kitchenham, Mahmood Turner, and Mahmood Niazi. "Risks and risk mitigation in global software development: A tertiary study."Information and Software Technology56, no. 1 (2014): 54-78. Kadoda, Gada. "Software Engineering Ethics Education: Incorporating Critical Pedagogy Into Student Outreach Projects." InLeadership and Personnel Management: Concepts, Methodologies, Tools, and Applications, pp. 1068-1089. IGI Global, 2016. Osuagwu, O. E., E. Ihedigbo, Chinwe Ndigwe, E. Chioma, and Obilor Njoku. "Ethics and the challenge of ICT: Advisory note for users and IT professionals."West African Journal of Industrial and Academic Research16, no. 1 (2016). ICT Copyrights and Ethics, Assessment 1, v_2.0Page7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
T-1.8.1 Document Sign-off Sheet Fill the document with details Document Name:Manager: Start Date:Completion Date: Goal: ICT Copyrights and Ethics, Assessment 1, v_2.0Page8
T-1.8.1 Clients: By signing this document, I acknowledge that I have delivered all the stated deliverables at the agreed to quality levels. By signing this document, I acknowledge that I have received all the stated deliverables at the agreed to quality levels. Compliance Manager Name and Signature:Project ManagerName and Signature: Date:Date: Remarks Appendix Provide templates, checklist, minutes of meeting, email in this section ICT Copyrights and Ethics, Assessment 1, v_2.0Page9