ICT Copyrights and Ethics: Compliance Report for BC Software Pty Ltd
VerifiedAdded on 2023/06/10
|9
|2024
|83
AI Summary
This report analyzes the compliance issues related to copyright, ethics, and privacy policies in BC Software Pty Ltd. It provides recommendations for the organization to abide by the ICT codes of conduct and Australian laws.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
T-1.8.1
ICT Copyrights and Ethics
Student Assessment Report for
BC Software Pty Ltd
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 1
ICT Copyrights and Ethics
Student Assessment Report for
BC Software Pty Ltd
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
T-1.8.1
Table of Contents
Introduction........................................................................................................................3
Copyright...........................................................................................................................3
Ethics..................................................................................................................................4
Privacy...............................................................................................................................5
Conclusion.........................................................................................................................6
References........................................................................................................................7
Document Sign-off Sheet................................................................................................8
Fill the document with details.........................................................................................8
Appendix............................................................................................................................9
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 2
Table of Contents
Introduction........................................................................................................................3
Copyright...........................................................................................................................3
Ethics..................................................................................................................................4
Privacy...............................................................................................................................5
Conclusion.........................................................................................................................6
References........................................................................................................................7
Document Sign-off Sheet................................................................................................8
Fill the document with details.........................................................................................8
Appendix............................................................................................................................9
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 2
T-1.8.1
Introduction
The primary responsibility of any organization is to complete a proposed project for
their clients with total responsibility and complying with all the social, legal,
professional and ethical aspects behind it. It should be always kept in mind that may
there be any adverse situation; the entire task related to the project must be handled
with all of the ethical, legal and professional conducts in order. The following report
should analyze a situation for the organization BC Software Pty. Ltd. or BCSoft
through the perspective of a Compliance Manager. The company generally has
expertise in developing softwares for educational purposes. The report should follow
the ICT codes of conduct for the copyright purposes, the ethics and privacy policies
regarding the case study concluding the report having a thorough knowledge of ICT
policies of an organization.
Copyright
Copyright Law: The Australian Copyright law enforces the creative right
of original creators and other artistic works classified under the Australian
Law. According to the case study, there have been identified issues in the
copyrighting ethics and privacy policies in the organization of BCSoft, and
these violate the Copyright Law of Australia which disallows all the
violations of original creations, including piracy of software, missing of the
copyright register, downloading of licensed material, missing copyright
notice, using photos without permissions and plagiarizing amongst few.
Copyright policy and procedure: According to the Privacy policy and
copyright law of Australia, the creative right of an original content resides
with the original content creator, be it a literary work or developed
software. The piracy of software that has been found in the case study
states that the IT department had set up the computer networks with the
help of Pirated Softwares. These are copies of the original software which
offers zero credibility to the original developer. Therefore, the copyright
policy and procedures are violated heavily.
Copyright notice [Poster, banner etc.]: The copyright notice for Posters
and Banners according to the Australian Law depicts that the original
works of an original creator must appear along with a statutory prescription
defining the authority of the person over the original content. The case
study bring about the violation of such notice as there has been incidences
of posting of images on the website with no credibility given to the
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 3
Introduction
The primary responsibility of any organization is to complete a proposed project for
their clients with total responsibility and complying with all the social, legal,
professional and ethical aspects behind it. It should be always kept in mind that may
there be any adverse situation; the entire task related to the project must be handled
with all of the ethical, legal and professional conducts in order. The following report
should analyze a situation for the organization BC Software Pty. Ltd. or BCSoft
through the perspective of a Compliance Manager. The company generally has
expertise in developing softwares for educational purposes. The report should follow
the ICT codes of conduct for the copyright purposes, the ethics and privacy policies
regarding the case study concluding the report having a thorough knowledge of ICT
policies of an organization.
Copyright
Copyright Law: The Australian Copyright law enforces the creative right
of original creators and other artistic works classified under the Australian
Law. According to the case study, there have been identified issues in the
copyrighting ethics and privacy policies in the organization of BCSoft, and
these violate the Copyright Law of Australia which disallows all the
violations of original creations, including piracy of software, missing of the
copyright register, downloading of licensed material, missing copyright
notice, using photos without permissions and plagiarizing amongst few.
Copyright policy and procedure: According to the Privacy policy and
copyright law of Australia, the creative right of an original content resides
with the original content creator, be it a literary work or developed
software. The piracy of software that has been found in the case study
states that the IT department had set up the computer networks with the
help of Pirated Softwares. These are copies of the original software which
offers zero credibility to the original developer. Therefore, the copyright
policy and procedures are violated heavily.
Copyright notice [Poster, banner etc.]: The copyright notice for Posters
and Banners according to the Australian Law depicts that the original
works of an original creator must appear along with a statutory prescription
defining the authority of the person over the original content. The case
study bring about the violation of such notice as there has been incidences
of posting of images on the website with no credibility given to the
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 3
T-1.8.1
authorized creator nor permission being taken for posting the original
content under the website.
Copyright permission form: Any original document or creation needs
permission to be used in another form by the Copyright Permission Form
and that should entirely abide by the Copyright Policies of Australia.
According to the copyright law of Australia, a proper form needs to be
established before asking the permission to use the original copy
elsewhere. The Copyright Permission Form has not been called for in this
case where the photos and posters have been taken randomly from
different sources without delivering proper credibility to the original content
creators.
Copyright register: Copyright registers are records that hold the
information about the originality of contents with the help of its date of
creation and content of the work. This register would help in providing
evidence of violating copyrights when reported.
Copyright compliance policy: A copyright compliance policy holds the
information for the users about the legal obligations in case of violating
copyrights and provides guidance to keep away from violating any
copyright. BCSoft could infringe original content because of the absence of
a Copyright Compliance Policy.
Copyright checklist: A copyright checklist carries the information about
the drafting of dealing with another organization before attaining a
copyright on their material. This contains all the information about the
considerations an organization has before having a claim of copyright.
Minutes of meeting: Minutes of meeting is a document kept in order to
hold the information about the topics discussed in the meeting. The
organization of BCSoft is in desperate need of a meeting to sort out the
matters about the copyright infringements it has made. The Minutes of
Meeting or MoM document would hold the information about the topics
that have been discussed to stop further violations of copyright laws.
Ethics
Code of ethics: The Australian Codes of Ethics and Laws states that any
developmental work or documentation needs to be absolutely original and if
any work is derived or copied to other works, it should be given proper
credibility including the original creator.
Code of ethics policy and procedure: Every organization should have a
provision for applying policy and procedure for code of ethics. This would
ensure the workforce in the organization to abide by the Laws of Ethics
according to the country in which the company is established. BCSoft’s
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 4
authorized creator nor permission being taken for posting the original
content under the website.
Copyright permission form: Any original document or creation needs
permission to be used in another form by the Copyright Permission Form
and that should entirely abide by the Copyright Policies of Australia.
According to the copyright law of Australia, a proper form needs to be
established before asking the permission to use the original copy
elsewhere. The Copyright Permission Form has not been called for in this
case where the photos and posters have been taken randomly from
different sources without delivering proper credibility to the original content
creators.
Copyright register: Copyright registers are records that hold the
information about the originality of contents with the help of its date of
creation and content of the work. This register would help in providing
evidence of violating copyrights when reported.
Copyright compliance policy: A copyright compliance policy holds the
information for the users about the legal obligations in case of violating
copyrights and provides guidance to keep away from violating any
copyright. BCSoft could infringe original content because of the absence of
a Copyright Compliance Policy.
Copyright checklist: A copyright checklist carries the information about
the drafting of dealing with another organization before attaining a
copyright on their material. This contains all the information about the
considerations an organization has before having a claim of copyright.
Minutes of meeting: Minutes of meeting is a document kept in order to
hold the information about the topics discussed in the meeting. The
organization of BCSoft is in desperate need of a meeting to sort out the
matters about the copyright infringements it has made. The Minutes of
Meeting or MoM document would hold the information about the topics
that have been discussed to stop further violations of copyright laws.
Ethics
Code of ethics: The Australian Codes of Ethics and Laws states that any
developmental work or documentation needs to be absolutely original and if
any work is derived or copied to other works, it should be given proper
credibility including the original creator.
Code of ethics policy and procedure: Every organization should have a
provision for applying policy and procedure for code of ethics. This would
ensure the workforce in the organization to abide by the Laws of Ethics
according to the country in which the company is established. BCSoft’s
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
T-1.8.1
software developer did not abide by the codes of ethics policy and procedure
and hence the developer had documented other people’s work without
referring the source of the original document.
Code of ethics notice: BCSoft must have a notice prepared for the codes of
ethics to be maintained by the organization. This would enable the employees
in the organization to not indulge in going beyond the codes of ethics and
laws.
Ethical standards checklist: The ethical standards checklist is a document
that provides information about all the possible ethical laws associated with a
certain task along with the obligatory implications it brings along. This should
be provided to all the employees working for the company so that while
working on any task they would follow the norms of the organization and
would not try to violate any of the laws.
Review and grievance procedure: BCSoft must have a review and
grievance procedure that would help the company to have information about
the employees in the organization and their grievances regarding the policies
and procedures followed in the organization altogether. This would help the
organization to take the employee attitude into account as well.
Privacy
Privacy law: Privacy Law should be imposed in the organization of BCSoft
since there has been data breaches reported in the organization regarding the
information secrecy as one of the employees have been reported to steal
records by improperly taking them to home.
Privacy policy and procedure
Privacy internal review document: BCSoft had been reported to have many
data breaches in the organization along with revelations of important
passwords and many other malicious activities like insecure transmission of
PII, virus infected systems and compromising of contractor computers. There
should have been a documented form of procedures to understand the
privacy laws for reviewing internals tasks so that these flaws would have been
eradicated.
Privacy checklist: A privacy checklist is a document that would have the
information regarding the privacy laws and the implications along with it when
the laws are intercepted. BCSoft would include implications for Data
Breaches, Insecure storage or Transmission, Revelation of Passwords, Virus
attacks and compromising of computers in the checklist to prevent the
incidences that occurred.
Minutes of meeting: The minutes of meeting should discuss about the ways to
eradicate Data Breaches, Insecure storage or Transmission, Revelation of
Passwords, Virus attacks and compromising of computers in the organization
of BCSoft.
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 5
software developer did not abide by the codes of ethics policy and procedure
and hence the developer had documented other people’s work without
referring the source of the original document.
Code of ethics notice: BCSoft must have a notice prepared for the codes of
ethics to be maintained by the organization. This would enable the employees
in the organization to not indulge in going beyond the codes of ethics and
laws.
Ethical standards checklist: The ethical standards checklist is a document
that provides information about all the possible ethical laws associated with a
certain task along with the obligatory implications it brings along. This should
be provided to all the employees working for the company so that while
working on any task they would follow the norms of the organization and
would not try to violate any of the laws.
Review and grievance procedure: BCSoft must have a review and
grievance procedure that would help the company to have information about
the employees in the organization and their grievances regarding the policies
and procedures followed in the organization altogether. This would help the
organization to take the employee attitude into account as well.
Privacy
Privacy law: Privacy Law should be imposed in the organization of BCSoft
since there has been data breaches reported in the organization regarding the
information secrecy as one of the employees have been reported to steal
records by improperly taking them to home.
Privacy policy and procedure
Privacy internal review document: BCSoft had been reported to have many
data breaches in the organization along with revelations of important
passwords and many other malicious activities like insecure transmission of
PII, virus infected systems and compromising of contractor computers. There
should have been a documented form of procedures to understand the
privacy laws for reviewing internals tasks so that these flaws would have been
eradicated.
Privacy checklist: A privacy checklist is a document that would have the
information regarding the privacy laws and the implications along with it when
the laws are intercepted. BCSoft would include implications for Data
Breaches, Insecure storage or Transmission, Revelation of Passwords, Virus
attacks and compromising of computers in the checklist to prevent the
incidences that occurred.
Minutes of meeting: The minutes of meeting should discuss about the ways to
eradicate Data Breaches, Insecure storage or Transmission, Revelation of
Passwords, Virus attacks and compromising of computers in the organization
of BCSoft.
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 5
T-1.8.1
Conclusion
Thus, the report can be concluded as a detailed idea on the documents that BCSoft organization
should have considered in order stopping the discrepancies that emerged in the company regarding
ethical, copyright and privacy issues. This has been done by analyzing the situations for the
organization BC Software Pty. Ltd. or BCSoft through the perspective of a Compliance Manager. The
company generally has expertise in developing softwares for educational purposes. The report
followed the ICT codes of conduct for the copyright purposes, the ethics and privacy policies
regarding the case study concluding the report having a thorough knowledge of ICT policies of an
organization.
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 6
Conclusion
Thus, the report can be concluded as a detailed idea on the documents that BCSoft organization
should have considered in order stopping the discrepancies that emerged in the company regarding
ethical, copyright and privacy issues. This has been done by analyzing the situations for the
organization BC Software Pty. Ltd. or BCSoft through the perspective of a Compliance Manager. The
company generally has expertise in developing softwares for educational purposes. The report
followed the ICT codes of conduct for the copyright purposes, the ethics and privacy policies
regarding the case study concluding the report having a thorough knowledge of ICT policies of an
organization.
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 6
T-1.8.1
References
Clay-Williams, R., N. Taylor, E. Hogden, and J. Braithwaite. "ISQUA16-2861 UNDERTAKING
LARGE-SCALE RESEARCH IN AUSTRALIA: ENCOUNTERING THE COMPLEX WEB OF ETHICS
AND GOVERNANCE IN HOSPITALS AND HEALTH SERVICES." International Journal for Quality in
Health Care 28, no. suppl_1 (2016): 57-58.
Mayes, Christopher, Jane Williams, I. Kerridge, and W. Lipworth. "Scientism, conflicts of interest, and
the marginalization of ethics." (2017).
Van den Hoven, Jeroen, P. Vermaas, and Ibo Van de Poel. Handbook of ethics, values and
technological design. Dordrecht: Springer, 2015.
Tjiptono, Fandy, and Denni Arli. "Gender and digital privacy: examining determinants of attitude
toward digital piracy among youths in an emerging market." International journal of consumer
studies 40, no. 2 (2016): 168-178.
Mittelstadt, Brent Daniel, Patrick Allo, Mariarosaria Taddeo, Sandra Wachter, and Luciano Floridi.
"The ethics of algorithms: Mapping the debate." Big Data & Society 3, no. 2 (2016):
2053951716679679.
Fricker, Samuel A., Christoph Thümmler, and Anastasius Gavras, eds. Requirements engineering for
digital health. Springer International Publishing, 2015.
Verner, June M., O. Pearl Brereton, Barbara A. Kitchenham, Mahmood Turner, and Mahmood Niazi.
"Risks and risk mitigation in global software development: A tertiary study." Information and Software
Technology 56, no. 1 (2014): 54-78.
Kadoda, Gada. "Software Engineering Ethics Education: Incorporating Critical Pedagogy Into Student
Outreach Projects." In Leadership and Personnel Management: Concepts, Methodologies, Tools, and
Applications, pp. 1068-1089. IGI Global, 2016.
Osuagwu, O. E., E. Ihedigbo, Chinwe Ndigwe, E. Chioma, and Obilor Njoku. "Ethics and the
challenge of ICT: Advisory note for users and IT professionals." West African Journal of Industrial and
Academic Research 16, no. 1 (2016).
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 7
References
Clay-Williams, R., N. Taylor, E. Hogden, and J. Braithwaite. "ISQUA16-2861 UNDERTAKING
LARGE-SCALE RESEARCH IN AUSTRALIA: ENCOUNTERING THE COMPLEX WEB OF ETHICS
AND GOVERNANCE IN HOSPITALS AND HEALTH SERVICES." International Journal for Quality in
Health Care 28, no. suppl_1 (2016): 57-58.
Mayes, Christopher, Jane Williams, I. Kerridge, and W. Lipworth. "Scientism, conflicts of interest, and
the marginalization of ethics." (2017).
Van den Hoven, Jeroen, P. Vermaas, and Ibo Van de Poel. Handbook of ethics, values and
technological design. Dordrecht: Springer, 2015.
Tjiptono, Fandy, and Denni Arli. "Gender and digital privacy: examining determinants of attitude
toward digital piracy among youths in an emerging market." International journal of consumer
studies 40, no. 2 (2016): 168-178.
Mittelstadt, Brent Daniel, Patrick Allo, Mariarosaria Taddeo, Sandra Wachter, and Luciano Floridi.
"The ethics of algorithms: Mapping the debate." Big Data & Society 3, no. 2 (2016):
2053951716679679.
Fricker, Samuel A., Christoph Thümmler, and Anastasius Gavras, eds. Requirements engineering for
digital health. Springer International Publishing, 2015.
Verner, June M., O. Pearl Brereton, Barbara A. Kitchenham, Mahmood Turner, and Mahmood Niazi.
"Risks and risk mitigation in global software development: A tertiary study." Information and Software
Technology 56, no. 1 (2014): 54-78.
Kadoda, Gada. "Software Engineering Ethics Education: Incorporating Critical Pedagogy Into Student
Outreach Projects." In Leadership and Personnel Management: Concepts, Methodologies, Tools, and
Applications, pp. 1068-1089. IGI Global, 2016.
Osuagwu, O. E., E. Ihedigbo, Chinwe Ndigwe, E. Chioma, and Obilor Njoku. "Ethics and the
challenge of ICT: Advisory note for users and IT professionals." West African Journal of Industrial and
Academic Research 16, no. 1 (2016).
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
T-1.8.1
Document Sign-off Sheet
Fill the document with details
Document Name: Manager:
Start Date: Completion Date:
Goal:
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 8
Document Sign-off Sheet
Fill the document with details
Document Name: Manager:
Start Date: Completion Date:
Goal:
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 8
T-1.8.1
Clients:
By signing this document, I acknowledge that I
have delivered all the stated deliverables at the
agreed to quality levels.
By signing this document, I acknowledge that I
have received all the stated deliverables at the
agreed to quality levels.
Compliance Manager Name and Signature: Project Manager Name and Signature:
Date: Date:
Remarks
Appendix
Provide templates, checklist, minutes of meeting, email in this section
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 9
Clients:
By signing this document, I acknowledge that I
have delivered all the stated deliverables at the
agreed to quality levels.
By signing this document, I acknowledge that I
have received all the stated deliverables at the
agreed to quality levels.
Compliance Manager Name and Signature: Project Manager Name and Signature:
Date: Date:
Remarks
Appendix
Provide templates, checklist, minutes of meeting, email in this section
ICT Copyrights and Ethics, Assessment 1, v_2.0 Page 9
1 out of 9
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.