logo

ICTICT418 Ethics and Privacy in ICT Environment

24 Pages5679 Words453 Views
   

Added on  2020-03-23

ICTICT418 Ethics and Privacy in ICT Environment

   Added on 2020-03-23

ShareRelated Documents
ICTICT418 Contribute to copyright, ethics and privacy in an ICT environmentAssessment 2: Privacy and ethics in an IT environmentUnit and Assessment DetailsAssessment TitleProtect Intellectual Property, Contribute to Copyright Policy and Protect Rights of StakeholdersUnit/Cluster CodeICTICT418Unit/Cluster TitleContribute to copyright, ethics and privacy in an ICT environmentCourse Code TitleICT50415 Diploma of Information Technology NetworkingICT40415 Certificate 4 in Information Technology NetworkingICT50115 Diploma of Information TechnologyAssessor NameVidhu BhardwajAssessment Date/Due DateAs per LMSAssessment Instructions for Students1.This assessment involves completing seven (7) tasks. 2.If you require any clarification or support to complete this assessment, ask your assessor. 3.For a satisfactory result in this assessment, you must successfully complete ALL tasks to a satisfactory standard. 4.Your assessor will assess you individually for each assessment task in this assessment. Plagiarism, collusion and cheating are strictly prohibited [see NIT Student Handbook Section 13.10]. 5.Support is available for students with special needs or learning difficulties. If you require any support or modified equipment to complete this assessment, please ask your assessor.6.Make sure you check grammar and spellings in your assessment before submission. 7.You must submit all completed assessment work to your assessor by the assessment due date.8.You must keep a copy of all submitted work. 9.Please use the following naming convention when saving and submitting your assessments:Required Resources and ToolsThe following resources and tools are required to complete this assessment and will be made available to you at the time of assessment:1.Computer Lab (Computers, Word processing software, Internet access)2.Access to relevant policies and legislationICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment Assessment No 2. Version: 3.0 – [21-June-2017] – PublishedPage 1 of 24
ICTICT418 Ethics and Privacy in ICT Environment_1
ICTICT418 Contribute to copyright, ethics and privacy in an ICT environmentScenarioYou are an IT consultantworking for ABC IT Companyand your manager (Trainer) has assigned you a task of reviewing ABC IT Company’s Privacy Policy. The policy reassures its clients that the data they collect from them will be used responsibly, and that the behaviour of their company, employees and sub-contractors will comply with the Australian Privacy Act of 1988.ABC IT Companyhas its Privacy Policy on its website. A copy of the policy is included below (Refer to Appendix 1).You are required to review this policy and report on its compliance with privacy legislation.Task 1Submit a report (minimum of 500 words) to your manager that critiques the Privacy Policy of IT Consultants. You should address the following questions in your report and add any further information you maythink is appropriate to complete Task 1. 1.Does ABC IT Company have a legal responsibility to have a Corporate Privacy Policy? 2.Map each paragraph of the ABC IT Company Policy statement to 1 or more of the 10 National Privacy Principles (NPPs). 3.Does this policy comply with the "10 Steps to Protecting Other People's Personal Information" as outlined by the Office of the Privacy Commissioner? Explain why or why not. 4.What alterations or additions would you make to this policy? 5.Does this privacy policy address relevant system security concerns in relation to maintainingthe integrity, confidentiality, and availability of information?6.What suggestions do you have for ways that new work practices, resulting from the policy update, could be implemented?ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment Assessment No 2. Version: 3.0 – [21-June-2017] – PublishedPage 2 of 24
ICTICT418 Ethics and Privacy in ICT Environment_2
ICTICT418 Contribute to copyright, ethics and privacy in an ICT environmentIntroduction:ABC is a highly committed Privacy Policy that protects the privacy while interacting with the clients,services and products. The following report provides responses to various queries criticizing the privacypolicies of the IT consultants. 1. Legal responsibility of ABC: The ABC definitely possesses legal responsibilities to possess the Corporate Privacy Policies. Todeliver the services to the users, ABC has been transparent regarding how and why they gatherdata of the users. In many situations, as the user never wants them to use their information, theyare provided with the scopes to state so. 2. Mapping every paragraph of the ABC IT Company Policy statement to 1 ormore of the 10 NPPs:The policy statements have been in alignment with the National Privacy Principles (NPPs). Thepolicy has been explaining the following:How and why they have been collecting and using the extra information while visiting theshop of ABC. The type of data ABC has been collecting about the users, how they have been collectingthat and how to use thatThe way they could disclose the dataThe way they could access the data they have been holding about themThe time they could use the data for contacting themThe use of cookies of ABC to gather data and how they could delete or manage thosecookies Extra steps for protecting the young peopleICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment Assessment No 2. Version: 3.0 – [21-June-2017] – PublishedPage 3 of 24
ICTICT418 Ethics and Privacy in ICT Environment_3
ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment3. Complying with the "10 Steps to Protecting Other People's PersonalInformation":The policies has been complying with the steps as their aim has been deliver the users the mediaexperiences that has been informing, entertaining and educating. At few cases they have beenusing data provided to ABC from the users about themselves in customizing the experiences. 4. The additions or alterations needed to this policy: The policy has been only applicable to ABC. This has never been applicable to other organizations orcompanies. This has been including the digital services having links to the services or contents of ABC.The third party services having links to the ABC services or documents have been governing the usage ofthe personal data submitted to them. This has been also including the collection through the cookies as theusers use or visits them. They have never been accepting any liability or responsibility for the practices ofprivacy of the digital services of the third party. 5. The relevant concerns of system security addressed by the privacy policy: The policy has been applicable to the ABC shops. This is the multichannel retailer storing throughout Australia and including the online shopping. 6. Suggestions for the ways of practices of new work:The information provided by the users should include the personal data that is needed. This must also include the personal data which has been optional. Lastly permissions must be made while asked about the agreement of any specific activity. Conclusion:ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment Assessment No 2. Version: 3.0 – [21-June-2017] – PublishedPage 4 of 24
ICTICT418 Ethics and Privacy in ICT Environment_4
ICTICT418 Contribute to copyright, ethics and privacy in an ICT environmentThus the above report has discussed some innovative manners to enhance the privacy policy of ABC. For instance in some cases the user could give the personal data as they wish to use the special service or to participate in any activity. Moreover, the user could go for some personal data that has not been needed but has been related directly to the activities of functions of ABC.Task 2Create at least one new work procedure and data collection tool for collecting personal information from clients. The work procedure you create must ensure the integrity, confidentiality, security and availability of client information as required by the organisation’s Privacy Policy.Submit a copy of this new procedure to your manager.The work procedure:The work procedureDescriptionIntegrityThe data is not modified, added or deletedConfidentialityThe information is kept secure and privateSecurityVerifying the identitiesAvailabilityAvailable systems to ABC. Data collection Tool:The process of data collection should be qualitative. MethodsExplanationObservationThis must be done by observing whether thepeople has been doing what they are sayingInterviewHere the asking of questions, listening to andthen recording the answers. Focussing on group discussionThis provides to collect diversified opinions. The other methodsThis includes the life history, ranking and therapid assessment procedure. Task 3Implement the new work procedure that you created in Task 2 as a trial to collect personal information from at least three clients.Create and submit a report (minimum 300 words) to your manager outlining the results of your trial.You should address any information integrity, confidentiality, system security and availability ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment Assessment No 2. Version: 3.0 – [21-June-2017] – PublishedPage 5 of 24
ICTICT418 Ethics and Privacy in ICT Environment_5
ICTICT418 Contribute to copyright, ethics and privacy in an ICT environmentissues identified in the work practices identified during your trial. You may also include any other relevant information you feel is appropriate to complete this task. The following study addresses the information integrity, availability issues, system securities andconfidentialities recognized in the working practices recognized in the trials. As per as the integrity is concerned some of the data must include the checksums. Thecryptographic checksums could be also considered to verify the integrity. The redundancies orbackups should be available for restoring the data affected to the proper state. The safeguardingof the data confidentiality could include the specialized training for the privacy of thosedocuments. These trainings could include the security risks threatening the information.Moreover the aspects of the training can include the strong passwords or the best practices relatedto password and data about the social-engineering methods. This is to prevent them from bendingthe rules of data-handling with proper intentions and the disastrous results. Moreover the userscould take precautions for minimizing the number of spaces where the data could appear and theamount of time actually transmitted for completing the needed transaction. Additional measurescould be considered for the case of highly sensitive documents. This might also include theprecautions like storing only in the disconnected storage devices, air applied computers for thehuge sensitive data in the format of hard copy only. For the availability a copy of backup couldbe stored in the location that is isolated geographically. Moreover regarding the system securitythe softwares like proxy servers and firewalls could protect against the unreachable data and thedowntime because of some malicious actions like network intrusions and DoS Attacks. Besides all these, the data encryption is the general process to ensure the confidentiality. Theother options could be the security tokens, biometric verification and the soft tokens. Moreover,the users could take preventions for minimizing the number of places where the data has beenICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment Assessment No 2. Version: 3.0 – [21-June-2017] – PublishedPage 6 of 24
ICTICT418 Ethics and Privacy in ICT Environment_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ICTICT418: Contribute to Copyright, Ethics and Privacy- ICT Environment
|6
|1843
|310

Contribute to Copyright, Ethics, and Privacy in an ICT Environment
|11
|2498
|386

BSBWHS501 Ensure a Safe Workplace - Assignment
|5
|1832
|89

Assessment Task 1: Knowledge Questions about Organisation Development
|46
|22842
|447

Implementing server virtualisation for a sustainable ICT system |Qualification|ICT50415 Diploma of Information Technology Networking
|26
|4851
|250

Diploma of Project Management Assignment
|25
|6812
|87