IT Ethics, Copyright and Privacy
VerifiedAdded on 2020/03/07
|6
|1843
|310
AI Summary
This assessment evaluates understanding of key concepts in IT ethics, copyright law, and privacy. It requires analyzing legal frameworks (WA state and federal) related to access & equity, intellectual property, WHS, and privacy. Students must apply this knowledge to a hypothetical scenario involving an IT company's copyright policy and workplace safety practices. The assessment also includes practical examples of how IT professionals protect copyright and tests comprehension of relevant legislation through detailed explanations.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Contribute to copyright, ethics and privacy in an
ICT environment
Assessment No 1: Protect Intellectual Property, Contribute to
Copyright Policy and Protect Rights of Stakeholders
Unit and Assessment Details
Assessment Title Protect Intellectual Property, Contribute to Copyright Policy and
Protect Rights of Stakeholders
Unit/Cluster Code ICTICT418
Unit/Cluster Title Contribute to copyright, ethics and privacy in an ICT environment
Course Code Title Diploma of Information Technology Networking
Required Resources and Tools
The following resources and tools are required to complete this assessment and will be made
available to you at the time of assessment:
1. Computer Lab (Computers, Word processing software, Internet access)
2. Access to relevant policies and legislation
Contribute to copyright, ethics and privacy in an ICT environment
Page 1 of 6
ICT environment
Assessment No 1: Protect Intellectual Property, Contribute to
Copyright Policy and Protect Rights of Stakeholders
Unit and Assessment Details
Assessment Title Protect Intellectual Property, Contribute to Copyright Policy and
Protect Rights of Stakeholders
Unit/Cluster Code ICTICT418
Unit/Cluster Title Contribute to copyright, ethics and privacy in an ICT environment
Course Code Title Diploma of Information Technology Networking
Required Resources and Tools
The following resources and tools are required to complete this assessment and will be made
available to you at the time of assessment:
1. Computer Lab (Computers, Word processing software, Internet access)
2. Access to relevant policies and legislation
Contribute to copyright, ethics and privacy in an ICT environment
Page 1 of 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Contribute to copyright, ethics and privacy in an
ICT environment
Task 1
You work as an IT consultant for ABC Software Company based in Perth. A recent review of your
company’s Copyright Policy (Refer of Appendix 1) identified that the policy does not address the
ownership of software developed by its employees. Your manager (Trainer) has allocated you a task
to research industry standards or legislation relevant to intellectual property and copyright to find
out who owns the copyright or intellectual property rights, where a software is developed by an
employee for an employer.
To complete this task, update this policy with an appropriate section addressing the copyright and
intellectual property rights of software developed by employees and submit this to your manager.
The designation or the authority of declaring a software as one of the open source
applications and the release, relaunch of the application needs to be legally
approved by group of developer as well as by the organization. Such decision shall
be taken after consent of both team and organization.
Installation of the developed software on multiple computer systems without
having a proper license.
Creation or maintenance of additional copies of the developed software is to
prohibited. In addition to that, providing such copies to outsiders except the
employees, without a proper license.
Copying of the documentation of the developed software, user manuals without the
permission of authority is also prohibited.
The transferability, sublicensing and exclusivity of the product should be protected
by the employees as well as management of the organization in making copies of
the application.
Task 2
List, with brief explanations, four industry standards or legislation relevant to work areas in the IT
industry.
Policy related to the emails using work place resources:
The employees of the organization, Utilizing the organizations resources to search
out, get to or send any material of a defamatory, offensive, obscene nature is
disallowed and may bring about disciplinary activity against them.
Social media usage:
It is to confirm that employees who use social media outside of the workplace or
organization does not post or share inappropriate photos or comments on social
media.
Internet usage policy: The employees of the organizations should not visit sites
Contribute to copyright, ethics and privacy in an ICT environment
Page 2 of 6
ICT environment
Task 1
You work as an IT consultant for ABC Software Company based in Perth. A recent review of your
company’s Copyright Policy (Refer of Appendix 1) identified that the policy does not address the
ownership of software developed by its employees. Your manager (Trainer) has allocated you a task
to research industry standards or legislation relevant to intellectual property and copyright to find
out who owns the copyright or intellectual property rights, where a software is developed by an
employee for an employer.
To complete this task, update this policy with an appropriate section addressing the copyright and
intellectual property rights of software developed by employees and submit this to your manager.
The designation or the authority of declaring a software as one of the open source
applications and the release, relaunch of the application needs to be legally
approved by group of developer as well as by the organization. Such decision shall
be taken after consent of both team and organization.
Installation of the developed software on multiple computer systems without
having a proper license.
Creation or maintenance of additional copies of the developed software is to
prohibited. In addition to that, providing such copies to outsiders except the
employees, without a proper license.
Copying of the documentation of the developed software, user manuals without the
permission of authority is also prohibited.
The transferability, sublicensing and exclusivity of the product should be protected
by the employees as well as management of the organization in making copies of
the application.
Task 2
List, with brief explanations, four industry standards or legislation relevant to work areas in the IT
industry.
Policy related to the emails using work place resources:
The employees of the organization, Utilizing the organizations resources to search
out, get to or send any material of a defamatory, offensive, obscene nature is
disallowed and may bring about disciplinary activity against them.
Social media usage:
It is to confirm that employees who use social media outside of the workplace or
organization does not post or share inappropriate photos or comments on social
media.
Internet usage policy: The employees of the organizations should not visit sites
Contribute to copyright, ethics and privacy in an ICT environment
Page 2 of 6
Contribute to copyright, ethics and privacy in an
ICT environment
that contains objectionable (such as pornographic) or criminal content. In addition
to that they are not allowed to exchange proprietary information, or any other
sensitive information about the organization on the internet.
Occupational safety and health: None of the employees is allowed to commence
or return to work, under the influence of drugs or alcohol. A breach of this policy is
grounds for disciplinary action.
Task 3
Read the first National Privacy Principle on collecting information. Outline in your own words what
you think this means for organisations. Include an example where you have experienced this
principle in action.
In the National Privacy Principle on collation of personal information, it states
that, any organization must not collect individual data unless the data is essential
for its functions. Therefore, the organizations cannot collect the data about the
individuals for the operations that does not include the interest of the concerned
individual or group of individuals.
An association should gather individual data only through the reasonable and
legitimate means and not in an intrusive way. Thus if the individual is not
interested in sharing their personal data then the organizations cannot pressurize to
get their information.
At or before the time of collection of the data it is the responsibility of the
organization to make aware the individuals or the group of individuals about the
identity of the company and to guarantee that the individual knows about:
The type of the organization and how to get in touch with it if anything adverse
happens or misuse of the data. In addition to that, the organization must provide
ways to them in which they can access to that collected data.
Moreover this principle data collection makes the organization responsible for any
kind accidental disclosure of the personal data provided to the organizations.
Task 4
Suggest system security features or procedures that should be addressed when collecting personal
information over the Internet?
Taking consent of the individuals: while collecting data through internet
platform using a web based form that is designed and intended to collect individual
data should consist of a specific statement that explains the reason for which the
collected information is to be utilized for. In addition to that, the individuals needs
to inform, to whom this collected data may be disclosed.
Disposal of data: while collecting data over internet, it is important for the
Contribute to copyright, ethics and privacy in an ICT environment
Page 3 of 6
ICT environment
that contains objectionable (such as pornographic) or criminal content. In addition
to that they are not allowed to exchange proprietary information, or any other
sensitive information about the organization on the internet.
Occupational safety and health: None of the employees is allowed to commence
or return to work, under the influence of drugs or alcohol. A breach of this policy is
grounds for disciplinary action.
Task 3
Read the first National Privacy Principle on collecting information. Outline in your own words what
you think this means for organisations. Include an example where you have experienced this
principle in action.
In the National Privacy Principle on collation of personal information, it states
that, any organization must not collect individual data unless the data is essential
for its functions. Therefore, the organizations cannot collect the data about the
individuals for the operations that does not include the interest of the concerned
individual or group of individuals.
An association should gather individual data only through the reasonable and
legitimate means and not in an intrusive way. Thus if the individual is not
interested in sharing their personal data then the organizations cannot pressurize to
get their information.
At or before the time of collection of the data it is the responsibility of the
organization to make aware the individuals or the group of individuals about the
identity of the company and to guarantee that the individual knows about:
The type of the organization and how to get in touch with it if anything adverse
happens or misuse of the data. In addition to that, the organization must provide
ways to them in which they can access to that collected data.
Moreover this principle data collection makes the organization responsible for any
kind accidental disclosure of the personal data provided to the organizations.
Task 4
Suggest system security features or procedures that should be addressed when collecting personal
information over the Internet?
Taking consent of the individuals: while collecting data through internet
platform using a web based form that is designed and intended to collect individual
data should consist of a specific statement that explains the reason for which the
collected information is to be utilized for. In addition to that, the individuals needs
to inform, to whom this collected data may be disclosed.
Disposal of data: while collecting data over internet, it is important for the
Contribute to copyright, ethics and privacy in an ICT environment
Page 3 of 6
Contribute to copyright, ethics and privacy in an
ICT environment
organizations to dispose the data that is not required for any functions or operations
of the organization so that those data cannot be exposed to any third party.
Use of peer to peer or secured channel transmission: The collated data on the
web forms must be transmitted through the secured transmission channels and after
the encrypting the total data.
Review of the collected files: It is important for the organizations to make and
store individual information where it has utmost importance. In addition to that,
the organizations should Safely discard or erase any individual information which
is outdated or not required. Therefore, after the collection of the data, it is important
for the organizations to review the collected data and dispose of pointless or out of
date information systematically.
Know that in the event that the organizations are utilizing an third party data
processor e.g. for bulk mailing system or database administration and are giving
them access to collected individual information, at that point the organization
should have restrict the access or develop contract set up with them to guarantee
that they treat such data privately, safely and in consistence with the Data
Protection laws where applicable.
Task 5
List and discuss briefly two elements in relation to copyright, privacy or ethical standards that
should be included in any Customer Service Policy prepared for an IT company.
Element 1: In the event that an IT company holds individual data around an
individual, it must give the individual with access to the data on their request to that
specific person, but it have to ensure that: (an) on account of individual data other
than their health related data giving access would represent and lead to a risk to the
protection of the intellectual property acquired by person.
Element 2:
Giving access would have a nonsensical effect upon the protection of different
products with description; the data identifies with existing or expected lawful
procedures between the organization and the individual (the customer), and the data
would not be open by the procedure of revelation in those procedures or products.
Task 6
Describe two positive examples of how IT professionals protect copyright.
Example 1: Piratebay: It is a peer to peer data transfer website that shares different
products or software’s that explicitly breaks the copy right laws of any software
Contribute to copyright, ethics and privacy in an ICT environment
Page 4 of 6
ICT environment
organizations to dispose the data that is not required for any functions or operations
of the organization so that those data cannot be exposed to any third party.
Use of peer to peer or secured channel transmission: The collated data on the
web forms must be transmitted through the secured transmission channels and after
the encrypting the total data.
Review of the collected files: It is important for the organizations to make and
store individual information where it has utmost importance. In addition to that,
the organizations should Safely discard or erase any individual information which
is outdated or not required. Therefore, after the collection of the data, it is important
for the organizations to review the collected data and dispose of pointless or out of
date information systematically.
Know that in the event that the organizations are utilizing an third party data
processor e.g. for bulk mailing system or database administration and are giving
them access to collected individual information, at that point the organization
should have restrict the access or develop contract set up with them to guarantee
that they treat such data privately, safely and in consistence with the Data
Protection laws where applicable.
Task 5
List and discuss briefly two elements in relation to copyright, privacy or ethical standards that
should be included in any Customer Service Policy prepared for an IT company.
Element 1: In the event that an IT company holds individual data around an
individual, it must give the individual with access to the data on their request to that
specific person, but it have to ensure that: (an) on account of individual data other
than their health related data giving access would represent and lead to a risk to the
protection of the intellectual property acquired by person.
Element 2:
Giving access would have a nonsensical effect upon the protection of different
products with description; the data identifies with existing or expected lawful
procedures between the organization and the individual (the customer), and the data
would not be open by the procedure of revelation in those procedures or products.
Task 6
Describe two positive examples of how IT professionals protect copyright.
Example 1: Piratebay: It is a peer to peer data transfer website that shares different
products or software’s that explicitly breaks the copy right laws of any software
Contribute to copyright, ethics and privacy in an ICT environment
Page 4 of 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Contribute to copyright, ethics and privacy in an
ICT environment
development organization such as Microsoft, Adobe etc. even though the sites are
still operating using different techniques but in order to protect the intellectual
properties (software’s, applications and movies), the site was brought down by the
IT professionals in the month of March this year.
Example 2: Another example is preventing the distribution of the licenced software
by the employees of the organization to the outsiders.
Task 7
Investigate WA state and federal legislation and or standards in relation to access and equity,
copyright and intellectual property, workplace health and safety (WHS) and privacy.
List and briefly discuss one element from each legislation that are relevant to work areas of an IT
company.
On the request by the employees the organization must encourage representation of the safety and
health representatives (SHRs) to them as well as a security and wellbeing committee.
The management of the organization must counsel and collaborate with SHRs and different
representatives in regards to work place safety and health legislation at the work environment.
Discussion must be two-way and include sharing of data, giving workers a sensible chance to
express their perspectives.
employees and Employers must try to resolve any kind of health and safety issues faced by the
employees in accordance with an agreed and established procedure effective in the organization.
Contribute to copyright, ethics and privacy in an ICT environment
Page 5 of 6
ICT environment
development organization such as Microsoft, Adobe etc. even though the sites are
still operating using different techniques but in order to protect the intellectual
properties (software’s, applications and movies), the site was brought down by the
IT professionals in the month of March this year.
Example 2: Another example is preventing the distribution of the licenced software
by the employees of the organization to the outsiders.
Task 7
Investigate WA state and federal legislation and or standards in relation to access and equity,
copyright and intellectual property, workplace health and safety (WHS) and privacy.
List and briefly discuss one element from each legislation that are relevant to work areas of an IT
company.
On the request by the employees the organization must encourage representation of the safety and
health representatives (SHRs) to them as well as a security and wellbeing committee.
The management of the organization must counsel and collaborate with SHRs and different
representatives in regards to work place safety and health legislation at the work environment.
Discussion must be two-way and include sharing of data, giving workers a sensible chance to
express their perspectives.
employees and Employers must try to resolve any kind of health and safety issues faced by the
employees in accordance with an agreed and established procedure effective in the organization.
Contribute to copyright, ethics and privacy in an ICT environment
Page 5 of 6
Contribute to copyright, ethics and privacy in an
ICT environment
Appendix 1 - ABC Software Company – Copyright Policy
1. ABC Software Company respects the copyright of those involved in creating and disseminating
copyright material, such as music, films, software, and other literary, artistic and scientific works.
2. ABC Software Company employees shall not make, store, transmit or make available unauthorised
copies of copyrighted material on ABC Software Company systems, equipment or storage media.
3. ABC Software Company employees shall not download, upload, store or make available
unauthorised copies of copyrighted material via the internet using ABC Software Company systems,
equipment or storage media.
4. ABC Software Company employees shall not install or run peer-to-peer ‘file-sharing’ software or
operate a peer-to-peer index or server on ABC Software Company systems or equipment, without
(Compliance Officer)’s consent.
5. IT Manager is responsible for carrying out this policy. Any questions as to whether an employee
may copy or use copyrighted material in ways covered by this policy should be raised with IT
Manager before proceeding.
6. Any activities or materials that violate this policy are subject to immediate removal, termination
and/or forfeiture of the material.
7. ABC Software Company employees that violate this policy are subject to discipline as appropriate
under the circumstances. Such discipline may include termination.
End of assessment.
Contribute to copyright, ethics and privacy in an ICT environment
Page 6 of 6
ICT environment
Appendix 1 - ABC Software Company – Copyright Policy
1. ABC Software Company respects the copyright of those involved in creating and disseminating
copyright material, such as music, films, software, and other literary, artistic and scientific works.
2. ABC Software Company employees shall not make, store, transmit or make available unauthorised
copies of copyrighted material on ABC Software Company systems, equipment or storage media.
3. ABC Software Company employees shall not download, upload, store or make available
unauthorised copies of copyrighted material via the internet using ABC Software Company systems,
equipment or storage media.
4. ABC Software Company employees shall not install or run peer-to-peer ‘file-sharing’ software or
operate a peer-to-peer index or server on ABC Software Company systems or equipment, without
(Compliance Officer)’s consent.
5. IT Manager is responsible for carrying out this policy. Any questions as to whether an employee
may copy or use copyrighted material in ways covered by this policy should be raised with IT
Manager before proceeding.
6. Any activities or materials that violate this policy are subject to immediate removal, termination
and/or forfeiture of the material.
7. ABC Software Company employees that violate this policy are subject to discipline as appropriate
under the circumstances. Such discipline may include termination.
End of assessment.
Contribute to copyright, ethics and privacy in an ICT environment
Page 6 of 6
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.