This report provides an overview of intellectual property and copyright laws in Australia, with a focus on the ICT industry. It discusses the legislation and amendments related to patents, trademarks, designs, and copyrights. The report also examines how Atlassian aligns its copyright policies with industry standards.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: Information Technology REPORT ON INFORMATION TECHNOLOGY Name of the Student Name of the University Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1Australia Copyrights Table of Contents PART A – Intellectual Property and Copyright:........................................................................2 Part B – Privacy.........................................................................................................................5 Over View of the Privacy policy of Atlassian:......................................................................5 Privacy Concern:....................................................................................................................5 Information Management:......................................................................................................5 Information Handling Procedure:..........................................................................................6 Table:......................................................................................................................................6 Recommendation:..............................................................................................................7 Distribution of policies and work monitoring:.......................................................................7 Part C – Ethics:...........................................................................................................................8 Review of organizational code with the ACS code:..............................................................8 Creating Code of Ethics:........................................................................................................9 Implementing new Code of Ethics:......................................................................................10 Review and Grievance process:...........................................................................................10 Reference:................................................................................................................................12
2Australia Copyrights PART A – Intellectual Property and Copyright: Followed by the investigation of Australian IP copyrights it has been observed that these legislations are mainly focused on the ICT industries. Mentioned copyrights are related to the aspects of Patent, Trade mark, Design as well as Australian Plant Breeder’s system (Drahos 2016). The purpose of the introduced act is mentioned below: In order to provide the administering power to the offices of patent, trade mark and plant breeder’s rights. An improved establishment for variety of patent, design and trade mark. It has set to charge a certain fee for the services. In order to improve the innovation and making the process more enhanced is one of the major provisions of it. Effective decisions making approach. In order to provide the effective supervision procedure to the mentioned sectors. It offers to follow the legal rules for all the sectors. The above aspects are the one of the major objectives of Australian copyrights for intellectual Property. The introduced legislations as well as amendments related to the Intellectual properties are mentioned below: Patent Protection – this legislation of offers a legal power to restrict any third party’s business related to selling inventions and manufacturing from Australia (DenicolòandZanchettin2018).Thus,itprovideslicencetotheverified manufacturer based on the validation and essentiality of the licence application. Trade Mark – this legislation provides a high protection to the verified brand owner from the unauthorized user. An organization or brand can use the trademark as their
3Australia Copyrights marketingtool. Trade Mark provides legalidentityto the brand and protect nationally. Design Protection – This legislation is for the purpose of registering the design or structure of any organization (Danezis et al. 2015). The design office will verify whether the design is following the legislation framework of the country or not. Copyright Protection – This legislation of Australia is structured in order provide protection to the manufacturer business and innovations (Reimers 2016). This mainly observes the usage of copyright materials. In order to describe the application of IP legislation of Australia, Atlassian has been chosen as an ideal organization. Since, Atlassian is a software company which develops software for project manager as well as software developers. Followed by the analysis of the Australian Copyrights Information sheet G010v19 several points has been raised which can be applied to the business structure of Atlassian in order to improve their service (Byrne 2018). The current copyright acts of Atlassian organization does not allows any type of infringing activities regarding copyright on cloud product of Atlassian. This organization have the policy of removing third party data from their services if it is determined that that those are braking the copyright rules of the organization. They also have a policy of terminating the accounts of parties who has done continuous infringement with the copyright contents. Currently this organization is having a good policy regarding the copyright infringement but this are not meeting the industrial standards. Here in this case some recommendations can be given to the organization so that they can align their policies with the legislation and industry standards (Darzentas and Petri 2018). There are some policies which need to be followed by this organization which are employee position description. It indicates all the position of the employees should be clearly defined. Personal policies should be stated clearly. No retaliation policy need to be added in the existing policy. Safety of the employees within the workplace
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4Australia Copyrights of the organization must be ensured. Confidentiality also must be ensured for protecting sensitive information. These new policies will align the Atlassian organization with the industrial standards. Considering the copyright law and the management of it one important area of copyright is the protecting the graphics that are mainly user generated and can be also protected with copyright laws. Thus this type of graphics can be used by the organisation whenever copyright duration of those graphics gets expired (Joyce et al. 2016). After the expiration those graphics can be used freely. Licencing is another factor in this case. Licencing can be done to use a particular graphics that under copyright protection. Intellectual Property audit is another factor that can be used in this case for using the copyright protected graphics. Contracting is another solution that can be used for using the copyright protected graphics. For the distribution of new or revised policy among the existing staff some specific procedures need to be followed. This starts with informing the existing staffs with the new procedures and it is explained to them, why this policies and procedures is very much important for the organisation. In the next step feedback is taken from the employees to encourage them about the changes in policies (Bonet et al. 2017). Feedback also helps the organization to take appropriate steps about the changes in policies. If the existing employees satisfies with the changes in policy then proper training is provided to them if required. In the last step employee sign off document is requested. For distributing the policies within the new employees of the organization first of they are communicated about the changes in policies and procedures. There after the policies are implemented.In this case also signoff document is requested from the employees (Ward et al. 2016). New policies and procedures can be distributed among the management of the organization by proper communication. In this case the communication plays an important role as it creates channel between the management and the employees of the organization. To communicate the changes in policies
5Australia Copyrights and procedures first of all a project plan need to be developed and it can be distributed by face to face meeting or by emailing the project plan regarding new or revised policy initiation. Part B – Privacy Over View of the Privacy policy of Atlassian: A brief over view on the privacy policy of Atlassian is as follows. Primarily the Atassian followstheaspectsofprotectingthecustomerdata.Consideringthefactaboutthe confidentiality of the user data it offers a transparent approach towards the data collection, handling as well as the information sharing operation (Bennett and Raab 2017). This policy also includes the purpose of collecting the user information and it also provides restriction to gather the unnecessary information about user. After analysing the entire privacy policy of the organization Atlassian it can be concluded that the fundamental aspect of their privacy policy is to gather and protect the user information. Privacy Concern: After the analysis of the Privacy Policy of Atlassian it can be stated that the fundamental objective of this organization is to protect the information of user. Thus, there is a future scope for this organization in order to build the customer trust which can directly affect their business services as well as their employment. In order to maintain this privacy policy Atalssian has incorporated this security aspect in the organization website as well as in the IT employment policy of the organization. Information Management: In order to manage the user information Atlassian is using the cloud products. Which provides safeguard to the collected information. The proposed security is managed by the Security Team of Atlassian and Atlassian Trust Management System (ATMS), (SSD)
6Australia Copyrights Securitysoftwaredevelopmentpreventstheorganizationthreats.Theaccessofthis management is provided to the data center hosting partners (Laudon and Laudon 2016). Information Handling Procedure: While analysing the request management procedure of Atlssian it has been observed that the organization has an expert team working on the process of customer request management in order to provide best services to the customers. The team of (ITIL) Information Technology Infrastructure Library department has segregated the request services and working in a repeated process for more effective services. Table: Australian Privacy PolicyShort FallsAffected Area Organizationmustnotcollect personal information. Up to date polices must be clearly defined within the organization. Howanindividualofthe organization access the data must be defined. Organization keeping personal information in various events. Organizationproperlynot communicatedaboutthe organizational policies to the employees. The procedure of accessing the data is not defined. Peoplesareaffectedof whom data is stored. Employeesandthe managementofthe organizationwillbe affected. Data operation within the organization is affected.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7Australia Copyrights Recommendation: Fordetailingthechangeswhichareimportanttotheprivacypolicysome recommendation can be provided. From the previous assessment it has been analysed that the main changes which are required in this case are the changes in organizational polices and in data access polices. The first recommendation is collecting about personal information. First of all it need to be ensured that the organization must take and store the information of the individuals (Liu et al. 2018). In many case he organization need to take and store the data of the employees. In such of the cases it becomes the responsibility of the organization to protect this data. Thus integrity of the data, security, confidentiality and availability of the data must be ensured. For protecting this data it is recommended to use multiple data protectionfunctions. Also for protectingthe data multiplatformcan be used. Backup methodology is also important in this case to ensure the availability of the data, thus it is recommendedinthiscase.Also,itisrecommendedtoincludeflexiblemanagement capabilities which will ensure the protection of the data. Cross platform ability also need to be ensured so that data can be maintained with higher efficiency (Gope and Amin 2016). It is also recommended to always up tod ta the employees about policies and procedures within the organisation so that organization can run with a constant flow without any type of disturbance. Data accessing policy also need to be revised in this case and it is recommended to give access to the sensitive information to only few peoples in the organization. Distribution of policies and work monitoring: Distributing the new policy to the stakeholder is not a hard work for the employees or the management of the organization. Foe distributing the policy first of all the management of the organization need to build a new policy for the organization there after it can be distributed to the stakeholder of the organization. For distributing the new policies to the organization a good communication is very much required in this case. This new policies can
8Australia Copyrights be distributed to the stakeholder by a proper communication by conducting a face to face to meeting. If face to face meeting is not possible then email is also a good option for communicating the new polices to all of the stakeholders. The feedbacks can be taken from the stakeholders by consulting with the stakeholders who are probably going to affect the implementation of this new policies (Turner et al. 2017).Multi-faceted intervention can be also done for gathering and analysis of the feedback of the stakeholders. The best method of collecting the feedback k is one to one meeting or formal meetings. The work practices which need to be reviewed and monitored in this context are the openmeeting,creatingreceptiveenvironment,trainingregardingcommunication, implementing the body language and acting out the messages through presentation. By following this work practices it can be ensured that the recommendation will become the normal part of the business practice of the organization. For achieve the policy requirement which are needed for meeting the security needs are the scheduling review meetings, making the policies easily accessible for the employees and setting a proper deadline for all the policies that need to be acknowledged. Review meetings need to be scheduled properly in this case as this will help to meet the policy requirement of the organization as proper scheduling will help to review the organizational process whether they are following the organizational policy or not. Part C – Ethics: Review of organizational code with the ACS code: For conducting the review of code of ethics here Atlassain organization has been selected. Currently the code of ethics of the Atlassian organization concludes to be friendly and patient attitude within the organization. This code of ethics of the organization also describes to be respectful to the employees and it also describe to be careful while choosing
9Australia Copyrights the word. From the above discussion it can be concluded that the approach of the Atlassian is somehow good but it is missing many important code of ethics fort the ACS which can make the code of ethics more strong (Leicester 2016). Comparing the code of ethics with the ACS code of ethics it has been founded that the main difference between this two is the enhancement of quality of life. ACM code of ethics is focused on the enhancement of the life quality where the code of ethics of Atlassian does not follow this ethics. From the Atlassian code of ethics the preferred code of ethics is the “Be respectful” and from the ACS code of ethics the preferred code of ethics is the enhancement of the life quality. As an IT professional both of the code of ethics can be used as both the code provides value to the personal life of the employees. Creating Code of Ethics: Acting with integrity: For IT organizations acting with integrity is a huge factor. This is one of the important ethical manner with, clients, public, employees and colleagues in the organization. Reasonable care and Integrity: Reasonable care and exercise need to be taken in consider while conducting an investment analysis for the organization (Warren and Burmeister 2017). This ethics code also includes investment recommendations and investment actions. Encouragement: Practice and encourage is an important factor in the organization as the professional and the ethical manner will reflect credit ion themselves. Integrity and Viability:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10Australia Copyrights Promotion of integrity and viability within the global capital market will actually benefit the whole society. Improvement: Improvementintheprofessionalcompetencewillmaintainandwillimprove competence of other investment professionals. This new code of ethics will be distributed among the stakeholders by a proper communication. This new codes will be distributed and the feedback will be collected from the stakeholders by effective face to face meeting. Implementing new Code of Ethics: The new week practices which need to be developed within the organization are the cooperation among the employees and encouraging each other within the organization. These new work practices will be implemented within the organizing properly by informing employees about it (Kaplan et al. 2017). Then feedback will be taken from them by using a feedback form which will be supplied by the management. To ensure that the code of ethics is used properly within the organization pre scheduled meeting can be arranged of which the main aim is conducting analysis of the new code of ethics. Review and Grievance process: It is not necessary that all the code of ethics will suit the every employees of the organization. Most of the code of ethics are developed considering the benefit of the organization. Thus it is normal that one might not happy with the implemented code of ethics. This is how grievance is related with code of ethics. Confidential report can be provided on the breach of the code of ethics by following the proper protocol. Also the purpose of writing the report is very much important to understand. Next it is very much vital to identify the receiver of this confidential report. A grievances can be handled by following some vital
11Australia Copyrights steps. These steps of handling the grievances are the setting up system, categorizing complaints, addressing complains and reviewing the outcomes. The main resources for handling the grievances is a good working environment. The handing of grievances perfectly, will reduce conflict thus organization will be able to run smoothly. The stakeholder has understand the code of ethics and they will apply the new code of ethics, it can be ensured by conducting a regular analysis of the organizational operation in which code of ethics has been followed.
12Australia Copyrights Reference: Bennett, Colin J., and Charles D. Raab.The governance of privacy: Policy instruments in global perspective. Routledge, 2017. Bonet, Mercedes, Marina Cuttini, A. Piedvache, Elaine M. Boyle, Pierre Henri Jarreau, L. Kollee, Rolf F. Maier et al. "Changes in management policies for extremely preterm births and neonatal outcomes from 2003 to 2012: two population‐based studies in ten European regions."BJOG: An International Journal of Obstetrics & Gynaecology124, no. 10 (2017): 1595-1604. Byrne, Sarah. "Intellectual property in Australia [Book Review]."Ethos: Official Publication of the Law Society of the Australian Capital Territory248 (2018): 58. Danezis, George, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Metayer, Rodica Tirtea, and Stefan Schiffner. "Privacy and data protection by design-from policy to engineering."arXiv preprint arXiv:1501.03726(2015). Darzentas, Jenny, and Helen Petrie. "Standards, Guidelines and Legislation Related to Self- service Technologies: Developments Since 2013." InInternational Conference on Computers Helping People with Special Needs, pp. 295-302. Springer, Cham, 2018. Denicolò, Vincenzo, and Piercarlo Zanchettin. "Some Simple Economics of Patent Protection for Complex Technologies." (2018). Drahos, Peter.A philosophy of intellectual property. Routledge, 2016. Gope, Prosanta, and Ruhul Amin. "A novel reference security model with the situation based access policy for accessing ephr data."Journal of medical systems40, no. 11 (2016): 242.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13Australia Copyrights Joyce,Craig,TylerT.Ochoa,MichaelW.Carroll,MarshallA.Leaffer,andPeter Jaszi.Copyright law. Durham: Carolina Academic Press, 2016. Kaplan, David M., Perry C. Francis, Mary A. Hermann, Jeannette V. Baca, Gary E. Goodnough, Shannon Hodges, Shawn L. Spurgeon, and Michelle E. Wade. "New concepts in the 2014 ACA Code of Ethics."Journal of Counseling & Development95, no. 1 (2017): 110- 120. Laudon,KennethC.,andJaneP.Laudon.Managementinformationsystem.Pearson Education India, 2016. Leicester, Nicola. "Ethics in the IT Profession: Does a Code of Ethics have an Effect on Professional Behaviour?." (2016). Liu, Lining, Pingzeng Liu, Fujiang Wen, Chao Zhang, Rui Zhao, Maoling Yan, and Xueru Yu. "Information collection system of duck products based on IoT."EURASIP Journal on Wireless Communications and Networking2018, no. 1 (2018): 124. Reimers,Imke."Canprivatecopyrightprotectionbeeffective?Evidencefrombook publishing."The journal of law and economics59, no. 2 (2016): 411-440. Turner, Simon, Danielle D’Lima, Emma Hudson, Stephen Morris, Jessica Sheringham, Nick Swart, and Naomi J. Fulop. "Evidence use in decision-making on introducing innovations: a systematic scoping review with stakeholder feedback."Implementation Science12, no. 1 (2017): 145. Ward, Blundellsands, Church Ward, Conservative Parry, Labour Veidman, Labour Webster, Manor Ward, Victoria Ward et al. "Public Document Pack." (2016). Warren, Matthew, and Oliver Kisalay Burmeister. "Research on Applied Ethics involving emerging ICT technologies."Australasian Journal of Information Systems21 (2017).