ICT50415 Diploma IT: ICTICT418 Privacy, Ethics, and Copyright
VerifiedAdded on 2020/03/23
|24
|5679
|453
Homework Assignment
AI Summary
This assignment solution for ICTICT418, focusing on privacy, ethics, and copyright in an IT environment, encompasses multiple tasks. The student begins by critiquing ABC IT Company's Privacy Policy, mapping it to National Privacy Principles, and assessing its compliance with privacy legislation. The report also suggests alterations and additions to the policy, addressing system security concerns and proposing new work practices. The assignment then involves creating a new work procedure and data collection tool to ensure data integrity, confidentiality, security, and availability. A trial implementation of this procedure is reported, identifying and addressing related issues. Further tasks involve researching industry codes of ethics, delivering a presentation on ethical practices, and developing and refining a new ethical work procedure based on feedback. The solution demonstrates a comprehensive understanding of privacy principles, ethical conduct, and practical application within an IT context.

ICTICT418 Contribute to copyright, ethics and
privacy in an ICT environment
Assessment 2: Privacy and ethics in an IT environment
Unit and Assessment Details
Assessment Title Protect Intellectual Property, Contribute to Copyright Policy and
Protect Rights of Stakeholders
Unit/Cluster Code ICTICT418
Unit/Cluster Title Contribute to copyright, ethics and privacy in an ICT environment
Course Code Title
ICT50415 Diploma of Information Technology Networking
ICT40415 Certificate 4 in Information Technology Networking
ICT50115 Diploma of Information Technology
Assessor Name Vidhu Bhardwaj
Assessment Date/Due Date As per LMS
Assessment Instructions for Students
1. This assessment involves completing seven (7) tasks.
2. If you require any clarification or support to complete this assessment, ask your assessor.
3. For a satisfactory result in this assessment, you must successfully complete ALL tasks to a
satisfactory standard.
4. Your assessor will assess you individually for each assessment task in this assessment.
Plagiarism, collusion and cheating are strictly prohibited [see NIT Student Handbook Section
13.10].
5. Support is available for students with special needs or learning difficulties. If you require any
support or modified equipment to complete this assessment, please ask your assessor.
6. Make sure you check grammar and spellings in your assessment before submission.
7. You must submit all completed assessment work to your assessor by the assessment due date.
8. You must keep a copy of all submitted work.
9. Please use the following naming convention when saving and submitting your assessments:
Required Resources and Tools
The following resources and tools are required to complete this assessment and will be made
available to you at the time of assessment:
1. Computer Lab (Computers, Word processing software, Internet access)
2. Access to relevant policies and legislation
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 1 of 24
privacy in an ICT environment
Assessment 2: Privacy and ethics in an IT environment
Unit and Assessment Details
Assessment Title Protect Intellectual Property, Contribute to Copyright Policy and
Protect Rights of Stakeholders
Unit/Cluster Code ICTICT418
Unit/Cluster Title Contribute to copyright, ethics and privacy in an ICT environment
Course Code Title
ICT50415 Diploma of Information Technology Networking
ICT40415 Certificate 4 in Information Technology Networking
ICT50115 Diploma of Information Technology
Assessor Name Vidhu Bhardwaj
Assessment Date/Due Date As per LMS
Assessment Instructions for Students
1. This assessment involves completing seven (7) tasks.
2. If you require any clarification or support to complete this assessment, ask your assessor.
3. For a satisfactory result in this assessment, you must successfully complete ALL tasks to a
satisfactory standard.
4. Your assessor will assess you individually for each assessment task in this assessment.
Plagiarism, collusion and cheating are strictly prohibited [see NIT Student Handbook Section
13.10].
5. Support is available for students with special needs or learning difficulties. If you require any
support or modified equipment to complete this assessment, please ask your assessor.
6. Make sure you check grammar and spellings in your assessment before submission.
7. You must submit all completed assessment work to your assessor by the assessment due date.
8. You must keep a copy of all submitted work.
9. Please use the following naming convention when saving and submitting your assessments:
Required Resources and Tools
The following resources and tools are required to complete this assessment and will be made
available to you at the time of assessment:
1. Computer Lab (Computers, Word processing software, Internet access)
2. Access to relevant policies and legislation
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 1 of 24
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

ICTICT418 Contribute to copyright, ethics and
privacy in an ICT environment
Scenario
You are an IT consultantworking for ABC IT Companyand your manager (Trainer) has assigned
you a task of reviewing ABC IT Company’s Privacy Policy. The policy reassures its clients that the
data they collect from them will be used responsibly, and that the behaviour of their company,
employees and sub-contractors will comply with the Australian Privacy Act of 1988.
ABC IT Companyhas its Privacy Policy on its website. A copy of the policy is included below
(Refer to Appendix 1).You are required to review this policy and report on its compliance with
privacy legislation.
Task 1
Submit a report (minimum of 500 words) to your manager that critiques the Privacy Policy of IT
Consultants.
You should address the following questions in your report and add any further information you may
think is appropriate to complete Task 1.
1. Does ABC IT Company have a legal responsibility to have a Corporate Privacy Policy?
2. Map each paragraph of the ABC IT Company Policy statement to 1 or more of the 10
National Privacy Principles (NPPs).
3. Does this policy comply with the "10 Steps to Protecting Other People's Personal
Information" as outlined by the Office of the Privacy Commissioner? Explain why or why
not.
4. What alterations or additions would you make to this policy?
5. Does this privacy policy address relevant system security concerns in relation to maintaining
the integrity, confidentiality, and availability of information?
6. What suggestions do you have for ways that new work practices, resulting from the policy
update, could be implemented?
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 2 of 24
privacy in an ICT environment
Scenario
You are an IT consultantworking for ABC IT Companyand your manager (Trainer) has assigned
you a task of reviewing ABC IT Company’s Privacy Policy. The policy reassures its clients that the
data they collect from them will be used responsibly, and that the behaviour of their company,
employees and sub-contractors will comply with the Australian Privacy Act of 1988.
ABC IT Companyhas its Privacy Policy on its website. A copy of the policy is included below
(Refer to Appendix 1).You are required to review this policy and report on its compliance with
privacy legislation.
Task 1
Submit a report (minimum of 500 words) to your manager that critiques the Privacy Policy of IT
Consultants.
You should address the following questions in your report and add any further information you may
think is appropriate to complete Task 1.
1. Does ABC IT Company have a legal responsibility to have a Corporate Privacy Policy?
2. Map each paragraph of the ABC IT Company Policy statement to 1 or more of the 10
National Privacy Principles (NPPs).
3. Does this policy comply with the "10 Steps to Protecting Other People's Personal
Information" as outlined by the Office of the Privacy Commissioner? Explain why or why
not.
4. What alterations or additions would you make to this policy?
5. Does this privacy policy address relevant system security concerns in relation to maintaining
the integrity, confidentiality, and availability of information?
6. What suggestions do you have for ways that new work practices, resulting from the policy
update, could be implemented?
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 2 of 24

ICTICT418 Contribute to copyright, ethics and
privacy in an ICT environment
Introduction:
ABC is a highly committed Privacy Policy that protects the privacy while interacting with the clients,
services and products. The following report provides responses to various queries criticizing the privacy
policies of the IT consultants.
1. Legal responsibility of ABC:
The ABC definitely possesses legal responsibilities to possess the Corporate Privacy Policies. To
deliver the services to the users, ABC has been transparent regarding how and why they gather
data of the users. In many situations, as the user never wants them to use their information, they
are provided with the scopes to state so.
2. Mapping every paragraph of the ABC IT Company Policy statement to 1 or
more of the 10 NPPs:
The policy statements have been in alignment with the National Privacy Principles (NPPs). The
policy has been explaining the following:
How and why they have been collecting and using the extra information while visiting the
shop of ABC.
The type of data ABC has been collecting about the users, how they have been collecting
that and how to use that
The way they could disclose the data
The way they could access the data they have been holding about them
The time they could use the data for contacting them
The use of cookies of ABC to gather data and how they could delete or manage those
cookies
Extra steps for protecting the young people
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 3 of 24
privacy in an ICT environment
Introduction:
ABC is a highly committed Privacy Policy that protects the privacy while interacting with the clients,
services and products. The following report provides responses to various queries criticizing the privacy
policies of the IT consultants.
1. Legal responsibility of ABC:
The ABC definitely possesses legal responsibilities to possess the Corporate Privacy Policies. To
deliver the services to the users, ABC has been transparent regarding how and why they gather
data of the users. In many situations, as the user never wants them to use their information, they
are provided with the scopes to state so.
2. Mapping every paragraph of the ABC IT Company Policy statement to 1 or
more of the 10 NPPs:
The policy statements have been in alignment with the National Privacy Principles (NPPs). The
policy has been explaining the following:
How and why they have been collecting and using the extra information while visiting the
shop of ABC.
The type of data ABC has been collecting about the users, how they have been collecting
that and how to use that
The way they could disclose the data
The way they could access the data they have been holding about them
The time they could use the data for contacting them
The use of cookies of ABC to gather data and how they could delete or manage those
cookies
Extra steps for protecting the young people
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 3 of 24
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

ICTICT418 Contribute to copyright, ethics and
privacy in an ICT environment
3. Complying with the "10 Steps to Protecting Other People's Personal
Information":
The policies has been complying with the steps as their aim has been deliver the users the media
experiences that has been informing, entertaining and educating. At few cases they have been
using data provided to ABC from the users about themselves in customizing the experiences.
4. The additions or alterations needed to this policy:
The policy has been only applicable to ABC. This has never been applicable to other organizations or
companies. This has been including the digital services having links to the services or contents of ABC.
The third party services having links to the ABC services or documents have been governing the usage of
the personal data submitted to them. This has been also including the collection through the cookies as the
users use or visits them. They have never been accepting any liability or responsibility for the practices of
privacy of the digital services of the third party.
5. The relevant concerns of system security addressed by the privacy policy:
The policy has been applicable to the ABC shops. This is the multichannel retailer storing throughout
Australia and including the online shopping.
6. Suggestions for the ways of practices of new work:
The information provided by the users should include the personal data that is needed. This must
also include the personal data which has been optional. Lastly permissions must be made while
asked about the agreement of any specific activity.
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 4 of 24
privacy in an ICT environment
3. Complying with the "10 Steps to Protecting Other People's Personal
Information":
The policies has been complying with the steps as their aim has been deliver the users the media
experiences that has been informing, entertaining and educating. At few cases they have been
using data provided to ABC from the users about themselves in customizing the experiences.
4. The additions or alterations needed to this policy:
The policy has been only applicable to ABC. This has never been applicable to other organizations or
companies. This has been including the digital services having links to the services or contents of ABC.
The third party services having links to the ABC services or documents have been governing the usage of
the personal data submitted to them. This has been also including the collection through the cookies as the
users use or visits them. They have never been accepting any liability or responsibility for the practices of
privacy of the digital services of the third party.
5. The relevant concerns of system security addressed by the privacy policy:
The policy has been applicable to the ABC shops. This is the multichannel retailer storing throughout
Australia and including the online shopping.
6. Suggestions for the ways of practices of new work:
The information provided by the users should include the personal data that is needed. This must
also include the personal data which has been optional. Lastly permissions must be made while
asked about the agreement of any specific activity.
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 4 of 24
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

ICTICT418 Contribute to copyright, ethics and
privacy in an ICT environment
Conclusion:
Thus the above report has discussed some innovative manners to enhance the privacy policy of
ABC. For instance in some cases the user could give the personal data as they wish to use the
special service or to participate in any activity. Moreover, the user could go for some personal
data that has not been needed but has been related directly to the activities of functions of ABC.
Task 2
Create at least one new work procedure and data collection tool for collecting personal information
from clients. The work procedure you create must ensure the integrity, confidentiality, security and
availability of client information as required by the organisation’s Privacy Policy.
Submit a copy of this new procedure to your manager.
The work procedure:
The work procedure Description
Integrity The data is not modified, added or deleted
Confidentiality The information is kept secure and private
Security Verifying the identities
Availability Available systems to ABC.
Data collection Tool:
The process of data collection should be qualitative.
Methods Explanation
Observation This must be done by observing whether the
people has been doing what they are saying
Interview Here the asking of questions, listening to and
then recording the answers.
Focussing on group discussion This provides to collect diversified opinions.
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 5 of 24
privacy in an ICT environment
Conclusion:
Thus the above report has discussed some innovative manners to enhance the privacy policy of
ABC. For instance in some cases the user could give the personal data as they wish to use the
special service or to participate in any activity. Moreover, the user could go for some personal
data that has not been needed but has been related directly to the activities of functions of ABC.
Task 2
Create at least one new work procedure and data collection tool for collecting personal information
from clients. The work procedure you create must ensure the integrity, confidentiality, security and
availability of client information as required by the organisation’s Privacy Policy.
Submit a copy of this new procedure to your manager.
The work procedure:
The work procedure Description
Integrity The data is not modified, added or deleted
Confidentiality The information is kept secure and private
Security Verifying the identities
Availability Available systems to ABC.
Data collection Tool:
The process of data collection should be qualitative.
Methods Explanation
Observation This must be done by observing whether the
people has been doing what they are saying
Interview Here the asking of questions, listening to and
then recording the answers.
Focussing on group discussion This provides to collect diversified opinions.
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 5 of 24

ICTICT418 Contribute to copyright, ethics and
privacy in an ICT environment
The other methods This includes the life history, ranking and the
rapid assessment procedure.
Task 3
Implement the new work procedure that you created in Task 2 as a trial to collect personal
information from at least three clients.
Create and submit a report (minimum 300 words) to your manager outlining the results of your trial.
You should address any information integrity, confidentiality, system security and availability
issues identified in the work practices identified during your trial. You may also include any other
relevant information you feel is appropriate to complete this task.
The following study addresses the information integrity, availability issues, system securities and
confidentialities recognized in the working practices recognized in the trials.
As per as the integrity is concerned some of the data must include the checksums. The
cryptographic checksums could be also considered to verify the integrity. The redundancies or
backups should be available for restoring the data affected to the proper state. The safeguarding
of the data confidentiality could include the specialized training for the privacy of those
documents. These trainings could include the security risks threatening the information.
Moreover the aspects of the training can include the strong passwords or the best practices related
to password and data about the social-engineering methods. This is to prevent them from bending
the rules of data-handling with proper intentions and the disastrous results. Moreover the users
could take precautions for minimizing the number of spaces where the data could appear and the
amount of time actually transmitted for completing the needed transaction. Additional measures
could be considered for the case of highly sensitive documents. This might also include the
precautions like storing only in the disconnected storage devices, air applied computers for the
huge sensitive data in the format of hard copy only. For the availability a copy of backup could
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 6 of 24
privacy in an ICT environment
The other methods This includes the life history, ranking and the
rapid assessment procedure.
Task 3
Implement the new work procedure that you created in Task 2 as a trial to collect personal
information from at least three clients.
Create and submit a report (minimum 300 words) to your manager outlining the results of your trial.
You should address any information integrity, confidentiality, system security and availability
issues identified in the work practices identified during your trial. You may also include any other
relevant information you feel is appropriate to complete this task.
The following study addresses the information integrity, availability issues, system securities and
confidentialities recognized in the working practices recognized in the trials.
As per as the integrity is concerned some of the data must include the checksums. The
cryptographic checksums could be also considered to verify the integrity. The redundancies or
backups should be available for restoring the data affected to the proper state. The safeguarding
of the data confidentiality could include the specialized training for the privacy of those
documents. These trainings could include the security risks threatening the information.
Moreover the aspects of the training can include the strong passwords or the best practices related
to password and data about the social-engineering methods. This is to prevent them from bending
the rules of data-handling with proper intentions and the disastrous results. Moreover the users
could take precautions for minimizing the number of spaces where the data could appear and the
amount of time actually transmitted for completing the needed transaction. Additional measures
could be considered for the case of highly sensitive documents. This might also include the
precautions like storing only in the disconnected storage devices, air applied computers for the
huge sensitive data in the format of hard copy only. For the availability a copy of backup could
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 6 of 24
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

ICTICT418 Contribute to copyright, ethics and
privacy in an ICT environment
be stored in the location that is isolated geographically. Moreover regarding the system security
the softwares like proxy servers and firewalls could protect against the unreachable data and the
downtime because of some malicious actions like network intrusions and DoS Attacks.
Besides all these, the data encryption is the general process to ensure the confidentiality. The
other options could be the security tokens, biometric verification and the soft tokens. Moreover,
the users could take preventions for minimizing the number of places where the data has been
appearing and the time it could be transmitted actually to finish the needed transaction.
Scenario
Sandra, your manager (Trainer) at Solutions One had the following to say about ethics, standards
and legislation:
Great work! Mr Fields was impressed with how you addressed all his concerns. Let’s see
what else we can do to help Solutions1 employees maintain ethical conduct.
Firstly, the team would like to know more about legislation and industry standards. Can
you identify all the legislation and industry standards that apply to our area of work, and
explain how each fits in with what we do?
This recent experience has highlighted the need for a grievance procedure so that staff
and clients can feel confident to raise confidential or sensitive matters with management.
Finally, we need to have a code of conduct in place within the organisation — this will be a useful
tool to get everyone up to speed on the professional standards we must all adhere to
Sandra has allocated the following tasks to you:
Task 4
Locate a relevant industry code of ethics and deliver a short 5 minutes’ presentation to the team
(your class) that discusses one or more of the practices listed in the code. Your presentation must
provide two examples of situations in which the ethical practice would apply.
The presentation slides are provided below:
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 7 of 24
privacy in an ICT environment
be stored in the location that is isolated geographically. Moreover regarding the system security
the softwares like proxy servers and firewalls could protect against the unreachable data and the
downtime because of some malicious actions like network intrusions and DoS Attacks.
Besides all these, the data encryption is the general process to ensure the confidentiality. The
other options could be the security tokens, biometric verification and the soft tokens. Moreover,
the users could take preventions for minimizing the number of places where the data has been
appearing and the time it could be transmitted actually to finish the needed transaction.
Scenario
Sandra, your manager (Trainer) at Solutions One had the following to say about ethics, standards
and legislation:
Great work! Mr Fields was impressed with how you addressed all his concerns. Let’s see
what else we can do to help Solutions1 employees maintain ethical conduct.
Firstly, the team would like to know more about legislation and industry standards. Can
you identify all the legislation and industry standards that apply to our area of work, and
explain how each fits in with what we do?
This recent experience has highlighted the need for a grievance procedure so that staff
and clients can feel confident to raise confidential or sensitive matters with management.
Finally, we need to have a code of conduct in place within the organisation — this will be a useful
tool to get everyone up to speed on the professional standards we must all adhere to
Sandra has allocated the following tasks to you:
Task 4
Locate a relevant industry code of ethics and deliver a short 5 minutes’ presentation to the team
(your class) that discusses one or more of the practices listed in the code. Your presentation must
provide two examples of situations in which the ethical practice would apply.
The presentation slides are provided below:
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 7 of 24
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

ICTICT418 Contribute to copyright, ethics and
privacy in an ICT environment
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 8 of 24
privacy in an ICT environment
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 8 of 24

ICTICT418 Contribute to copyright, ethics and
privacy in an ICT environment
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 9 of 24
privacy in an ICT environment
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 9 of 24
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

ICTICT418 Contribute to copyright, ethics and
privacy in an ICT environment
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 10 of 24
privacy in an ICT environment
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 10 of 24
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

ICTICT418 Contribute to copyright, ethics and
privacy in an ICT environment
Task 5
a. Develop a new ethical work procedure to implement one principle or a value from any relevant
industry code of ethics or code of professional conduct followed within the IT industry. Present
and explain this procedure to your manager (Trainer) and team (your class) to obtain feedback
on the procedure ensuring application of the code.
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 11 of 24
privacy in an ICT environment
Task 5
a. Develop a new ethical work procedure to implement one principle or a value from any relevant
industry code of ethics or code of professional conduct followed within the IT industry. Present
and explain this procedure to your manager (Trainer) and team (your class) to obtain feedback
on the procedure ensuring application of the code.
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 11 of 24

Identifying the entire task
Breaking down the processes in some basic
steps
The recognition of the issues related to every
step
Identifying the preventive measures to
minimize the risks
Writing down the secured working
procdure or the secured work practice
ICTICT418 Contribute to copyright, ethics and
privacy in an ICT environment
b. Review the procedure taking into account the feedback provided by your manager and team to
create an updated version of the procedure.
Submit the final version of the new ethical work procedure to your Manager.
New ethical work procedure:
This includes the following:
Figure 1: “The new ethical procedure”
(Source: Goff, 2017)
Reviewing the procedure:
The above practice is the set of principles for helping ABC to do tasks that might not need the
step by step process. This has been outlining how to do tasks with the minimum risks to
equipment, environment, processes, materials and people.
Task 6
Draft a Grievance Procedure (work procedure) and any accompanying tools (at least one) to enable
confidential reporting of ethical issues arising from staff or clients.
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 12 of 24
Breaking down the processes in some basic
steps
The recognition of the issues related to every
step
Identifying the preventive measures to
minimize the risks
Writing down the secured working
procdure or the secured work practice
ICTICT418 Contribute to copyright, ethics and
privacy in an ICT environment
b. Review the procedure taking into account the feedback provided by your manager and team to
create an updated version of the procedure.
Submit the final version of the new ethical work procedure to your Manager.
New ethical work procedure:
This includes the following:
Figure 1: “The new ethical procedure”
(Source: Goff, 2017)
Reviewing the procedure:
The above practice is the set of principles for helping ABC to do tasks that might not need the
step by step process. This has been outlining how to do tasks with the minimum risks to
equipment, environment, processes, materials and people.
Task 6
Draft a Grievance Procedure (work procedure) and any accompanying tools (at least one) to enable
confidential reporting of ethical issues arising from staff or clients.
ICTICT418 - Contribute to copyright, ethics and privacy in an ICT environment
Assessment No 2. Version: 3.0 – [21-June-2017] – Published Page 12 of 24
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 24
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.