University ICT Laws and Regulations Report: Internship Analysis

Verified

Added on  2023/01/03

|4
|665
|53
Report
AI Summary
This report examines ICT laws and regulations within the context of an IT administration internship at a consultancy firm. The first part of the report focuses on compliance with the Crimes Act 1900 (NSW) during the implementation of an e-record system, highlighting the importance of data security and authorized access (van de Pas and van Bussel 2015; Safa, Von Solms and Furnell 2016). The second part of the report discusses IT governance within the organization, outlining the roles and responsibilities of key individuals such as the Chief Executive, General Manager, Project Head, Project Coordinators, and employees in aligning the firm with IT governance frameworks (De Haes and Van Grembergen 2015; Selig 2018). The report emphasizes the importance of structured management, reporting, and planning in ensuring the effective and sustainable use of IT within the organization.
Document Page
Running head: ICT LAWS AND REGULATIONS
ICT LAWS AND REGULATIONS
Name of the Student
Name of the university
Author note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1ICT LAWS AND REGULATIONS
Answer to question 1
Our organization is a consultancy firm; it helps people to get jobs as well as the
employers to find their employees. Being the IT admin I made use of ICT technology to
create an e-record for the organization. The nature of the organization is such that there is a
requirement to handle numerous records of the clients and keeping these in a manual database
creates problems such as mishandling, loss of information and many more (van de Pas and
van Bussel 2015). Well organized records serve as the foundation of all organizations. Thus
transforming manual records to e-records is beneficial (Safa, Von Solms and Furnell 2016).
The records management with ICT will enable the users to get the information with a
button’s click. While making this change the law that was complied to was the Crimes Act
1900 (NSW) according to which a person is liable to be punished if he accesses data stored in
the computer systems without having the authority to do so.
Answer to question 2
IT governance refers to collection of management, reporting of performance, planning
as well as reviewing the processes. It is the responsibility of the executives as well as the
board of directors of the firm that consists of organizational structures, leadership and various
other different processes. IT governance ensures that the organization’s IT becomes
sustainable and keeps the potential to extend the strategies as well as the objectives of the
organization (De Haes and Van Grembergen 2015). In order to implement IT governance in
the organization that deals in electronic goods the roles and responsibilities of the individuals
are given:
Chief Executive- Chief Executive officer takes the topmost position in the organization and
he is responsible to take decisions as to how to implement IT governance in the firm. He
analyzes the present scenario and checks how to align it with the IT frameworks.
Document Page
2ICT LAWS AND REGULATIONS
General manager- As per the requirements given by the Chief Executive Officer the general
managers plan how to get it done. The process involved in aligning the firm with IT
governance is prepared by them
Project Head- The project head is responsible to analyze the expertise of the members
involved in implementation of IT governance and work is allotted accordingly (Selig 2018).
Project Coordinators- The project coordinators are responsible to update the project head with
the ongoing tasks related to the implementation of IT governance.
Employees- The employees have a vital part as any changes in the organization involve them
as well. The employees can provide feedback as how successful the management has been in
implementing IT governance.
Document Page
3ICT LAWS AND REGULATIONS
References
De Haes, S. and Van Grembergen, W., 2015. Enterprise Governance of IT. In Enterprise
Governance of Information Technology (pp. 11-43). Springer, Cham.
Safa, N.S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance
model in organizations. computers & security, 56, pp.70-82.
Selig, G.J., 2018, August. It Governance—An Integrated Framework and Roadmap: How to
Plan, Deploy and Sustain for Competitive Advantage. In 2018 Portland International
Conference on Management of Engineering and Technology (PICMET) (pp. 1-15). IEEE.
van de Pas, J. and van Bussel, G.J., 2015. 'Privacy Lost-and Found?'The information value
chain as a model to meet citizens' concerns. Electronic Journal of Information Systems
Evaluation, 18(2), p.185.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]