ICTICT418 Assessment: Copyright, Ethics, and Privacy in ICT Report

Verified

Added on  2023/04/17

|14
|3232
|429
Report
AI Summary
This report provides a detailed analysis of copyright, ethics, and privacy issues within an Information and Communications Technology (ICT) environment, focusing on Australian legislation and the application of these principles to a real-world organization, Atlassian. The report examines Australian intellectual property (IP) copyrights, including patent protection, trademark, design protection, and copyright protection, and assesses Atlassian's current copyright policies. It recommends improvements to align Atlassian's policies with industry standards, emphasizing employee position descriptions, personal policies, no retaliation policies, employee safety, and confidentiality. The report also addresses privacy concerns, reviewing Atlassian's privacy policy, information management practices, and information handling procedures. Recommendations are made to enhance data protection, update organizational policies, and revise data access policies. The report further discusses the distribution of new policies to stakeholders and work monitoring practices to ensure effective implementation. The report also reviews organizational code with the ACS code and provides the steps for creating and implementing a new code of ethics including review and grievance process. Desklib offers a wealth of similar solved assignments and past papers for students.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: Information Technology
REPORT
ON
INFORMATION TECHNOLOGY
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1Australia Copyrights
Table of Contents
PART A – Intellectual Property and Copyright:........................................................................2
Part B – Privacy.........................................................................................................................5
Over View of the Privacy policy of Atlassian:......................................................................5
Privacy Concern:....................................................................................................................5
Information Management:......................................................................................................5
Information Handling Procedure:..........................................................................................6
Table:......................................................................................................................................6
Recommendation:..............................................................................................................7
Distribution of policies and work monitoring:.......................................................................7
Part C – Ethics:...........................................................................................................................8
Review of organizational code with the ACS code:..............................................................8
Creating Code of Ethics:........................................................................................................9
Implementing new Code of Ethics:......................................................................................10
Review and Grievance process:...........................................................................................10
Reference:................................................................................................................................12
Document Page
2Australia Copyrights
PART A – Intellectual Property and Copyright:
Followed by the investigation of Australian IP copyrights it has been observed that these
legislations are mainly focused on the ICT industries. Mentioned copyrights are related to the
aspects of Patent, Trade mark, Design as well as Australian Plant Breeder’s system (Drahos
2016). The purpose of the introduced act is mentioned below:
In order to provide the administering power to the offices of patent, trade mark and
plant breeder’s rights.
An improved establishment for variety of patent, design and trade mark.
It has set to charge a certain fee for the services.
In order to improve the innovation and making the process more enhanced is one of
the major provisions of it.
Effective decisions making approach.
In order to provide the effective supervision procedure to the mentioned sectors.
It offers to follow the legal rules for all the sectors.
The above aspects are the one of the major objectives of Australian copyrights for intellectual
Property. The introduced legislations as well as amendments related to the Intellectual
properties are mentioned below:
Patent Protection – this legislation of offers a legal power to restrict any third
party’s business related to selling inventions and manufacturing from Australia
(Denicolò and Zanchettin 2018). Thus, it provides licence to the verified
manufacturer based on the validation and essentiality of the licence application.
Trade Mark – this legislation provides a high protection to the verified brand owner
from the unauthorized user. An organization or brand can use the trademark as their
Document Page
3Australia Copyrights
marketing tool. Trade Mark provides legal identity to the brand and protect
nationally.
Design Protection – This legislation is for the purpose of registering the design or
structure of any organization (Danezis et al. 2015). The design office will verify
whether the design is following the legislation framework of the country or not.
Copyright Protection – This legislation of Australia is structured in order provide
protection to the manufacturer business and innovations (Reimers 2016). This
mainly observes the usage of copyright materials.
In order to describe the application of IP legislation of Australia, Atlassian has been chosen
as an ideal organization. Since, Atlassian is a software company which develops software for
project manager as well as software developers. Followed by the analysis of the Australian
Copyrights Information sheet G010v19 several points has been raised which can be applied
to the business structure of Atlassian in order to improve their service (Byrne 2018).
The current copyright acts of Atlassian organization does not allows any type of infringing
activities regarding copyright on cloud product of Atlassian. This organization have the
policy of removing third party data from their services if it is determined that that those are
braking the copyright rules of the organization. They also have a policy of terminating the
accounts of parties who has done continuous infringement with the copyright contents.
Currently this organization is having a good policy regarding the copyright infringement but
this are not meeting the industrial standards. Here in this case some recommendations can be
given to the organization so that they can align their policies with the legislation and industry
standards (Darzentas and Petri 2018). There are some policies which need to be followed by
this organization which are employee position description. It indicates all the position of the
employees should be clearly defined. Personal policies should be stated clearly. No retaliation
policy need to be added in the existing policy. Safety of the employees within the workplace
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4Australia Copyrights
of the organization must be ensured. Confidentiality also must be ensured for protecting
sensitive information. These new policies will align the Atlassian organization with the
industrial standards.
Considering the copyright law and the management of it one important area of copyright is
the protecting the graphics that are mainly user generated and can be also protected with
copyright laws. Thus this type of graphics can be used by the organisation whenever
copyright duration of those graphics gets expired (Joyce et al. 2016). After the expiration
those graphics can be used freely. Licencing is another factor in this case. Licencing can be
done to use a particular graphics that under copyright protection. Intellectual Property audit is
another factor that can be used in this case for using the copyright protected graphics.
Contracting is another solution that can be used for using the copyright protected graphics.
For the distribution of new or revised policy among the existing staff some specific
procedures need to be followed. This starts with informing the existing staffs with the new
procedures and it is explained to them, why this policies and procedures is very much
important for the organisation. In the next step feedback is taken from the employees to
encourage them about the changes in policies (Bonet et al. 2017). Feedback also helps the
organization to take appropriate steps about the changes in policies. If the existing employees
satisfies with the changes in policy then proper training is provided to them if required. In the
last step employee sign off document is requested. For distributing the policies within the
new employees of the organization first of they are communicated about the changes in
policies and procedures. There after the policies are implemented. In this case also signoff
document is requested from the employees (Ward et al. 2016). New policies and procedures
can be distributed among the management of the organization by proper communication. In
this case the communication plays an important role as it creates channel between the
management and the employees of the organization. To communicate the changes in policies
Document Page
5Australia Copyrights
and procedures first of all a project plan need to be developed and it can be distributed by
face to face meeting or by emailing the project plan regarding new or revised policy
initiation.
Part B – Privacy
Over View of the Privacy policy of Atlassian:
A brief over view on the privacy policy of Atlassian is as follows. Primarily the Atassian
follows the aspects of protecting the customer data. Considering the fact about the
confidentiality of the user data it offers a transparent approach towards the data collection,
handling as well as the information sharing operation (Bennett and Raab 2017). This policy
also includes the purpose of collecting the user information and it also provides restriction to
gather the unnecessary information about user. After analysing the entire privacy policy of
the organization Atlassian it can be concluded that the fundamental aspect of their privacy
policy is to gather and protect the user information.
Privacy Concern:
After the analysis of the Privacy Policy of Atlassian it can be stated that the fundamental
objective of this organization is to protect the information of user. Thus, there is a future
scope for this organization in order to build the customer trust which can directly affect their
business services as well as their employment. In order to maintain this privacy policy
Atalssian has incorporated this security aspect in the organization website as well as in the IT
employment policy of the organization.
Information Management:
In order to manage the user information Atlassian is using the cloud products. Which
provides safeguard to the collected information. The proposed security is managed by the
Security Team of Atlassian and Atlassian Trust Management System (ATMS), (SSD)
Document Page
6Australia Copyrights
Security software development prevents the organization threats. The access of this
management is provided to the data center hosting partners (Laudon and Laudon 2016).
Information Handling Procedure:
While analysing the request management procedure of Atlssian it has been observed that the
organization has an expert team working on the process of customer request management in
order to provide best services to the customers. The team of (ITIL) Information Technology
Infrastructure Library department has segregated the request services and working in a
repeated process for more effective services.
Table:
Australian Privacy Policy Short Falls Affected Area
Organization must not collect
personal information.
Up to date polices must be clearly
defined within the organization.
How an individual of the
organization access the data must
be defined.
Organization keeping personal
information in various events.
Organization properly not
communicated about the
organizational policies to the
employees.
The procedure of accessing the
data is not defined.
Peoples are affected of
whom data is stored.
Employees and the
management of the
organization will be
affected.
Data operation within the
organization is affected.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7Australia Copyrights
Recommendation:
For detailing the changes which are important to the privacy policy some
recommendation can be provided. From the previous assessment it has been analysed that the
main changes which are required in this case are the changes in organizational polices and in
data access polices. The first recommendation is collecting about personal information. First
of all it need to be ensured that the organization must take and store the information of the
individuals (Liu et al. 2018). In many case he organization need to take and store the data of
the employees. In such of the cases it becomes the responsibility of the organization to
protect this data. Thus integrity of the data, security, confidentiality and availability of the
data must be ensured. For protecting this data it is recommended to use multiple data
protection functions. Also for protecting the data multiplatform can be used. Backup
methodology is also important in this case to ensure the availability of the data, thus it is
recommended in this case. Also, it is recommended to include flexible management
capabilities which will ensure the protection of the data. Cross platform ability also need to
be ensured so that data can be maintained with higher efficiency (Gope and Amin 2016). It is
also recommended to always up tod ta the employees about policies and procedures within
the organisation so that organization can run with a constant flow without any type of
disturbance. Data accessing policy also need to be revised in this case and it is recommended
to give access to the sensitive information to only few peoples in the organization.
Distribution of policies and work monitoring:
Distributing the new policy to the stakeholder is not a hard work for the employees or
the management of the organization. Foe distributing the policy first of all the management of
the organization need to build a new policy for the organization there after it can be
distributed to the stakeholder of the organization. For distributing the new policies to the
organization a good communication is very much required in this case. This new policies can
Document Page
8Australia Copyrights
be distributed to the stakeholder by a proper communication by conducting a face to face to
meeting. If face to face meeting is not possible then email is also a good option for
communicating the new polices to all of the stakeholders. The feedbacks can be taken from
the stakeholders by consulting with the stakeholders who are probably going to affect the
implementation of this new policies (Turner et al. 2017). Multi-faceted intervention can be
also done for gathering and analysis of the feedback of the stakeholders. The best method of
collecting the feedback k is one to one meeting or formal meetings.
The work practices which need to be reviewed and monitored in this context are the
open meeting, creating receptive environment, training regarding communication,
implementing the body language and acting out the messages through presentation. By
following this work practices it can be ensured that the recommendation will become the
normal part of the business practice of the organization. For achieve the policy requirement
which are needed for meeting the security needs are the scheduling review meetings, making
the policies easily accessible for the employees and setting a proper deadline for all the
policies that need to be acknowledged. Review meetings need to be scheduled properly in
this case as this will help to meet the policy requirement of the organization as proper
scheduling will help to review the organizational process whether they are following the
organizational policy or not.
Part C – Ethics:
Review of organizational code with the ACS code:
For conducting the review of code of ethics here Atlassain organization has been
selected. Currently the code of ethics of the Atlassian organization concludes to be friendly
and patient attitude within the organization. This code of ethics of the organization also
describes to be respectful to the employees and it also describe to be careful while choosing
Document Page
9Australia Copyrights
the word. From the above discussion it can be concluded that the approach of the Atlassian is
somehow good but it is missing many important code of ethics fort the ACS which can make
the code of ethics more strong (Leicester 2016). Comparing the code of ethics with the ACS
code of ethics it has been founded that the main difference between this two is the
enhancement of quality of life. ACM code of ethics is focused on the enhancement of the life
quality where the code of ethics of Atlassian does not follow this ethics. From the Atlassian
code of ethics the preferred code of ethics is the “Be respectful” and from the ACS code of
ethics the preferred code of ethics is the enhancement of the life quality. As an IT
professional both of the code of ethics can be used as both the code provides value to the
personal life of the employees.
Creating Code of Ethics:
Acting with integrity:
For IT organizations acting with integrity is a huge factor. This is one of the important
ethical manner with, clients, public, employees and colleagues in the organization.
Reasonable care and Integrity:
Reasonable care and exercise need to be taken in consider while conducting an
investment analysis for the organization (Warren and Burmeister 2017). This ethics code also
includes investment recommendations and investment actions.
Encouragement:
Practice and encourage is an important factor in the organization as the professional
and the ethical manner will reflect credit ion themselves.
Integrity and Viability:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10Australia Copyrights
Promotion of integrity and viability within the global capital market will actually
benefit the whole society.
Improvement:
Improvement in the professional competence will maintain and will improve
competence of other investment professionals.
This new code of ethics will be distributed among the stakeholders by a proper
communication. This new codes will be distributed and the feedback will be collected from
the stakeholders by effective face to face meeting.
Implementing new Code of Ethics:
The new week practices which need to be developed within the organization are the
cooperation among the employees and encouraging each other within the organization. These
new work practices will be implemented within the organizing properly by informing
employees about it (Kaplan et al. 2017). Then feedback will be taken from them by using a
feedback form which will be supplied by the management. To ensure that the code of ethics
is used properly within the organization pre scheduled meeting can be arranged of which the
main aim is conducting analysis of the new code of ethics.
Review and Grievance process:
It is not necessary that all the code of ethics will suit the every employees of the
organization. Most of the code of ethics are developed considering the benefit of the
organization. Thus it is normal that one might not happy with the implemented code of ethics.
This is how grievance is related with code of ethics. Confidential report can be provided on
the breach of the code of ethics by following the proper protocol. Also the purpose of writing
the report is very much important to understand. Next it is very much vital to identify the
receiver of this confidential report. A grievances can be handled by following some vital
Document Page
11Australia Copyrights
steps. These steps of handling the grievances are the setting up system, categorizing
complaints, addressing complains and reviewing the outcomes. The main resources for
handling the grievances is a good working environment. The handing of grievances perfectly,
will reduce conflict thus organization will be able to run smoothly. The stakeholder has
understand the code of ethics and they will apply the new code of ethics, it can be ensured by
conducting a regular analysis of the organizational operation in which code of ethics has been
followed.
Document Page
12Australia Copyrights
Reference:
Bennett, Colin J., and Charles D. Raab. The governance of privacy: Policy instruments in
global perspective. Routledge, 2017.
Bonet, Mercedes, Marina Cuttini, A. Piedvache, Elaine M. Boyle, Pierre Henri Jarreau, L.
Kollee, Rolf F. Maier et al. "Changes in management policies for extremely preterm births
and neonatal outcomes from 2003 to 2012: two populationbased studies in ten European
regions." BJOG: An International Journal of Obstetrics & Gynaecology 124, no. 10 (2017):
1595-1604.
Byrne, Sarah. "Intellectual property in Australia [Book Review]." Ethos: Official Publication
of the Law Society of the Australian Capital Territory 248 (2018): 58.
Danezis, George, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le
Metayer, Rodica Tirtea, and Stefan Schiffner. "Privacy and data protection by design-from
policy to engineering." arXiv preprint arXiv:1501.03726 (2015).
Darzentas, Jenny, and Helen Petrie. "Standards, Guidelines and Legislation Related to Self-
service Technologies: Developments Since 2013." In International Conference on Computers
Helping People with Special Needs, pp. 295-302. Springer, Cham, 2018.
Denicolò, Vincenzo, and Piercarlo Zanchettin. "Some Simple Economics of Patent Protection
for Complex Technologies." (2018).
Drahos, Peter. A philosophy of intellectual property. Routledge, 2016.
Gope, Prosanta, and Ruhul Amin. "A novel reference security model with the situation based
access policy for accessing ephr data." Journal of medical systems 40, no. 11 (2016): 242.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13Australia Copyrights
Joyce, Craig, Tyler T. Ochoa, Michael W. Carroll, Marshall A. Leaffer, and Peter
Jaszi. Copyright law. Durham: Carolina Academic Press, 2016.
Kaplan, David M., Perry C. Francis, Mary A. Hermann, Jeannette V. Baca, Gary E.
Goodnough, Shannon Hodges, Shawn L. Spurgeon, and Michelle E. Wade. "New concepts in
the 2014 ACA Code of Ethics." Journal of Counseling & Development 95, no. 1 (2017): 110-
120.
Laudon, Kenneth C., and Jane P. Laudon. Management information system. Pearson
Education India, 2016.
Leicester, Nicola. "Ethics in the IT Profession: Does a Code of Ethics have an Effect on
Professional Behaviour?." (2016).
Liu, Lining, Pingzeng Liu, Fujiang Wen, Chao Zhang, Rui Zhao, Maoling Yan, and Xueru
Yu. "Information collection system of duck products based on IoT." EURASIP Journal on
Wireless Communications and Networking 2018, no. 1 (2018): 124.
Reimers, Imke. "Can private copyright protection be effective? Evidence from book
publishing." The journal of law and economics 59, no. 2 (2016): 411-440.
Turner, Simon, Danielle D’Lima, Emma Hudson, Stephen Morris, Jessica Sheringham, Nick
Swart, and Naomi J. Fulop. "Evidence use in decision-making on introducing innovations: a
systematic scoping review with stakeholder feedback." Implementation Science 12, no. 1
(2017): 145.
Ward, Blundellsands, Church Ward, Conservative Parry, Labour Veidman, Labour Webster,
Manor Ward, Victoria Ward et al. "Public Document Pack." (2016).
Warren, Matthew, and Oliver Kisalay Burmeister. "Research on Applied Ethics involving
emerging ICT technologies." Australasian Journal of Information Systems 21 (2017).
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]