Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 12

Queensland International Business Academy

CRICOS Code –01515 RTO Code-5304

ASSESSMENT
Cluster: BRI_ADIT10-1

Unit: ICTICT610 - Manage copyright, ethics and privacy in an ICT environment

Course Name: ICT60115 - Advanced Diploma of Information Technology


Training Package: ICT
Assessment Tool: Summative Assessment

Candidate must fill this section:

Candidate Name: Srijan pandey


Candidate ID: 5892417
“I give my permission for my assessment material to be used in the auditing, assessment
Privacy Release Clause: validation & moderation Process”

Student signature: Date: 23/1/2021


Srijan pandey

Feedback to student:

Assessment Completion Status


Attempt Satisfactory Non-Satisfactory Date Assessor’s Signature

Initial attempt  
 
2nd attempt/Re-assessment

     QIBA-ICTICT610-A-V2018.1 | Page 1 of 12


Queensland International Business Academy
CRICOS Code –01515 RTO Code-5304

Information for Candidate:


 All work is to be entirely of the candidate.

General Information for this assessment:

 Read the instructions for each question very carefully.


 Be sure to PRINT your FULL name & LAST name in every place that is provided.
 Short questions must be answered in the spaces provided.
 For those activities requesting extra evidence such as: research reports, ESSAY reports, etc. The student must attach its own work formatted in
double space, Arial 12 pts.
 All activities must be addressed correctly in order to obtain a competence for the unit of competency.
 If the candidate doesn’t understand the assessment, they can request help from the assessor to interpret the assessment.

Re-assessment of Result & Academic Appeal procedures:


If a student at Queensland International Business Academy is not happy with his/ her results, the student may appeal against their result via a written
letter, clearly stating the grounds of appeal to the MSS / DSS. This should be submitted after completion of the subject and within 14 days of
commencement of the new term.
 
Re-assessment Process:
 An appeal in writing is made to the ACC / MSS providing reasons for re-assessment /appeal.
 ACC / MSS will delegate another faculty member of CBC to review the assessment.
 The student will be advised of the review result done by another assessor.
 If the student is still not satisfied and further challenges the decision, then a review panel is formed comprising the lecturer/trainer in charge, the
ACC, the MSS and the DSS OR if need be an external assessor.
 The Institute will advise the student of the appeal decision within 14 days from the submission date of the appeal. The decision of the panel will be
deemed to be final.
 If the student is still not satisfied with the result, the he / she has the right to seek independent advice or follow external mediation option with
CBC’s nominated mediation agency.
 Any student who fails a compulsory subject or appeals unsuccessfully will be required to re-enrol in that subject.
 
The cost of reassessment will be borne by the Institute. The external assessor will base his/her judgement based on principles of assessment. These
principles require assessment to be reliable, fair, practical and valid.
 
Academic Appeals:
 If the student is dissatisfied with the outcome of the assessment marking process, he/she has a right to appeal the assessment results.
 The notice of appeal should be in writing addressed to the MSS / ACC and submitted within seven days of notification of the assessment results.
 If the appeal is not lodged in the specified time, the result will stand as marked.
 In emergency circumstances, such as in cases of serious illness or injury, the student must forward a medical certificate in support of a deferred
appeal. The notice of appeal must be made within three working days of the concluding date shown on the medical certificate.
 The decision of MSS / ACC will be discussed with the DSS and will be final.

For further information please refer to Student Handbook.

“I understand all the above rules and guidelines for the assessment”
Srijan 23/01/2021
Srijan pandey
Full Name Signature Date (dd/mm/yyyy)

Submission Details:

     QIBA-ICTICT610-A-V2018.1 | Page 2 of 12


Queensland International Business Academy
CRICOS Code –01515 RTO Code-5304

The assessment task is due on the date provided by the assessor. Any variations to this arrangement must be approved in
writing by your assessor. Submit this document with any required evidence attached. See specifications below for details

Performance objective
The candidate must demonstrate skills, knowledge and understanding of promote the use and implementation of
professional ethics, copyright and privacy to effect change, as states the unit of competency ICTICT610. Throughout this
program you are to demonstrate knowledge in:

 analyse legislation and standards related to copyright, professional conduct and privacy in the information and
communications technology (ICT) industry
 contribute to the review and development of code of ethics, and monitor the workplace to ensure code of ethics is
appropriate and being applied
 contribute to the review and development of a privacy policy, and monitor the workplace to ensure the policy is
appropriate and being applied
 ensure the adherence to copyright, ethics and privacy in a team.

And foundation skills in:

Skill Performance Criteria Description


Reading 1.1, 2.1, 3.1, 3.2  Identifies, analyses and evaluates complex text to determine
legislative requirements and organisational standards, and applies the
information
Writing 1.2-1.4, 2.3- 2.7, 3.1, 3.4  Integrates information and ideas from a number of sources,
utilising appropriate support materials, specialised and cohesive
language and a range of writing styles and document structures
Oral 1.2-1.4, 2.2-2.7, 3.1-3.4 Articulates ideas and requirements clearly, based on techniques
Communication appropriate to audience and environment
Participates in a verbal exchange of ideas and elicits the view and
opinions of others by using effective listening and open questioning
techniques
Navigate the 1.1, 1.3, 1.4, 2.1, 2.6, 3.1, Takes full responsibility for identifying and considering relevant legal
world of work 3.2, 3.4 and regulatory obligations when managing copyright, ethics and privacy
in an ICT environment
Takes a lead role in the development of organisational goals, roles and
responsibilities
Monitors and reviews the organisation’s policies, procedures and
adherence to legislative requirements in order to implement and
manage change
Interact with 1.5, 3.5  Actively identifies the requirements of important
others communication exchanges, selecting appropriate channels, format, tone
and content to suit purpose and audience, and monitoring impact
Get the work 1.1, 1.4, 3.1-3.3 Plans strategic priorities and outcomes within a flexible, efficient and
done effective context in a diverse environment exposed to competing
demands
Reflects on the application of key principles in a particular context, the
appropriateness and effectiveness of different sources of information
and planning processes for that context, and the potential implications
for future situations
Recognises broader positive and negative implications of new
technologies, and acknowledges the vital importance of system security
and storage management
Table: ICT Information and Communications Technology Training Package

     QIBA-ICTICT610-A-V2018.1 | Page 3 of 12


Queensland International Business Academy
CRICOS Code –01515 RTO Code-5304

Assessment description:
You will undertake some research to provide appropriate responses towards ethics, privacy and copyright.

Procedure:
1 You will need to follow instructions below and address all activities required.
2 This is an individual activity where each candidate will be assessed individually;
3 Complete all activities and submit assessment evidence (including these papers) to your assessor the date specified
above (see submission details).
Specifications/Conditions:
Your assessor will be looking for evidence that you can understanding of:
 relevant organisational policies
 legislation and standards documentation
 industry codes of practice.

Specification and Task

Covering elements – ICTICT610 1.1-1.5, 2.1-2.7, 3.1-3.6

1. In your own words, how do you understand the Australian Computer Societies “Code of Ethics”?
No more than 50 words.

The ACS code of ethics is the part of the ACS constitution. As the ACS member you must have to uphold and
advance the dignity, honor, and effectiveness of being a professional. It entails, in the addition of being the good
citizen and acting in the law. The ACS provides the six ethical values with the requirements which contribute to
observe the values. They are as follow: -

1. The primacy of the public interest.

2. The enhancement of quality of life.

3. Honesty

4. Competence

5. Professionalism

6. Professional development

2. Using Google, find three (3) news ICT stories about privacy infringement, write no more than 500 words
about the infringement, repercussions and effected Australian Privacy Policy. What impact do you think this
has on professional ethics?

     QIBA-ICTICT610-A-V2018.1 | Page 4 of 12


Queensland International Business Academy
CRICOS Code –01515 RTO Code-5304

A. Location Tracking

Location tracking refers to technologies that physically locate and electronically record and track the
movement of people or objects. Location tracking technology is in use every day with GPS navigation,
locations located on digital pictures and searching for businesses nearby using common apps. While
location tracking is often associated with smartphone use since smartphones have a GPS chip, there are
other ways location tracking is done. Using multiple satellites, a GPS device can identify it's longitude and
latitude location and display the information to the person using the device or send the information to a
software app or program. A common everyday example is a use of Internet and mobile map applications
on smartphones that can calculate your current position using your GPS location and show where you're
located on a map. Because your location coordinates are sent to a map application, your location is now
known by the application, which is location tracking.

B. Information mishandling

Data misuse is the use of information in ways it wasn’t intended for. User agreements, corporate policies,
data privacy laws, and industry regulations all set conditions for how data can be collected and used. Data
misuse violates these requirements.
Unlike data theft, data misuse doesn’t necessarily happen as a result of a cyberattack or when data is
collected without the owner’s consent. Although preventing data theft by employees—as covered in the
Computer Misuses Act—is important to consider, misusing data often means that permissions are being
ignored: a user might willingly provide a company with their personal data, only for the company to use
or share this information for purposes that the user didn’t agree to.

C. Spying and snooping

Exactly when you are on the web, you are spied by a couple of trackers for various purposes. Trackers
track your interest history and track all your online activities through various strategies. This gives them
an away from of what your personality is and your tendencies, which is an enter of online security
methodology and makes you a public property. Usually, this after is for advertisement purposes just and it
grants marketing specialists to show advancements according as you would prefer and interests.
However, at times this information is used by cybercriminals to do unapproved and criminal activities
taking a risk with your online presence.

     QIBA-ICTICT610-A-V2018.1 | Page 5 of 12


Queensland International Business Academy
CRICOS Code –01515 RTO Code-5304

3. Fill out the following table

What is it? What does Brief Description State/Federal


it protect? legislation and policy
access and equity It protect the right to Equity of access implies Access and equity policy
give equal that all people have the exist for different
opportunities to all the knowledge they need - no legislation
people or matter age, education,
ethnicity, language,
administration.
income, physical
limitations or geographic
barriers.

copyright Copyright refers to It is the elite, legal and Copyright Act 1968 -
assignable lawful right,
the legal right of the Federal Register of
given to the creator for a
owner of intellectual settled number of years, to Legislation
print, distribute, perform,
property. In simpler film, or record scholarly,
terms, copyright is creative, or music material.
the right to copy. This
means that the
original creators of
products and anyone
they give
authorization to are
the only ones with
the exclusive right to
reproduce the work.

intellectual property Intellectual property Intellectual property is


the manifestations of IP legislation
(IP) is a category of
the psyche, such as,
property that includes innovations; scholarly
intangible creations of and creative works;
the human intellect. plans; and images,
There are many types names and image
utilized as a part of
of intellectual commerce.
property, and some
countries recognize
more than others.
The most well-known
types are copyrights,
patents, trademarks,
and trade secrets.

     QIBA-ICTICT610-A-V2018.1 | Page 6 of 12


Queensland International Business Academy
CRICOS Code –01515 RTO Code-5304

workplace health health and safety in WHS includes the laws, Work Health and
and safety (WHS) standards, and programs
the workplace is Safety Act 2011
that are aimed at making
about promoting the workplace better for
workers, along with co-
positive wellbeing as workers, family members,
well as preventing customers, and other
stakeholders. Improving a
injury and illness.
company's occupational
health and safety standards
ensures good business, a
better brand image, and
higher employee morale.

privacy Privacy helps us privacy is the capacity of Privacy Act 1988


an individual or gathering
establish boundaries to detach themselves, or
to limit who has data about themselves,
access to our bodies, and in this way convey
what needs be specifically.
places and things, as The limits and substance
well as our of what is viewed as
private contrast among
communications and
societies and people, yet
our information. The share normal subjects.
rules that protect When something is private
to a man, it as a rule
privacy give us the implies that something is
ability to assert our naturally delicate to them.
rights in the face of
significant power
imbalances

4. Fill in the blanks - Register Copyright and protect your creative works and innovations for lifetime in 176
countries by Notary deposit. Our Copyright deposit service is based on international Bern Convention
gathering 176 countries. Protect Your Creative Works by a Copyright certified by Public Notary: We protect
your Logos, Books, Websites, Screenplays, Music, Written Works, Artworks, Photos, Internet Domains.

5. Find three (3) examples of version control history.

     QIBA-ICTICT610-A-V2018.1 | Page 7 of 12


Queensland International Business Academy
CRICOS Code –01515 RTO Code-5304

     QIBA-ICTICT610-A-V2018.1 | Page 8 of 12


Queensland International Business Academy
CRICOS Code –01515 RTO Code-5304

6. You work in in ICT industry and your organisation is heavily involved with creative works, at the moment
your organisation is flourishing, you seem to be getting new employees every week. You are to draft a
document that will inform your colleagues across the organisation about changes in copyright legislation.
Consider all the critical elements needed to inform all stakeholders. Use the Communication Matrix on
Moodle, modify if needed then write the document with version control.

In 2020, copyright act has been recently changed. it is not just important for you to have permission from
the copyright owners and pay for the right to reuse content for the benefit of your business; it is a legal
requirement too. Copyright is a form of Intellectual Property Law and gives copyright owners exclusive
rights to deal with their works in certain ways. In Australia, copyright law is set out in federal legislation
(Copyright Act 1968) and in court decisions which have interpreted the Act. As copyright law is federal
legislation, liability for infringement is strict; good intentions and misinformation are not valid defences
if you are caught infringing copyright. As most literary and visual works are protected by copyright, your
employees will usually need permission from the copyright owner to copy and share text, tables, graphs
or images that were created by others.

This includes content from:

 Newspapers and magazines

 Industry reviews, journals and updates

 Books

 Research and competitive analysis reports

 Survey plans and maps

     QIBA-ICTICT610-A-V2018.1 | Page 9 of 12


Queensland International Business Academy
CRICOS Code –01515 RTO Code-5304

7. Compare both QUT’s and UQ’s privacy protection, do they both align to Australian Privacy Principles?
Which one does not? If not, why not?
Both QUT and UQ doesn’t align to Australian Privacy Principles. QUT’s doesn’t align to Australian Privacy
principle as Your personal information will be used and protected according to QUT privacy policy and will
not be disclosed to any external parties. It won't use your social media information to contact you unless
you expressly consent to use social media contact details for communication with QUT. The UQ embraces
the philosophy of open government underlying the RTI Act and the IP Act, and also embraces the
requirement to act in accordance with the Information Privacy Principles set out in the IP Act.

8. Correct the table below:

APP Title Description


APP1 Open and transparent management of An APP entity must manage personal
personal information information in an open and transparent way.
This includes having a clearly expressed and
up to date APP privacy policy.
APP2 Anonymity and pseudonymity An APP entity must give an individual the
option of not identifying themselves or of
using a pseudonym. Limited exceptions
apply.
APP3 Collection of solicited personal information Outlines when an APP entity can collect
solicited personal information. Higher
standards apply to the collection of sensitive
information.
APP4 Dealing with unsolicited personal information Outlines how an APP entity must deal with
unsolicited personal information.

APP5 Notification of the collection of personal An APP entity that collects personal
information information about an individual must take
reasonable steps either to notify the
individual of certain matters or to ensure the
individual is aware of those matters.
APP6 Use or disclosure of personal information An APP entity can only use or disclose
personal information for a purpose for which
it was collected (known as the ‘primary
purpose’), or for a secondary purpose if an
exception applies.
APP7 Direct marketing An organisation may only use or disclose
personal information for direct marketing
purposes if certain conditions are met.
APP8 Cross-border disclosure of personal Outlines the steps an APP entity must take to
information protect personal information before it is
disclosed overseas.

APP9 Adoption, use or disclosure of government Outlines the limited situations when an
related identifiers organisation may adopt a government-
related identifier of an individual as the
organisation’s own identifier or use or
disclose a government-related identifier of an

     QIBA-ICTICT610-A-V2018.1 | Page 10 of 12


Queensland International Business Academy
CRICOS Code –01515 RTO Code-5304

individual.
APP10 Quality of personal information An APP entity must take reasonable steps to
ensure the personal information it collects is
accurate, up to date and complete. An entity
must also take reasonable steps to ensure
the personal information it uses or discloses
is accurate, up to date, complete and
relevant, having regard to the purpose of the
use or disclosure.
APP11 Security of personal information An APP entity must take reasonable steps to
protect personal information it holds from
misuse, interference and loss, and from
unauthorised access, modification or
disclosure. An APP entity has obligations to
destroy or de-identify personal information in
certain situations.
APP12 Access to personal information Outlines an APP entity’s obligations when an
individual request to be given access to
personal information held about them by the
APP entity. This includes a requirement to
provide access unless a specific exception
applies.
APP13 Correction of personal information Outlines an APP entity’s obligations for
correcting the personal information it holds
about individuals.

9. You received a complaint from one of the department heads who discovered a USB drive in the company
car park. Inside the USB stick were copies of employee resumes and other personnel records such as
employee appraisal reports, which must be kept confidential.
a. Write an email advising the complainant of the next steps to be taken in determining the
complaint. Send a copy of the email to your facilitator.

To,
The department Head,

Subject: about the USB drive that was found.

Regarded Head of Department,

Dear sir, I want to let you know that i have found USB drive in the company carpark which
contain employee resumes and other personnel records such as employee appraisal reports. According to
company privacy rules these data must be kept confidential. I have written this email as you are the CEO of the
company and you have full right to take action about this matter and you can also let all the employee to know
about the privacy rules of the company.
Kind regards
Srijan pandey

     QIBA-ICTICT610-A-V2018.1 | Page 11 of 12


Queensland International Business Academy
CRICOS Code –01515 RTO Code-5304

b. Refer to the Privacy Policy and determine whether there has been a breach of the Privacy
Principles.
Since the personal documents have been looked into, according to “APP5 i.e.
Notification of the collection of personal information”, there has been a breach of the Privacy
Principles.

c. Send an email to your facilitator advising him/her of any action required in order to remedy the
breach.

To,
The Facilitator,

I want to let you know that there has been leak of privacy principle in our company. One of the employee has
found USB drive in the car parking. There are some private information of the company and employee which must
be kept private. I want to find out who have lost the USB drive and want to talk with the employees about this
matter. All the information must be kept private and security must be made tight so that no one can get access to
information unless its urgent.
Kind regards
CEO
Joshua Lee

     QIBA-ICTICT610-A-V2018.1 | Page 12 of 12

You might also like