Professional Documents
Culture Documents
ICTICT610 Assessment Task 1
ICTICT610 Assessment Task 1
ASSESSMENT
Cluster: BRI_ADIT10-1
Feedback to student:
Initial attempt
2nd attempt/Re-assessment
“I understand all the above rules and guidelines for the assessment”
Srijan 23/01/2021
Srijan pandey
Full Name Signature Date (dd/mm/yyyy)
Submission Details:
The assessment task is due on the date provided by the assessor. Any variations to this arrangement must be approved in
writing by your assessor. Submit this document with any required evidence attached. See specifications below for details
Performance objective
The candidate must demonstrate skills, knowledge and understanding of promote the use and implementation of
professional ethics, copyright and privacy to effect change, as states the unit of competency ICTICT610. Throughout this
program you are to demonstrate knowledge in:
analyse legislation and standards related to copyright, professional conduct and privacy in the information and
communications technology (ICT) industry
contribute to the review and development of code of ethics, and monitor the workplace to ensure code of ethics is
appropriate and being applied
contribute to the review and development of a privacy policy, and monitor the workplace to ensure the policy is
appropriate and being applied
ensure the adherence to copyright, ethics and privacy in a team.
Assessment description:
You will undertake some research to provide appropriate responses towards ethics, privacy and copyright.
Procedure:
1 You will need to follow instructions below and address all activities required.
2 This is an individual activity where each candidate will be assessed individually;
3 Complete all activities and submit assessment evidence (including these papers) to your assessor the date specified
above (see submission details).
Specifications/Conditions:
Your assessor will be looking for evidence that you can understanding of:
relevant organisational policies
legislation and standards documentation
industry codes of practice.
1. In your own words, how do you understand the Australian Computer Societies “Code of Ethics”?
No more than 50 words.
The ACS code of ethics is the part of the ACS constitution. As the ACS member you must have to uphold and
advance the dignity, honor, and effectiveness of being a professional. It entails, in the addition of being the good
citizen and acting in the law. The ACS provides the six ethical values with the requirements which contribute to
observe the values. They are as follow: -
3. Honesty
4. Competence
5. Professionalism
6. Professional development
2. Using Google, find three (3) news ICT stories about privacy infringement, write no more than 500 words
about the infringement, repercussions and effected Australian Privacy Policy. What impact do you think this
has on professional ethics?
A. Location Tracking
Location tracking refers to technologies that physically locate and electronically record and track the
movement of people or objects. Location tracking technology is in use every day with GPS navigation,
locations located on digital pictures and searching for businesses nearby using common apps. While
location tracking is often associated with smartphone use since smartphones have a GPS chip, there are
other ways location tracking is done. Using multiple satellites, a GPS device can identify it's longitude and
latitude location and display the information to the person using the device or send the information to a
software app or program. A common everyday example is a use of Internet and mobile map applications
on smartphones that can calculate your current position using your GPS location and show where you're
located on a map. Because your location coordinates are sent to a map application, your location is now
known by the application, which is location tracking.
B. Information mishandling
Data misuse is the use of information in ways it wasn’t intended for. User agreements, corporate policies,
data privacy laws, and industry regulations all set conditions for how data can be collected and used. Data
misuse violates these requirements.
Unlike data theft, data misuse doesn’t necessarily happen as a result of a cyberattack or when data is
collected without the owner’s consent. Although preventing data theft by employees—as covered in the
Computer Misuses Act—is important to consider, misusing data often means that permissions are being
ignored: a user might willingly provide a company with their personal data, only for the company to use
or share this information for purposes that the user didn’t agree to.
Exactly when you are on the web, you are spied by a couple of trackers for various purposes. Trackers
track your interest history and track all your online activities through various strategies. This gives them
an away from of what your personality is and your tendencies, which is an enter of online security
methodology and makes you a public property. Usually, this after is for advertisement purposes just and it
grants marketing specialists to show advancements according as you would prefer and interests.
However, at times this information is used by cybercriminals to do unapproved and criminal activities
taking a risk with your online presence.
copyright Copyright refers to It is the elite, legal and Copyright Act 1968 -
assignable lawful right,
the legal right of the Federal Register of
given to the creator for a
owner of intellectual settled number of years, to Legislation
print, distribute, perform,
property. In simpler film, or record scholarly,
terms, copyright is creative, or music material.
the right to copy. This
means that the
original creators of
products and anyone
they give
authorization to are
the only ones with
the exclusive right to
reproduce the work.
workplace health health and safety in WHS includes the laws, Work Health and
and safety (WHS) standards, and programs
the workplace is Safety Act 2011
that are aimed at making
about promoting the workplace better for
workers, along with co-
positive wellbeing as workers, family members,
well as preventing customers, and other
stakeholders. Improving a
injury and illness.
company's occupational
health and safety standards
ensures good business, a
better brand image, and
higher employee morale.
4. Fill in the blanks - Register Copyright and protect your creative works and innovations for lifetime in 176
countries by Notary deposit. Our Copyright deposit service is based on international Bern Convention
gathering 176 countries. Protect Your Creative Works by a Copyright certified by Public Notary: We protect
your Logos, Books, Websites, Screenplays, Music, Written Works, Artworks, Photos, Internet Domains.
6. You work in in ICT industry and your organisation is heavily involved with creative works, at the moment
your organisation is flourishing, you seem to be getting new employees every week. You are to draft a
document that will inform your colleagues across the organisation about changes in copyright legislation.
Consider all the critical elements needed to inform all stakeholders. Use the Communication Matrix on
Moodle, modify if needed then write the document with version control.
In 2020, copyright act has been recently changed. it is not just important for you to have permission from
the copyright owners and pay for the right to reuse content for the benefit of your business; it is a legal
requirement too. Copyright is a form of Intellectual Property Law and gives copyright owners exclusive
rights to deal with their works in certain ways. In Australia, copyright law is set out in federal legislation
(Copyright Act 1968) and in court decisions which have interpreted the Act. As copyright law is federal
legislation, liability for infringement is strict; good intentions and misinformation are not valid defences
if you are caught infringing copyright. As most literary and visual works are protected by copyright, your
employees will usually need permission from the copyright owner to copy and share text, tables, graphs
or images that were created by others.
Books
7. Compare both QUT’s and UQ’s privacy protection, do they both align to Australian Privacy Principles?
Which one does not? If not, why not?
Both QUT and UQ doesn’t align to Australian Privacy Principles. QUT’s doesn’t align to Australian Privacy
principle as Your personal information will be used and protected according to QUT privacy policy and will
not be disclosed to any external parties. It won't use your social media information to contact you unless
you expressly consent to use social media contact details for communication with QUT. The UQ embraces
the philosophy of open government underlying the RTI Act and the IP Act, and also embraces the
requirement to act in accordance with the Information Privacy Principles set out in the IP Act.
APP5 Notification of the collection of personal An APP entity that collects personal
information information about an individual must take
reasonable steps either to notify the
individual of certain matters or to ensure the
individual is aware of those matters.
APP6 Use or disclosure of personal information An APP entity can only use or disclose
personal information for a purpose for which
it was collected (known as the ‘primary
purpose’), or for a secondary purpose if an
exception applies.
APP7 Direct marketing An organisation may only use or disclose
personal information for direct marketing
purposes if certain conditions are met.
APP8 Cross-border disclosure of personal Outlines the steps an APP entity must take to
information protect personal information before it is
disclosed overseas.
APP9 Adoption, use or disclosure of government Outlines the limited situations when an
related identifiers organisation may adopt a government-
related identifier of an individual as the
organisation’s own identifier or use or
disclose a government-related identifier of an
individual.
APP10 Quality of personal information An APP entity must take reasonable steps to
ensure the personal information it collects is
accurate, up to date and complete. An entity
must also take reasonable steps to ensure
the personal information it uses or discloses
is accurate, up to date, complete and
relevant, having regard to the purpose of the
use or disclosure.
APP11 Security of personal information An APP entity must take reasonable steps to
protect personal information it holds from
misuse, interference and loss, and from
unauthorised access, modification or
disclosure. An APP entity has obligations to
destroy or de-identify personal information in
certain situations.
APP12 Access to personal information Outlines an APP entity’s obligations when an
individual request to be given access to
personal information held about them by the
APP entity. This includes a requirement to
provide access unless a specific exception
applies.
APP13 Correction of personal information Outlines an APP entity’s obligations for
correcting the personal information it holds
about individuals.
9. You received a complaint from one of the department heads who discovered a USB drive in the company
car park. Inside the USB stick were copies of employee resumes and other personnel records such as
employee appraisal reports, which must be kept confidential.
a. Write an email advising the complainant of the next steps to be taken in determining the
complaint. Send a copy of the email to your facilitator.
To,
The department Head,
Dear sir, I want to let you know that i have found USB drive in the company carpark which
contain employee resumes and other personnel records such as employee appraisal reports. According to
company privacy rules these data must be kept confidential. I have written this email as you are the CEO of the
company and you have full right to take action about this matter and you can also let all the employee to know
about the privacy rules of the company.
Kind regards
Srijan pandey
b. Refer to the Privacy Policy and determine whether there has been a breach of the Privacy
Principles.
Since the personal documents have been looked into, according to “APP5 i.e.
Notification of the collection of personal information”, there has been a breach of the Privacy
Principles.
c. Send an email to your facilitator advising him/her of any action required in order to remedy the
breach.
To,
The Facilitator,
I want to let you know that there has been leak of privacy principle in our company. One of the employee has
found USB drive in the car parking. There are some private information of the company and employee which must
be kept private. I want to find out who have lost the USB drive and want to talk with the employees about this
matter. All the information must be kept private and security must be made tight so that no one can get access to
information unless its urgent.
Kind regards
CEO
Joshua Lee