Professional Documents
Culture Documents
ICTICT618
ICTICT618
ICTICT618
Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT
environments
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
Copyright 2022
Version: 22.0
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means,
electronic, mechanical, photocopying, recording or otherwise without the prior written permission of Australian College of
Business Intelligence.
Disclaimer:
The Australian College of Business Intelligence does not invite reliance upon, nor accept responsibility for, the information it
provides. The Australian College of Business Intelligence makes every effort to provide a high-quality service. However, neither
the Australian College of Business Intelligence, nor the providers of data, gives any guarantees, undertakings or warranties
concerning the accuracy, completeness or up-to-date nature of the information provided. Users should confirm information
from another source if it is of sufficient importance for them to do so.
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
Contents
1. Assessment Information .................................................................................................... 4
A. Purpose of assessment ......................................................................................................................... 4
B. Competencies being assessed .............................................................................................................. 4
C. What you are required to do ................................................................................................................ 5
D. Adjustment and Support ...................................................................................................................... 7
E. Assessment submission ........................................................................................................................ 7
F. Assessment results and feedback ......................................................................................................... 8
G. Technical tools for completing this assessment ................................................................................... 9
2. Assessment Coversheet ................................................................................................... 10
3. Assessment Requirements ............................................................................................... 11
A. Overview ............................................................................................................................................. 11
B. Task 1 – Short Answer Knowledge Questions .................................................................................... 12
C. Task 2 – Project Case Study ................................................................................................................ 28
4. Student Checklist ............................................................................................................. 40
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
1. Assessment Information
A. Purpose of assessment
This assessment will develop your skills and knowledge to manage the issues of intellectual property
(IP), copyright and professional and ethical conduct in a team and to ensure that personal information of
stakeholders is handled in a confidential and professional manner.
The unit applies to those operating at a senior level in an organisation with a high degree of autonomy
in managing policies and system security.
No licensing, legislative or certification requirements apply to this unit at the time of publication.
The assessment is designed to help you gather evidence of your competence against the requirements
of the unit of competency, as outlined below. Your evidence may take a variety of forms and must be:
To achieve competency in this unit students must demonstrate their ability to:
Performance Evidence
• analyse legislation and standards and contribute to the review of at least three different policies
including IP, ethical conduct and privacy in an organisation.
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
Knowledge Evidence
• federal and state/territory legislation and policy relevant to an ICT environment relating to:
• processes and procedures by which an organisation communicates its policies and procedures
• organisational requirements for customer service relating to managing copyright, ethics and
privacy in ICT environments
• industry standard ICT system security systems and procedures relating to managing IP,
copyright, ethics and privacy in ICT environments.
For further information on the competencies of this unit, please refer to:
https://training.gov.au/Training/Details/ICTICT618
Task 1
For Task 1 you are required to answer a number of short answer questions related to federal and
state/territory legislation and policy relevant to an ICT environment relating to: copyright and
intellectual property, privacy. Processes and procedures by which an organisation communicates its
policies and procedures, organisational requirements for customer service relating to managing
copyright, ethics and privacy in ICT environments, industry standard ICT system security systems and
procedures relating to managing IP, copyright, ethics and privacy in ICT environments.
Task 2
For Task 2 you are required to undertake project were you analyse legislation and standards and
contribute to the review of at least three different policies including IP, ethical conduct and privacy in an
organisation, communicate policy change to required personnel, manage adherence to IP regulation,
manage ethical behaviour, manage privacy
For further details, please refer to the “Assessment Requirements” section of this document.
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
Assessment resources
To enable you to complete this assessment, the following documents have been provided in the unit
course page on Moodle unit on Moodle:
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
Plagiarism is a form of theft where the work, ideas, inventions etc. of other people are presented as
your own.
When quoting or paraphrasing from a source such as the Internet, the source must be recognised. If you
are quoting a source, make sure to acknowledge this by including “quotation marks” around the
relevant words/sentences or ideas. Note the source at the point at which it is included within your
assessment, such as by using a citation. Then list the full details of the source in a ‘references’ section at
the end of your assessment.
All sources used for your assessment should be detailed in the ‘references’ section. It is advisable to
never copy another person’s work.
ACBI supports individual differences in the learning environment and provides ‘reasonable adjustment’
in training and assessment activities to support every learner. If you have any special needs that make it
difficult for you to complete your learning or assessments, you should discuss this with your assessor.
ACBI will endeavour to provide you with reasonable alternatives to assist you to complete the required
tasks such as completing tests verbally or using an interpreter.
NOTE: If you have any special needs, you should discuss this with your assessor before starting your
assessment.
ii. Support
While ACBI may not be able to assist you with language training or specific Language, Literacy and
Numeracy (LLN) training, our assessors will work with you to ensure that you are supported throughout
your qualification. If you require individual tutoring this may attract an additional fee (please refer to the
ACBI Student Handbook available from https://www.acbi.edu.au). Support may be offered by your
assessor, or for more specialist support you may need to contact the RTO administration.
E. Assessment submission
Always submit assessments on time by the due date. You can find the due date in the unit course page
on Moodle.
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
i. Assessment Coversheet
Once you have completed all the tasks of the assessment, you must complete the Assessment Cover
Sheet, including signing the declaration.
When submitting assessments electronically follow the following standard for naming document files
and subject line. You must insert the following information:
Hence as an example of incorporating the four points above your file name or subject line should appear
this way: ICTICT618 A1– JessieA #1
Please refer to the “Instructions for Submitting Your Assessment” on the unit course page in Moodle.
NOTE: Please take care to follow all instructions listed. Assessments uploaded with a draft status on
Moodle may not be graded.
Once you have submitted this assessment online via Moodle, your assessor will grade it and provide you
with feedback. For each task of the assessment, you will receive a grade of ‘Satisfactory’ or ‘Not
Satisfactory’. You will also receive a grade for the entire assessment of ‘Competent’ or ‘Not Competent’.
Each task of the assessment must be ‘Satisfactory’ in order to receive a grade of ‘Competent’.
ii. Resubmission
If your assessment is graded ‘Not Competent’, you receive instructions via the feedback form on
components to be amended.
Your assessor is committed to providing you with detailed feedback on the outcomes of the assessment
and will provide guidance on areas for improvement. In most instances, you should need only complete
the sections of the assessment that were deemed ‘Not Satisfactory’. However, it is important to
remember that depending on the task, it may be necessary to repeat the whole task (for example
presentations or the delivery of a training session).
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
If resubmission is required, you will need to amend or update your assessment as a different version by
the required term cut-off date, as detailed on Moodle.
NOTE: For further information on late assessment, please refer to the ‘Assessment Policy’ available on
Moodle.
iii. What happens if you do not agree with the assessment result
If you do not think the assessment process is valid, or disagree with the decision once it is made, or
believe that you have been treated unfairly, you can appeal.
The first step is to discuss the matter with your trainer. If you still do not agree with the assessment, you
are able to request a re-assessment. It is possible to have your evidence assessed by a different trainer.
If you remain dissatisfied after the re-assessment, you should contact the Director of Studies. Full details
of the Appeals process are contained in your Student Handbook.
• Computer
• Internet access
• Internet browser
• Word processing software : Microsoft Office or equivalent
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
2. Assessment Coversheet
Student Name: Ajay Yadav
Email: ajyadac@gmail.com
Unit of Competency: ICTICT618 Manage IP, ethics and privacy in ICT environments
Declaration: I have read and understood the following information at the beginning of
this assessment guide (please tick):
☐ Assessment information
☐ Submitting assessments
☐ Plagiarism and referencing
Student signature:
Date:
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
3. Assessment Requirements
A. Overview
For this assessment, you are required to complete 2 tasks:
• For Task 1 you are required to answer a number of short answer questions related to federal
and state/territory legislation and policy relevant to an ICT environment relating to: copyright
and intellectual property, privacy. Processes and procedures by which an organisation
communicates its policies and procedures, organisational requirements for customer service
relating to managing copyright, ethics and privacy in ICT environments, industry standard ICT
system security systems and procedures relating to managing IP, copyright, ethics and privacy in
ICT environments.
• For Task 2 you are required to undertake project were you analyse legislation and standards and
contribute to the review of at least three different policies including IP, ethical conduct and
privacy in an organisation, communicate policy change to required personnel, manage
adherence to IP regulation, manage ethical behaviour, manage privacy
Please note: Task 2 of this assessment requires you to use the provided case study.
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
Task 1 of this assessment requires you to demonstrate understanding related to federal and
state/territory legislation and policy relevant to an ICT environment relating to: copyright and
intellectual property, privacy. Processes and procedures by which an organisation communicates its
policies and procedures, organisational requirements for customer service relating to managing
copyright, ethics and privacy in ICT environments, industry standard ICT system security systems and
procedures relating to managing IP, copyright, ethics and privacy in ICT environments.
To complete Task 1, undertake your own research and refer to the resources below provided on
Moodle:
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
You may use various sources of information to inform your answers, including your resources provided
by ACBI, books, and online sources. You must acknowledge and cite your sources.
A1.
Identify and explain federal and state or territory legislation and policy relevant to an ICT
environment relating to:
• access and equity
• copyright and intellectual property
• workplace health and safety (WHS)
• privacy
Answer using 50-100 words.
Resource:
• What is access and equity?
https://www.fairtrading.nsw.gov.au/about-fair-trading/access-and-equity
• Smartcopying
https://www.smartcopying.edu.au/copyright-guidelines/copyright---a-general-overview/1-1-
what-is-copyright-
• Australian Copyright Council
https://www.copyright.org.au/
• Safework NSW
https://www.safework.nsw.gov.au/
• What is privacy?
https://www.oaic.gov.au/privacy/your-privacy-rights/what-is-privacy/
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
A2.
Resource:
• Types of IP
https://www.ipaustralia.gov.au/understanding-ip/getting-started-ip/types-of-ip
Trade secrets -
You are responsible for protecting any proprietary innovations that contain sensitive information.
Making sure employees or wholesalers sign confidentiality agreements is one method you can
prevent competitors from getting their hands on this information. 2021 IP Australia
Circuit Layouts -
Circuit formats are the design schematics or layouts (geographies) of integrated circuits used in
hardware produced by personal computers. They are occasionally mentioned in conjunction with
microprocessor or semiconductor chip designs. 2021 IP Australia
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
A3.
Explain common creative, fair dealing and open source in terms of copyright. What are the materials
exempted from copyright policy?
Resource:
• Australian Copyright Council
https://www.copyright.org.au/
• Assessment Resource- ICTICT618: Copyright - Exceptions to Copyright (G121v04).pdf
• Australian copyright law overview
https://creativecommons.org.au/materials/copyrightlawoverviewinfopack.pdf
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
A4.
What are the rights of a copyright owner? How long does copyright protection last in Australia?
Resource:
• Australian Copyright Council
https://www.copyright.org.au/
Copyright in published works in Australia typically lasts for the author's lifetime plus an additional 70
years. The length of a copyright for unpublished works depends on whether it was made public while
the author was still alive.
A5.
What are the procedures should be undertaken to manage organisational copyright requirements are
up-to-date and team members are adhering to these requirements?
Resource:
• Copyright - Procedures
https://www.usc.edu.au/about/policies-and-procedures/copyright-procedures
• 6 Tips for Creating an Effective Copyright Policy
http://www.copyright.com/learn/6-tips-creating-effective-copyright-policy/
• 8 Steps to Copyright Compliance
https://www.copyrightlaws.com/8-steps-to-copyright-compliance/
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
A6.
Resource:
• Smartcopying
https://www.smartcopying.edu.au/copyright-guidelines/what-can-i-copy-communicate-
A7.
What is the Australian Computer Society code of ethics? Describe the importance of code of ethics in
ICT environment.
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
Resource:
• Australian Computer Society code of ethics : Ethics documentation & resources
https://www.acs.org.au/governance/ethics-committee.html
Through their Vice Presidents, each of the three Boards advises the Management Committee on
strategy related to their areas of competence.
The cumulative knowledge and abilities of the ACS's members are one of its greatest assets, and the
expert advisory boards provide the structure for maximising this knowledge.
It is significant because, within the parameters established by the Associations Incorporations Act
(ACT) and the Society's Objects, Rules, and National Regulations, the ACS Management Committee
controls and manages the Society.
A8.
How to ensure all the members and staff in an IT organization aware and understand companies code
of ethics?
Resource:
• Implementing a code of conduct
https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
conduct/implementing
• One-on-one training - A representative from the company, such as the owner, manager,
supervisor, HR staff member, or trainer, could go over the code of conduct and other
standards and expectations with current employees.
• Codes of conduct can be presented online in a way that allows personnel to go over subjects
at their own pace.
• Company intranet - By making the code of conduct available on the intranet, all employees
will have access to it whenever they need it.
• Employee handbook - A copy of your employee handbook that is printed
• Noticeboards - Staff can be reminded of the full code of conduct by posting a condensed
version on the noticeboard.
• Understanding the code - Ask your team for input to make sure they are aware of the code of
conduct.
• Accepting the code - Request that employees sign a statement acknowledging their
acceptance of the code of conduct.
A9.
You are the customer support manager for a small software manufacturer. The newest addition to
your 10-person team is Sofia, a recent college graduate. She is a little overwhelmed by the volume of
calls, but is learning quickly and doing her best to keep up. Today, as you performed your monthly
review of employee email, you were surprised to see that Sofia has received several messages from
employment agencies. One message says, “Sofia, I’m sorry you don’t like your new job. We have lots
of opportunities that I think would much better match your interests. Please call me, and let’s talk
further.” You’re shocked and alarmed. You had no idea she was unhappy, and your team desperately
needs her help to handle the onslaught of calls generated by the newest release of software. If you’re
going to lose her, you’ll need to find a replacement quickly. You know that Sofia did not intend for you
to see the email, but you can’t ignore what you saw.
Should you confront Sofia and demand to know her intentions? Should you avoid any confrontation
and simply begin seeking her replacement? Could you be misinterpreting the email? What should you
do?
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
Resource:
• Implementing a code of conduct
https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
conduct/implementing
• Communicating effectively for business
https://www.business.qld.gov.au/running-business/marketing-sales/managing-
relationships/communicating-effectively
A10.
Describe ICT industry code of ethics. How do we know whether something or not is ethical?
Resource:
• Code of Ethics
https://www.itpa.org.au/code-of-ethics/
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
A11.
Resource:
A12.
You have a customer who knows nothing about a technical product which he is buying. You have
found that he will buy any model you recommend. Is it your duty to sell her the most expensive
model in the store? Explain what is your ethical responsibility.
Resource:
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
A13.
a. What is the legislation that refers to privacy? What are the National Privacy Principles?
b. List 3 points of National Privacy Principles.
c. What you understand in terms of privacy to protect your “Personal information”?
Resource:
• Australian Privacy Principles
https://www.oaic.gov.au/privacy/australian-privacy-principles/
• ACS Privacy policy
https://www.acs.org.au/privacy-policy
a.
Write your answer here
Australian law, known as the Privacy Act of 1988 (Privacy Act), governs how personal information
about persons is handled. Information or an opinion that identifies a person or makes them fairly
identifiable is considered personal information.
b.
Write your answer here
There are 13 privacy principles in Australia, some of which include the following:
• Management of personal information in an open and transparent manner.
• Pseudonyms and anonymity
• gathering of requested personal data
• handling personal information that was not requested
• Notification of the gathering of personal data.
c.
Write your answer here
1. Information quality
2. Collection
3. Use and discloser
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
A14.
Assume that you are the technical support for an Internet Service Provider. You are visiting a
customer’s premises, on a speed complaint request. Upon testing, you find that the issue is with the
router your company provided. Your supervisor tells you to tell the customer that they might have
damaged the router and they need to buy a new router from the company. Would you charge the
customer for damaging the router? What should you do?
Resource:
• ACS Privacy policy
https://www.acs.org.au/privacy-policy
• Implementing a code of conduct
https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
conduct/implementing
A15.
How the new or revised policy and procedures will be distributed or up-to-date?
Resource:
• Implementing a code of conduct
https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
conduct/implementing
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
Employees of an organisation should be informed about new or updated policies and procedures
through communication meetings. The distribution procedure for policy changes should largely be the
same and take place through meetings.
A16.
Resource:
• The Privacy Act
https://www.oaic.gov.au/privacy/the-privacy-act/
• Your right to privacy
https://www.servicesaustralia.gov.au/individuals/privacy
• Australian Federal Privacy Laws
https://privacy.org.au/resources/privacy-law/plawsclth/
A17.
Resource:
• ACS Privacy policy
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
https://www.acs.org.au/privacy-policy
A18.
Resource:
• ACS Privacy policy
https://www.acs.org.au/privacy-policy
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
A19.
Describe the importance of disseminating your code of ethics throughout the organisation.
Resource:
A20.
How can you secure a system? Explain the password setup procedure
Resource:
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
By concentrating on software and security updates, systems can be safeguarded. A firewall that
serves as a barrier between a computer and a network can be enabled.
Use of a virtual private network (VPN) is a great way to set up protection for online browsing.
Encrypt Data: Encrypt Data will concentrate on protecting computer files and web traffic
communication.
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
• Project Activities
To complete Task 2, undertake your own research and refer to the information provided in the following
documents available on Moodle:
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
You may use various sources of information to inform your answers, including your resources provided
by ACBI, books, and online sources. You must acknowledge and cite your sources.
Case study:
You are designing a database management system for the personnel office for your company.
The system will store extremely sensitive information such as performance evaluations, medical
records for filing insurance claims, salaries, and so forth. With weak security, employees
working on client machines may be able to figure out ways to get access to this data, not to
mention the possibility of on-line access from hackers. You feel strongly that the system should
be much more secure. However, the CEO, director of computing and director of personnel all
agree that less security will do since it is going to very expensive to build high security system.
Resource:
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
1. Write at least 3 privacy policies to ensure the integrity, confidentiality, security and
availability of information and adhere to current privacy legislation.
Agency or organisation of the privacy legislation must adhere to the Australian privacy concept. It
includes organisations with a yearly revenue of more than $3 million that are government agency.
Personal information that has been sought may be collected in accordance with Australian privacy laws,
according to this statement. The acquisition of private or sensitive information is where it is most
relevant.
Direct marketing: Under certain conditions, an organisation may share personal information for direct
marketing.
Notification of collecting personal data: This statement explains that ABP is required to acquire personal
data and that it was necessary to notify the individual by disclosing particular information.
2. By not implementing high security in the system, is the CEO breaching the Privacy law? Justify
your answer with examples.
As sensitive information, the CEO is required by privacy law to maintain security measures.
3. Name the privacy act that applies to your state and explain how can companies maintain
privacy policies?
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
handling of personal information is governed by this law. Companies must abide by the Privacy Act, but
they are responsible for implementing any additional security measures beyond the minimum
requirements.
CyberTech is a very young cybersecurity company which was established in Sydney, Australia in
2019. A youthful organization, enthusiastic, optimistic and accessible which believes in quality
software solutions that can change the world for the better. CyberTech usually offers number
of cybersecurity solutions for corporate and different industries.
CyberTech has very targeted mission - “To be the dominant cybersecurity solutions provider in
Australia by 2023, and be positioned to be a global player thereafter".
CyberTech decides to appoint a project management team to develop and manage intellectual
property, copyright, ethics and privacy policy for IT environment. CyberTech’s governing body
found that in the last few years, there are number of copyright and policy breaching incidents
by staff members and contractors. The company is very keen to develop a standard code of
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
ethics, intellectual property, copyright and privacy policy for everyone in the organization.
In order to manage intellectual property, copyright, ethics and privacy in ICT environment
project team needs to assess current ICT industry requirements and governing bodies
legislation. Student needs to follow Australian Copyright Law, ACS (Australian Computer
Society) Code of conduct, The Commonwealth ACT, and CyberTech requirements.
In order to understand the assessment task student may need to search for the following
information:
1. Assess current Australian IP and copyright law and ensure that implies in your
organization IT environment
2. Ensure that team members are aware of Australian IP and copyright law and how it
affects their work
3. Institute measures to ensure that Australian IP and copyright law is not breached
4. Institute regular reviews to ensure organizational Australian IP and copyright law
requirements are up-to-date and team members are adhering to these requirements
5. Develop appropriate code of ethics, both organizational and IT-specific
6. Acquaint team members with ethical requirements
7. Institute regular reviews of team member's ethical work practices and feedback to
ensure correct application of the code
8. Implement new work procedures according to review plan
9. Ensure that stakeholders are aware of ethics code, and adjust appropriately following
stakeholder feedback
10. Institute regular reviews of stakeholder understanding and application of code of
ethics legislation and standards to organizational outcomes, the organization's privacy policy
and procedures.
Resource:
• IP Australia
https://www.ipaustralia.gov.au/
• Australian Intellectual Property laws
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
https://www.austrade.gov.au/International/Invest/Guide-to-investing/Running-a-
business/Understanding-Australian-business-regulation/Australian-Intellectual-
Property-laws
• Intellectual Property
https://business.gov.au/Planning/Intellectual-Property
• Intellectual Property explained
https://business.gov.au/Planning/Intellectual-Property/Intellectual-Property-explained
• Short Guide to Copyright- Attorney-General's Department:
https://www.ag.gov.au/RightsAndProtections/Documents/ShortGuidetoCopyright-
October2012.pdf
• Infringement: Action, Remedies, Offences & Penalties:
http://www.copyright.org.au/acc_prod/ACC/Information_Sheets/Infringement__Actio
n__Remedies__Offences___Penalties.aspx?WebsiteKey=8a471e74-3f78-4994-9023-
316f0ecef4ef
• Australian Computer Society
https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Professional-
Conduct_v2.1.pdf
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
▪
Complaints Management Policy
▪
Electronic Collaboration and Social Media Policy
▪
Email and Messaging Policy
▪
Information Security Policy
▪
Internet Use Policy
▪
IT Conditions of Use Policy
▪
IT Infrastructure Policy
▪
IT Security Policy
▪
Website privacy notice.
Duration of copyright and infringement: Copyright is in the context of successful theatrical, literary,
artistic, and musical works for the author's lifetime plus an additional 70 years as perspective 33. The
protection period is computed from the author's death at the end of the calendar year and any
subsequent work caused by illness or by an unknown author that was first made public before January
1st, 2019.
Copyright laws for organisations: Under the Fair Dealing exceptions, students are permitted to copy
copyright material, especially while doing the following:
A student may copy a "reasonable portion" of copyrighted items for private study or research, such as
10% of a work, 1 chapter, or 1 article from a journal issue (or more if they relate to the same research
topic or course of study).
Copyright work may be duplicated for inclusion in, for example, an essay, conference paper, or journal
article in order to remark critically on the material. This is known as fair dealing for review or critique.
Unless the author is unknown or has authorised or instructed that they not be cited, any such use
should include the work's title and author.
Copyright infringement policy: CyberTech anticipates that its staff will use protected content
responsibly. Additionally, we promote staff education on copyright compliance among their peers.
Please notify the person involved as well as our Director, who serves as our copyright compliance
officer, if any employee notices what they believe to be a copyright violation. Employees who unlawfully
copy works protected by copyright may face disciplinary action, including termination.
The Internet: Internet content is shielded by copyright legislation. The usage of the internet grants you
an implied permission to visit websites, link to them from outside websites, and print content for your
own use. The majority of websites provide a copyright statement or terms and conditions outlining the
parameters of the licence given to users. Material obtained through the internet should not be used for
any other purpose without express permission from the copyright owner, with the exception of any fair
dealing for personal use or educational use, as permitted under the Copyright Act and the CyberTech's
statutory licences.
Music: Includes song lyrics, jingles, and incidental music, whether in the physical form of sheet music,
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
broadsheets, or other notation; and musical scores for opera, operetta, symphonic, ensemble, band,
and other musical performances.
Pictures: The law permits teachers to exhibit copyright-eligible content for students in non-profit, face-
to-face classroom settings without restriction. (Without this exclusion, displaying items in a classroom
would constitute a public exhibition that would call for money and/or permission.)
Trademark Logo: Unless it is for editorial or informational purposes, such as when a logo is featured in a
written article or is a part of a comparative product statement, you need permission to use a logo.
Plagiarism: According to the 1968 Copyright Act, the author is granted full ownership of their creations.
Paraphrasing is a form of plagiarism that involves taking someone else's ideas and rephrasing them.
There is a risk that the author of the original work may file a lawsuit to defend their intellectual property
rights in cases of plagiarism.
Inform stakeholders to review and update information: Because of out-of-date or confusing laws,
many educational institutions' libraries and cases of recent difficulty using copyright material. It is
guaranteed that institutions in the Australian community can reasonably access content in accordance
with changes and the Copyright Act of 1968. Additionally, it's critical to ensure that university search
engines and libraries can abide by the requirements set forth in order to minimise online copyright
infringement.
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
Informal procedure: In cyber tech, the management will talk with the individual who is the target of the
complaint about the problem. The line manager will arrange a meeting between the parties to settle the
problem and continue.
Formal procedure: this entails an official investigation of the complaint. First, an enquiry will be
conducted by gathering historical data and then locating current data.
If the person in question is unhappy with the results of the formal investigation, they can appeal to the
organization's HOD.
External mediator: The grievance may be referred to an external mediator if everyone involved in the
dispute agrees that one is necessary.
Confidentiality: In terms of cyber technology, the confidentiality will be upheld by the human resource
management. In order to maintain fairness and address complaints, there will be interaction with
employees and workplace participants. Employees who have filed a complaint as well as all other
participants and employees at the workplace are expected to respect confidentiality. The complainant
will speak with the appropriate support representative about their complaint. The customer service
worker must uphold element confidentiality.
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
IT Infrastructure policy:
• The content that cybertech makes available on internet services needs to be explicitly identified.
The content cannot be distributed or used in accordance with the National Classification Court's
or the relevant industry code's applicable classification requirements.
• Cybertech organisations are required to protect the security of their internet services under IT
security policies.
• It offers defence against unlawful third-party use of the service.
• There are suitable security precautions, such as installing a firewall or installing antivirus
software.
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
chance to let potential clients and website visitors know that the company is reputable and that they
should be concerned about their privacy and the security of their personal information.
Activity 3: Present and obtain feedback and sign-off from required personnel
In this part of the assessment activity, you are required to present and obtain the sign-off from the
required personnel.
Presentation may be between 3-5 mins. You will provide a link to the presentation video for the
assessor to observe. Each student will individually present, recorded and submitted this activity.
During the presentation you will be required to demonstrate effective interpersonal and
communication skills including:
Your task
In the presentation, you will explain the Intellectual Property and Copyright Policy, Code of ethics,
Ethical Behaviour, Privacy policies to required CyberTech personnel [your classmate will assume role
of CyberTech personnel]
You will record the presentation. You can use a phone or other recording device to record your
presentation.
• You can upload video to Google drive, Dropbox or other cloud services.
• Provide screenshot of you conducting the program.
• Do not delete the link until you have received grade for the unit.
You must record all responses correctly to the template provided below.
Resource:
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
Video Link
Write your answer here
Sign-off document ] can copy the document in the space below or submit as attachment]
Write your answer here
Document Attached
Submission Instructions
Please proofread your work and include ICTICT618 – A1 - Your Name in the document header.
Submit your completed assessment to your Tutor/Assessor for marking via the eLearning Platform –
Moodle using the following file name: ICTICT618 – A1 Your Name
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
4. Student Checklist
Student name: Ajay Yadav
Unit of Competency: ICTICT618 Manage IP, ethics and privacy in ICT environments
Yes
Short Answer Questions Comments
✓
Did the Candidate:
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments
• PowerPoint slides
• Video Link
• Sign-off document
Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023