ICTICT618

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 43

Student

Assessment Guide:
ICTICT618 Manage IP, ethics and privacy in ICT
environments
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

Copyright 2022

© Australian College of Business Intelligence

All rights reserved

Version: 22.0

Date Modified: Dec 2022

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means,
electronic, mechanical, photocopying, recording or otherwise without the prior written permission of Australian College of
Business Intelligence.

Disclaimer:

The Australian College of Business Intelligence does not invite reliance upon, nor accept responsibility for, the information it
provides. The Australian College of Business Intelligence makes every effort to provide a high-quality service. However, neither
the Australian College of Business Intelligence, nor the providers of data, gives any guarantees, undertakings or warranties
concerning the accuracy, completeness or up-to-date nature of the information provided. Users should confirm information
from another source if it is of sufficient importance for them to do so.

Student Assessment Guide: ICTICT618 Version: v22.0 Page 2 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

Contents
1. Assessment Information .................................................................................................... 4
A. Purpose of assessment ......................................................................................................................... 4
B. Competencies being assessed .............................................................................................................. 4
C. What you are required to do ................................................................................................................ 5
D. Adjustment and Support ...................................................................................................................... 7
E. Assessment submission ........................................................................................................................ 7
F. Assessment results and feedback ......................................................................................................... 8
G. Technical tools for completing this assessment ................................................................................... 9
2. Assessment Coversheet ................................................................................................... 10
3. Assessment Requirements ............................................................................................... 11
A. Overview ............................................................................................................................................. 11
B. Task 1 – Short Answer Knowledge Questions .................................................................................... 12
C. Task 2 – Project Case Study ................................................................................................................ 28
4. Student Checklist ............................................................................................................. 40

Student Assessment Guide: ICTICT618 Version: v22.0 Page 3 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

1. Assessment Information
A. Purpose of assessment
This assessment will develop your skills and knowledge to manage the issues of intellectual property
(IP), copyright and professional and ethical conduct in a team and to ensure that personal information of
stakeholders is handled in a confidential and professional manner.

The unit applies to those operating at a senior level in an organisation with a high degree of autonomy
in managing policies and system security.

No licensing, legislative or certification requirements apply to this unit at the time of publication.

The assessment is designed to help you gather evidence of your competence against the requirements
of the unit of competency, as outlined below. Your evidence may take a variety of forms and must be:

• Authentic – your own work


• Valid – related to the competency
• Sufficient – appropriate quantity and quality
• Current – recent proof of your skills and knowledge

B. Competencies being assessed


Elements

To achieve competency in this unit students must demonstrate their ability to:

• Manage adherence to IP regulations


• Manage ethical behaviour
• Manage privacy

Performance Evidence

Evidence of the ability to:

• analyse legislation and standards and contribute to the review of at least three different policies
including IP, ethical conduct and privacy in an organisation.

In the course of the above, the candidate must:

• communicate policy change to required personnel.

Student Assessment Guide: ICTICT618 Version: v22.0 Page 4 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

Knowledge Evidence

To complete the unit requirements safely and effectively, you must:

• federal and state/territory legislation and policy relevant to an ICT environment relating to:

o copyright and intellectual property


o privacy

• processes and procedures by which an organisation communicates its policies and procedures
• organisational requirements for customer service relating to managing copyright, ethics and
privacy in ICT environments
• industry standard ICT system security systems and procedures relating to managing IP,
copyright, ethics and privacy in ICT environments.

For further information on the competencies of this unit, please refer to:
https://training.gov.au/Training/Details/ICTICT618

C. What you are required to do


This assessment requires you to analyse legislation and standards and contribute to the review of at
least three different policies including IP, ethical conduct and privacy in an organisation, communicate
policy change to required personnel, manage adherence to IP regulations, manage ethical behaviour,
manage privacy

Task 1

For Task 1 you are required to answer a number of short answer questions related to federal and
state/territory legislation and policy relevant to an ICT environment relating to: copyright and
intellectual property, privacy. Processes and procedures by which an organisation communicates its
policies and procedures, organisational requirements for customer service relating to managing
copyright, ethics and privacy in ICT environments, industry standard ICT system security systems and
procedures relating to managing IP, copyright, ethics and privacy in ICT environments.

Task 2

For Task 2 you are required to undertake project were you analyse legislation and standards and
contribute to the review of at least three different policies including IP, ethical conduct and privacy in an
organisation, communicate policy change to required personnel, manage adherence to IP regulation,
manage ethical behaviour, manage privacy

For further details, please refer to the “Assessment Requirements” section of this document.

Student Assessment Guide: ICTICT618 Version: v22.0 Page 5 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

Assessment resources
To enable you to complete this assessment, the following documents have been provided in the unit
course page on Moodle unit on Moodle:

• Assessment Resource - ICTICT618

Student Assessment Guide: ICTICT618 Version: v22.0 Page 6 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

A note on plagiarism and referencing

Plagiarism is a form of theft where the work, ideas, inventions etc. of other people are presented as
your own.

When quoting or paraphrasing from a source such as the Internet, the source must be recognised. If you
are quoting a source, make sure to acknowledge this by including “quotation marks” around the
relevant words/sentences or ideas. Note the source at the point at which it is included within your
assessment, such as by using a citation. Then list the full details of the source in a ‘references’ section at
the end of your assessment.

All sources used for your assessment should be detailed in the ‘references’ section. It is advisable to
never copy another person’s work.

D. Adjustment and Support


i. Reasonable adjustment

ACBI supports individual differences in the learning environment and provides ‘reasonable adjustment’
in training and assessment activities to support every learner. If you have any special needs that make it
difficult for you to complete your learning or assessments, you should discuss this with your assessor.
ACBI will endeavour to provide you with reasonable alternatives to assist you to complete the required
tasks such as completing tests verbally or using an interpreter.

NOTE: If you have any special needs, you should discuss this with your assessor before starting your
assessment.

ii. Support

While ACBI may not be able to assist you with language training or specific Language, Literacy and
Numeracy (LLN) training, our assessors will work with you to ensure that you are supported throughout
your qualification. If you require individual tutoring this may attract an additional fee (please refer to the
ACBI Student Handbook available from https://www.acbi.edu.au). Support may be offered by your
assessor, or for more specialist support you may need to contact the RTO administration.

E. Assessment submission
Always submit assessments on time by the due date. You can find the due date in the unit course page
on Moodle.

Student Assessment Guide: ICTICT618 Version: v22.0 Page 7 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

i. Assessment Coversheet

Once you have completed all the tasks of the assessment, you must complete the Assessment Cover
Sheet, including signing the declaration.

ii. File naming conventions

When submitting assessments electronically follow the following standard for naming document files
and subject line. You must insert the following information:

• Unit of Competency code (ie. ICTICT618)


• ‘A’ for word assessment then followed by the assessment number and a dash
• Your first name and initial of last name. Capitalise only the first letter of names. Then insert a
hashtag, followed by submission attempt.

Hence as an example of incorporating the four points above your file name or subject line should appear
this way: ICTICT618 A1– JessieA #1

iii. Submission via Moodle

Please refer to the “Instructions for Submitting Your Assessment” on the unit course page in Moodle.

NOTE: Please take care to follow all instructions listed. Assessments uploaded with a draft status on
Moodle may not be graded.

F. Assessment results and feedback


i. Assessment results

Once you have submitted this assessment online via Moodle, your assessor will grade it and provide you
with feedback. For each task of the assessment, you will receive a grade of ‘Satisfactory’ or ‘Not
Satisfactory’. You will also receive a grade for the entire assessment of ‘Competent’ or ‘Not Competent’.
Each task of the assessment must be ‘Satisfactory’ in order to receive a grade of ‘Competent’.

ii. Resubmission

If your assessment is graded ‘Not Competent’, you receive instructions via the feedback form on
components to be amended.

Your assessor is committed to providing you with detailed feedback on the outcomes of the assessment
and will provide guidance on areas for improvement. In most instances, you should need only complete
the sections of the assessment that were deemed ‘Not Satisfactory’. However, it is important to
remember that depending on the task, it may be necessary to repeat the whole task (for example
presentations or the delivery of a training session).

Student Assessment Guide: ICTICT618 Version: v22.0 Page 8 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

If resubmission is required, you will need to amend or update your assessment as a different version by
the required term cut-off date, as detailed on Moodle.

NOTE: For further information on late assessment, please refer to the ‘Assessment Policy’ available on
Moodle.

iii. What happens if you do not agree with the assessment result

If you do not think the assessment process is valid, or disagree with the decision once it is made, or
believe that you have been treated unfairly, you can appeal.

The first step is to discuss the matter with your trainer. If you still do not agree with the assessment, you
are able to request a re-assessment. It is possible to have your evidence assessed by a different trainer.
If you remain dissatisfied after the re-assessment, you should contact the Director of Studies. Full details
of the Appeals process are contained in your Student Handbook.

G. Technical tools for completing this assessment


To complete this assessment, you need access to:

• Computer
• Internet access
• Internet browser
• Word processing software : Microsoft Office or equivalent

Student Assessment Guide: ICTICT618 Version: v22.0 Page 9 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

2. Assessment Coversheet
Student Name: Ajay Yadav

Student ID: ACBI20210532

Contact Number: 0451129915

Email: ajyadac@gmail.com

Trainer / Assessor Name: Naveed Khan

Qualification: ICT60220 Advanced Diploma of Information Technology

Unit of Competency: ICTICT618 Manage IP, ethics and privacy in ICT environments

☐ Task 1. Short Answer Knowledge Questions


Assessment Tasks:
☐ Task 2. Project Case Study

Due Date: Date Submitted:

Declaration: I have read and understood the following information at the beginning of
this assessment guide (please tick):

☐ Assessment information
☐ Submitting assessments
☐ Plagiarism and referencing

I declare this assessment is my own work and where the work is of


others, I have fully referenced that material.

Name (please print): Ajay Yadav

Student signature:

Date:

Student Assessment Guide: ICTICT618 Version: v22.0 Page 10 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

3. Assessment Requirements

A. Overview
For this assessment, you are required to complete 2 tasks:

• For Task 1 you are required to answer a number of short answer questions related to federal
and state/territory legislation and policy relevant to an ICT environment relating to: copyright
and intellectual property, privacy. Processes and procedures by which an organisation
communicates its policies and procedures, organisational requirements for customer service
relating to managing copyright, ethics and privacy in ICT environments, industry standard ICT
system security systems and procedures relating to managing IP, copyright, ethics and privacy in
ICT environments.

• For Task 2 you are required to undertake project were you analyse legislation and standards and
contribute to the review of at least three different policies including IP, ethical conduct and
privacy in an organisation, communicate policy change to required personnel, manage
adherence to IP regulation, manage ethical behaviour, manage privacy

Please note: Task 2 of this assessment requires you to use the provided case study.

Student Assessment Guide: ICTICT618 Version: v22.0 Page 11 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

B. Task 1 – Short Answer Knowledge Questions


i. Instructions for students

Task 1 of this assessment requires you to demonstrate understanding related to federal and
state/territory legislation and policy relevant to an ICT environment relating to: copyright and
intellectual property, privacy. Processes and procedures by which an organisation communicates its
policies and procedures, organisational requirements for customer service relating to managing
copyright, ethics and privacy in ICT environments, industry standard ICT system security systems and
procedures relating to managing IP, copyright, ethics and privacy in ICT environments.

You must complete 1 part

Task 1 is structured into one part:

• 10 Short Answer Questions

Important resources for Task 1

To complete Task 1, undertake your own research and refer to the resources below provided on
Moodle:

• Assessment Resource- ICTICT618

Student Assessment Guide: ICTICT618 Version: v22.0 Page 12 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

ii. Task 1, Short Answer Questions


Task 1, Part A of this assessment requires you to demonstrate understanding related to federal and
state/territory legislation and policy relevant to an ICT environment relating to: copyright and
intellectual property, privacy. Processes and procedures by which an organisation communicates its
policies and procedures, organisational requirements for customer service relating to managing
copyright, ethics and privacy in ICT environments, industry standard ICT system security systems and
procedures relating to managing IP, copyright, ethics and privacy in ICT environments.

Answer the questions below using the space provided:

• Answer all parts of each question


• Use your own words and give examples wherever possible
• The quality of your answer is more important than how long it is
• Enter your answers in this document

You may use various sources of information to inform your answers, including your resources provided
by ACBI, books, and online sources. You must acknowledge and cite your sources.

A1.

Identify and explain federal and state or territory legislation and policy relevant to an ICT
environment relating to:
• access and equity
• copyright and intellectual property
• workplace health and safety (WHS)
• privacy
Answer using 50-100 words.

Resource:
• What is access and equity?
https://www.fairtrading.nsw.gov.au/about-fair-trading/access-and-equity
• Smartcopying
https://www.smartcopying.edu.au/copyright-guidelines/copyright---a-general-overview/1-1-
what-is-copyright-
• Australian Copyright Council
https://www.copyright.org.au/
• Safework NSW
https://www.safework.nsw.gov.au/
• What is privacy?
https://www.oaic.gov.au/privacy/your-privacy-rights/what-is-privacy/

Student Assessment Guide: ICTICT618 Version: v22.0 Page 13 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

Write your answer here


• Access and equity - this concept denotes fair and equitable access to services in sectors
necessary for achieving and sustaining social, cultural, and economic well-being. Equity refers
to the equitable distribution of economic, social, and political resources without regard to
factors such as age, gender, race, ethnicity, aptitude, income, or sexual orientation.
• Laws pertaining to the expression of ideas protect intellectual property. The legislation
governing the expression of ideas through the use of images or sound is known as copyright.
Copyright protects a distinct expression of thinking, in contrast to a trademark, which
designates that a particular product or design is protected.
• Occupational health and safety, or OH&S, is another name for work health and safety (WHS),
which is the management of threats to everyone's health and safety at work. Those that work
for you, as well as your clients, guests, and suppliers, are all included in this.
• A person's or a group's right to seclude themselves or information about themselves and so
express themselves in a selected manner is known as privacy.

A2.

What are the 4 types of intellectual property?

Answer using 50-100 words.

Resource:
• Types of IP
https://www.ipaustralia.gov.au/understanding-ip/getting-started-ip/types-of-ip

Write your answer here


Copyright –
In Australia, a thought or creative idea is automatically protected by copyright the moment it is
written down or transmitted electronically. 2021 IP Australia

Trade secrets -
You are responsible for protecting any proprietary innovations that contain sensitive information.
Making sure employees or wholesalers sign confidentiality agreements is one method you can
prevent competitors from getting their hands on this information. 2021 IP Australia

Circuit Layouts -
Circuit formats are the design schematics or layouts (geographies) of integrated circuits used in
hardware produced by personal computers. They are occasionally mentioned in conjunction with
microprocessor or semiconductor chip designs. 2021 IP Australia

Student Assessment Guide: ICTICT618 Version: v22.0 Page 14 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

A3.

Explain common creative, fair dealing and open source in terms of copyright. What are the materials
exempted from copyright policy?

Answer using 50-100 words.

Resource:
• Australian Copyright Council
https://www.copyright.org.au/
• Assessment Resource- ICTICT618: Copyright - Exceptions to Copyright (G121v04).pdf
• Australian copyright law overview
https://creativecommons.org.au/materials/copyrightlawoverviewinfopack.pdf

Write your answer here


Under some conditions, a copyrighted work may be used without the copyright holder's consent
under a copyright law provision known as fair use. Activities such as news reporting, teaching, and
parody are all examples of what may be considered fair use. Fair use is assessed on a case-by-case
basis, taking into account the intended use, the extent to which the original work is used, and the
effect on the original work's market.

Student Assessment Guide: ICTICT618 Version: v22.0 Page 15 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

A4.

What are the rights of a copyright owner? How long does copyright protection last in Australia?

Answer using 50-100 words.

Resource:
• Australian Copyright Council
https://www.copyright.org.au/

Write your answer here


The copyright holder is permitted to: copy or scan the work for personal use; reproduce the work in
material form; (Provide copies to the general public) To share the work with the public, use email,
intranet or the Internet to post it, make it accessible online, or broadcast it on free-to-air or pay TV.

Copyright in published works in Australia typically lasts for the author's lifetime plus an additional 70
years. The length of a copyright for unpublished works depends on whether it was made public while
the author was still alive.

A5.

What are the procedures should be undertaken to manage organisational copyright requirements are
up-to-date and team members are adhering to these requirements?

Answer using 50-100 words.

Resource:
• Copyright - Procedures
https://www.usc.edu.au/about/policies-and-procedures/copyright-procedures
• 6 Tips for Creating an Effective Copyright Policy
http://www.copyright.com/learn/6-tips-creating-effective-copyright-policy/
• 8 Steps to Copyright Compliance
https://www.copyrightlaws.com/8-steps-to-copyright-compliance/

Write your answer here


The following advice will help you develop a successful copyright policy.
• Show respect for other people's copyrights and lessen the chance of infringement.
• Request advice from a copyright specialist.

Student Assessment Guide: ICTICT618 Version: v22.0 Page 16 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

• Disclose the details of copyright legislation.


• Address the world's copyright problems.
• Clearly state the compliance policies.
• Explain to staff how to use things that belong to your company but are protected by
copyright.
• Provide workers with guidance on how to handle violations properly.

A6.

How the updated versions of copyright law will be distributed?

Answer using 50-100 words.

Resource:
• Smartcopying
https://www.smartcopying.edu.au/copyright-guidelines/what-can-i-copy-communicate-

Write your answer here


Use the following guidance to create a successful copyright policy.
• Be respectful of others' copyrights and reduce the likelihood of infringement.
• Consult a copyright expert for advice.
• Provide information on copyright regulations.
• Address copyright issues on a global scale.
• Clearly outline the rules for compliance.
• Describe to employees how to make use of corporate property that is copyrighted.
• Educate employees on how to properly handle infractions.

A7.

What is the Australian Computer Society code of ethics? Describe the importance of code of ethics in
ICT environment.

Student Assessment Guide: ICTICT618 Version: v22.0 Page 17 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

Answer using 50-100 words.

Resource:
• Australian Computer Society code of ethics : Ethics documentation & resources
https://www.acs.org.au/governance/ethics-committee.html

Write your answer here


A national Management Committee oversees the administration of the Australian Computer Society.
Eight State and Territory Branch Executive Committees, a National Congress, and three expert
advisory boards—the Member Advisory Board, the Profession Advisory Board, and the Technical
Advisory Board—all provide assistance to this body.

Through their Vice Presidents, each of the three Boards advises the Management Committee on
strategy related to their areas of competence.

The cumulative knowledge and abilities of the ACS's members are one of its greatest assets, and the
expert advisory boards provide the structure for maximising this knowledge.

It is significant because, within the parameters established by the Associations Incorporations Act
(ACT) and the Society's Objects, Rules, and National Regulations, the ACS Management Committee
controls and manages the Society.

A8.

How to ensure all the members and staff in an IT organization aware and understand companies code
of ethics?

Answer using 50-100 words.

Resource:
• Implementing a code of conduct
https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-

Student Assessment Guide: ICTICT618 Version: v22.0 Page 18 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

conduct/implementing

Write your answer here


The process of putting in place a code of conduct at work entails explaining its rules and regulations
to every employee and giving them any necessary training to make sure they are aware of it.
Management should model the code for employees by practising it and promoting it.
Additionally, there are ways to distribute the code correctly.-

• One-on-one training - A representative from the company, such as the owner, manager,
supervisor, HR staff member, or trainer, could go over the code of conduct and other
standards and expectations with current employees.
• Codes of conduct can be presented online in a way that allows personnel to go over subjects
at their own pace.
• Company intranet - By making the code of conduct available on the intranet, all employees
will have access to it whenever they need it.
• Employee handbook - A copy of your employee handbook that is printed
• Noticeboards - Staff can be reminded of the full code of conduct by posting a condensed
version on the noticeboard.
• Understanding the code - Ask your team for input to make sure they are aware of the code of
conduct.
• Accepting the code - Request that employees sign a statement acknowledging their
acceptance of the code of conduct.

A9.

You are the customer support manager for a small software manufacturer. The newest addition to
your 10-person team is Sofia, a recent college graduate. She is a little overwhelmed by the volume of
calls, but is learning quickly and doing her best to keep up. Today, as you performed your monthly
review of employee email, you were surprised to see that Sofia has received several messages from
employment agencies. One message says, “Sofia, I’m sorry you don’t like your new job. We have lots
of opportunities that I think would much better match your interests. Please call me, and let’s talk
further.” You’re shocked and alarmed. You had no idea she was unhappy, and your team desperately
needs her help to handle the onslaught of calls generated by the newest release of software. If you’re
going to lose her, you’ll need to find a replacement quickly. You know that Sofia did not intend for you
to see the email, but you can’t ignore what you saw.

Should you confront Sofia and demand to know her intentions? Should you avoid any confrontation
and simply begin seeking her replacement? Could you be misinterpreting the email? What should you
do?

Write your answer in steps of actions you would take.

Answer using 50-100 words.

Student Assessment Guide: ICTICT618 Version: v22.0 Page 19 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

Resource:
• Implementing a code of conduct
https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
conduct/implementing
• Communicating effectively for business
https://www.business.qld.gov.au/running-business/marketing-sales/managing-
relationships/communicating-effectively

Write your answer here


• It's a good idea to start the process of finding her replacement while putting some applicants
on hold.
• As a next step, I need to develop a survey for employees asking them about their jobs, how
they feel about working for our company, and what needs to change to improve conditions
for our organisation.
• The last phase is that, following the conclusion of the survey, I will have in-person meetings
with every employee to go over the results and discuss the fixes and modifications that will be
made.

A10.

Describe ICT industry code of ethics. How do we know whether something or not is ethical?

Answer using 50-100 words.

Resource:
• Code of Ethics
https://www.itpa.org.au/code-of-ethics/

Write your answer here


Because every business has slightly distinct codes of conduct and ethics, it relies on the organisation.
Therefore, it is best to constantly refer to the company's ethical policy when an employee is lost or
seeking additional information, regardless of whether it is ethical or not based on culture, country,
and policy.
The collection of guidelines has been created to help members and staff make wise professional
decisions while following ethical ideals and commitments. The ICT's forerunner should draught the
code of ethics.
According to the code of ethics, our members and staff are obligated to protect the privacy and
integrity of the computer systems they oversee for the good of everyone who uses and is impacted by
them. While IT professionals must always rely on their own professional judgement, we believe that
taking this code into consideration will be helpful when issues arise. There is no one set of principles
that could apply to the great diversity of situations and duties that exist.

Student Assessment Guide: ICTICT618 Version: v22.0 Page 20 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

A11.

How to distribute an update ethical code of conduct in an organization?

Answer using 50-100 words.

Resource:

• Implementing a code of conduct


https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
conduct/implementing

Write your answer here


Employees of an organisation should receive hard copies of the company's code of conduct and
informational sessions about it. New hires should be introduced to the organization's policies and
codes of behaviour as soon as they start working there. The procedure for disseminating updates to
the code of conduct should generally remain the same: it should be done through meetings and the
distribution of physical copies explaining the updates.

A12.

You have a customer who knows nothing about a technical product which he is buying. You have
found that he will buy any model you recommend. Is it your duty to sell her the most expensive
model in the store? Explain what is your ethical responsibility.

Answer using 50-100 words.

Resource:

• Implementing a code of conduct


https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
conduct/implementing

Student Assessment Guide: ICTICT618 Version: v22.0 Page 21 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

Write your answer here


Absolutely not; instead, we must advise them to purchase simple technological tools that are
affordable and durable and allow them to quickly learn what they want to do. To help people select
the model that best suits their needs, the distinctions between the models should also be highlighted.

A13.

a. What is the legislation that refers to privacy? What are the National Privacy Principles?
b. List 3 points of National Privacy Principles.
c. What you understand in terms of privacy to protect your “Personal information”?

Answer using 50-100 words.

Resource:
• Australian Privacy Principles
https://www.oaic.gov.au/privacy/australian-privacy-principles/
• ACS Privacy policy
https://www.acs.org.au/privacy-policy

a.
Write your answer here
Australian law, known as the Privacy Act of 1988 (Privacy Act), governs how personal information
about persons is handled. Information or an opinion that identifies a person or makes them fairly
identifiable is considered personal information.

b.
Write your answer here
There are 13 privacy principles in Australia, some of which include the following:
• Management of personal information in an open and transparent manner.
• Pseudonyms and anonymity
• gathering of requested personal data
• handling personal information that was not requested
• Notification of the gathering of personal data.

c.
Write your answer here
1. Information quality
2. Collection
3. Use and discloser

Student Assessment Guide: ICTICT618 Version: v22.0 Page 22 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

A14.

Assume that you are the technical support for an Internet Service Provider. You are visiting a
customer’s premises, on a speed complaint request. Upon testing, you find that the issue is with the
router your company provided. Your supervisor tells you to tell the customer that they might have
damaged the router and they need to buy a new router from the company. Would you charge the
customer for damaging the router? What should you do?

Write your answer in steps of actions you would take.

Answer using 50-100 words.

Resource:
• ACS Privacy policy
https://www.acs.org.au/privacy-policy
• Implementing a code of conduct
https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
conduct/implementing

• Write your answer here


I must lay the groundwork for efficient customer communication.
• Get to know the customer on a personal level and earn their trust.
• Express a sincere apologies for the issue that arose.
• Learn how the consumer utilised the item.
• You should clarify that this is not the proper use for the router, outline the proper use, and
help them comprehend that the router's malfunction is due to damage.
• Tell the consumer that if they damage the equipment, the company will replace it, but there
will be an additional fee and no shipping fee.

A15.

How the new or revised policy and procedures will be distributed or up-to-date?

Answer using 50-100 words.

Resource:
• Implementing a code of conduct
https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
conduct/implementing

Write your answer here

Student Assessment Guide: ICTICT618 Version: v22.0 Page 23 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

Employees of an organisation should be informed about new or updated policies and procedures
through communication meetings. The distribution procedure for policy changes should largely be the
same and take place through meetings.

A16.

How an organization should protect stakeholders' personal information to ensure continued


confidentiality and proprietary rights?

Answer using 50-100 words.

Resource:
• The Privacy Act
https://www.oaic.gov.au/privacy/the-privacy-act/
• Your right to privacy
https://www.servicesaustralia.gov.au/individuals/privacy
• Australian Federal Privacy Laws
https://privacy.org.au/resources/privacy-law/plawsclth/

Write your answer here


Like all other individuals, the personal information of stakeholders should be protected. Personal
information should only be gathered with consent and used for the specific objectives for which it
was obtained. If it is to be used for any other purpose, the stakeholder should be informed and given
the opportunity to express their opinion.

A17.

Visit https://www.acs.org.au/privacy-policy and assess the intention of ACS privacy policy.

Answer using 50-100 words.

Resource:
• ACS Privacy policy

Student Assessment Guide: ICTICT618 Version: v22.0 Page 24 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

https://www.acs.org.au/privacy-policy

Write your answer here


The Australian Privacy Principles, which are part of Schedule 1 of the Privacy Amendment (Enhancing
Privacy Protection) Act 2012, which amends the Privacy Act 1988, serve as the foundation for this
privacy policy.Personal information is treated in the utmost trust by ACS since protecting it is crucial
to them.
Only the purposes for which they were acquired or the ways in which the provider has granted ACS
permission to use them are utilised for personal information.
In order to:
a) offer members a wide range of membership products and services as well as helpful information
about pertinent products and services from ACS and appropriate ACS contracted third parties;
b) fulfil its role as an organisation that conducts "Skills Assessment for Migration,"

A18.

Describe how to manage privacy complaint?

Answer using 50-100 words.

Resource:
• ACS Privacy policy
https://www.acs.org.au/privacy-policy

Write your answer here


As soon as possible after receiving the complaint, acknowledge receiving it. Even if the complaint calls
for additional research or will be handled informally, a fast acknowledgement of receipt can lay the
groundwork for fruitful dialogue with the complainant.
-To make sure you completely get the complainant's stance, ask them questions or give them a
summary of how you interpret the situation.
-Building trust with a complaint personally through telephone or, when necessary, face-to-face
contact is essential for advancing the resolution process. For instance, calling a complainant before
sending them a letter with a disappointing judgement can assist them manage their disappointment
and improve the likelihood that they will be more accepting of the outcome.

Student Assessment Guide: ICTICT618 Version: v22.0 Page 25 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

A19.

Describe the importance of disseminating your code of ethics throughout the organisation.

Answer using 50-100 words.

Resource:

• Implementing a code of conduct


https://www.business.qld.gov.au/running-business/employing/taking-on-staff/staff-code-
conduct/implementing

Write your answer here


The best means to inform the workforce of long-lasting changes inside an organisation are through
internal training and communications, given through various tools and channels. Our initial goal must
be clear: we must engage and inspire our employees to accept new behaviours and regulations that,
in most circumstances, would disturb their daily lives.
When a code of conduct is put into place at work, all employees must be informed of its rules and
norms, and any relevant training must be given to make sure they are familiar with it. Management
should model the code for employees by practising it and promoting it.

A20.

How can you secure a system? Explain the password setup procedure

Answer using 50-100 words.

Resource:

• 8 easy steps to secure your computer


https://privacy.net/how-to-secure-your-computer/

Write your answer here

Student Assessment Guide: ICTICT618 Version: v22.0 Page 26 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

By concentrating on software and security updates, systems can be safeguarded. A firewall that
serves as a barrier between a computer and a network can be enabled.
Use of a virtual private network (VPN) is a great way to set up protection for online browsing.
Encrypt Data: Encrypt Data will concentrate on protecting computer files and web traffic
communication.

The following steps must be followed in order to set up a password:


Click on Settings after choosing Start, then sign in choices after clicking Settings.
Then choose a new password or enter an existing one, and click on the password option. You can then
change your password or reset it if you've already chosen one. It's important to use a password
management tool and to store passwords in both the most secure way possible on both a
professional and personal level.

Student Assessment Guide: ICTICT618 Version: v22.0 Page 27 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

C. Task 2 – Project Case Study

i. Instructions for students


Task 2 of this assessment requires you to undertake project were you analyse legislation and standards
and contribute to the review of at least three different policies including IP, ethical conduct and privacy
in an organisation, communicate policy change to required personnel, manage adherence to IP
regulation, manage ethical behaviour, manage privacy

You need to complete 1 part

Task 2 is structured into the 1 part below:

• Project Activities

Important resources for Task 2

To complete Task 2, undertake your own research and refer to the information provided in the following
documents available on Moodle:

• Assessment Resource – ICTICT618

Student Assessment Guide: ICTICT618 Version: v22.0 Page 28 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

ii. Task2 – Project Activities


Task 2, Part A of this assessment requires you to analyse legislation and standards and contribute to the
review of at least three different policies including IP, ethical conduct and privacy in an organisation,
communicate policy change to required personnel, manage adherence to IP regulation, manage ethical
behaviour, manage privacy.

Answer the questions below using the space provided:

• Answer all parts of each question


• Use your own words and give examples wherever possible
• The quality of your answer is more important than how long it is
• Enter your answers in this document

You may use various sources of information to inform your answers, including your resources provided
by ACBI, books, and online sources. You must acknowledge and cite your sources.

Activity 1: Manage privacy

Case study:

You are designing a database management system for the personnel office for your company.
The system will store extremely sensitive information such as performance evaluations, medical
records for filing insurance claims, salaries, and so forth. With weak security, employees
working on client machines may be able to figure out ways to get access to this data, not to
mention the possibility of on-line access from hackers. You feel strongly that the system should
be much more secure. However, the CEO, director of computing and director of personnel all
agree that less security will do since it is going to very expensive to build high security system.

Resource:

• The Privacy Act


https://www.oaic.gov.au/privacy/the-privacy-act/
• Australian Privacy Principles
https://www.oaic.gov.au/privacy/australian-privacy-principles/
• ACS Privacy policy
https://www.acs.org.au/privacy-policy
• Privacy Policy
https://managedapp.com.au/privacy-policy
• Privacy Policy
https://technologyonecorp.com/privacy-policy

Student Assessment Guide: ICTICT618 Version: v22.0 Page 29 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

1. Write at least 3 privacy policies to ensure the integrity, confidentiality, security and
availability of information and adhere to current privacy legislation.

Write your answer here


Australian privacy rules require organisations and government entities to disclose or use personal
information only for the purposes for which it was obtained, including direct marketing.
The privacy statute of 1988 and the privacy protection framework include Australian privacy concepts.
Respond to the private act's organisation or agency. It addresses the following rights, obligations, and
standards:
- Information collection, disclosure, or use
- Accountability or agency governance
- Correction or integrity of personal information
- Individuals' right to access information.

Agency or organisation of the privacy legislation must adhere to the Australian privacy concept. It
includes organisations with a yearly revenue of more than $3 million that are government agency.
Personal information that has been sought may be collected in accordance with Australian privacy laws,
according to this statement. The acquisition of private or sensitive information is where it is most
relevant.
Direct marketing: Under certain conditions, an organisation may share personal information for direct
marketing.
Notification of collecting personal data: This statement explains that ABP is required to acquire personal
data and that it was necessary to notify the individual by disclosing particular information.

2. By not implementing high security in the system, is the CEO breaching the Privacy law? Justify
your answer with examples.

Write your answer here


It is then up to the CEO to decide how effective a security system he wants to create. As long as the
security complies with the standards, there won't be a breach. Employees should be informed about the
security system in use when they start working for the organisation. After receiving this information,
they can decide whether or not they want to use that system at work.

As sensitive information, the CEO is required by privacy law to maintain security measures.

3. Name the privacy act that applies to your state and explain how can companies maintain
privacy policies?

Write your answer here


Australia's Privacy Act of 1988 governs how personal information about persons is handled. The

Student Assessment Guide: ICTICT618 Version: v22.0 Page 30 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

handling of personal information is governed by this law. Companies must abide by the Privacy Act, but
they are responsible for implementing any additional security measures beyond the minimum
requirements.

Activity 2: Manage adherence to IP regulations, Copyright, ethical behaviour and privacy

CyberTech Case Study

CyberTech is a very young cybersecurity company which was established in Sydney, Australia in
2019. A youthful organization, enthusiastic, optimistic and accessible which believes in quality
software solutions that can change the world for the better. CyberTech usually offers number
of cybersecurity solutions for corporate and different industries.

CyberTech has very targeted mission - “To be the dominant cybersecurity solutions provider in
Australia by 2023, and be positioned to be a global player thereafter".

As a growing organization CyberTech is facing number of challenges every day. To manage


intellectual property, copyright, ethics and privacy ICT resources is one of the biggest
challenges.

CyberTech decides to appoint a project management team to develop and manage intellectual
property, copyright, ethics and privacy policy for IT environment. CyberTech’s governing body
found that in the last few years, there are number of copyright and policy breaching incidents
by staff members and contractors. The company is very keen to develop a standard code of

Student Assessment Guide: ICTICT618 Version: v22.0 Page 31 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

ethics, intellectual property, copyright and privacy policy for everyone in the organization.

In order to manage intellectual property, copyright, ethics and privacy in ICT environment
project team needs to assess current ICT industry requirements and governing bodies
legislation. Student needs to follow Australian Copyright Law, ACS (Australian Computer
Society) Code of conduct, The Commonwealth ACT, and CyberTech requirements.

Students need to read assessment background information and understand Australian


Copyright Law, ACS (Australian Computer Society), The Commonwealth ACT, Australian
Government IP code of ethics and policies which can ensure standard code of conduct, ethics,
copyright and privacy for CyberTech.

Assessment Task Research Activities:

In order to understand the assessment task student may need to search for the following
information:

1. Assess current Australian IP and copyright law and ensure that implies in your
organization IT environment
2. Ensure that team members are aware of Australian IP and copyright law and how it
affects their work
3. Institute measures to ensure that Australian IP and copyright law is not breached
4. Institute regular reviews to ensure organizational Australian IP and copyright law
requirements are up-to-date and team members are adhering to these requirements
5. Develop appropriate code of ethics, both organizational and IT-specific
6. Acquaint team members with ethical requirements
7. Institute regular reviews of team member's ethical work practices and feedback to
ensure correct application of the code
8. Implement new work procedures according to review plan
9. Ensure that stakeholders are aware of ethics code, and adjust appropriately following
stakeholder feedback
10. Institute regular reviews of stakeholder understanding and application of code of
ethics legislation and standards to organizational outcomes, the organization's privacy policy
and procedures.

Resource:

• IP Australia
https://www.ipaustralia.gov.au/
• Australian Intellectual Property laws

Student Assessment Guide: ICTICT618 Version: v22.0 Page 32 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

https://www.austrade.gov.au/International/Invest/Guide-to-investing/Running-a-
business/Understanding-Australian-business-regulation/Australian-Intellectual-
Property-laws
• Intellectual Property
https://business.gov.au/Planning/Intellectual-Property
• Intellectual Property explained
https://business.gov.au/Planning/Intellectual-Property/Intellectual-Property-explained
• Short Guide to Copyright- Attorney-General's Department:
https://www.ag.gov.au/RightsAndProtections/Documents/ShortGuidetoCopyright-
October2012.pdf
• Infringement: Action, Remedies, Offences & Penalties:
http://www.copyright.org.au/acc_prod/ACC/Information_Sheets/Infringement__Actio
n__Remedies__Offences___Penalties.aspx?WebsiteKey=8a471e74-3f78-4994-9023-
316f0ecef4ef
• Australian Computer Society
https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Professional-
Conduct_v2.1.pdf

Student needs to complete the following task:

1) Manage Intellectual Property and Copyright Policy

• Intellectual Property and Copyright Act


• Duration of Copyright and Infringement
• Copyright law for Information Technology organisation
• Copyright infringement policy
o The Internet
o Music
o Picture/Images
o Trademarks and Logos
• Manage your own work (Plagiarism)
• Inform stakeholders copyrights update and review information

2) Manage Ethical Behaviour


▪ Contractor Code of ethics
▪ Staff and organization code of Ethics
▪ Grievance procedure and confidential reporting
▪ Action against breaching ethical conduct
▪ Reporting template to record ethical incident

3) Manage Privacy Policies

Student Assessment Guide: ICTICT618 Version: v22.0 Page 33 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments


Complaints Management Policy

Electronic Collaboration and Social Media Policy

Email and Messaging Policy

Information Security Policy

Internet Use Policy

IT Conditions of Use Policy

IT Infrastructure Policy

IT Security Policy

Website privacy notice.

Manage Intellectual Property and Copyright Policy


Write your answer here
Copyright act: In accordance with the Copyright Act, the original expression of an Idea is protected as
long as it is documented. It safeguards writings on advertising, movies, and music.

Duration of copyright and infringement: Copyright is in the context of successful theatrical, literary,
artistic, and musical works for the author's lifetime plus an additional 70 years as perspective 33. The
protection period is computed from the author's death at the end of the calendar year and any
subsequent work caused by illness or by an unknown author that was first made public before January
1st, 2019.

Copyright laws for organisations: Under the Fair Dealing exceptions, students are permitted to copy
copyright material, especially while doing the following:
A student may copy a "reasonable portion" of copyrighted items for private study or research, such as
10% of a work, 1 chapter, or 1 article from a journal issue (or more if they relate to the same research
topic or course of study).
Copyright work may be duplicated for inclusion in, for example, an essay, conference paper, or journal
article in order to remark critically on the material. This is known as fair dealing for review or critique.
Unless the author is unknown or has authorised or instructed that they not be cited, any such use
should include the work's title and author.

Copyright infringement policy: CyberTech anticipates that its staff will use protected content
responsibly. Additionally, we promote staff education on copyright compliance among their peers.
Please notify the person involved as well as our Director, who serves as our copyright compliance
officer, if any employee notices what they believe to be a copyright violation. Employees who unlawfully
copy works protected by copyright may face disciplinary action, including termination.

The Internet: Internet content is shielded by copyright legislation. The usage of the internet grants you
an implied permission to visit websites, link to them from outside websites, and print content for your
own use. The majority of websites provide a copyright statement or terms and conditions outlining the
parameters of the licence given to users. Material obtained through the internet should not be used for
any other purpose without express permission from the copyright owner, with the exception of any fair
dealing for personal use or educational use, as permitted under the Copyright Act and the CyberTech's
statutory licences.

Music: Includes song lyrics, jingles, and incidental music, whether in the physical form of sheet music,

Student Assessment Guide: ICTICT618 Version: v22.0 Page 34 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

broadsheets, or other notation; and musical scores for opera, operetta, symphonic, ensemble, band,
and other musical performances.

Pictures: The law permits teachers to exhibit copyright-eligible content for students in non-profit, face-
to-face classroom settings without restriction. (Without this exclusion, displaying items in a classroom
would constitute a public exhibition that would call for money and/or permission.)

Trademark Logo: Unless it is for editorial or informational purposes, such as when a logo is featured in a
written article or is a part of a comparative product statement, you need permission to use a logo.

Plagiarism: According to the 1968 Copyright Act, the author is granted full ownership of their creations.
Paraphrasing is a form of plagiarism that involves taking someone else's ideas and rephrasing them.
There is a risk that the author of the original work may file a lawsuit to defend their intellectual property
rights in cases of plagiarism.

Inform stakeholders to review and update information: Because of out-of-date or confusing laws,
many educational institutions' libraries and cases of recent difficulty using copyright material. It is
guaranteed that institutions in the Australian community can reasonably access content in accordance
with changes and the Copyright Act of 1968. Additionally, it's critical to ensure that university search
engines and libraries can abide by the requirements set forth in order to minimise online copyright
infringement.

Manage Ethical Behaviour


Write your answer here
There are several characteristics that are mentioned below that can help manage ethical behaviour in
cybertech:

Code of ethics for contractors:


1. To provide goods and services that are in line with the practical and financial requirements of
stakeholders.
2. Knowledge of pertinent norms and legislation;
3. Do not misrepresent abilities or knowledge.
4. Respect, items, receive orders, and address proprietary
5. Inform guests about a proposed project service or product.
6. Take responsibility for your job
7. Respect your colleagues' professional judgement in your areas of expertise

Staff and organisations code of ethics:


Encourage co-workers of chair employee to continue their professional development by providing
support for raining educational professional development that takes into account each professional's
unique needs. Continue to improve their knowledge and skills. Raise awareness of issues affecting their
profession.

Grievance procedure and confidential reporting

Student Assessment Guide: ICTICT618 Version: v22.0 Page 35 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

Informal procedure: In cyber tech, the management will talk with the individual who is the target of the
complaint about the problem. The line manager will arrange a meeting between the parties to settle the
problem and continue.
Formal procedure: this entails an official investigation of the complaint. First, an enquiry will be
conducted by gathering historical data and then locating current data.
If the person in question is unhappy with the results of the formal investigation, they can appeal to the
organization's HOD.
External mediator: The grievance may be referred to an external mediator if everyone involved in the
dispute agrees that one is necessary.
Confidentiality: In terms of cyber technology, the confidentiality will be upheld by the human resource
management. In order to maintain fairness and address complaints, there will be interaction with
employees and workplace participants. Employees who have filed a complaint as well as all other
participants and employees at the workplace are expected to respect confidentiality. The complainant
will speak with the appropriate support representative about their complaint. The customer service
worker must uphold element confidentiality.

Action against breaching ethical conduct


Temporary reassignment or suspension: In the event of a suspension or poor performance, the
delegation may opt to allocate the employee to another task or suspend them from doing their current
one. The following are some of the elements that influence the decision:
• The seriousness of the alleged violation
• The maintenance of an efficient work force or cohesiveness affecting the employed in a certain
workplace.
• The integrity and standing of the APS and the employee agency
• Termination of employment: This more severe measure is suitable
• The delegate has determined that the employee's continued employment in the organisation is no
longer desirable
• The employee has rejected a fundamental component of the employment relationship.

Manage Privacy Policies


Write your answer here
Complaint management policy

Universities aim to handle concerns in a just and open way.


There are two options for complaint settlement.
Informal Complaint- University and college staff members can handle unofficial complaints by getting in
touch with the complainant informally.
Formal Complaint - A formal complaint procedure is used when a situation is serious or complex and
cannot be settled formally.
Social media policy and online collaboration.
Australian social media policy is based on detailed instructions that the government has posted on the
National Library of Australia website.
Be mindful: Personal assaults on contributors and staff members are checked online by real people.
Avoid posting any private information on social media to protect your privacy. Subject to the 1980
Privacy Act, which mandates adherence to the Australian Privacy Principle
Keep the conversation relevant to the original post; while people may focus on questions and

Student Assessment Guide: ICTICT618 Version: v22.0 Page 36 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

discussions, this is vital.


Respect copyright: In accordance with this legislation, only creative work that is unique and protected by
intellectual property rights may be posted.

E mail and messaging policy:


The Spam Act of 2003 governs email and messaging policies.
According to the law, every commercial message must contain an unsubscribe option that is
available, with instructions, and functioning for five working days after the message's delivery.

Information security policy:


Cybertech needs to put an emphasis on ethical business practises that respect employees' and
customers' rights to privacy. In Australia, the Cyber Crime Act of 2001 modifies and oversees the
legislation pertaining to software offences and data security.

Internet use policy:


Cyber technology must be used responsibly, and organisations are accountable for their activities based
on how they use their current system and network equipment.

IT conditions of use policy:


• This policy is focused on outlining specific guidelines for information technology branches like
cybertech when using information:
• Not to disseminate offensive content or materials that are illegal or restricted
• Stores and disseminates information that violates her privacy and denigrates her reputation.Any
work protected by copyright or other objective intellectual property rights that contains
confidential information
• Access another person's account by using their name, password, or username.
• Affect the network system's integrity or security

IT Infrastructure policy:
• The content that cybertech makes available on internet services needs to be explicitly identified.
The content cannot be distributed or used in accordance with the National Classification Court's
or the relevant industry code's applicable classification requirements.
• Cybertech organisations are required to protect the security of their internet services under IT
security policies.
• It offers defence against unlawful third-party use of the service.
• There are suitable security precautions, such as installing a firewall or installing antivirus
software.

Website privacy notice


According to Australian privacy laws, Cybertech was obligated to make a private statement on their
website and to stably gather any data pertaining to website visitors or customers. A privacy notice is a

Student Assessment Guide: ICTICT618 Version: v22.0 Page 37 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

chance to let potential clients and website visitors know that the company is reputable and that they
should be concerned about their privacy and the security of their personal information.

Activity 3: Present and obtain feedback and sign-off from required personnel

In this part of the assessment activity, you are required to present and obtain the sign-off from the
required personnel.

Presentation may be between 3-5 mins. You will provide a link to the presentation video for the
assessor to observe. Each student will individually present, recorded and submitted this activity.

During the presentation you will be required to demonstrate effective interpersonal and
communication skills including:

• Speaking clearly and concisely


• Using effective non-verbal communication skills to encourage audience interest
• Asking questions to seek feedback

Your task

In the presentation, you will explain the Intellectual Property and Copyright Policy, Code of ethics,
Ethical Behaviour, Privacy policies to required CyberTech personnel [your classmate will assume role
of CyberTech personnel]

You will record the presentation. You can use a phone or other recording device to record your
presentation.

Request feedback and obtain sign-off from relevant personnel.

Note for student:

• You can upload video to Google drive, Dropbox or other cloud services.
• Provide screenshot of you conducting the program.
• Do not delete the link until you have received grade for the unit.

You must record all responses correctly to the template provided below.

Resource:

Student Assessment Guide: ICTICT618 Version: v22.0 Page 38 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

• Assessment Resource- ICTICT618: CyberTech organisational documents - Activity Sign-off


template

PowerPoint slides screenshot or submit as attachment in zip file.


Write your answer here
Document Attached

Video Link
Write your answer here

Sign-off document ] can copy the document in the space below or submit as attachment]
Write your answer here
Document Attached

Submission Instructions

Please proofread your work and include ICTICT618 – A1 - Your Name in the document header.

Submission Document Checklist:

• Student Assessment Guide ICTICT618


• Other assessment related documents in zip folder.

Make a copy of your assessment.

Submit your completed assessment to your Tutor/Assessor for marking via the eLearning Platform –
Moodle using the following file name: ICTICT618 – A1 Your Name

Student Assessment Guide: ICTICT618 Version: v22.0 Page 39 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

4. Student Checklist
Student name: Ajay Yadav

Unit of Competency: ICTICT618 Manage IP, ethics and privacy in ICT environments

Assessment and marking criteria:


The Trainer & Assessor is to place a tick ‘✓ ’ in appropriate column for each criteria for Satisfactory (S)
or Not Satisfactory (NS) assessment

Task 1 – Short Answer Knowledge Questions

Yes
Short Answer Questions Comments

Did the Candidate:

A1. Identify and explain federal and state or territory


legislation and policy relevant to an ICT environment
relating to: access and equity, copyright and
intellectual property, workplace health and safety
(WHS), privacy. Answer using 50-100 words.
A2. What are the 4 types of intellectual property?
Answer using 50-100 words.
A3. Explain common creative, fair dealing and open
source in terms of copyright. What are the materials
are exempted from copyright policy? Answer using
50-100 words.
A4. What are the rights of a copyright owner? How
long does copyright protection last in Australia?
Answer using 50-100 words.
A5. What are the procedures should be undertaken
to manage organisational copyright requirements are
up-to-date and team members are adhering to these

Student Assessment Guide: ICTICT618 Version: v22.0 Page 40 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

requirements? Answer using 50-100 words.


A6. How the updated versions of copyright law will be
distributed? Answer using 50-100 words.
A7. What is the Australian Computer Society code of
ethics? Describe the importance of code of ethics in
ICT environment. Answer using 50-100 words.
A8. How to ensure all the members and staff in an IT
organization aware and understand companies code
of ethics? Answer using 50-100 words.
A9. You are the customer support manager for a
small software manufacturer. The newest addition to
your 10-person team is Sofia, a recent college
graduate. She is a little overwhelmed by the volume
of calls, but is learning quickly and doing her best to
keep up. Today, as you performed your monthly
review of employee email, you were surprised to see
that Sofia has received several messages from
employment agencies. One message says, “Sofia, I’m
sorry you don’t like your new job. We have lots of
opportunities that I think would much better match
your interests. Please call me, and let’s talk further.”
You’re shocked and alarmed. You had no idea she was
unhappy, and your team desperately needs her help
to handle the onslaught of calls generated by the
newest release of software. If you’re going to lose her,
you’ll need to find a replacement quickly. You know
that Sofia did not intend for you to see the email, but
you can’t ignore what you saw.
Should you confront Sofia and demand to know her
intentions? Should you avoid any confrontation and
simply begin seeking her replacement? Could you be
misinterpreting the email? What should you do?
Write your answer in steps of actions you would take.

A10. Describe ICT industry code of ethics. How do we


know whether something or not is ethical? Answer
using 50-100 words.

A11. How to distribute an update ethical code of


conduct in an organization? Answer using 50-100
words.
A12. You have a customer who knows nothing about
a technical product which he is buying. You have
found that he will buy any model you recommend. Is
it your duty to sell her the most expensive model in
the store? Explain what is your ethical responsibility.
Answer using 50-100 words.

Student Assessment Guide: ICTICT618 Version: v22.0 Page 41 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

A13. a. What is the legislation that refers to privacy?


What are the National Privacy Principles? b.List 3
points of National Privacy Principles. c. What you
understand in terms of privacy to protect your
“Personal information”? Answer using 50-100 words.
A14. Assume that you are the technical support for an
Internet Service Provider. You are visiting a
customer’s premises, on a speed complaint request.
Upon testing, you find that the issue is with the router
your company provided. Your supervisor tells you to
tell the customer that they might have damaged the
router and they need to buy a new router from the
company. Would you charge the customer for
damaging the router? What should you do? Write
your answer in steps of actions you would take.
Answer using 50-100 words.
A15. How the new or revised policy and procedures
will be distributed or up-to-date? Answer using 50-
100 words.
A16. How an organization should protect
stakeholders' personal information to ensure
continued confidentiality and proprietary rights?
Answer using 50-100 words.
A17. Visit https://www.acs.org.au/privacy-policy and
assess the intention of ACS privacy policy. Answer
using 50-100 words.
A18. Describe how to manage privacy complaint?
Answer using 50-100 words.
A19. Describe the importance of disseminating your
code of ethics throughout the organisation. Answer
using 50-100 words.
A20. How can you secure a system? Explain the
password setup procedure. Answer using 50-100
words.
Task 2– Project Case Study
Project Activities Yes
Comments
Did the Candidate: ✓
Activity 1: Manage privacy

1. Write at least 3 privacy policies to ensure the


integrity, confidentiality, security and availability
of information and adhere to current privacy
legislation.
2. By not implementing high security in the
system, is the CEO breaching the Privacy law?

Student Assessment Guide: ICTICT618 Version: v22.0 Page 42 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTICT618 Manage IP, ethics and privacy in ICT environments

Justify your answer with examples.


3. Name the privacy act that applies to your state
and explain how can companies maintain privacy
policies?
Activity 2: Manage adherence to IP regulations,
Copyright, ethical behaviour and privacy

Manage Intellectual Property and Copyright


Policy
Manage Ethical Behaviour

Manage Privacy Policies

Activity 3: Present and obtain feedback and sign-off


from required personnel

• PowerPoint slides
• Video Link
• Sign-off document

Student Assessment Guide: ICTICT618 Version: v22.0 Page 43 of 43

Developed by: ACBI Approved by: DoS Issued: Dec 2022 Review: Dec 2023

You might also like