ICTICT418 Contribute Copyright Ethics Privacy in an ICT Environment

ICTICT418 Contribute Copyright Ethics Privacy in an ICT Environment

ICTICT418 Contribute Copyright Ethics Privacy in an ICT Environment

This subject describes the performance outcomes, skills, and knowledge needed to maintain professional and ethical conduct as well as to ensure that personal information of stakeholders is handled in a confidential and professional manner when dealing with stakeholders in an Information and Communication Technology environment.

This assessment is divided into four parts:

1. Assessment Task 1 – Short Answer Questions
2. Assessment Task 2 – Project
3. Assessment Task 3 – Project
4. Assessment Task 4 – Project

Here, you will find guidance to complete each assessment.

Assessment 2 (Project)

To complete this assessment task, you will be provided a case study.

A project is designed to evaluate how well you can apply the knowledge and skills that you’ve acquired. Read the following tips to help you to complete the project:

1. Read through the whole project before getting started and make sure that you understand what it is that you are required to do.
2. You have been given certain sources of information (List of IT Companies and links). If you have any questions, discuss them with your trainer or assessor.
3. Plan out how you are going to tackle the project.
4. Use the documentation principles that you have learned throughout this course when completing reports and other documents.
5. When creating the project report, should be properly structured and should be clearly written using plain English and avoid the use of jargon, use non-discriminatory language and there should be at least 1000 words.

Ensure that you have included and detailed all the points in your task list below.

Task

Complete the following tasks to develop a code of ethics for Plug it in:

1. From the list of ICT companies provided below select six companies and review their code of conduct via their website. Once you have reviewed their code of conduct you are required to complete the table below. Mention 3 codes of conduct listed for each company on their website. According to you what other codes of conduct that can be added (there should be at least 3 points per company)

Organisation and link

Codes of Conduct (list minimum 3)

Other Codes of conduct which you think can be added (list minimum 3)

 

 

 

 

 

 

 

2. Analyse the results of table above and use the results to write a code-of-conduct for ICT use in your own words for the Plug it in company which address adequately the codes like privacy, IP-Intellectual Property, copyright, Security, Confidentiality, Honesty, Competence, Professionalism, Professional Development, The Primacy of the Public Interest, The Enhancement of Quality of Life etc. Make use of positive elements that you identified during the task1.

3. Ensure that your code of ethics that you developed above adheres to the relevant legislation. For your reference, we have provided with examples of many of the legislation below. You could refer to other legislation also which is relevant to your code of ethics you developed.

4. Write a report summarising your rationale for each element in the code-of-conduct. Include the legislation that you referred to and why.

ICTICT418 Assignment Help, Contribute to Copyright, Ethics and Privacy in an ICT Environment Assignment Help, ICTICT418

Assessment 3

This assessment is based on Assessment 2 Project Report.

Tasks

Use the code-of-conduct that you developed in Assessment 2 to write an implementation plan for Plug it in. You need to include the following in your plan:

a. A strategy for implementation of the code.
b. A strategy for monitoring legislative changes.
c. A strategy for ensuring that all stakeholders continue to understand and apply the code of ethics.
d. A review and grievance procedure which facilitates the confidential reporting of any ethical issues.
e. A set of interview questions that you could use to check that stakeholders are receiving consistent and appropriate service in dealing with the code of ethics.
f. A strategy for distributing new or revised policies and/or procedures to stakeholders and confirming that they have received and understood them and getting feedback from them.

Assessment 4

Tasks

Protection of an organization’s IP and copyright is critical to the on-going success and survival of any business. This is no less true in ICT than in any other industry.

1. Research a case where an organization’s IP has been lost or stolen or its copyright infringed. You can choose any topic of your interest. For example, someone copying the patented logo, process or software of a company, a copyrighted movie being uploaded on the internet, an employee stealing a laptop from the company he works etc. You are asked to get approval from your trainer to see whether the case that you choose is appropriate. After getting the approval write a Copyright report addressing the following questions:

a. What happened?
b. What legislation was infringed?
c. What impact did this have on the business?
d. How might the company have prevented what occurred?
e. If you are able to access the organization’s copyright policy, was there a conflict with the policy that caused this issue?
f. What was the end result?
g. How would you ensure that you don’t infringe copyright in your work?

2. Research a case where an organization has allowed their clients’ personal information to be accessed illegally. You can choose a relevant topic of your own. For example exchanging of customers contact details with telemarketing companies by other firms, disclosing of your medical report to others without your consent etc. You are asked to get approval from your trainer to see whether the case that you choose is appropriate.  After getting the approval write a Privacy report addressing the following questions:

a. What happened?
b. What legislation was infringed?
c. What impact did this have on the business?
d. How might the company have prevented what occurred? What do you think went wrong with their work practices?
e. How did this incident conflict with the organization’s privacy policy?
f. What was the end result?
g. How would you ensure that you protect personal and other sensitive information as a future employee?

Challenges students may face in this assessment completion

Students may face several problems in completion of this assessment like deficiency of time, understanding the complicated process of ICT assignment, for such students, OZ Assignments provide tutorial help and academic guidance to get resolve students’ problems. By getting our technical experts’ help students can excel their academic grades.

Note: The given price is only for a particular part of this assignment.