You are on page 1of 10

1. In your own words, how do you understand the Australian Computer Societies “Code of Ethics”?

No more than 50 words.


Code of Ethics is a guide of standards intended to help experts direct their business morally. ACS, one should
support the polished methodology. Other than being a productive member of society and keeping the law, we
should follow some general public qualities:
o priority
o Honesty
o Competence
o Information technology Professionalism
o The enhancement of quality of life
o Standard of conduct
o The primary of the public interest
o Professional development

2. Using Google, find three (3) news ICT stories about privacy infringement, write no more than 500 words
about the infringement, repercussions and effected Australian Privacy Policy. What impact do you think
this has on professional ethics?
a. Location Tracking

A huge bit of the web customers happily moves their electronic media posts highlighting
their current region close by naming friends and family. It's fun and stimulating to give your life
events to friends and family, yet this data doesn't remain restricted to your ordinary group in a
manner of speaking. This identical data is taken care of on the electronic media page you are
using and stays there consistently, oftentimes without you knowing (anyway you may have given
consent through a terms and organizations course of action). Close by online media applications,
Google Maps and different applications in like manner demand your zone and by turning on your
zone you are giving direct information to the world about where unequivocally you are and what
your best strategy is, which is certainly risky and inconsistent

b. Information Mishandling

There are various districts on the web that need your own information to acquire induction to
their organizations. These objections oftentimes store treats and save your own information and
later use it for various purposes. As a general rule this information isn't encoded and can be
gotten to by anyone. This abusing of individual information may incite certifiable outcomes. The
high level example of e-banking and e-business passageways have expanded the perils related
with online security. By sharing your bank nuances and imperative records on the web, you are
clearing ways for cheats and making yourself frail against cybercriminals.

The Privacy Act 1988 (Privacy Act) covers relationship with a yearly turnover of more than $3
million and working in Australia, and some various affiliations. If the online relational association
you use is such a relationship, by then the individual information you share on it is made sure
about by the Privacy Act. Such affiliations join Facebook, Instagram, Twitter, Snapchat and
LinkedIn.
A couple of components go into picking if an affiliation works in Australia, remembering for the
occasion that they have a presence in Australia or carry on a business in Australia.

You should similarly observe that the Privacy Act doesn't cover individuals acting in an individual
breaking point. This infers you generally can't approve a security straightforwardly against an
individual. Regardless, you may have rights under various laws, for instance, copyright or insulting
laws.

It is of most extraordinary criticalness to respect the constraints of others. Powerful cantered


around promoting isn't gladly received in online media. Your motivation for being a bit of the
organization is to give others the benefit of your experience and to create relationship with
various people from your area.
c. Spying and Snooping

Exactly when you are on the web, you are spied by a couple of trackers for various
purposes. Trackers track your interest history and track all your online activities through various
strategies. This gives them an away from of what your personality is and your tendencies, which is
an enter of online security methodology and makes you a public property. Usually, this after is for
advertisement purposes just and it grants marketing specialists to show advancements according
as you would prefer and interests. However, at times this information is used by cybercriminals to
do unapproved and criminal activities taking a risk with your online presence.

3. Fill out the following table

What is it? Brief Description State/Federal


What does it legislation and
protect? policy
access and Access and They will be reflected in how choices Access and equity
equity value are ideas are made about who is qualified for policy exist for
against which an administration, how assets are different
legislation
all distributed, how the requirements
administrations of individuals from different
ought to be foundations are met.
estimated.
copyright A simple Copyright is the elite right given to Copyright Act
definition of the maker of an innovative work to 1968 - Federal
copyright is duplicate the work, as a rule Register of
that it is a temporarily Legislation
bunch of
rights in In the event that you are not the
certain proprietor of copyright, you hazard
creative
encroaching copyright in the event
works such as
that you perform one of these
text, artistic
works, music, selective demonstrations without
computer acquiring the consent of the
programs, copyright proprietor. You should
sound consider copyright when you
recordings acquire or make duplicates of things
and films from the Library's assortment to re-
use them in some open manner.
Copyright
does not
protect ideas,
concepts,
styles or
techniques.
For example,
copyright will
not protect an
idea for a film
or book, but it
will protect a
script for the
film or even a
storyboard for
the film.
intellectual intellectual
property properties is a The primary motivation behind IP legislation
classification ofintellectual property law is to
property that empower the making of a wide
incorporates assortment of scholarly
theoretical merchandise. To accomplish this,
manifestations the law gives individuals and
of the human organizations property rights to the
insight data and scholarly merchandise they
make, ordinarily for a restricted
(immaterial timeframe. This gives monetary
property that is motivation for their creation, since it
the aftereffect permits individuals to benefit from
of imagination, the data and scholarly merchandise
for example, they make. These monetary
licenses, impetuses are relied upon to
copyrights, and animate advancement and add to
so forth) the mechanical advancement of
nations, which relies upon the
intellectual degree of security allowed to
properties law pioneers
secures various
rights that
identify with
manifestations
and creative
activities,
everything
being equal.
For the most
part, these
works are the
innovative
works of
writers,
craftsmen,
designers,
artists,
musicians, and
other
comparative
individuals.
workplace Work place Work Health and Safety (WHS) is Work Health and
health and Health and important health and safety Safety Act 2011
safety (WHS) Safety (WHS) is regulations for the workplace
the request that businesses must follow. . WHS
stressed over involves the assessment and
making sure mitigation of risks that may impact
about the the health, safety or welfare of the
prosperity and workplace. This may include the
security of all health and safety of customers,
accomplices in employees, contractors, volunteers
the workplace and suppliers. Examples of common
from practices in work health and safety
receptiveness include:
to perils and  Providing a safe workplace
risks coming  Assessing the workplace
about on layout and providing safe
account of systems of work
work works
out.

It makes sure
about the
prosperity,
security and
government
help of all
experts at
work. It also
guarantees the
prosperity and
security of any
leftover people
who might be
affected by the
work.
Privacy is the When something is private to The Privacy
privacy capacity of an a person, it usually means that Act 1988
individual or something is inherently special or
gathering to sensitive to them. The domain of
disconnect privacy partially overlaps
themselves, or with security, which can include the
data about concepts of appropriate use, as well
themselves, as protection of information. Privacy
and in this may also take the form of bodily
manner integrity. The right not to be
communicate subjected to unsanctioned invasions
specifically. of privacy by the government,
corporations or individuals is part of
shield many countries' privacy laws, and in
ourselves from some cases, constitutions.
inappropriate
obstruction in
our lives, which
permits us to
arrange what
our identity is
and how we
need to
interface with
the world
around us.

4. Fill in the blanks - Register Copyright and protect your creative works and innovations for lifetime in 176
countries by Notary deposit. Our Copyright deposit service is based on international Bern Convention
gathering 176 countries. Protect Your Creative Works by a Copyright certified by Public Notary: We
protect your Logos, Books, Websites, Screenplays, Music, Written Works, Artworks, Photos, Internet
Domains.

5. Find three (3) examples of version control history.


The examples of version control history are as below:
6. You work in in ICT industry and your organisation is heavily involved with creative works, now your
organisation is flourishing, you seem to be getting new employees every week. You are to draft a
document that will inform your colleagues across the organisation about changes in copyright legislation.
Consider all the critical elements needed to inform all stakeholders. Use the Communication Matrix on
Moodle, modify if needed then write the document with version control.

 Copyright sanctioning looks at the explanation and character, nature, proportion of noteworthiness and
the effect it invites on the normal market. The electronic arrangement act 2000 has acquired some new
rights respects to the issue of copyright; copyright holders are outfitted with the decision and power what
is to put on the web. None can get the particular induction control beside the permitted purposes by the
copyright holder. For any endeavour or works the affiliation have done and is available on the web, it
might be gotten to by the individuals by the approval or grant. According to territory 36 in copyright
authorisation act, the copyright in an insightful, hair-raising, melodic and innovative work, by the person
who doesn't have the duty regarding copyright or owner of that record in Australia is seen as copyright.

7. Compare both QUT’s and UQ’s privacy protection, do they both align to Australian Privacy Principles?
Which one does not? If not, why not?

 Both QUT and UQ doesn’t align to Australian Privacy Principles. QUT’s doesn’t align to Australian Privacy
Principles as it is committed to protecting the privacy of personal information in accordance
with the 11 Information Privacy Principles of the Information Privacy Act 2009 whereas the Australian
Privacy Principles (or APPs) are the cornerstone of the privacy protection framework in
the Privacy Act 1988 (Privacy Act).

8. Correct the table below:

APP Title Description


APP1 Open and transparent management of An APP entity must manage personal
personal information information in an open and transparent way.
This includes having a clearly expressed and
up to date APP privacy policy.
APP2 Anonymity and pseudonymity An APP entity must give an individual the
option of not identifying themselves or of
using a pseudonym. Limited exceptions
apply.
APP3 Collection of solicited personal information Outlines when an APP entity can collect
solicited personal information. Higher
standards apply to the collection of sensitive
information.
APP4 Dealing with unsolicited personal information Outlines how an APP entity must deal with
unsolicited personal information.

APP5 Notification of the collection of personal An APP entity that collects personal
information information about an individual must take
reasonable steps either to notify the
individual of certain matters or to ensure the
individual is aware of those matters.
APP6 Use or disclosure of personal information An APP entity can only use or disclose
personal information for a purpose for which
it was collected (known as the ‘primary
purpose’), or for a secondary purpose if an
exception applies.
APP7 Direct marketing An organisation may only use or disclose
personal information for direct marketing
purposes if certain conditions are met.
APP8 Cross-border disclosure of personal Outlines the steps an APP entity must take to
information protect personal information before it is
disclosed overseas.

APP9 Adoption, use or disclosure of government Outlines the limited situations when an
related identifiers organisation may adopt a government-
related identifier of an individual as the
organisation’s own identifier or use or
disclose a government-related identifier of an
individual.
APP10 Quality of personal information An APP entity must take reasonable steps to
ensure the personal information it collects is
accurate, up to date and complete. An entity
must also take reasonable steps to ensure
the personal information it uses or discloses
is accurate, up to date, complete and
relevant, having regard to the purpose of the
use or disclosure.
APP11 Security of personal information An APP entity must take reasonable steps to
protect personal information it holds from
misuse, interference and loss, and from
unauthorised access, modification or
disclosure. An APP entity has obligations to
destroy or de-identify personal information in
certain situations.
APP12 Access to personal information Outlines an APP entity’s obligations when an
individual request to be given access to
personal information held about them by the
APP entity. This includes a requirement to
provide access unless a specific exception
applies.
APP13 Correction of personal information Outlines an APP entity’s obligations for
correcting the personal information it holds
about individuals.

9. You received a complaint from one of the department heads who discovered a USB drive in the company
car park. Inside the USB stick were copies of employee resumes and other personnel records such as
employee appraisal reports, which must be kept confidential.
a. Write an email advising the complainant of the next steps to be taken in determining the
complaint. Send a copy of the email to your facilitator.

To,
The department Head,

Subject: about the USB drive that was found.

Regarded Head of Department,

It has gone to my notification that a USB drive has been as of late found in the vehicle leave that
is being utilized by our organization. You have referenced that the drive has a place with one of
our workers. You likewise said that inside the drive, there were different sorts of records which
could be classified. Being one of the head of division, I was expecting you knew about the
circumstance and you haven't opened any one the documents as it might prompt the penetrate
of security strategy, yet it appears you have. Presently you should not tell anybody about the data
and furthermore not show the reports of anybody as there may be touchy materials in it. Thus, I
might want to demand you to hand the USB roll over to the facilitator and meanwhile, we will
attempt to locate the proprietor of the USB drive.
Kind Regards,
CEO

Joshua Lee

b. Refer to the Privacy Policy and determine whether there has been a breach of the Privacy
Principles.
Since the personal documents have been looked into, according to “APP5 i.e. Notification of the
collection of personal information”, there has been a breach of the Privacy Principles.

c. Send an email to your facilitator advising him/her of any action required in order to remedy the
breach.

To,
The Facilitator,

I might want to advise you that there has been a penetrate of the Privacy Principle in our
organization. One of our workers found a USB drive and saw that there was different private data
about the proprietor. You will before long get the drive and I would demand you to put together a
pursuit party to discover who it has a place with. All the archives are to be kept classified and
security ought to be kept up.
Kind Regards,
CEO

Joshua Lee
Reference:
www.acs.org.au
en.wikipedia.org
https://copyright-australia.com/

You might also like