You are on page 1of 3

Assessment Task 3

Case Study 1
1. Identify the components of the policy and procedures Jane has breached. Write
a brief description of how she has breached the policy.

The policy that Jane has breached is use of cloud computing services on her individual cloud
services account to convey files, store files that are of company- owned data without
conforming to the company's rules governing such data.

She used cloud computing services to move work files without formal authority from the IT
manager.

Cloud computing services may lead to data loss or theft hence revealing folks and
organization to such online threats hence exposing the company's network to unauthorized
intruders. Jane by transferring files via cloud computing account without sufficient control
could have led to disclosure of the company's information to unauthorized intruders.

2. If Jane had authority to use her mobile phone at work, what other component of
the policy and procedures did she breach?

Jane has received a formal warning and ask been asked to remove the app from her phone.
Management have since heard that a number of staff have downloaded cloud storage
services onto their devices so that they can work from home. While they have had their
devices approved for use, they have not had permission to use the cloud services.

1
This study source was downloaded by 100000771940113 from CourseHero.com on 01-23-2022 11:28:59 GMT -06:00

https://www.coursehero.com/file/54218558/Assessment-Task-3docx/
Assessment Task 3

Case Study 2
1. What information could Grow Management Consultants add to their policy and
procedure to ensure the use of cloud storage services meets their compliance
requirements?

Even if the group has access to the device, they can't use cloud storage on their device.

2. Write an excerpt for the policy and procedure document on how intellectual
property and copyright will be protected using cloud storage services.

Grow Management Consultancy produce a monthly blog about all aspects of leadership and
management.

Your most recent blog is about Leadership in the digital age. You have just been searching
the Internet to find out about topics that you think might be of interest to your readers and
you find that a competitor, Better Management Consultants has posted more than half of
your blog, word for word, on their blog page as their own.

2
This study source was downloaded by 100000771940113 from CourseHero.com on 01-23-2022 11:28:59 GMT -06:00

https://www.coursehero.com/file/54218558/Assessment-Task-3docx/
Assessment Task 3

Case Study 3
1. Research copyright laws in Australia to find out if this scenario is a breach of
copyright laws. Explain your findings in a paragraph.

The Copyright Act. Copyright is a right belonging to the owner or licensee of a a literary,
artistic or dramatic work, film or sound recording, to reproduce, perform or otherwise deal
with the work. The law of copyright in Australia is contained in the Copyright Act 1968 (Cth).

2. Could Better Management Consultants use the text from the blog under 'Fair
Dealing' exceptions? Explain your response in a paragraph.

No, In order to meet fair dealing requests in accordance with Australian law, the blog should
use if it was a research or study, for review and criticism.

3. Explain what Grow Management Consultants can do regarding this breach of


copyright, without taking the matter to court.

Indicating that they have violated the law, grow managers may request that they remove
content immediately.

4. Who or where can they report the breach externally to? Explain your response.

Grow Management is responsible for reporting them to a legal authority, such as the
Ministry of Labor.

3
This study source was downloaded by 100000771940113 from CourseHero.com on 01-23-2022 11:28:59 GMT -06:00

https://www.coursehero.com/file/54218558/Assessment-Task-3docx/
Powered by TCPDF (www.tcpdf.org)

You might also like