You are on page 1of 59

ASSESSMENT COVER SHEET STUDENT DETAILS / DECLARATION:

Course Name: Advanced Diploma of Information Technology_105133C

Unit / Subject Name: Manage IP, ethics and privacy in ICT environments_T2022

Trainer’s Name: Anisul Choudhory Assessment No: 1

 I fully understand the context and purpose of this assessment.


 I am fully aware of the competency standard/criteria against which I will be assessed.
 I have been given fair notice of the date, time and venue for the assessment.
I declare that:
 I am aware of the resources I need and how the assessment will be conducted.
 I have had the appeals process and confidentiality explained to me.
 I agree that I am ready to be assessed and that all written work is my own.
209169
Student Name: Andres David Paez Student ID:

Student’s Signature: Submission Date: 05 / 06 /22

1 ASSESSOR USE ONLY: (ACADEMIC DEPARTMENT)

o First submission: o Satisfactory o Not Satisfactory


Result:
o Re-submission: (Attempt ___ ) o Satisfactory o Not Satisfactory

Assessor’s Feedback:

Trainer/Assessor Declaration: I declare that I have conducted a fair, valid, reliable


and flexible assessment with this student, and I have provided appropriate feedback. Date:
Assessor Signature: / /

3 ASSESSMENT SUBMISSION RECEIPT: (CAN BE COMPLETED BY ANY DEPARTMENT.)


It is student’s responsibility to keep the assessment submission receipt as a proof of submission of assessment
tasks.
Student Name: Student ID:

Unit / Subject Code: Assessment No:

Staff Name: Signature:

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 1|P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Department: Date: / /

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 2|P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Assessment Task 1: Knowledge Test
Provide your response to each question in the box below.

Q1: In context of the Australian Computer Society Code of Ethics, Satisfactory


explain your responsiblies for the following values: response
Yes ☐ No ☐
a. The Primacy of the Public Interest

b. Professional Development

1. Write your answer in 150-200 words.

a) identify those potentially impacted by your work and explicitly consider their interests;
b) raise with stakeholders any potential conflicts between your professional activity and legal or other
accepted public requirements;
c) advise your stakeholders as soon as possible of any conflicts of interest or conscientious objections
that you have;
d) take into consideration the fact that your profession traverses many other professions, and has
implications for other social systems and organisations;
e) endeavour to preserve the integrity, security, continuity and utility of ICT;
f) respect the intellectual property of others; and
g) endeavour to preserve the confidentiality and privacy of the information of others.

b. a) continue to upgrade your knowledge and skills;


b) increase your awareness of issues affecting the profession and its relationship with the public;
c) encourage your colleagues, employees and students to continue their own professional
development; and
d) support education, training and professional development in ICT that reflects the diverse needs of
individual professionals and their various career paths.

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 3|P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Q2: Explain the processes that an organisation can use to Satisfactory
communicate its policies and procedures to its employees? Write response
30-50 words for each communication method. Yes ☐ No ☐

1. Ask for feedback


To encourage employee involvement and buy-in, ask employees for their ideas about what they
think should be included in the employee handbook or policy manual. Incorporate as much of the
employee feedback as possible. Involve employees in drafting particular sections of the policy
document if it makes sense.
2. Introduce final product
Conduct a meeting with all staff to introduce the completed handbook or manual and review its
purpose. Reinforce its importance and how it should be used.
3. Ask employees to review employee handbook or policy manual
Provide employees a chance to ask questions. Distribute the completed handbook or manual to
staff, either in a hard copy or advise them how to access the document electronically. Ask employees
to provide feedback on improving the document.

4. Inform employees up-front


At the start of the project, let employees know that the company will work on developing (or
updating) company policies and procedures. Explain why the information is important and relevant,
and what impact it will have on them.
5. Provide training where required
Some policies and procedures may require more extensive and intensive training to ensure that
employees understand how the policy applies to them, so provide employee training, as required.
Training does not have to be provided all at once. You can schedule training sessions on an on-going
basis or on an as-needed basis.
6. Request employee sign-off
It is important for staff to read the document to become familiar with the company’s policies.
Request each employee sign-off on having read the document. A copy of the sign-off should be
placed in the employee’s personnel file.

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 4|P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Q3: Answer the following: Satisfactory
response
a. Explain the purpose of organisational standards for Yes ☐ No ☐
customer service. Write your answer in 30-50 words.

b. Prepare a list of at least seven (7) potential sources of


information to help define the customer service
standards for an organisation.

c. Provide an example of organisational requirements for


answering phone call. Write your answer in 100-150
words.

a. Organisational standards are benchmarks with which your organisation can reflect on customer
engagement with your product or service. It helps companies to manage customer interactions to
increase customer satisfaction. This in turn leads to higher satisfaction ratings and ultimately higher
profits for your organisation.

b. standards for an organisation:


• management
• employees
• existing customers
• potential customers
• lost or former customers
• competitors
• regulatory authorities
• Management

c.
1. Enunciate clearly, keep your voice volume moderate, and speak slowly and clearly when answering
the phone so your caller can understand you easily.
2. Control your language when answering the phone. Don't use slang or buzzwords.
3. Train your voice and vocabulary to be positive when phone answering, even on a "down" day.
4. When you answer the phone, take phone messages completely and accurately.
5. Always ask the caller if it's all right to put her on hold when answering the phone, and don't leave
people on hold.
6. Answer all incoming phone calls before the third ring.
7. When you answer the phone, be warm, enthusiastic, and professional.
8. When answering the phone, welcome callers courteously and identify yourself and your
organization immediately.

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 5|P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 6|P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Q4: Answer the following: Satisfactory
response
a. What is an ICT system? What are the three (3) core Yes ☐ No ☐
components of ICT system. Provide at least two (2) examples
and write your answer in 100-150 words.
b. What are ICT system security systems? Write your answer in
20-30 words.
c. Summarise any five (5) industry practices/procedures for
security systems. Write your answer in 150-200 words.

a. ICT systems are primarily made up of three core components: • Operating system—core programs
that run on the ICT hardware that enable other programs to work. Examples of operating systems
include Microsoft Windows, Unix and IBM OS/400. • Databases—programs that organise and store
data.

b. An ICT system is a collection of computer hardware and programs that work together to support
business and operational processes. ICT systems are primarily made up of three core components: •
Operating system—core programs that run on the ICT hardware that enable other programs to work.
Examples of operating systems include Microsoft Windows, Unix and IBM OS/400.
• Databases—programs that organise and store data. Examples of database software include Oracle
database and Microsoft SQL Server.
• Applications—programs that deliver business and operational requirements.
Examples of applications include Oracle E-business suite, SAP and TechnologyOne. These components
are typically supported by an organisation’s network infrastructure.

c.

1. Your first line of defense are firewalls.

This is your first line of defense. A firewall dictates what data flows through and where it should go.
Firewalls keep unwanted files from breaching your network and compromising your assets.

2. Routers are used by networks mainly to police the flow of traffic. But routers are actually complete
with security features.

There are some routers that have better security features than a firewall. These include the following:

• Intrusion Defense System (IDS) functionality

• Intrusion Prevention System (IPS) functionality

3. Have a Wi-Fi Protected Access 2 (WPA2).

A WPA2 is popularly used on wi-fi networks. It is much better than its predecessor and uses stronger
wireless encryption methods.

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 7|P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
4. Keep your email secure.

Your email is a highly sought after target by black hat hackers. It is not uncommon to receive email
from suspicious sources.

5. Use web security.

In the same Verizon Data Breach Investigations Report, it stated that attacks against web applications
have increased at an alarming rate, with 51 percent of the victims being financial institutions.

Ref: 5 Fundamental Best Practices for Enterprise Security (entrepreneur.com)

Ref: Information and Communications Technology Controls Guide (audit.vic.gov.au)

Q5: Identify the federal and state WHS legislation applicable to your state Satisfactory
and explain its purpose. Write your answer in 50-100 words. response
Yes ☐ No ☐

South Australia (SA)


• Act: Work Health and Safety Act 2012 (SA)
The Work Health and Safety Act 2012 (the WHS Act) provides a framework to protect the health, safety
and welfare of all workers at work. It also protects the health and safety of all other people who might
be affected by the work. The WHS Act also provides protection for the general public so that their
health and safety is not placed at risk by work activities.

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 8|P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Q6: Identify, document and explain the state and federal legislations related Satisfactory
to the key concepts given in the table. response
Yes ☐ No ☐

State and federal legislations Explanation (30-50 words)


Access and equity
Equal Opportunity Act 2010 (Victoria)
The Equal Opportunity Act 2010
–Victoria's anti-discrimination law
–protects people from discrimination and harassment in
areas of public life such as workplaces, schools, clubs,
shops or places that provide services.

Disability Discrimination Act 1992 The Commonwealth Disability Discrimination Act 1992
(Commonwealth) (DDA) makes it against the law to treat people
unfairly because of a disability. a person's thought
processes, perception of reality, emotions or
judgment or that results in disturbed.

Age Discrimination Act 2004 The Age Discrimination Act 2004 is an Act of the
(Commonwealth) Parliament of Australia that prohibits age discrimination in
many areas including employment, education,
accommodation and the provision of goods and services.

Racial Discrimination Act 1975


(Commonwealth)

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 9|P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
promote equality before the law for all persons,
regardless of their race, colour or national or ethnic origin,
and make discrimination against people on the
basis of their race, colour, descent or national or
ethnic origin unlawful.

promote equality between men and women


Sex Discrimination Act 1984 eliminate discrimination on the basis of sex, marital status
(Commonwealth) or pregnancy and, with respect to dismissals, family
responsibilities, and
eliminate sexual harassment at work, in educational
institutions, in the provision of goods and services, in the
provision of accommodation and the delivery of
Commonwealth programs.

Copyright and intellectual property


Copyright Act 1968
The copyright law of Australia defines the legally
enforceable rights of creators of creative and
artistic works under Australian law.
The scope of copyright in Australia is defined in
the Australian Copyright Act 1968 (as amended),
which applies the national law throughout Australia.

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 10 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Trade Marks Act 1995 This Act provides for the registration of trade marks, collective
certification trademarks and defensive trademarks
and sets out and protects the rights deriving from
registration.

Privacy
Privacy Act 1988 (Cth) Privacy Act 1988 (Cth) (Privacy Act) governs the way in
which business entities and federal government agencies
must handle personal information, largely through the 13
Australian Privacy Principles (APPs) set out within the
Privacy Act.

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 11 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Q7: Answer the following: Satisfactory
response
a. What do you mean by Australian Copyright Law? Write your Yes ☐ No ☐
answer in 50-100 words.
b. List the four (4) examples of ICT related work, protected by the
copyright act.

a. The copyright law of Australia defines the legally enforceable rights of creators of creative and
artistic works under Australian law. The scope of copyright in Australia is defined in the Australian
Copyright Act 1968 (as amended), which applies the national law throughout Australia. Designs may
be covered by the Copyright Act (as sculptures or drawings) as well as by the Design Act. Since
2007, performers have moral rights in recordings of their work.

b.
1. Copying Software
2. Copying or downloading music
3. Copying images or photographs from the web
4. Copying text from webpages and using it in the work or posting it onto the websites and
pretending it is your own work.

Q8: Prepare a list of any seven (7) methods to communicate new or revised Satisfactory
policies and procedures to the stakeholders. response
Yes ☐ No ☐

1. Meetings
2. Conference Calls
3. Newsletters/ Email/ Posters
4. Hallway Conversations, Bathroom conversations
5. Lunch Meetings, Drink at the bar after work
6. Sporting events
7. Voice mail

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 12 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Q9: What do you mean by confidentiality, integrity and availability according Satisfactory
to CIA triad? Write 50-100 words for each term. response
Yes ☐ No ☐

Confidentiality, integrity, and availability, also known as the CIA triad, is a model designed to guide
an organization’s policy and information security. The goal of the CIA Triad of Integrity is to ensure
that information is stored accurately and consistently until authorized changes are made.

Integrity means that protection against improper modification and destruction of information,
ensuring that information cannot be changed undetected, and ensuring the integrity of the
information.

Ref: Confidentiality, Integrity, Availability (CIA Triad) — The Backbone of Cybersecurity | by Ensar
Seker | DataDrivenInvestor

Q10 Answer the following: Satisfactory


response
a. Prepare a list of steps that you would follow to implement new Yes ☐ No ☐
ICT policies and procedures at the workplace.

b. What are the five (5) factors to be considered while gathering


feedback from the stakeholders during the implementation
process? Write your answer in 100-150 words.

a. 1. Study the requirements


2. Take into account the results of your risk assessment
3. Optimize and align your document(s)
4. Structure your document
5. Write your document
6. Get your document approved
7. Training and awareness of your employees

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 13 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
b.
• Collecting feedback from stakeholders during the implementation process, to monitor how well the
intervention is doing.
• Stakeholders close to the intervention may well have valuable insights and information to feedback
to the main team
• This feedback can help you assess progress against objectives and consider how to take advantages
of new opportunities or respond to problems
• Understanding stakeholders’ perceptions and expectations of the project, and their views about
what has contributed to success or failure, is key to any process evaluation
• Collect feedback from key stakeholders on the progress of the intervention, possibly via one-to-one
sessions or larger, formal meetings. Consult stakeholders and other staff outside your organisation
who may be affected by the intervention.

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 14 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 15 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Q11: Answer the following: Satisfactory
response
a. What are the five (5) factors to ensure confidentiality of Yes ☐ No ☐
stakeholder’s interest? Write your answer in 50-100
words.

b. What do you understand by the term proprietary rights


of stakeholder’s interest? Write your answer in 50-100
words.

a.

• Individual files are locked and secured

• Support workers do not tell other people what is in a stakeholder’s file unless they have permission
from the client
• Information about stakeholders’ is not told to people who do not need to know
• Stakeholder’s medical details are not discussed without their consent
• Stakeholder’s have the right to keep any information about themselves confidential, which includes
that information being kept from family and friends.

b. Proprietary information, also known as a trade secret, is information a company wishes to keep
confidential. Proprietary information can include secret formulas, processes, and methods used in
production. It can also include a company's business and marketing plans, salary structure, customer
lists, contracts, and details of its computer systems. In some cases, the special knowledge and skills
that an employee has learned on the job are considered to be a company's proprietary information.
For stakeholder’s interest, this term refers to the data belonging to the stakeholder and may include
financial information, intellectual property (concepts, designs, techniques), technical documentation,
artwork, and the like.

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 16 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Q12: What are the ten (10) considerations, for drafting or updating Satisfactory
organisation’s privacy policy and procedures? Write your answer in response
100-150 words. Yes ☐ No ☐

• A detailed list of what personal information your business collects, specific to your business.
• A disclaimer that you will log information about the individual’s access and use of your website,
including through cookies, browser, operating system and Internet service provider domain name.
• A detailed list of uses of personal information, specific to your business.
• A detailed list of disclosure of personal information, specific to your business, including disclosure to
any third party as required under the Australian Privacy Principles.
• Whether you will disclose personal information to overseas recipients, and if so which countries, as
required by the Australian Privacy Principles.
• A clause setting out what happens to personal information where there is a change of control of the
business.
• A suite of clauses about dealing with sensitive information.

Q13: Explain different measures that can be implemented to avoid a breach Satisfactory
of copyright complaint. Write your answer in 100-150 words. response
Yes ☐ No ☐

• Where you are using someone else’s material your material, ensure that you have their permission
to use it.
• Where you are commissioning work from third parties (for example where you ask someone to take
some publicity photographs or where you ask someone to develop a website for you) you should
ensure, insofar as it is possible for you to do so, that the copyright is transferred to you or that you
are granted a licence to use the material which is as broad as possible in terms of the use you may
want to make of it.
• Where you are developing material of your own but are drawing on the work of others, every effort
should be made to make your material as distinct and separate from the source material as possible.
The greater the degree of similarity the higher the risk of a complaint.
• In practical terms, a straightforward ‘sense check’ can be very effective. Asking an independent
person who is unfamiliar to compare your material with any source material and give a view as to
any similarity can be a useful test. This is, in essence, the starting point for any judge if a dispute
were to arise.

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 17 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Q14: Answer the following: Satisfactory
a. Why is it important to review the code of ethics of the response
organisation? Write your answer in single sentence. Yes ☐ No ☐
b. How should the review of the code of the ethics to be
conducted? Write your answer in 30-50 words.
c. How can you review the staff understanding of the code of
ethics? Write your answer in 30-50 words.

a. To keep our code of conduct up to date we should review it regularly; once or twice a year should
be enough.
b. Review each section of your code of conduct and make sure it still represents the values of your
business. You should also review current standards and guidelines and any new policies introduced
for the business.
Consider any areas that could be added to the code.

C. You can review staff understanding of your code of conduct by requiring them to complete a
survey or questionnaire. Focus your questions on any new sections and particular areas of your code
that you think your staff may not fully understand.
The surveys will identify areas that staff may need further training in and areas of your code that
may be unclear and need reviewing.

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 18 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 19 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Assessment Task 2:

ASSESSMENT COVER SHEET STUDENT DETAILS / DECLARATION:


Course Name: Advanced Diploma of Information Technology_105133C

Unit / Subject Name: Manage IP, ethics and privacy in ICT environments_T2022

Trainer’s Name: Anisul Choudhory Assessment No: 2

 I fully understand the context and purpose of this assessment.


 I am fully aware of the competency standard/criteria against which I will be assessed.
 I have been given fair notice of the date, time and venue for the assessment.
I declare that:
 I am aware of the resources I need and how the assessment will be conducted.
 I have had the appeals process and confidentiality explained to me.
 I agree that I am ready to be assessed and that all written work is my own.
209169
Student Name: Andres David Paez Student ID:

Student’s Signature: Submission Date: 05 / 06 /22

4 ASSESSOR USE ONLY: (ACADEMIC DEPARTMENT)

o First submission: o Satisfactory o Not Satisfactory


Result:
o Re-submission: (Attempt ___ ) o Satisfactory o Not Satisfactory

Assessor’s Feedback:

Trainer/Assessor Declaration: I declare that I have conducted a fair, valid, reliable


and flexible assessment with this student, and I have provided appropriate feedback. Date:
Assessor Signature: / /

6 ASSESSMENT SUBMISSION RECEIPT: (CAN BE COMPLETED BY ANY DEPARTMENT.)


It is student’s responsibility to keep the assessment submission receipt as a proof of submission of assessment
tasks.
Student Name: Student ID:

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 20 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Unit / Subject Code: Assessment No:

Staff Name: Signature:

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 21 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Assessment Task 2 - Project

Introduction (30-50 words)

Copyright is a legal right, existing in many countries around the world, that grants the creator of an
original work exclusive rights to achieve whether, and under which conditions, this original work may
be used by others. This is usually only for a limited timeline

Copyright

Copyright All copying of copyright material undertaken by the Organisation shall be in


compliance accordance with the provisions of the Copyright Act 1968 and any relevant
policy copyright agreement(s) currently in force.

Legislative The Organisation is subject to the provisions of the Copyright Act 1968.
requirement
s

Infringement Whatever person who commits such an infringement shall be personally liable under
of Copyright the Copyright Act. The Organisation may also be found liable.

Expiry of Generally copyright lasts in a work for 70 years after the death of the creator, or 70
Copyright years after its first publication.

If copyright expired before 1 January 2005, it was not revived, even if it was less
than 70 years.

Procedures -Copyright register


to address
the issues -Comply with all applicable Australian laws

-Maintain appropriate confidentiality.

-Create their own cybersecurity information in order to avoid coping information


from internet.

-Reviewing periodically the internet browser history in order to control the


downloads.

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 22 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Identify things that can be copyrighted in your org 

How to, default or need register 

Breaches 

Resources/ Mention Act, legislation, regulation, policy about copyrigh

References -The Copyright ACT 1968 (Australia)

- Copyright Regulations 1969 Statutory Rules

Ref: Copyright Act 1968 (legislation.gov.au)

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 23 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Introduction (30-50 words)

A code of morals is a guide of benchmarks planned to empower specialists to lead business truly and
with reliability. This set of principles has been designed to assist members in sound professional
judgement while upholding ethical ideas and obligations.

Ethics

Purpose As ICT continues to place an increasingly pervasive role in all our lives, the way in
which ICT professionals conduct themselves will be subject to greater scrutiny. To
legitimately call themselves professionals, those working in ICT must not only
operate within the bounds of the law but go beyond that to conduct themselves
ethically and responsibly at all times.

Scope This Code of Ethics (“Code”) applies to all employees, officers and directors of the
company.

Legislative  Disability Discrimination Act 1992 (Commonwealth)


requirement
s  Age Discrimination Act 2004 (Commonwealth)

 Racial Discrimination Act 1975 (Commonwealth)

 Sex Discrimination Act 1984 (Commonwealth)

Code of All employees of the organisation must comply with the organisation's behaviours
ethics notice and Code of Conduct.

Procedures 1. Behave honestly and with integrity

2. Act with care and diligence whole time

3. Treat everyone with respect and courtesy and without harassment of any

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 24 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
kind

4. Comply with all applicable Australian laws

5. Not provide false or misleading information in response to a request for


information that is made for official purposes

6. Comply with any lawful and reasonable direction given by someone in the
organisation who has the authority to give the direction

7. Maintain appropriate confidentiality

Can be different as well based on individual responses

Ethical Integrity 
standard
Checklist Objectivity 

Professional Competence and Due Care 

Confidentiality 

Professional Behaviour 

Review and - Management policies


grievance
procedure -working conditions

-Interpersonal factors

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 25 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Resources/  Disability Discrimination Act 1992 (Commonwealth)

References  Age Discrimination Act 2004 (Commonwealth)

 Racial Discrimination Act 1975 (Commonwealth)

 Sex Discrimination Act 1984 (Commonwealth)

Introduction

Privacy policies are important for compliance with different privacy legislation, and data privacy
policies also help set expectations with your organisation. Furthermore, it is necessary to develop a
privacy checklist that is to be used in the organisation to make sure they adhere to the requirements
of the current Australian privacy act.

Privacy

Purpose Conduct a research, analyse current Australian privacy law and standards
and prepare a privacy policy and procedure that address the issues identified
in the audit conducted. In addition to Determine and ensure the integrity,
confidentiality, security and availability of information as required by the
organisational policy.

Scope The organisation is committed to managing personal information in an open and


transparent way. The organisation is a registered company and is subject to the
requirements of the Act. It adheres to the Australian Privacy Principles (APPs) set
out in Schedule 1 to the Act.

Privacy law The Organisation is subject to the provisions of the Privacy Act 1988 (Privacy Act).

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 26 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Privacy Policies and procedures related to:
policy and
procedure  Personal information collected and held

 collects and holds personal information

 Notification of collection of personal information

 Use or disclosure for secondary purposes

 Security

 Unsolicited personal information

Privacy Personal Information 


checklist
Passwords 

Security 

Integrity 

Resources/

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 27 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
References - Privacy Act 1988

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 28 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
PART B : MEETING AGENDA

MEETING AGENDA TEMPLATE:


Meeting/Project NICON Software Pt. Ltd
Name:

Date of Meeting: 15/05/2022 Time: 8:00


(MM/DD/YYYY)

Meeting Facilitator: Andres Paez Location: Adelaide

1. Meeting Objective

There are some objectives such as check compliance with the legislations and standards related to
copyright, professional conduct and privacy applicable to the organisation, Identify key issues related
to compliance and conduct further investigations, review and develop code of ethics and monitor the
workplace to ensure code of ethics is appropriate and being applied and Conduct internal audits of
the copyright, ethics and privacy issues in the organisation.

2. Attendees

Name Department/Division E-mail Phone

Andres Paez Compliance Manager andrespaez@hotmail.c


om

Alex Owen I.T. Manager Alex.owen@hotmail.co


m

Carmen Perez Staff Carmen.perez@hotma


il.com

3. Meeting Agenda

Topic Owner Time

-Conduct internal audits of the copyright, ethics and privacy I.T. Manager 8:30
issues in the organisation

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 29 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
-Update the policies and procedures to meet the changes in Staff 10:30
legislations and regulations

-Review and develop code of ethics and monitor the workplace Compiance 12:30
to ensure code of ethics is appropriate and being applied. Manager

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 30 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
4. Pre-work/Preparation (documents/handouts to bring, reading material, etc.)

Description Prepared by

 Staff and contractors should perform their duties with Carmen


professionalism and integrity.

 Fairness and equity must be observed by our staff and Alex


contractors in dealings with Clients and stakeholders.

 use NICON Software Pt. Ltd property and equipment Andres


for its intended purpose

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 31 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 32 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Assessment Task 3:

ASSESSMENT COVER SHEET STUDENT DETAILS / DECLARATION:


Course Name: Advanced Diploma of Information Technology_105133C

Unit / Subject Name: Manage IP, ethics and privacy in ICT environments_T2022

Trainer’s Name: Anisul Choudhory Assessment No: 3

 I fully understand the context and purpose of this assessment.


 I am fully aware of the competency standard/criteria against which I will be assessed.
 I have been given fair notice of the date, time and venue for the assessment.
I declare that:
 I am aware of the resources I need and how the assessment will be conducted.
 I have had the appeals process and confidentiality explained to me.
 I agree that I am ready to be assessed and that all written work is my own.
209169
Student Name: Andres David Paez Student ID:

Student’s Signature: Submission Date: 05 / 06 /22

7 ASSESSOR USE ONLY: (ACADEMIC DEPARTMENT)

o First submission: o Satisfactory o Not Satisfactory


Result:
o Re-submission: (Attempt ___ ) o Satisfactory o Not Satisfactory

Assessor’s Feedback:

Trainer/Assessor Declaration: I declare that I have conducted a fair, valid, reliable


and flexible assessment with this student, and I have provided appropriate feedback. Date:
Assessor Signature: / /

9 ASSESSMENT SUBMISSION RECEIPT: (CAN BE COMPLETED BY ANY DEPARTMENT.)


It is student’s responsibility to keep the assessment submission receipt as a proof of submission of assessment
tasks.
Student Name: Student ID:

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 33 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Unit / Subject Code: Assessment No:

Staff Name: Signature:

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 34 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Assessment Task 3:

Template 1:

Team members questionnaire Survey Template (Copyright policy and procedures)

Answer the following questions by circling the most appropriate answer

1. Ideas, concepts, styles, techniques and information are also protected by copyright?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

2. The Copyright Act is protecting a wide range of work?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

3. Meetings, conference calls and voice mail are methods to communicat procedures to the
skateholders?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

4. Confidentiality, integrity and availability are some of the features of Copyright?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 35 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
5. Is the Organization of the subject to the provisions of the Copyright Act 1968?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

6. Can any person who commits such an infringement shall be personally liable under the
Copyright?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

7. After the death of the creator, is Copyright the last in a work for 70 years?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

8. Is Copyright register a procedure to address any issue?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

9. Is Copyright very important for the data security of the organization?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 36 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
10. Is it important for the oraganization folowing all the standards and lwasd regading
Copyright Act?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

What would you like to see offered/improved?

__________________________________________________________________________________
____________mention about reward and realize the awareness and
knowledge._________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
_____________________________________________________________________

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 37 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Template 2:

Team members questionnaire Survey Template (Code of ethics policy and procedures)

Answer the following questions by circling the most appropriate answer

1. Is Code of Morals a guide of benchmarks planned to empower people to lead buisiness?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

2. Is the Code of Ethics apply to all employees, officers and directors of the company?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

3. Is Disability Discrimination Act 1992 a legislative requirement?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

4. Is Racial Discrimination Act 1975 a legislative requirement?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 38 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
5. Is Age Discrimination Act 2004 a legislative requirement?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

6. Is Sex Discrimination Act 1984 a legislative requirement?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

7. Is the Code of Conduct important to all employees within the organization?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

8. Behave honestly and with integrity in the organization is a procedure?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

9. Treat everyone with respect and courtesy and without harassment of any kind is it
consider a procedure?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

10. Objectivity, integrity and Confidentiality are Ethical Standadrs?

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 39 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Strongly Disagree Neutral Agree Strongly
Disagree Agree

What would you like to see offered/improved?

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
________________________________________________________________________

Template 3:

Team members questionnaire Survey Template (Privacy policy and procedures)

Answer the following questions by circling the most appropriate answer

1. Is the organization committed to managing personal information in an open and


transparent way?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

2. Is the Organization subject to the provisions of the Privacy Act 1988?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 40 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
3. Personal information collected and held is a policy and procedure?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

4. Is a procedure all the notification of collection of personal information?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

5. Is Security a main standard of the Privacy Policy?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

6. Determine and ensure the integrity, confidentiality, security and availability of


information is a requirement by the organisational policy.?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

7. References to personal information to this policy include sensitive information is relevant


within the organization ?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 41 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
8. Protect your persoanl inforamtion is considering a private policy?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

9. Computer network security, including password security to prevent unauthorised access


is a procedure of the privacy?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

10. Is Data protection and information security important for the privacy of the
organization ?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

What would you like to see offered/improved?

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
________________________________________________________________________

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 42 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Part B:

After preparing the questionnaire, you are required to arrange a team meeting with the team members.
The participants of the meeting will include following team members (I.T Manager and staff members
(any two)).

QUESTIONER COMPLETED BY IT MANAGER

Template 1:

Team members questionnaire Survey Template (Copyright policy and procedures)

Answer the following questions by circling the most appropriate answer

1. Ideas, concepts, styles, techniques and information are also protected by copyright?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

2. The Copyright Act is protecting a wide range of work?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

3. Meetings, conference calls and voice mail are methods to communicat procedures to the
skateholders?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

4. Confidentiality, integrity and availability are some of the features of Copyright?

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 43 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Strongly Disagree Neutral Agree Strongly
Disagree Agree

5. Is the Organization of the subject to the provisions of the Copyright Act 1968?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

6. Can any person who commits such an infringement shall be personally liable under the
Copyright?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

7. After the death of the creator, is Copyright the last in a work for 70 years?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

8. Is Copyright register a procedure to address any issue?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

9. Is Copyright very important for the data security of the organization?

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 44 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Strongly Disagree Neutral Agree Strongly
Disagree Agree

10. Is it important for the oraganization folowing all the standards and lwasd regading
Copyright Act?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

What would you like to see offered/improved?

__________________________________________________________________________________
____________mention about reward and realize the awareness and
knowledge._________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
_____________________________________________________________________

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 45 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Template 2:

Team members questionnaire Survey Template (Code of ethics policy and procedures)

Answer the following questions by circling the most appropriate answer

1. Is Code of Morals a guide of benchmarks planned to empower people to lead buisiness?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

2. Is the Code of Ethics apply to all employees, officers and directors of the company?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

3. Is Disability Discrimination Act 1992 a legislative requirement?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

4. Is Racial Discrimination Act 1975 a legislative requirement?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 46 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
5. Is Age Discrimination Act 2004 a legislative requirement?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

6. Is Sex Discrimination Act 1984 a legislative requirement?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

7. Is the Code of Conduct important to all employees within the organization?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

8. Behave honestly and with integrity in the organization is a procedure?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

9. Treat everyone with respect and courtesy and without harassment of any kind is it
consider a procedure?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

10. Objectivity, integrity and Confidentiality are Ethical Standadrs?

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 47 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Strongly Disagree Neutral Agree Strongly
Disagree Agree

What would you like to see offered/improved?

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
________________________________________________________________________

Template 3:

Team members questionnaire Survey Template (Privacy policy and procedures)

Answer the following questions by circling the most appropriate answer

1. Is the organization committed to managing personal information in an open and


transparent way?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

2. Is the Organization subject to the provisions of the Privacy Act 1988?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 48 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
3. Personal information collected and held is a policy and procedure?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

4. Is a procedure all the notification of collection of personal information?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

5. Is Security a main standard of the Privacy Policy?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

6. Determine and ensure the integrity, confidentiality, security and availability of


information is a requirement by the organisational policy.?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

7. References to personal information to this policy include sensitive information is relevant


within the organization ?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 49 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
8. Protect your persoanl inforamtion is considering a private policy?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

9. Computer network security, including password security to prevent unauthorised access


is a procedure of the privacy?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

10. Is Data protection and information security important for the privacy of the
organization ?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

What would you like to see offered/improved?

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
________________________________________________________________________

Feedback: Based on the answers looks the IT manager does have important knowledge and
insight about all these three areas namely code of ethics, privacy and copyright. It provides
an impression that the program is sorting out correctly and overall employees’s awareness
are improving. It is not neccessary to change anything in program at this time.

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 50 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
QUESTIONER COMPLETED BY STAFF MEMBER

Template 1:

Team members questionnaire Survey Template (Copyright policy and procedures)

Answer the following questions by circling the most appropriate answer

1. Ideas, concepts, styles, techniques and information are also protected by copyright?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

2. The Copyright Act is protecting a wide range of work?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

3. Meetings, conference calls and voice mail are methods to communicat procedures to the
skateholders?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

4. Confidentiality, integrity and availability are some of the features of Copyright?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 51 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
5. Is the Organization of the subject to the provisions of the Copyright Act 1968?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

6. Can any person who commits such an infringement shall be personally liable under the
Copyright?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

7. After the death of the creator, is Copyright the last in a work for 70 years?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

8. Is Copyright register a procedure to address any issue?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

9. Is Copyright very important for the data security of the organization?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 52 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
10. Is it important for the oraganization folowing all the standards and lwasd regading
Copyright Act?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

What would you like to see offered/improved?

__________________________________________________________________________________
____________mention about reward and realize the awareness and
knowledge._________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
_____________________________________________________________________

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 53 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Template 2:

Team members questionnaire Survey Template (Code of ethics policy and procedures)

Answer the following questions by circling the most appropriate answer

1. Is Code of Morals a guide of benchmarks planned to empower people to lead buisiness?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

2. Is the Code of Ethics apply to all employees, officers and directors of the company?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

3. Is Disability Discrimination Act 1992 a legislative requirement?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

4. Is Racial Discrimination Act 1975 a legislative requirement?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 54 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
5. Is Age Discrimination Act 2004 a legislative requirement?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

6. Is Sex Discrimination Act 1984 a legislative requirement?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

7. Is the Code of Conduct important to all employees within the organization?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

8. Behave honestly and with integrity in the organization is a procedure?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

9. Treat everyone with respect and courtesy and without harassment of any kind is it
consider a procedure?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

10. Objectivity, integrity and Confidentiality are Ethical Standadrs?

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 55 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
Strongly Disagree Neutral Agree Strongly
Disagree Agree

What would you like to see offered/improved?

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
________________________________________________________________________

Template 3:

Team members questionnaire Survey Template (Privacy policy and procedures)

Answer the following questions by circling the most appropriate answer

1. Is the organization committed to managing personal information in an open and


transparent way?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

2. Is the Organization subject to the provisions of the Privacy Act 1988?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 56 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
3. Personal information collected and held is a policy and procedure?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

4. Is a procedure all the notification of collection of personal information?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

5. Is Security a main standard of the Privacy Policy?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

6. Determine and ensure the integrity, confidentiality, security and availability of


information is a requirement by the organisational policy.?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

7. References to personal information to this policy include sensitive information is relevant


within the organization ?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 57 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
8. Protect your persoanl inforamtion is considering a private policy?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

9. Computer network security, including password security to prevent unauthorised access


is a procedure of the privacy?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

10. Is Data protection and information security important for the privacy of the
organization ?

Strongly Disagree Neutral Agree Strongly


Disagree Agree

What would you like to see offered/improved?

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
________________________________________________________________________

Feedback: Based on the answers looks the Staff member does have important knowledge
and insight about all these three areas namely code of ethics, privacy and copyright. It
provides an impression that the program is sorting out correctly and overall employees’s
awareness are improving. It is not neccessary to change anything in program at this time.

ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 58 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021
ICTNPL413 Evaluate networking regulations and legislation for the telecommunications industry 59 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 Nov 2021

You might also like