Professional Documents
Culture Documents
Student Version
ICTICT618
Manage IP, ethics and privacy in ICT
environments
First published 2020
RTO Works
www.rtoworks.com.au
hello@rtoworks.com.au
0452 157 557
This resource is copyright. Apart from any fair dealing for the purposes of private study, research, criticism or review as
permitted under the Copyright Act 1968, no part may be reproduced by any process without written permission as
expressed in the RTO Works License Agreement.
The information contained in this resource is, to the best of the project team’s and publisher’s knowledge true and correct.
Every effort has been made to ensure its accuracy, but the project team and publisher do not accept responsibility for any
loss, injury or damage arising from such information.
While every effort has been made to achieve strict accuracy in this resource, the publisher would welcome notification of
any errors and any suggestions for improvement. Readers are invited to write to us at hello@rtoworks.com.au.
IT Works is a series of training and assessment resources developed for qualifications within the Information and
Communications Technology Training Package.
CONTENTS
Section 1: Research................................................................................................................................... 5
Section 2: Action Plan for review of organisational adherence to IP, ethics/conduct and privacy
requirements.............................................................................................................................................. 7
Section 3: Policy update............................................................................................................................. 9
Section 4: Reflection................................................................................................................................. 11
Student name: NITESH GOYAL
Date: 20/06/2023
Privacy legislation Privacy legislation in Australia is covered by the Privacy Act 1988.
Information should be only kept if required for use, accurately
Research and identify existing
maintained and accessible to only those who are authorised to do
legislation relevant to privacy.
so. Privacy relates to respecting the rights of an individual to have
Identify the name of the Act their personal information collected, stored and maintained
and describe the key purpose appropriately.
of this legislation.
The act is the Privacy Act. The key purpose of this act is to protect
Describe how you know the the privacy of individuals and to ensure personal information is
source of this information is correctly handled
reliable thereby ensuring the
This information is from a reliable source as I researched a
integrity of information.
government department website to find this information.
Explain the outcomes of
If you comply with privacy requirements, then the business will be
complying with and not
adhering to the law. If you don't then there can be great risks to the
complying with privacy
business such as litigation
requirements (at least one
example of each).
Ethics
Research and identify ICT Ethics: ethics at work is concerned with ensuring specific standards
industry standards relevant to of behaviour. A code of ethics can be adopted by an organisation to
code of ethics, including provide a formal or informal set of standards. It can include working
typical procedures for review and personal conduct requirements, policies and procedures, rules
and grievance procedures and moral values, which workers should adhere to.
relevant to ethics breaches.
An example code of ethics is:
List at least one code of ethics
Australian Computer Society Code of Ethics - To ensure members
and describe its key purpose.
upload and advance the honour, dignity and effectiveness of being
Describe typical review and an ICT professional
grievance procedures for
Review and grievance procedures typically seem to involve
ethical breaches.
documenting the issue, thoroughly investigating it and then either
Describe how you know the closing the matter if it's not an issue or escalating if e.g. to senior
source of this information is management if it is.
reliable thereby ensuring the
This information is from a reliable source as I researched a peak
integrity of information.
body website to find this information.
Explain the outcomes of
Complying with ethics requirements is important as the business will
complying with and not
run harmoniously and will be respected Not complying can cause
complying with ethics
numerous problems such as a dissatisfied workforce.
requirements (at least one
example of each).
Section 2: Action Plan for review of organisational adherence to IP, ethics/conduct
and privacy requirements
Include actions in order of priority.
Include any comments you need Time frames/ deadlines To mark off once
What activities will you be completing
to note completed
Research and review of legislation and Make sure I check how reliable the 1-2 weeks
standards information is ☒
Review of existing policies and procedures and Review policies and procedures 1-2 weeks
identify gaps based on research above ☒
Meeting with the senior management team to Explain what the gaps are and 2-3 weeks
discuss gaps make recommendations for ☒
change
Update policies and procedures Focus on clear and concise 1-2 weeks
language ☒
Communication and education plan to ensure Plan to extend over 1 year. 2-3 weeks
changes fully implemented. ☒
Complete first training and information session Develop a PowerPoint 2-3 weeks
on policies and procedures. presentation for showcasing ☒
information.
Conduct regular surveys on understanding to Conduct via Survey Monkey. 3-4 weeks
monitor implementation ☒
Annual review of policies and procedures Check to see if there any 2-3 weeks
legislation changes ☒
Section 3: Policy update
Policy updates
List the title of the Copyright Policy and Procedures
policy and
Privacy Policy and Procedures
procedures you have
developed, as well Staff Code of Conduct
as the review and Ethical review and grievance procedures.
grievance procedure
for ethical breaches.
Then attach them to
your portfolio as
below.
Policy distribution
Take a screenshot of
the folders you have
set up.
Describe how the
information is secure
and accessible.
Include logins for this
information. Updated Policy and Procedures
Password: Albright@123
Feedback As the policies and procedures in the documents are quite useful and handy
but yet it’s not quite clear, so it needs an additional training.
Summarise the
feedback that you
were provided with
on policies and
procedures and how
you used it.
Presentation As per the feedback, policies and procedures are not clear do I have created a
presentation to explain them. The presentation is a best way of providing a
Describe how you
clear understanding of the updated policies and procedures of highlighting the
have decided to
details.
present the policies
and procedures at
your roundtable
meeting. Explain
why you believe this
method is
appropriate for your
audience.
Presentation ☒