Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Candidate’s Name
Submission Details
This assessment task is to be submitted online by the due date specified by your Trainer/Assessor
which is labelled on Moodle. Your assessor must approve any variations to this arrangement in
writing.
Specifications below
Identifying the Unit, Assessment Number, student name, student number, date and page
number (preferably) in the Footer
Assessment Overview
This Assessment will assess Evidence of the ability to:
use network administrative tools to carry out system administration tasks
manage the network file system
create the network configuration required by the client
provide user services and user accounts
provide backup and service restoration capability.
Performance Evidence
Knowledge Evidence
To complete the unit requirements safely and effectively, the individual must:
outline the Australian Computer Society Code of Ethics
identify and explain federal and state or territory legislation and policy relevant to an
ICT environment relating to:
access and equity
copyright and intellectual property
workplace health and safety (WHS)
privacy
describe the processes and procedures by which an organisation communicates its
policies and procedures
outline organisational requirements for customer service
summarise typical ICT system security systems and procedures
Assessment Conditions
Gather evidence to demonstrate consistent performance in conditions that are safe and
replicate the workplace. Noise levels, production flow, interruptions and time variances must
be typical of those experienced in the general ICT industry and include access to:
relevant organisational policies
General Instructions
You are required to answer all questions within each Assessment Task and be assessed as
“Satisfactory” in each to gain competency in this unit.
Submit the completed Assessment Tasks to your Trainer & Assessor through MOODLE.
If you have any questions regarding this assessment, please contact your Trainer & Assessor
Assessment Task 1
Research via the internet in order to find the following answers about manage copyrights
policy to protect ICT resources in an organisation.
Task 1
Australian Copyright Law, ACS (Australian Computer Society), The Commonwealth ACT
and individual ICT company’s websites could be handy to complete the following task:
Intellectual property (IP) and other intangible assets that relate to doing business include
patents, trademarks, designs, and secret processes and formulae.
IP Australia is the Australian Government agency that administers IP rights and legislation.
4) Explain common creative, fair dealing and open source in terms of copyright.
Creative commons refers to the licenses to the public which is given to the enable free
distribution of an otherwise copyrighted work. This license is used when the author is
giving the public the right to share his original work.
Fair dealing is the exceptions given in the copyright act which allows you to use other
people’s private study, education, reviews or education.
An open source licence refers to a type of license used by computer softwares as well as
other products which allows the source code and blueprint to be used.
Works that have not been fixed in a tangible form of expression (for example,
choreographic works that have not been notated or recorded, or improvisational
speeches or performances that have not been written or recorded).
Titles, names, short phrases, and slogans; familiar symbols or designs; mere variations
of typographic ornamentation, lettering, or coloring; mere listings of ingredients or
contents.
Ideas, procedures, methods, systems, processes, concepts, principles, discoveries, or
devices, as distinguished from a description, explanation, or illustration
As a general rule, for works created after January 1, 1978, copyright protection lasts
for the life of the author plus an additional 70 years. For an anonymous work, a
pseudonymous work, or a work made for hire, the copyright endures for a term of 95
years from the year of its first publication or a term of 120 years from the year of its
creation, whichever expires first reproduction right — the right to make copies of a
reproduction right — the right to make copies of a protected work
distribution right — the right to sell or otherwise distribute copies to the public
right to create adaptations (called derivative works) — the right to prepare new works
based on the protected work, and
Performance and display rights — the rights to perform a protected work (such as a
stage play) or to display a work in public. This bundle of rights allows a copyright
owner to be flexible when deciding how to realize commercial gain from the
underlying work; the owner may sell or license any of the rights.
protected work
ICTICT610_Assessments Version: v19.0 Page 5 of 15
Developed by: ACBI Approved by: DoS Issued: January 2019 Review: January 2020
distribution right — the right to sell or otherwise distribute copies to the public
right to create adaptations (called derivative works) — the right to prepare new works
based on the protected work, and
Performance and display rights — the rights to perform a protected work (such as a
stage play) or to display a work in public. This bundle of rights allows a copyright
owner to be flexible when deciding how to realize commercial gain from the
underlying work; the owner may sell or license any of the rights.
Overview ;Copyright is, essentially, a bundle of exclusive rights of the owner to publish,
copy, adapt, broadcast and perform material contained in literary, dramatic, musical, and
artistic works, and in computer software, sound recordings, films, and broadcasts.
The owner is generally the author or maker of the copyright material,
Policy
All copying of copyright material undertaken by the University shall be in accordance with
the provisions of the Copyright Act 1968 and any relevant copyright agreement(s) currently in
force.
Legislative Requirements
Infringement of Copyright
Use of University equipment, facilities and/or premises for a purpose which infringes
copyright is expressly forbidden. Any person who commits such an infringement shall be
personally liable under the Copyright Act. The University may also be found liable.
Expiry of Copyright
Generally copyright lasts in a work for 70 years after the death of the creator, or 70 years after
its first publication
The University is party to agreements with two Collecting Societies who represent copyright
owners, under statutory license
Computer programs are defined under the Copyright act they are expressly excluded from the
statutory licenses for copying for educational use. The Act permits the owner of a legitimate
copy of a computer program to make a back-up copy of the program.
Assessment Task 2
Research via internet to find the following answers in order to manage ethical behaviour in
an organisation.
Assessment Task
No, it is my obligation to explain to the customers the advantages and disadvantages of each
of the products and give chance to the customer to make their own decisions. All the prices
for the products should be quoted against all the products so that the customer makes a
choice of what or not to buy.
Background Information: Research via internet to find the following answers in order to
manage privacy in an ICT environment as
Australian Copyright Law, ACS (Australian Computer Society), The Commonwealth ACT and
individual ICT companies websites could be handy to complete the following task:
Australian Copyright Law, ACS (Australian Computer Society), The Commonwealth ACT and
individual ICT companies websites could be handy to complete the following task.
Case study:
You are designing a database management system for the personnel office for your
company. The system will store extremely sensitive information such as performance
evaluations, medical records for filing insurance claims, salaries, and so forth. With weak
security, employees working on client machines may be able to figure out ways to get access
to this data, not to mention the possibility of on-line access from hackers. You feel strongly
that the system should be much more secure. However, the CEO, director of computing and
director of personnel all agree that less security will do since it is going to very expensive to
build high security system.
11) Write at least 3 privacy policies to ensure the integrity, confidentiality, security and
availability of information and adhere to current privacy legislation.
12) By not implementing high security in the system, is the CEO breaching the Privacy
law? Justify your answer with examples.
Organisation should ensure data security accountability to always check for any attack of the
database
Use policies that will help to protect your organisation network services
Check any vulnerability that the organisation might have and come up with strategies
that will protect such challenges
Enforce strict data security policies in an organisation
Always make sure you monitor compliance of the policies in an organisation
Always manage patches
Assessment Task 4
ACBI decides to appoint a project management team to develop and manage Copyright,
ethics and privacy policy for IT environment. Governing body also found last few years there
are number of copyright and policy breaching incident happened among students and staff
members. Institute is very keen to develop a standard code of ethics, copyright and privacy
policy for everyone in the organization.
In order to manage copyright, ethics and privacy in ICT environment project team needs to
assess current ICT industry requirements and governing bodies legislation. Student needs to
follow Australian Copyright Law, ACS (Australian Computer Society) Code of conduct, The
Commonwealth ACT, and ACBI requirements.
Assessment Task
Copyright Act
Duration of Copyright and Infringement
Copyright laws for students
Copyright infringement policy
o The Internet
o Music
o Picture/Images
o Trademarks and Logos
Manage your own work (Plagiarism)
Inform stakeholders copyrights update and review information
Email and Messaging Policy
Information Security Policy
Internet Use Policy
IT Conditions of Use Policy
IT Infrastructure Policy
IT Security Policy
Website privacy notice.
In order to understand the assessment task student may need to search for the following
information:
1) Assess current Australian Copyright law and ensure that implies in your organization
IT environment
2) Ensure that team members are aware of Australian copyright law and how it affects
their work
All team members must show the sense of respect to all member of the public; they must
also show dignity, courtesy and sensitivity.
Must cooperate and create good relationship with other student
Must be honest in everything they engage especially university employees, management,
stakeholders and their fellow students.
Privacy of others is paramount and they must respect others especially management and
their colloquies
Ensure that they do not engage on criminal activities or harassment of other students or
any act that encourages bullying of employee or their student leaders, consultants,
contractors or any other public citizen.
o Perform an annual review of the entire manual, noting any areas of concern.
o Look for policies that may not apply to your organization any longer. Has your
company grown to the point that certain rules can no longer be effectively
managed?
o Have your by-laws changed? If so, your policies and procedures may need to
change, as well, so that the important documents are in alignment with each
other.
o Has the legal environment changed in a way that impacts your policies? For
example, have you moved to a different community? Are you conducting
international business now? Have your hired independent contractors? Take
the time to review current and pending employment legislation.
o Are your policies being effectively implemented and enforced?
o Are they accomplishing their objectives?
o Have you received any feedback from managers or employees on your
policies? Are they requesting any changes?
5) Develop appropriate code of ethics, both organizational and IT-specific
Develop code of ethics- develop elements of code of conduct to support for the
policies from organisational leadership, practical guidance
7) Institute regular reviews of team member's ethical work practices and feedback to
ensure correct application of the code
Obey the law set in place
Start what you stand for even if other people or team members have different
options
Exercise respect to your co-workers
Train workers to avoid conflicts of interest in your organisation
8) Ensure that stakeholders are aware of ethics code, and adjust appropriately following
stakeholder feedback
By offering face to face or one-on-one training- by training employees, it is easy to
comply to all rules or code of conduct if someone if trained to know what is right and
what is wrong.
Offer training courses that teach students on the importance of code of conduct in
school. Code of conduct can help everyone in the institution to comply with all
policies, rules and other university regulations
Provide employees and student handbooks that contain code of conduct guidelines
to allow everyone understand what is required to them to follow.
Put all noticeboards all regulations that guiding students and staff to follow and
adhere in day to day school activities.
Upload code of conduct to organisation intranet to allow everyone to read and
understand every part to allow compliance.
Submission Instructions
Please proofread your work.
Make a copy of your assessment. Submit your completed assessment to your Tutor/Assessor
for marking via the eLearning Platform using the following file name:
ICTICT610 – Assessment- YourName