Any profession demands maintaining of proper working conduct from both the perspectives of an individual employee as well as the organization. It depends on the legislative and ethical measures adopted by the country the organization is established in. The organizations are obligated to follow these laws otherwise they might be considered as unlawful and any kind of legislative steps can be taken against them (Bennett and Raab 2017). Thus, the following report would be based on the personal perspective of an individual on how an organization established in Australia and working under Information and Communication Technology environment maintains all the professional and ethical conducts.
This would be justified in the report in four parts. The first part would relate an organization’s intellectual property and copyright properties with that of the standard codes of conducts. The next part would include the understanding of the Privacy Laws in an organization according to the ACS privacy and integrity protection laws. The third part would have the ethical codes of conducts and finally the fourth and last part would present an understanding of the entire research with the help of a meeting held between two people that summarize the understanding of the entire research done so far.
Part A: Intellectual property and copyright
An introduction to the Copyright Laws in Australia
According to the Intellectual Property Rights as mentioned in the Australian Laws, it can be stated that all the Divisions according to the Copyright Act 1968 clearly points out the fact that all in an ICT environment, the creators are subjected to produce original works in their scope of specialization. In addition to this, any work that does not acknowledge the original creator while referring to their creations can be penalized in every possible way according to the legal proceedings of Australia (Bennett and Raab 2017). Thus, it is understandable that every work must be original, and when it refers to the original works of a creator, he or she should be given proper acknowledgement for the task. This includes artistic works presented offline or online, subject matters and creations like poems, paintings and others.
How to implement Copyright Law for Australia should be enrolled in the organization
Since, the company in discussion is an ICT based organization; all the laws presented in the Australian Copyright Law should be applicable in the organization. This is to specify that the integrity of the original creators should be maintained. Thus, within the organization, it should be specified that the use of any original idea to create any work should be properly acknowledged and it should be applicable to all the hierarchy levels of the organization (Suominen et al. 2016).
These should be included in the business policy and that should be spread within the entire organization (Warren and Lucas 2016). Any person who does not follow the same should be penalized harshly and if the continuation of the same occurs again, the employee would be terminated. The entire workforce in the organization should be specifically made aware of the company policies prepared on the basis of the Australian Copyright Law.
Areas covered by copyright legislation
Ownership and Infringement of copyright works: Every original work must be properly referred to acknowledge the original creator and any the copyrighted works should be given special attention for this matter. Any infringement in the copyright laws may lead to serious consequences for every employee in the workplace.
Subject-Matter, other than Works, in which Copyright Subsists: As an ICT organization, it is necessary that the broadcasting of any product created on the pretext of the organization should be original or should be given proper credit to the original content and creator when referred as. It can be exempted on account of non-copyrighted materials but shall be maintained for any copyrighted creation.
Miscellaneous: The subsistence of copyright under any provision of this Part does not affect the operation of any other provision of this Part under which copyright can subsist.
Ownership and Infringement of copyright works: The employees in the organization should enable implementing their own ideas and taking reference from the copyrighted works only when required (Leicester 2016). A database can be maintained in accordance to this to maintain proper acknowledgement ideas.
Subject-Matter, other than Works, in which Copyright Subsists: It must be paid attention to that the employees use copyrighted work for their day to day references.
Miscellaneous: It should be kept in mind by every employee that they must report every work to their seniors for proper monitoring regarding this matter (Chatfield and Reddick 2018).
Change recommendation to align the policy
The organization is advised to use copyrighted material when needed and focus more on creating original document while production for abiding with the copyright policy.
Procedure to maintain one copyright law
The workforce is advised to produce original document as much as possible and take little help from the copyrighted or non-copyrighted materials.
Distribution of revised policy
The existing staff would be handed over a document covering all the new business policies applied and would be informed by personal mails as well.
The new staff would be made aware of the new business policies via the orientation program, and would be handled over with the printed copy of the business policies as well.
The management would be informed through individual mails and by conducting a meeting that would make them aware of the changes in the company’s policy and should be told to pass them over to the subordinates as much verbally as possible.
The external stakeholders shall be shared a mail consisting of all the information regarding the changes with detailed report and instructions about the conditions before and after the change management application.
Part B: Privacy
Overview of the Privacy Policy for Yahoo
Privacy Policy in Yahoo describes that protected and secured information are always kept intricate within the organization and all the user data is also kept safe from any kind of breaches capable of occurring (Dženopoljac, Janoševic and Bontis 2016).
Aim of the privacy policy
The privacy policy is aimed particularly at the users who are being provided with the web services offered by the organization (Dutfield 2017). It has a broad scope of maintaining user data and providing the users with confidentiality with the web services they use to send or receive data.
Privacy Legislation
The privacy policy for the security maintenance of user data that has been maintained, stored and managed within the organization of Yahoo, abides by the Privacy Policy Laws as mentioned in the country’s legislations (Burmeister 2017).
Table for Identification
APPs applicable to the organization |
Shortfalls between the organization and the APPs |
Policy of the organization that exceeds the requirement of APPs |
The modifiable Data Breaches (NDB) scheme under Part IIIC of the Privacy Act 1988 (Privacy Act) |
The Information sharing and disclosure scheme |
Changes in the policy of the organizations |
The changes those are required in this aspect is the changes regarding the security of the user data which is found to be a little tricky in terms of storage, since it is found to be extremely prone to data compromise (Baldwin and Henkel 2015).
Part C: Ethics
Review of one of the company’s ethical code
The organization focuses on the providing of their services in accordance to the enhancement of the Primacy of the Public Interest. This means that the business organization strictly follows the ethical conduct all the services provided for the company should be working in favor of the customer primarily (Pila and Torremans 2016).
Comparison with ACS codes of Ethics
The first and foremost policy of the ACS codes of conduct mentions that the services provided by any ICT based company should work in favor of the customer’s requirements, which is ardently followed as per the organization’s ethical policy. This policy should be maintained in an organization as the first and foremost obligation of a company is to abide by the requirements of the clients and customers.
Creating own code of ethics
It should be specified that use of any unfair means to finish a work with the use of illegal applications over the web is absolutely prohibited within the organization. Any person found to be using the same should be highly penalized (Birkbeck 2016). This should be reviewed and monitored with the use of applications to map the online activities of each employee in the organization.
Review and Grievance Process
The documents for the review and grievance policy should be prepared in accordance to the applied ethical code as below:
Thus it can be stated from the above report that the Australian codes of Conducts and Copyright laws are essentially helpful to maintain the integrity of original creation and this should be implemented in every organization to acknowledge the works of original creators. The workforce should be encouraged to create original works for the organization and should also be recommended to use proper acknowledgements of the copyrighted works used as a reference. This has been concluded with the help of the following report based on the personal perspective of an individual on how an organization established in Australia and working under Information and Communication Technology environment maintains all the professional and ethical conducts.
This had been justified in the report in four parts. The first part relates an organization’s intellectual property and copyright properties with that of the standard codes of conducts. The next part includes the understanding of the Privacy Laws in an organization according to the ACS privacy and integrity protection laws. The third part has the ethical codes of conducts and finally the fourth and last part presents an understanding of the entire research with the help of a meeting held between two people that summarize the understanding of the entire research done so far.
Baldwin, C.Y. and Henkel, J., 2015. Modularity and intellectual property protection. Strategic Management Journal, 36(11), pp.1637-1655.
Bennett, C.J. and Raab, C.D., 2017. The governance of privacy: Policy instruments in global perspective. Routledge.
Birkbeck, C.D., 2016. The World Intellectual Property Organization (WIPO): A Reference Guide. Edward Elgar Publishing.
Burmeister, O.K., 2017. Professional ethics in the information age. Journal of Information, Communication and Ethics in Society, 15(4), pp.348-356.
Chatfield, A.T. and Reddick, C.G., 2018. The role of policy entrepreneurs in open government data policy innovation diffusion: An analysis of Australian Federal and State Governments. Government Information Quarterly, 35(1), pp.123-134.
Dutfield, G., 2017. Intellectual property rights and the life science industries: a twentieth century history. Routledge.
Dženopoljac, V., Janoševic, S. and Bontis, N., 2016. Intellectual capital and financial performance in the Serbian ICT industry. Journal of Intellectual Capital, 17(2), pp.373-396.
Ferguson, S., Thornley, C. and Gibb, F., 2016. Beyond codes of ethics: how library and information professionals navigate ethical dilemmas in a complex and dynamic information environment. International Journal of Information Management, 36(4), pp.543-556.
Leicester, N., 2016. Ethics in the IT Profession: Does a Code of Ethics have an Effect on Professional Behaviour?.
Pila, J. and Torremans, P., 2016. European intellectual property law. Oxford University Press.
Suominen, H., Müller, H., Ohno-Machado, L., Salanterä, S., Schreier, G. and Hanlen, L., 2016. Prerequisites for international exchanges of health information: Comparison of Australian, Austrian, Finnish, Swiss, and US privacy policies. arXiv preprint arXiv:1612.04902.
Warren, M. and Lucas, R., 2016. Ethics and ICT: Why all the fuss?. Journal of Information, Communication and Ethics in Society, 14(2), pp.167-169.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Contribute To Copyright, Ethics And Privacy In An ICT Environment. Retrieved from https://myassignmenthelp.com/free-samples/ictict418-contribute-to-copyright-ethics-and-privacy-in-an-ict-environment/environment-maintains.html.
"Contribute To Copyright, Ethics And Privacy In An ICT Environment." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/ictict418-contribute-to-copyright-ethics-and-privacy-in-an-ict-environment/environment-maintains.html.
My Assignment Help (2021) Contribute To Copyright, Ethics And Privacy In An ICT Environment [Online]. Available from: https://myassignmenthelp.com/free-samples/ictict418-contribute-to-copyright-ethics-and-privacy-in-an-ict-environment/environment-maintains.html
[Accessed 19 April 2021].
My Assignment Help. 'Contribute To Copyright, Ethics And Privacy In An ICT Environment' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/ictict418-contribute-to-copyright-ethics-and-privacy-in-an-ict-environment/environment-maintains.html> accessed 19 April 2021.
My Assignment Help. Contribute To Copyright, Ethics And Privacy In An ICT Environment [Internet]. My Assignment Help. 2021 [cited 19 April 2021]. Available from: https://myassignmenthelp.com/free-samples/ictict418-contribute-to-copyright-ethics-and-privacy-in-an-ict-environment/environment-maintains.html.
You have just completed your essay assignment, but there’s a constant fear regarding the final word count of the paper. Well, it’s a common feeling among students. According to general college paper format, you cannot exceed a certain amount of word count while drafting the paper. So, the better suggestion for you is to use online words counter tool. If you want to access the latest version of word counter, there is no better place than MyAssignmenthelp.com. The best part is you get to use the online word count tool at free of cost. You can even count the number of pages by setting the font and spacing of the document.
Answer: The aim of the report is to provide an insight into 3M, a Mining and Manufacturing Company, located in Minnesota. Five young entrepreneurs found the company that remained in the business for 100 yrs. Every stage of 100-year history of 3M has been a combination of enterprise and ingenuity (3m.com 2018). The report focused on the primary factors contributing to innovation, the importance of the commercialization for an innovative company l...
Read MoreAnswer: The business analysis has a significant role to play in the implementation of any project, which comprises of project development and project testing. The managers in the development department needs business analysis decisions, to help in modeling the internal business processes, data flow, to identify the critical components which impacts the performance and to prepare the test plans (Carlberg, 2010). Any business depends o...
Read MoreAnswer: Challenges encountered in the construction of the project While conducting the website design and management project it has been found that there are many challenges that may interrupt the success of the project. In order to initiate the project or evaluate the website design and management project the project manager should develop a scope statement. Besides the scope statement if accurate project objectives are not developed by then...
Read MoreAnswer: Robert L. Frank Construction Company was engineering as well as Construction Company serving petroleum, chemical, mining as well as food processing industries from its headquarters. The services for the company are engineering, inspection, construction, consultation as well as purchasing (Snyder, 2013). The identified risks for Lewis Project are that the project is over budget as well as was not progressing to satisfy the customer. Th...
Read MoreAnswer: Introduction The stream of art is popularly known and offers wide opportunities among students in various fields like mass communication, teaching, counselling and many others. The main subjects’ options available in art are Drama, Dance, Media arts, Music and Visual Arts. Drama as a subject helps in understanding the difference between reality and portrayal. Drama as an art requires seriousness towards work and develops deep co...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
THANK YOU SO MUCH FOR YOUR ASSISTANCE AND HELP DURING THESE TIMES! YOU ARE ALL AMAZING
Australia
happy with the work happy with the work happy with the work happy with happy with the work h the work happy with the work happy with the work happy with the work happy with the work happy with the work happy with the work happy with the work happy wi...
Australia
happy with the work ,happy with the work happy with the work happy with the work happy with the work happy with the work happy with the work happy with the work happy with the work happy with the work happy with the work happy with the work happy wit...
Australia
Written really well and answered the questions well. Straight to the point and citations are placed well. Well informated.
Australia