Contemporary Issues in Management
March 8, 2023Do you agree with the ‘long decline’ paradigm for Late Byzantine history
March 8, 2023Copyright policy documentation for the Training R Us Company
nName:
nCourse:
nInstitution:
nInstructor:
nDate:
n
nCopyright policy in an ICT environment
nIntroduction
nCopyright policy provides people who have written or created creative materials with rewards for sharing their creative works with other people (Harris, 2014). Copyright policy also guarantees the creators of creative works with compensation when other people use the copyright protected materials in certain ways. Training R Us is a company based in Australia that provides online courses services. It has a copyright policy that is designed in line with the copyright policy in the Australian constitution. This paper will first provide an insight on how the copyright policy of Training R Us relates with the copyright law of Australia. It will then discuss the appropriate strategies that can be implemented to promote the ICT teams copyright laws adherence. The paper will show how these strategies will be monitored and how changes in the policy will be communicated to the team members. The aim of this paper is to provide an effective copyright policy to the Training R Us Company with that will help the company to adhere to the ethics in an ICT environment.
nPolicy review
n Just like in the Australian copyright policy, the copyright policy of the company protects creative works such as literary works and any artistic works. This ensures that the team members of the company obtain permission to use any copyright protected materials. When using copyright protected materials, TRS allows its members to use only very short quotes from other peoples creative works. This is because this can be termed as fair use. This is in line with the Australian copyright policy 1968 as the information is used for educational purposes and not for commercial uses which can be termed as fair use (Austlii.edu.au, 2015). When using foreign copyright protected materials, TRS ensures that its operations are in line with the Australian copyright policy of 1968 which applies to quite a number of countries.
nThe Training R Us Company ensures that its members obtain rights globally when using works from web sources as these are protected as digital works in the Australian copyright policy 1968 (Austlii.edu.au, 2015). The companys policy also ensures that its members use the right procedures when obtaining permission to use copyright protected materials. One is expected to contact the owner of a copyright protected material directly when the company is not operating with the copyright policy. The company provides all the necessary procedures that one should take when seeking to use these materials, which promote the adherence with the Australian copyright policy 1968 among its members. TRS supports the eradication of copyright infringement as per the Australian copyright policy 1968 by encouraging its employees to observe the rules relating to the use of copyright protected materials and to also act as watchdogs to their fellow employees in the use of such materials. The company takes major disciplinary actions towards any employees who do not adhere to these rules.
nStrategy for promotion
nIn order to promote copyright knowledge in the TRS Company, several strategies can be put in place. To start with, while inducting new employees in the company, they should be educated about issues relating to copyright laws. Every person recruited to work in the company should sign a copyright policy agreement before commencing work so as to declare that he/she will never use any work in a way that will infringe the copyright laws. The company should also create programs to inform its employees about any changes in the copyright laws affecting them.
nConclusion
nTo ensure that the employees in TRS Company adhere to the laws under the companys copyright policy, several strategies can be implemented. To start with, there should be effective, communication with any changes to the laws relating to the copyright policy to ensure that the employees are updated with the changes. The other effective strategy would be to put effective disciplinary actions against any employee who acts in any way that infringes the copyright laws. This could be through the termination of a job or making the person face charges in a court of law. The company should also reward those employees that display a good record in observing the laws related to the companys copyright policy.
n
nPrivacy policy in an ICT environment
nIntroduction
nPrivacy is the right of people to safeguard their personal life from being invaded and to control how their personal information flow (Australia.gov.au, 2015). Training R Us is an online certification provider. In order to get a certificate you have to register with them by providing them with your personal information. This paper will review Training R Us Companys privacy policy and provide strategies that would ensure that the organization adheres to this policy. It will also provide an example of an organization that has an IT related breach of the Australian privacy policy. The aim of this research paper is to provide strategies for promoting adherence to the Australian privacy policy in the Training R Us Company.
nPrivacy policy review
nAustralian law dealing with privacy is known as the “Privacy Act 1988”. Information Privacy Principles (IPPs) are the privacy rights stipulated in section 14 of the act (Oaic. Gov. au, 2015). The collection of personal information by an organization is governed by these principles. An organization should only collect information if its relevant to its functions. Australians have the right to know why certain information about them is being acquired and the parties, which will be able to view that information (Oaic.gov.au, 2015). The organization holds the obligation of ensuring that information is not lost or exploited since they are in charge of storing the information. An Australian has a right to access the information except when it is specifically prohibited by law.
nTraining R Us, under the “privacy act 1988”, are bound by the Information Privacy Policy. This is with respect to obtaining, using, storing and leaking personal information. Training R Us collects peoples personal information in order to efficiently carry out its own functions. They collect information such as name and email address to authenticate users and also to send notifications to users who relate to their service (Oaic.gov.au, 2015). This is an instance showing how Training R Us adhere to the Australia privacy act 1988. Also, users have the ability to access their information on the portal and they can edit it just as stipulated in the act. A user can also specify which information about them is public and which is private. This is in accordance with the privacy act since a user has the ability to specify who is viewing their information. Training R Us take reasonable measures to protect information of members which is stored within their database by restricting access of the employees to the data. This is in accordance with the act which stipulates that an organization holds the obligation of ensuring that information is not lost or exploited.
nStrategy for ensuring privacy policy
nTo ensure privacy policy is reflected in the work practices of the team, the team members should be familiarized with internal privacy policies, processes and procedures. The team should undertake regular privacy training to help them manage privacy risks. During project planning, privacy should be considered in order make sure that the policy reflects current legislation. A key privacy officer should be engaged during the planning phase of the project. To ensure the team is aware of its responsibilities, every team member should be educated on their role in ensuring privacy. Introduction of feedback system from users narrating their experiences and suggesting what they would like to be changed would help in pinpointing necessary changes to working practice.
nConclusion
nSnap chat is a messaging app that lets users send images and texts that disappear a few seconds (Hill, 2015). However, it was discovered that snap chat users had ways of getting copies of other users photos permanently. The leaking of photos can affect the users of Snap chat due to factors such as cyber bullying. The organization is affected by the negative publicity. The company might also face harsh penalties, including multimillion-dollar fines (Hill, 2015). This breach could have been prevented by ensuring that the photos were encrypted when being transmitted. The team should also monitor third party software, which allows users to capture the photos and remove them from Google and Apple app stores. Therefore, organizations should ensure that they adhere to the privacy policy rules, as non-adherence would lead to major repercussions.
n
nReferences
nAustlii.edu.au. (2015). Copyright act 1968. Retrieved 14 August 2015, from http://www.austlii.edu.au/au/legis/cth/consol_act/ca1968133/
nAustralia.gov.au. (2015). Privacy policy. Retrieved 15 August 2015, from http://www.australia.gov.au/privacy-policy
nHarris, L. (2014). Canadian Copyright Law, Fourth Edition. Retrieved 14 August 2015, from http://canadiancopyrightlaw.ca/what-is-a-copyright-policy-or-copyright-guidelines/
nHill, S. (2015). Snap chat and the Liability Conundrum. Retrieved 15 August 2015, from http://knowledge.wharton.upenn.edu/article/snapchat-shawndra-hill/
nOaic.gov.au. (2015). Privacy fact sheet 17: Australian Privacy Principles. Retrieved 15 August 2015, from http://www.oaic.gov.au/privacy/privacy-resources/privacy-fact-sheets/other/privacy-fact-sheet-17-australian-privacy-principles