The report is based on managing of the copyrights, ethics and privacy of Hosted Desktop Solutions (HDS) which provides of hosted open source IT solutions to both small as well as medium sized businesses. The company is going to build a new business website as its current website is not managed well. The design of website is little back dated, and there is lack of functionality into the website (Fennelly 2016). The content of website is old as well as inaccurate which are not being updated for long time. Therefore, HDS is going to deliver hosted services from the equipments into the premises.
In this report, copyrights policies and procedures document, code of ethics document and privacy policies for HDS are summarized so as to mitigate the ethics and privacy related issues into the organization. The service requirements of the clients as well as business requirement are developed for HDS.
The main purpose of new website design for HDS is to promote their business online for continuing to grow as well as innovative their organizational culture to become more efficient as well as effective. Laws as well as services in license for the copyright are established in HDS to define the implementation of website following some of the copyright policies as well as procedures (Campbell, Jardine and McGlynn 2016). Intellectual property rights and copyrights policies as well as procedures are to be protected at the time of developing the website:
Protection of IP rights: Register the trademark and register the domain name which reflects the business trademark of HDS. The domain name allows others to access of new website. The internet addresses which ends with “.au” are being registered into Australian business (Bradner and Contreras 2017). In order to register with this domain name, the business should have to meet auDA’s policy on the domain name for eligibility.
Trademark protection: The trade secrets are not disclosure to any third party person. The organization should contain of legacy system which can protect the intellectual property of their business (Wheelen et al. 2017). The register of trademark provides of legal protection which prevents other business to use the same brand name.
Control of access and use of website content: The website of the business should be accessed by only the authorized person. Online agreements are used to only limit the license to be used the content available to the website. Encryption is used to safeguard the unlicensed use (Cohen et al. 2015). The conditional access system should check the identity of user and then identity the website content files.
Respect personal data of people: When the website is received of consumer information, then it is complied with applicable data protection as well as privacy laws (American Library Association 2016). The organization should ensure that personal identifiable information of the consumers are protected and displayed to privacy policy of the website.
Internal material: The materials which are shared into the website are to be protected by the copyright law. The internet carries of license in order to browse the website and create of external link to site (Senter et al. 2017). The website should carry of copyright notice and the copyright terms and conditions are defined scope of license granted to the end users.
Registering copyright: There is no such registration for the copyright protection into Australia as well as copyright protection is dependent on the copyright notice and symbol ©. The work is protected from time it is being recorded.
Design protection: Australia consists of framework to register the design of website into their database. Applications for the registration in order to design the website are filed with the design office of the IP Australia, those would assess if design of website is meet with the legislative requirements (Adelstein and Clegg 2016).
Those procedures are to be read with the copyright which would set the outline of the processes to manage the policy throughout the lifecycle. Those copyright policies as well as procedures are used to manage along with establishment of the business processes based on legislation compliance, license as well as creation of agreement to design the website (Resnik 2015). The employees of HDS follow all this copyright policies and regulations, so that a successful website is formed and developed.
Chief Information Officer has code of ethics, used to guide the principles which help to make decision. Codes help the client to meet with their requirements. Code of ethics help into safe as well as efficient development of the website so that the business can gain of more sales and gain of competitive advantage in the marketplace. The code of ethics provides framework to the ethical responsibilities of the professionals those are involved into the website development (Wood 2015). In order to do so, ethical guidelines are required to be adopted by HDS which are summarized as follows:
In relation to the following responsibilities of people, code of ethics is to be followed:
The privacy policy is intended to provide information on the policies as well as practices regards the collection of the personal information based on use of website and services (Westin and Ruebhausen 2015). In order to develop the website, a proper strategic planning is required so that all the privacy policies are to be followed properly. HDS has informal policies as well as procedures to manage increased growth. Following are the privacy policies for the case organization which is followed to securely development of website:
Secure the confidential information: The confidential information such as personal information and contact information of customers are kept secured from any unauthorized access (Waldman 2017). The personal data of customers are collected at the time of registration into the website which may be stolen from email or any other type of communication channel. For the visitors those are visiting the website of HDS, a log in session is required to create on the home page so that the visitor can sign up into efficient manner.
Transactional information: The financial information of the customers may be stolen at the time of transfer of finance from one place to other. The hackers should steal the password of the account and then may transfer the fund from their account (Adelstein and Clegg 2016). Therefore, all the transactional data should be kept secured with authentication password. When the company makes links with other websites to make the transaction, then at that time there are high chances of hacking of financial data and information.
Secure the customer’s information: The management of the personal information includes of privacy policy. While registering the customer into the website page, HDS requires collecting personal information of the customer such as name, age, sex, contact information and address (Senter et al. 2017). It is the responsibility of HDS to collect information and secure them into the company’s database so that none of unauthorized person can able to access it without prior permission of the owner. The company can access to the personal information of customer when it is required. Each of the privacy terms as well as conditions is applicable for the website to develop the business functions of HDS such as productivity, IT innovation and value creation.
Secure the e-mail messages: The networking capability of HDS is 4 years older, therefore their networking storage, sharing of files becomes difficult to perform. The email is being hosted throughout the Google app, and their website is also hosted externally (Westin and Ruebhausen 2015). When one person is shared any confidential messages throughout email, therefore there should be use of digital signature mechanism to secure the messages so that only authorized person can access to it. IT system monitoring along with maintenance are being taken throughout the internal IT. The customers of HDS should deal with the staffs properly when they gain trust (Bradner and Contreras 2017). Most of the clients think that the website should be good enough to provide required services. The internal infrastructure is used and maintained to meet with the performance demands of HDS.
Conclusion
It is concluded that most important is to secure the personal information of the customers which identifies the person personally. While registering the website of a company, it is required to collect information from the visitors to the website such as personal information, non-personal information such as IP address, cookies and others. From the entire study, it is concluded that in order to securely develop a website, a proper code of ethics are required to be followed. The purpose of HDS is to develop a secured website for clients so that they can achieve competitive advantage by following the copyright laws, privacy policies in addition to guidelines. Based on the “Australian copyright law”, the company adopted the policies of information technology and ensured the confidentiality, security along with availability of the data. HDS should implement of the ethical policies so that the employees can take proper decision regarding the development of website. It is also summarized that the privacy policies which are adopted into HDS Company are the legal documents which can use and manage the client’s data. Those policies are protected the privacy information of the clients from being hacked or stolen. The content of those policies are based on applicable law which are required to address requirements across the legal justifications.
References
Adelstein, J. and Clegg, S., 2016. Code of ethics: A stratified vehicle for compliance. Journal of business ethics, 138(1), pp.53-66.
American Library Association, 2016. ALA code of ethics.
Bennett, C.J. and Raab, C.D., 2017. The governance of privacy: Policy instruments in global perspective. Routledge.
Bradner, S. and Contreras, J., 2017. Intellectual Property Rights in IETF Technology (No. RFC 8179).
Campbell, J.D., Jardine, A.K. and McGlynn, J. eds., 2016. Asset management excellence: optimizing equipment life-cycle decisions. CRC Press.
Cohen, J.E., Loren, L.P., Okediji, R.L. and O’Rourke, M.A., 2015. Copyright in a global information economy. Wolters Kluwer Law & Business.
Fennelly, L., 2016. Effective physical security. Butterworth-Heinemann.
Liu, F., Wilson, S., Schaub, F. and Sadeh, N., 2016, November. Analyzing vocabulary intersections of expert annotations and topic models for data practices in privacy policies. In 2016 AAAI Fall Symposium Series.
Resnik, D.B., 2015, December. What is ethics in research & why is it important. In ideas.
Senter, L., Bennett, R.L., Madeo, A.C., Noblin, S., Ormond, K.E., Schneider, K.W., Swan, K. and Virani, A., 2017. National Society of Genetic Counselors Code of Ethics: Explication of 2017 Revisions. Journal of genetic counseling, pp.1-7.
Slavin, R., Wang, X., Hosseini, M.B., Hester, J., Krishnan, R., Bhatia, J., Breaux, T.D. and Niu, J., 2016, May. Toward a framework for detecting privacy policy violations in android application code. In Proceedings of the 38th International Conference on Software Engineering (pp. 25-36). ACM.
Squicciarini, A.C., Lin, D., Sundareswaran, S. and Wede, J., 2015. Privacy policy inference of user-uploaded images on content sharing sites. IEEE transactions on knowledge and data engineering, 27(1), pp.193-206.
Waldman, A.E., 2017. A Statistical Analysis of Privacy Policy Design.
Westin, A.F. and Ruebhausen, O.M., 2015. Privacy and freedom. Ig Publishing.
Wheelen, T.L., Hunger, J.D., Hoffman, A.N. and Bamford, C.E., 2017. Strategic management and business policy. pearson.
Wood, G.W., 2015. Communicating the ethos of codes of ethics in Australia’s largest organizations: a reliance on osmosis. In Proceedings of the 2000 Academy of Marketing Science (AMS) Annual Conference (pp. 425-429). Springer, Cham.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download