Discuss about the Policies And Ethics Related To the HDS Companies.
The main objectives of the business processes involved in Hosted Desktop Solutions Company are to build websites for other companies. They also strive to provide hosted solutions mainly by utilizing the cloud concept. The main involvement of the project considered by the company is to improve the website of their own. The design of the website needs sufficient technical processes so that it may come up to the requirements of the modern markets. This report will develop a copyright policy and a procedure based document for the new project that is being implemented. This report will also make a new code of ethics based document so that the framework to be followed for making an ethical analysis is determined. Lastly, a privacy policy is also in place which will help in addressing the concerns of any privacy based concepts involved.
The Hosted Desktop Solutions Company is mainly situated in the IT hub of North Ryde, Sydney. The business aspects of the company is mainly utilized in providing IT based services such as the installation of software, hardware, network configuration and management. They are also involved with the development of company websites and their associated intranets and extranets. The prospective clients of the company are mainly acquisitioned from designer based companies and other similar individual companies who are not focused on the management of internal infrastructures associated to an IT department.
The purpose of the copyright policy is to outline the various roles and responsibilities that must be followed by the company in hand. This is mainly to be followed regarding the utilization of third-party materials. As those materials are to be protected and copyrighted, the utilization of copyright acts is a necessity for any company (Park 2015). The use of copyright protection to files is usually given to provide a legal protection prospects to assets involved with a company. These are usually given to the creators of contents who are basically given rights to protect their assets and also help in qualifying for protection.
The purpose of this copyright policy is to provide legal copyrighted protections on the website design made. The main objectives of this policy are to identify the inputs associated to the company. The inputs associated are the company based information (Haggart and Jablonski 2017). For making a new project, the company needs to associate with the client so that a signed contract is made regarding duplicity of the designs. The HDS Company needs to identify the various experts who might be able to suggest various copyright policy parameters.
The various objectives of the company are:
The definition of the copyright policy must be successfully implemented so that the frameworks associated to it are followed. This will also involve associating the various components associated such that the employees will be able to follow the framework associated. The utilization of this concept must be adopted to know the level of copyright protection of the resources associated in the company.
The company must identify their assets and make their own set of obligations. These will then be signed by the associated stakeholders who will also be signed by any further customers of the company. This will be present in the terms and condition section of the company rules.
The company needs to prepare a procedure document for providing a framework of processes to be followed. The main process involved is updating the company website. The process will be followed to meet the needs of the business.
The company is aimed at achieving a professional solution for their current website. The company also needs to carry out a stakeholder analysis which will involve knowing the demands of the stakeholders involved (Patton, Sawicki and Clark 2015). This will help the company to get a strong position in the market in terms of competition. The company also needs to improve their infrastructural requirements and their customer management systems.
This procedure document is addressed towards the betterment of the business processes involved in the company.
The company must address the procedure plan and make changes accordingly. As a result, the various aspects are to be complied and followed (So and Witter 2016). In addition, this must also be monitored so that the level of compliance with the procedure plan is analyzed.
In case of making an ethical analysis, the company needs to follow specific standards and rules which will help in addressing them.
It is the responsibility of the company to uphold work ethics in their workspace effectively which will in turn be used as a framework for serving businesses by the employees (Hevelke and Nida-Rümelin 2015). The company wishes that the employees must follow the standards such that professional business conduct can be effectively implemented.
The company needs to consider the demands of the stakeholder associated. The IT infrastructural services are to be provided only by using various resources such that it can be effectively addressed (Greenwood and Freeman 2018). The success of the company is mainly dependent on the trust made from the customers and the employees. The credibility of the services offered are gained after displaying their efficiency in their services.
The employees associated to the company are always considered due to their services. This will be also implemented after the adoption of the new project in the business activities. This will also help in increasing the employee satisfaction rate of the company and as such, it will help in increasing the company performance in the market.
The company is always associated to upholding the law from their end. This is usually done by considering the number of laws present in the company. The employees are also provided training in a frequent manner to get the required assessment of the company laws and policies. This will then be addressed in the normal processing of the business involved (Salazar, Crosby and DiClemente 2015). In addition, the privacy policy of the company is also considered as the customer information must never be sold and this will be complied according to the Data Protection Act.
Conflicts are a common problem which exists in various companies. The Hosted Desktop Solutions are to be effectively mitigating any conflict related occurrence inside the premises. This will then be resolved by involving experts in this manner (DeMartino et al. 2017). There are times where the impact of any business related operations falls on the personal lives of the people involved. It is then required to solve them so that the continuity of the resource is maintained. The management of the company must be efficient in handling these conflicts and safeguarding the best interests of the company.
The company resources are to be effectively maintained such that the misuse of it is reduced. These resources are the basic components used in the IT infrastructure of the company. The time, material and the components are to be properly documented. This will address the company resource optimization and will reduce any misuse associated with the company. In addition, the use of company resources are not be emphasized when considering any outsider activities. This will safeguard the resources and loss of it will be prevented.
This privacy policy of the company is mainly in place to denote the utilization of the information gathering system currently in place. The HDS Company is in place for ensuring that the privacy of the customers is always protected. If the customers are asked for detailed information, then it must be in accordance to the privacy policy.
HDS Company changes their privacy policy to stay updated in terms of their standards. It is thus required by the customers to check this policy from time to time (Acquisti, Brandimarte and Loewenstein 2015). The customer can apply for displaying the information associated which is mainly abided by the Data Protection Act, 1988. The information will be displayed in exchange for a minimal fee.
For providing services, we only collect information which will be used for the business processes. These include name of the company, company address, and company email id and company phone number (Bechmann 2014). In addition, we also collect the type of service that is being addressed and for this reason the business current solutions are also recorded.
The information we collect is mainly utilized for internal record filing. This information is also utilized for improving the services being offered. Lastly, we may send promotional emails for any new product launched.
The HDS Company is always committed on the security of its business aspects. This will be done to improve their business ratings in the market. For preventing any unauthorized access to the system, it is necessary to involve various physical and virtual security solutions.
The utilization of cookies in the system is mainly in place to collect information from the visitors that come in the website (Sicari et al. 2015). Using these web beacons, the efficient services are tailored to meet the needs of the business.
Conclusion
Thus, it can be concluded that the utilization of various policies and standards will help in addressing the needs of business. The company, Hosted Desktop Solutions will successfully be able to address their needs for upgrading their internal infrastructure. In addition, the new business prospects that will be formed will address all the policies and standards in place. This report has successfully discussed about a copyright policy and has made a procedure plan. This report has also analyzed a code of ethics policy which will help in ethical analysis. Lastly, a privacy policy has also been made for addressing the data privacy processes.
References
Acquisti, A., Brandimarte, L. and Loewenstein, G., 2015. Privacy and human behavior in the age of information. Science, 347(6221), pp.509-514.
Aufderheide, P. and Jaszi, P., 2018. Reclaiming fair use: How to put balance back in copyright. University of Chicago Press.
Bardach, E. and Patashnik, E.M., 2015. A practical guide for policy analysis: The eightfold path to more effective problem solving. CQ press.
Bechmann, A., 2014. Non-informed consent cultures: Privacy policies and app contracts on Facebook. Journal of Media Business Studies, 11(1), pp.21-38.
Bennett, C.J. and Raab, C.D., 2017. The governance of privacy: Policy instruments in global perspective. Routledge.
DeMartino, E.S., Wordingham, S.E., Stulak, J.M., Boilson, B.A., Fuechtmann, K.R., Singh, N., Sulmasy, D.P., Pajaro, O.E. and Mueller, P.S., 2017, May. Ethical Analysis of Withdrawing Total Artificial Heart Support. In Mayo Clinic Proceedings (Vol. 92, No. 5, pp. 719-725). Elsevier.
Greenwood, M. and Freeman, R.E., 2018. Deepening Ethical Analysis in Business Ethics. Journal of Business Ethics, pp.1-4.
Haggart, B. and Jablonski, M., 2017. Internet freedom and copyright maximalism: Contradictory hypocrisy or complementary policies?. The Information Society, 33(3), pp.103-118.
Hevelke, A. and Nida-Rümelin, J., 2015. Responsibility for crashes of autonomous vehicles: an ethical analysis. Science and engineering ethics, 21(3), pp.619-630.
Oleszek, W.J., 2014. Congressional procedures and the policy process. Sage.
Park, W.G., 2015. Economics of Global Copyright Policies: Impacts on US Multinational Investments.
Patton, C., Sawicki, D. and Clark, J., 2015. Basic methods of policy analysis and planning. Routledge.
Salazar, L.F., Crosby, R.A. and DiClemente, R.J., 2015. Research methods in health promotion. John Wiley & Sons.
Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A., 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer networks, 76, pp.146-164.
So, N. and Witter, S., 2016. The evolution of human resources for health policies in post-conflict Cambodia: findings from key informant interviews and document reviews. Liverpool: ReBUILD. Liverpool: ReBUILD.
Trepte, S., Teutsch, D., Masur, P.K., Eicher, C., Fischer, M., Hennhöfer, A. and Lind, F., 2015. Do people know about privacy and data protection strategies? Towards the “Online Privacy Literacy Scale”(OPLIS). In Reforming European data protection law (pp. 333-365). Springer, Dordrecht.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download