_Contribute to Org PrivacyCP_Assessment 2
docx
keyboard_arrow_up
School
TAFE NSW - Sydney Institute *
*We aren’t endorsed by this school
Course
ICT50615
Subject
Business
Date
Jan 9, 2024
Type
docx
Pages
9
Uploaded by AdmiralPheasantPerson135
ABN: 19 080 559 600 | CRICOS CODE: 01856K | RTO: 90501
T.
+61 2 9283 4388 | E.
info@wic.nsw.edu.au
Lower Ground, 101 Sussex St., Sydney NSW 2000 Australia | www.wic.nsw.edu.au
Diploma of Systems Analysis and Design
Contribute to Organisational Privacy and Contingency
Plans
Due Date:
Sunday, 02 June 2019
Contribute to organizational privacy and contingency plans
- Assessment Task 2
LAST
UPDATED:
December 2015, Version No. 3.0
Page 1
of 9
ABN: 19 080 559 600 | CRICOS CODE: 01856K | RTO: 90501
T.
+61 2 9283 4388 | E.
info@wic.nsw.edu.au
Lower Ground, 101 Sussex St., Sydney NSW 2000 Australia | www.wic.nsw.edu.au
Task 1-Multiple choice Questions: 1)
Intellectual Property Rights (IPR) protect the use of information and ideas that are of
a)
Ethical value
b)
Moral value
c)
Social value
d)
Commercial value
2)
The term ‘Intellectual Property Rights’ covers
a)
Copyrights
b)
Know-how
c)
Trade dress
d)
All of the above
3)
The following cannot be exploited by assigning or by licensing the rights to others.
a)
Patents
b)
Designs
c)
Trademark
d)
All of the above
4)
The following can be patented
a)
Machine
b)
Process
c)
Composition of matter
d)
All of the above
5)
Which of these rights isn't generally regarded as part of designs law?
a)
Registered designs law
b)
Copyright
c)
Trade mark law
d)
Design Right under Part III of the CDPA
6)
To enforce copyright to prevent a product from being copied:
a)
The claimant's product must be represented in an artistic work.
b)
Articles made to the design must have been marketed.
c)
The defendant's product must be a substantial copy of the claimant's product.
d) The claimant's designer must have created the design for the claimant's product in the form of a drawing or a model that is an artistic work.
Contribute to organizational privacy and contingency plans
- Assessment Task 2
LAST
UPDATED:
December 2015, Version No. 3.0
Page 2
of 9
ABN: 19 080 559 600 | CRICOS CODE: 01856K | RTO: 90501
T.
+61 2 9283 4388 | E.
info@wic.nsw.edu.au
Lower Ground, 101 Sussex St., Sydney NSW 2000 Australia | www.wic.nsw.edu.au
7)
Copyright law protects:
a)
Tangible property.
b)
Intangible property.
c)
The name of a particular good or service.
d)
Ideas contained in varied forms of expression.
8)
While sharing some similarities, committing plagiarism and violating copyright are different because plagiarism involves:
a)
Using someone else's work as if it were your own.
b)
Distributing someone else's work.
c)
Reproducing someone else's work.
d)
All of the above.
9)
The exclusive rights that apply to copyright owners include the right of:
a)
Public distribution of the work.
b)
Reproduction of the work.
c)
Preparation of derivative works.
d)
All of the above.
10) Before a copyrighted work like a book may be printed:
a)
The book must be registered with the Copyright Office.
b)
Consent of the copyright owner must be obtained.
c)
The copyright symbol must be affixed to the book.
d)
None of the above.
11) Excluding "work for hires," a sole-authored original work created after 1978 receives copyright protection for:
a)
56 years.
b)
95 years.
c)
67 years.
d)
The life of the creator plus 70 years.
12) The Digital Millennium Copyright Act (DMCA):
a)
Provides exemptions from copyright infringement claims to Internet service providers (ISPs) who are merely acting as conduits.
b)
Establishes compulsory licensing for the transmission of music over the Internet.
c)
Prevents the circumvention of technological measures designed to protect copyrighted works.
d)
All of the above.
Contribute to organizational privacy and contingency plans
- Assessment Task 2
LAST
UPDATED:
December 2015, Version No. 3.0
Page 3
of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ABN: 19 080 559 600 | CRICOS CODE: 01856K | RTO: 90501
T.
+61 2 9283 4388 | E.
info@wic.nsw.edu.au
Lower Ground, 101 Sussex St., Sydney NSW 2000 Australia | www.wic.nsw.edu.au
13) Basil is a designer who works for Meteor Motors Ltd, a company which manufactures specialist sports cars which are built on a timber frame. For a forthcoming press release about a new model of car (the Meteor Merlin), Basil made a three-dimensional space-frame replicating the new revolutionary timber frame to be used for the Merlin. He built it from engineering drawings using balsa wood (a very lightweight wood which possesses little strength but is useful for modelling) with glued joints. The real cars will be built using a strong ash frame with sturdy bolted joints. Which one of the following best describes Basil's balsa wood and glue space-frame from a copyright perspective?
a)
It is not protected by copyright as copyright does not protect industrial designs
b)
It is not an artistic work on the basis of being a sculpture or a work of artistic craftsmanship.
c)
Anyone copying the space-frame will infringe the copyright in the drawings indirectly as these
are protected irrespective of artistic quality
d)
As the space-frame will not be seen in normal use of the Merlin, being covered by metal panels and body parts, there can be no artistic copyright (which requires eye-appeal) in the frame nor in the drawings as these lack artistic quality, being engineering drawings
14) Roger is a computer programmer and is employed by a software development company known as Programmers R Us Ltd. A retail organisation known as Acme Trading Ltd asked Programmers R
Us to write some computer software to handle Acme's accounts and paid Programmers R Us a fee of £87,500 for the work. All the work was carried out by Roger at Acme's premises and on Acme's computer during a period of 10 months. Roger was paid an hourly rate (£17.25 per hour) by Programmers R Us for his work on the project. There is nothing in writing to say who owns the copyright subsisting in the computer software and there is no written assignment of copyright. There is no express or implied agreement as between Roger and Programmers R Us as
to copyright ownership. Which one of the following most accurately describes the position as regards ownership of copyright in the computer program?
a)
Roger owns the copyright at law and at equity as he created the software. Any presumption that his employer, Programmers R Us owns it is displaced because he created the software at Acme's premises and using Acme's equipment
b)
Acme Trading Ltd owns the legal and beneficial copyright in the software because it paid for it
to be written, there was no agreement to the contrary and Programmers R Us owes a fiduciary duty to Acme
c)
As there was no formal assignment of copyright complying with the Copyright, Designs and Patents Act 1988, Programmers R Us is the first owner of the legal title to the copyright as Roger created the software as an employee in the course of his employment. However, a court is likely to hold that Acme is the beneficial owner of the copyright or at least has an implied licence to continue to use it
d)
Acme Trading and Programmers R Us are joint owners of the legal and beneficial copyright. This will enable Acme to continue to use the software and both Acme and Programmers R Us to licence the software to third parties
Contribute to organizational privacy and contingency plans
- Assessment Task 2
LAST
UPDATED:
December 2015, Version No. 3.0
Page 4
of 9
ABN: 19 080 559 600 | CRICOS CODE: 01856K | RTO: 90501
T.
+61 2 9283 4388 | E.
info@wic.nsw.edu.au
Lower Ground, 101 Sussex St., Sydney NSW 2000 Australia | www.wic.nsw.edu.au
15) Naomi MacDonald is a poet who wrote a series of poems on the theme of 'The Four Seasons' for Limerick Publishing plc ('LPP'). Naomi granted LPP an exclusive licence to publish the poems as a collection in book form under the name 'The Four Seasons Poems'. There were no terms in the licence agreement relating to Naomi's moral rights. LPP published and sold the entire print run of 800 copies of the book with Naomi being acknowledged as the author on the cover and flyleaf.
However, LPP decided not to reprint the book and informed Naomi accordingly. Naomi subsequently assigned the copyright in her Four Seasons Poems to Epic Sagas Ltd ('ESL'). A term in the assignment stated that Naomi was to be identified as author under her newly adopted pseudonym 'Helena Campbell'. ESL duly printed copies of the poems and put them on sale. They bore the author's name as Naomi MacDonald as a result of an oversight by ESL's printing sub-
contractor. Which one of the following statements is correct?
a)
ESL is in breach of Naomi's right to be identified as author as she specified the pseudonym 'Helena Campbell' in the assignment and that form of identification only must be used
b)
Although there is potential liability for failing to use the specified form of identification, ESL is
not liable as the mistake was that of its printing sub-contractor who will be liable to Naomi for its error
c)
As the book of poems was lawfully first published with the name Naomi MacDonald as author, this overrides any later assertion of the right to be identified as author
d)
There is no infringement of Naomi's right to be identified by author by ESL as using her real name to identify her is a reasonable form of identification
Contribute to organizational privacy and contingency plans
- Assessment Task 2
LAST
UPDATED:
December 2015, Version No. 3.0
Page 5
of 9
ABN: 19 080 559 600 | CRICOS CODE: 01856K | RTO: 90501
T.
+61 2 9283 4388 | E.
info@wic.nsw.edu.au
Lower Ground, 101 Sussex St., Sydney NSW 2000 Australia | www.wic.nsw.edu.au
16) Frederick is a well-known commercial artist who is employed by Graphic Designs Ltd ('GDL'). As part of his employment duties, Frederick produced an original drawing depicting an angler fishing from a boat in the process of reeling in a large barracuda fish. The drawing captured the excitement of the event. Frederick's name did not appear on the drawing. GDL assigned the copyright in the drawing to Southern Sports Ltd ('SSL'), which applied copies of the drawing to T-
Shirts, which were sold in large numbers to keen anglers. A charitable organisation, Campaign Against Cruel Sports ('CACS') started placing advertisements which include a copy of Frederick's drawing but with the head of the angler replaced by the head of a monstrous devil and to which a slogan had been added stating 'All anglers are sub-human fiends'. CACS did not have SSL's permission to copy or modify the drawing. Frederick was incensed when he saw CACS's advertisement. Which one of the following statements is correct?
a)
If Frederick sued CACS on the basis of the moral right to object to a derogatory treatment of his drawing, CACS would escape liability if it raised a defence based on freedom of expression
under Article 10 of the Council of Europe Convention for the Protection of Human Rights and Fundamental Freedoms
b)
As Frederick does not own the copyright in the drawing he has no remedies under copyright law
c)
As Frederick's name does not appear on the drawing he cannot object to the treatment of the work as the right only applies if the author is identified as such on copies of the work
d)
Frederick has a right to object to a derogatory treatment of his work as the modification was not made by or with the authority of the copyright owner providing it amounted to a distortion or mutilation of his drawing or is otherwise prejudicial to his honour or reputation
17) In relation to infringement of an original work of copyright, which one of the following statements is not correct?
a)
Substantiality is more concerned with quality rather than quantity, in other words, it is the importance of the part taken to the work that has been copied which is the predominant question
b)
Copyright infringement requires, essentially, three things to be shown (i) that copyright subsists in the claimant's work, (ii) that the defendant has copied from the claimant's work (directly or indirectly), and (iii) that the part copied by the defendant is a substantial part of the claimant's work
c)
The part taken from the claimant's work must be a substantial part of that work but need not be a substantial part of the defendant's work
d)
Where an artistic work is copied by converting it from three-dimensions to two-dimensions, or vice versa, the copy must, in the eyes of a non-expert, look like the work copied
Contribute to organizational privacy and contingency plans
- Assessment Task 2
LAST
UPDATED:
December 2015, Version No. 3.0
Page 6
of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ABN: 19 080 559 600 | CRICOS CODE: 01856K | RTO: 90501
T.
+61 2 9283 4388 | E.
info@wic.nsw.edu.au
Lower Ground, 101 Sussex St., Sydney NSW 2000 Australia | www.wic.nsw.edu.au
18) Privacy in Australia is overseen by:
a)
Australian Security Intelligence Organisation
b)
Australian Securities Commission
c)
The Privacy Commissioner
d)
The Privacy Ombudsman
19) The legislation which sets out the rules for privacy in Australia is called:
a)
The Official Secrets Act
b)
The Freedom of Information Act
c)
The Corporations Law
d)
The Privacy Act
20) The Privacy Act applies to whom?
a)
Government departments only
b)
Large corporations only
c)
Private enterprise only
d)
All of the above
21) The Privacy Act is concerned with how all personal information is used and stored. This statement is:
a)
True
b)
False
22) People have rights to access information a company or Government Department holds about them.
a)
True
b)
False
23) An organisation should only use or disclose a person's information for the purpose it was collected unless the person has consented to it being used in another way.
a)
True
b)
False
24) Define morality
a)
What is considered as correct within a society
b)
Making the right decision's where there is a chance to do wrong
c)
Defining what is right and wrong for an individual or a community
d)
Where individuals have a conscious choice to make a right and ethical decision
Contribute to organizational privacy and contingency plans
- Assessment Task 2
LAST
UPDATED:
December 2015, Version No. 3.0
Page 7
of 9
ABN: 19 080 559 600 | CRICOS CODE: 01856K | RTO: 90501
T.
+61 2 9283 4388 | E.
info@wic.nsw.edu.au
Lower Ground, 101 Sussex St., Sydney NSW 2000 Australia | www.wic.nsw.edu.au
25) What is business ethics?
a)
The study of business situations, activities, and decisions where issues of right and wrong are addressed
b)
Defined as decisions organisations make on issues that could be considered right or wrong
c)
Ethics that can be applied to an organisation’s practises
d)
Ethical processes businesses use in order to achieve a good ethical standard
26) Which is not
a reason a business engages in business ethics?
a)
To recover a company’s image after a notorious business scandal
b)
To avoid the loss of a good corporate image or being sued for misconduct
c)
To enhance global relationships
d)
To enhance stakeholder relationships
e)
To act with real commitment
f)
To build corporate reputation
27) Which one is a purpose of Privacy?
a)
protects individuals from misuse of their personal information
b)
protects the rights of owners of published and unpublished material
c)
ensures equal rights regardless of gender, ability, religion or ethnicity
d)
protects the good name and reputation of individuals and businesses
28) There are 10 National Privacy Principles. Which of the following is not
the privacy principle?
a)
Organisations must give people the option to interact anonymously whenever it is lawful and practicable to do.
b)
Generally speaking, an organisation should not give an individual access to personal information it holds about that individual on request.
c)
An organisation must take reasonable steps to make sure that the personal information it collects, uses or discloses is accurate, complete and up-to date.
d)
An organisation must have a policy document outlining its information handling practices and
make this available to anyone who asks.
29) What are the common security features covered in a system’s functional requirements?
a)
log ins
b)
password policies
c)
open public shells
d)
secure directories
e)
encryption protocols
Contribute to organizational privacy and contingency plans
- Assessment Task 2
LAST
UPDATED:
December 2015, Version No. 3.0
Page 8
of 9
ABN: 19 080 559 600 | CRICOS CODE: 01856K | RTO: 90501
T.
+61 2 9283 4388 | E.
info@wic.nsw.edu.au
Lower Ground, 101 Sussex St., Sydney NSW 2000 Australia | www.wic.nsw.edu.au
30) IT support staff loudly discuss their organisation’s network security problem on a crowded train. This statement relate to which ethical issue.
a)
Reliability
b)
Security
c)
Confidentiality
d)
Proprietary rights
e)
Conflict of interest
Contribute to organizational privacy and contingency plans
- Assessment Task 2
LAST
UPDATED:
December 2015, Version No. 3.0
Page 9
of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Documents
Recommended textbooks for you

Purchasing and Supply Chain Management
Operations Management
ISBN:9781285869681
Author:Robert M. Monczka, Robert B. Handfield, Larry C. Giunipero, James L. Patterson
Publisher:Cengage Learning
Recommended textbooks for you
- Purchasing and Supply Chain ManagementOperations ManagementISBN:9781285869681Author:Robert M. Monczka, Robert B. Handfield, Larry C. Giunipero, James L. PattersonPublisher:Cengage Learning

Purchasing and Supply Chain Management
Operations Management
ISBN:9781285869681
Author:Robert M. Monczka, Robert B. Handfield, Larry C. Giunipero, James L. Patterson
Publisher:Cengage Learning