Managing Copyrights, Ethics And Privacy Of Hosted Desktop Solutions

Copyright Policies and Procedures for HDS

The report is based on managing of the copyrights, ethics and privacy of Hosted Desktop Solutions (HDS) which provides of hosted open source IT solutions to both small as well as medium sized businesses. The company is going to build a new business website as its current website is not managed well. The design of website is little back dated, and there is lack of functionality into the website (Fennelly 2016). The content of website is old as well as inaccurate which are not being updated for long time. Therefore, HDS is going to deliver hosted services from the equipments into the premises.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

In this report, copyrights policies and procedures document, code of ethics document and privacy policies for HDS are summarized so as to mitigate the ethics and privacy related issues into the organization. The service requirements of the clients as well as business requirement are developed for HDS.

The main purpose of new website design for HDS is to promote their business online for continuing to grow as well as innovative their organizational culture to become more efficient as well as effective. Laws as well as services in license for the copyright are established in HDS to define the implementation of website following some of the copyright policies as well as procedures (Campbell, Jardine and McGlynn 2016). Intellectual property rights and copyrights policies as well as procedures are to be protected at the time of developing the website:

Protection of IP rights: Register the trademark and register the domain name which reflects the business trademark of HDS. The domain name allows others to access of new website. The internet addresses which ends with “.au” are being registered into Australian business (Bradner and Contreras 2017). In order to register with this domain name, the business should have to meet auDA’s policy on the domain name for eligibility.

Trademark protection: The trade secrets are not disclosure to any third party person. The organization should contain of legacy system which can protect the intellectual property of their business (Wheelen et al. 2017). The register of trademark provides of legal protection which prevents other business to use the same brand name.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Control of access and use of website content: The website of the business should be accessed by only the authorized person. Online agreements are used to only limit the license to be used the content available to the website. Encryption is used to safeguard the unlicensed use (Cohen et al. 2015). The conditional access system should check the identity of user and then identity the website content files.

Code of Ethics for HDS

Respect personal data of people: When the website is received of consumer information, then it is complied with applicable data protection as well as privacy laws (American Library Association 2016). The organization should ensure that personal identifiable information of the consumers are protected and displayed to privacy policy of the website.

Internal material: The materials which are shared into the website are to be protected by the copyright law. The internet carries of license in order to browse the website and create of external link to site (Senter et al. 2017). The website should carry of copyright notice and the copyright terms and conditions are defined scope of license granted to the end users.

Registering copyright: There is no such registration for the copyright protection into Australia as well as copyright protection is dependent on the copyright notice and symbol ©. The work is protected from time it is being recorded.

Design protection: Australia consists of framework to register the design of website into their database. Applications for the registration in order to design the website are filed with the design office of the IP Australia, those would assess if design of website is meet with the legislative requirements (Adelstein and Clegg 2016).

Those procedures are to be read with the copyright which would set the outline of the processes to manage the policy throughout the lifecycle. Those copyright policies as well as procedures are used to manage along with establishment of the business processes based on legislation compliance, license as well as creation of agreement to design the website (Resnik 2015). The employees of HDS follow all this copyright policies and regulations, so that a successful website is formed and developed.

Chief Information Officer has code of ethics, used to guide the principles which help to make decision. Codes help the client to meet with their requirements. Code of ethics help into safe as well as efficient development of the website so that the business can gain of more sales and gain of competitive advantage in the marketplace. The code of ethics provides framework to the ethical responsibilities of the professionals those are involved into the website development (Wood 2015). In order to do so, ethical guidelines are required to be adopted by HDS which are summarized as follows:

  1. The confidential information into the HDS is not to be disclosed by the employees to others. It should be ensured that the information which are provided to the client are true and it will never mislead the customers (Bradner and Contreras 2017).
  2. As per the privacy policy and norms of HDS, the confidential information are not shared with any of the third party person and not even discussed with others.
  • The employees should not distribute any sort of spyware into the business functions of HDS.
  1. None of the unlicensed software is used for the business purpose. The organization should adopt of strict policy to secure the intellectual properties and copyright policies for development of the website (Cohen et al. 2015).  
  2. Most important is that the financial details are not to be shared with others as it will become a huge loss for HDS in the future as it leads to financial loss and stolen.
  3. The social workers should be demonstrated with respect for the clients and promote of dignity with rights as well as responsibilities (Adelstein and Clegg 2016). They also ensure that the clients should have access to required information along with resources to participate into the decision making.

In relation to the following responsibilities of people, code of ethics is to be followed:

  1. In relation to the management functions:They carry out activities into ethical manner. They make the code in order to guarantee the website application that it would provide required website as per organizational requirements (Bennett and Raab 2017). The management also maintain of confidential data and information so as to access by virtue of company’s functions.
  2. In relation to the suppliers and clients:The organization should maintain ethical relationships with supplying of goods as well as services. The organization should select of those suppliers those business practices are to be respect with human dignity (Squicciarini et al. 2017).  
  3. In relation to competitors:The competitors should gain of good faith with the company when the organization should provide them with their desired requirements (Liu et al. 2016). The company should achieve of market based on respect among the competitors as well as engagement of unfair practices.
  4. In relation to employees: The organization should treat the employees with respect as well as justice into considerations into various cultural sensitivities. HDS should not disseminate against the employees on religion, sex, race, age and nationality based on their different social conditions (Slavin et al.2016). The organization should not any permit of any type of violation and harassment on the employees at the workplace. HDS should also promote of professional development and training of the employees. The organization guarantees health as well as safety of their employees so as to prevent the occupational risks.

The privacy policy is intended to provide information on the policies as well as practices regards the collection of the personal information based on use of website and services (Westin and Ruebhausen 2015). In order to develop the website, a proper strategic planning is required so that all the privacy policies are to be followed properly. HDS has informal policies as well as procedures to manage increased growth. Following are the privacy policies for the case organization which is followed to securely development of website:

Privacy Policies for HDS

Secure the confidential information: The confidential information such as personal information and contact information of customers are kept secured from any unauthorized access (Waldman 2017). The personal data of customers are collected at the time of registration into the website which may be stolen from email or any other type of communication channel. For the visitors those are visiting the website of HDS, a log in session is required to create on the home page so that the visitor can sign up into efficient manner.

Transactional information: The financial information of the customers may be stolen at the time of transfer of finance from one place to other. The hackers should steal the password of the account and then may transfer the fund from their account (Adelstein and Clegg 2016). Therefore, all the transactional data should be kept secured with authentication password. When the company makes links with other websites to make the transaction, then at that time there are high chances of hacking of financial data and information.

Secure the customer’s information: The management of the personal information includes of privacy policy. While registering the customer into the website page, HDS requires collecting personal information of the customer such as name, age, sex, contact information and address (Senter et al. 2017). It is the responsibility of HDS to collect information and secure them into the company’s database so that none of unauthorized person can able to access it without prior permission of the owner. The company can access to the personal information of customer when it is required. Each of the privacy terms as well as conditions is applicable for the website to develop the business functions of HDS such as productivity, IT innovation and value creation.

Secure the e-mail messages: The networking capability of HDS is 4 years older, therefore their networking storage, sharing of files becomes difficult to perform. The email is being hosted throughout the Google app, and their website is also hosted externally (Westin and Ruebhausen 2015). When one person is shared any confidential messages throughout email, therefore there should be use of digital signature mechanism to secure the messages so that only authorized person can access to it. IT system monitoring along with maintenance are being taken throughout the internal IT. The customers of HDS should deal with the staffs properly when they gain trust (Bradner and Contreras 2017). Most of the clients think that the website should be good enough to provide required services. The internal infrastructure is used and maintained to meet with the performance demands of HDS.

Developing a New Website for HDS

Conclusion

It is concluded that most important is to secure the personal information of the customers which identifies the person personally. While registering the website of a company, it is required to collect information from the visitors to the website such as personal information, non-personal information such as IP address, cookies and others. From the entire study, it is concluded that in order to securely develop a website, a proper code of ethics are required to be followed. The purpose of HDS is to develop a secured website for clients so that they can achieve competitive advantage by following the copyright laws, privacy policies in addition to guidelines. Based on the “Australian copyright law”, the company adopted the policies of information technology and ensured the confidentiality, security along with availability of the data. HDS should implement of the ethical policies so that the employees can take proper decision regarding the development of website. It is also summarized that the privacy policies which are adopted into HDS Company are the legal documents which can use and manage the client’s data. Those policies are protected the privacy information of the clients from being hacked or stolen. The content of those policies are based on applicable law which are required to address requirements across the legal justifications.

References

Adelstein, J. and Clegg, S., 2016. Code of ethics: A stratified vehicle for compliance. Journal of business ethics, 138(1), pp.53-66.

American Library Association, 2016. ALA code of ethics.

Bennett, C.J. and Raab, C.D., 2017. The governance of privacy: Policy instruments in global perspective. Routledge.

Bradner, S. and Contreras, J., 2017. Intellectual Property Rights in IETF Technology (No. RFC 8179).

Campbell, J.D., Jardine, A.K. and McGlynn, J. eds., 2016. Asset management excellence: optimizing equipment life-cycle decisions. CRC Press.

Cohen, J.E., Loren, L.P., Okediji, R.L. and O’Rourke, M.A., 2015. Copyright in a global information economy. Wolters Kluwer Law & Business.

Fennelly, L., 2016. Effective physical security. Butterworth-Heinemann.

Liu, F., Wilson, S., Schaub, F. and Sadeh, N., 2016, November. Analyzing vocabulary intersections of expert annotations and topic models for data practices in privacy policies. In 2016 AAAI Fall Symposium Series.

Resnik, D.B., 2015, December. What is ethics in research & why is it important. In ideas.

Senter, L., Bennett, R.L., Madeo, A.C., Noblin, S., Ormond, K.E., Schneider, K.W., Swan, K. and Virani, A., 2017. National Society of Genetic Counselors Code of Ethics: Explication of 2017 Revisions. Journal of genetic counseling, pp.1-7.

Slavin, R., Wang, X., Hosseini, M.B., Hester, J., Krishnan, R., Bhatia, J., Breaux, T.D. and Niu, J., 2016, May. Toward a framework for detecting privacy policy violations in android application code. In Proceedings of the 38th International Conference on Software Engineering (pp. 25-36). ACM.

Squicciarini, A.C., Lin, D., Sundareswaran, S. and Wede, J., 2015. Privacy policy inference of user-uploaded images on content sharing sites. IEEE transactions on knowledge and data engineering, 27(1), pp.193-206.

Waldman, A.E., 2017. A Statistical Analysis of Privacy Policy Design.

Westin, A.F. and Ruebhausen, O.M., 2015. Privacy and freedom. Ig Publishing.

Wheelen, T.L., Hunger, J.D., Hoffman, A.N. and Bamford, C.E., 2017. Strategic management and business policy. pearson.

Wood, G.W., 2015. Communicating the ethos of codes of ethics in Australia’s largest organizations: a reliance on osmosis. In Proceedings of the 2000 Academy of Marketing Science (AMS) Annual Conference (pp. 425-429). Springer, Cham.