ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment

ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment

Section C – Instructions to students
Task instructions:
Part 1 – Observation


Part 1 of the assessment will be completed as a scenario and observed and assessed by the assessor. 
 
You work as a developer in a production house which is meeting with new client. The client is creating a website with a game aimed at students who are young and have visual impairment. They are asking you questions about their project and what you can provide for them.

In this scenario you will be meeting with your client. You will work in pairs to complete this meeting. One person will play the part of the client, and another will play the part of the developer and then you will swap roles. The client will need to systematically ask each of the questions in Part 1 of this assessment. The developer is then required to answer each of the questions posed by the client.

It is recommended that you prepare for the meeting by noting answers to the questions that will be asked by the client.

SEE SUPPORTING DOCUMENTATION FOR OBSERVATION QUESTIONS.
 
Part 2 – Knowledge Questions
This part of assessment requires learners to answer a range of knowledge questions related to copyrights, ethics, and privacy.  Some of these questions refer to scenarios and others will relate to the topics which have been discussed in class. The typical length for an answer would be 2 to 3 sentences.
 
– Learners are required to correctly answer all questions. 
– Once learners have completed all the questions, the assessment must be uploaded and submitted to Brightspace.
– If a supplied answer is incorrect or requires further information the learner will be requested to correct the issues and resubmit the assessment via Brightspace.
– Learners must contribute to and abide by organisational standards including intellectual property and privacy
– You may use the internet for research purposes.
Section D – Conditions for assessment
Conditions: Student to complete and attach Assessment Submission Cover Sheet to the completed Assessment Task.
–  This assessment is to be completed individually.
–  You must meet all criteria listed in the marking guide to be satisfactory in this task.
–  You may resubmit this task if not successful within the enrolment period as per Holmesglen conducting
   assessment procedure.
–  This is an individual task; however, you are required to get information, feedback and ideas from your assessor, peers and industry to help complete the assessment planning guide. 
–  It is expected all documents will be completed and submitted electronically but if this is not possible, make alternative arrangements for submitting the documents with your assessor.
–  You will have the opportunity to resubmit if any part of the assessment is deemed unsatisfactory (one resubmit allowed per task).
–  You can appeal an assessment decision according to the Holmesglen Assessment Complaints and Appeals Procedure.
–  If you feel you require special allowance or adjustment to this task, please decide with your assessor within one week of commencing this assessment,
–   The learner may use the internet research answers for this assessment.
 
Part 1
–    Learners will need to pair up with one other learner, one taking the role of the client and the other the role of the developer.
–    Once all the questions have been answered they will need to swap roles based on the scenario provided.
–    This must be completed in class

Learners will be provided with:
– Copyright legislation
– APP Principles
– Australian Accessibility standards
– Privacy Policy template


Equipment/resources students must supply:Equipment/resources to be provided by the RTO:
USB / Online Storage
computer
internet connection
headset with mic
webcam
Computer
Internet connection
Word processor
WebEx Teams

Section E – Marking Sheet – Student Answer Sheet
Unit code:(W4)

ICTICT418
Unit title:(Ethics)

Contribute to copyright, ethics and privacy in an ICT environment

Part 1 – Observation task

Skills to be observed during this task to the required standard1. Date:2. Date:3. Date:Comment
   
SatisfactorySatisfactorySatisfactory
YesNoYesNoYesNo
1.The learner has articulated and communicated the principles of web design accessibility and equity in relation to the ICT industry.  
2.The learner has identified, established, and articulated where to find current state and federal legislation and standards in relation to accessibility standards and web design. 
3.The learner has contributed, articulated, and investigated into negative consequences of failure to incorporate accessibility and equity in relation to website or web design. 
4.The learner has investigated, identified, and reviewed the client’s current copyright policy, in addition to contributing and to creation and updates to their client’s copyright policy and procedures to align with legislation and industry standards. 
5.The learner has identified, established, and articulated where to find current state and federal legislation and standards in relation to privacy standards and web design. 
6.The learner has articulated privacy expectations in accordance with current legislation standards and how to implement these privacy standards for an organization. 
7.The learner has identified, investigated and articulated WHS issues and expectations that need to maintain in accordance to current legislation and industry standards. 
8.The learner has identified, established, and articulated where to find current state and federal legislation and standards in relation to WHS and web design. 
9.The learner has investigated and articulated current legislation and standards in relation to intellectual property and copyright in work practices. 
10.The learner has identified and established where to find current state and federal legislation and standards in relation to intellectual property and copyright in the ICT industry. 
11.The learner has articulated implementation of new policy and procedures to stakeholders, in addition to identifying how to distribute, implement and review new ethics codes and ethical work practices to stakeholders with feedback being collected and implemented. 
12The learner has reviewed and discussed work practices to ensure server operating system security in accordance with the client’s organisational policy.   
13The learner has outlined standard organisational communication processes and procedures in relation to privacy policy and ethics. 

Part 2 – Knowledge task

Questions: Provide your responses in the boxes below each question.
Q1.You are required to contribute to the code of ethics. Please refer to the Supporting documents section of this document. You are required to contribute by filling in the missing statement points under each heading. Please write you answer in red.   This policy must include the following topics with at least three (3) points per category:   Privacy and confidentiality (with clients and also students)Copyright procedures for all assessmentsEthical behaviour as a designer in classWHS procedure and issuesCommunication strategy and class behaviour  Satisfactory response
Yes ☐No ☐
Answer: Privacy and confidentiality (with clients and also students) a. I will keep any information supplied by customers, other students, and staff secret. b. Your Student ID is used for administration and to help secure your information.   c. Any information obtained from a customer about facts, details, or data should be treated as confidential. This is applicable to information that is not widely known or in the public domain. Copyright procedures for all assessments   a. I agree that any work given is original and not covered by copyright.   b. If you utilized pictures or fonts downloaded from the internet that are copyrighted and not licensed, you must obtain permission from the owner before using them. c. Follow the directions for crediting the owner, or refer to their rules of use in their terms and conditions. Ethical behaviour as a designer in class a. I will always act ethically with clients, other students, and staff. b. Produce unique work c. Obey the laws and regulations governing privacy, intellectual property, and discrimination. WHS procedure and issues a. Understand and follow WHS procedures b. I will ensure that WHS requirements are followed and that information is kept up to date. c. Take part in WHS consultations as needed and offer comments Communication strategy and class behaviorIn class, be kind and nice.b. In relation to Holmesglen, I shall exclusivelyutilizee Brightspace and other communication means for academic purposes (not private)b. Be conscious of your outside-of-class communication tools, such as Brightspace or email.Comment:  
Q2.How would you distribute and educate your peers about this policy or any future policy changes?   List two (2) methods.Satisfactory response
Yes ☐No ☐
Answer: By Webex chatBy EmailComment:  
Q3.How would you collect feedback and review your new policy?   List three (3) methods.Satisfactory response
Yes ☐No ☐
Answer: 1. Questionnaires 2. e-mail 3. Individualized conversationsComment:
Q4.What are the three (3) ways you can protect your IP in web/game design? (Intellectual Property).Satisfactory response
Yes ☐No ☐
Answer: 1. Obtain Trademark Registration 2. Obtain Patent Registration 3. Intellectual property rights  Comment:  
Q5.Outline the system security in your current work area.   List at least three (3) observations. Satisfactory response
Yes ☐No ☐
Answer: 1. Separate logins 2. Accounts for administrators 3. Log out automaticallyComment:  
Q6.Based on Q5, is your work area system security secure?Satisfactory response
Yes ☐No ☐
Answer: Yes, by using these the system will be absolutely Secure.Comment:  
Q7.Explain what a “system security procedure” is referring to in one paragraph or less.Satisfactory response
Yes ☐No ☐
Answer: A sequence of actions, tasks, procedures, judgments, computations, and other processes that culminate in a specific security task or function.Comment:  
Q8.List two (2) ways a business communicates in the ICT industry?Satisfactory response
Yes ☐No ☐
Answer: By Policy, terms & conditions.Via the Internet.Comment:  
Q9.List three (3) customer service requirements in the ICT industry?Satisfactory response
Yes ☐No ☐
Answer: 1. To be deserving of clients’ trust 2. to be truthful 3. to be skilled.Comment:  
Q10.Write a letter to ACS (Australian Computer Society) asking for permission to use their logo.  https://www.acs.org.au. This should be no longer than one paragraphs. Satisfactory response
Yes ☐No ☐
Answer: To, Australian Computer Society Q534 Queen Victoria Building, Sydney NSW 1230   Subject: Copyright permission for the logo   Dear Sir,   I’m writing to request copyright permission to use your company’s logo on my website. These resources are designed for non-profit educational purposes, and I would appreciate free permission to use them. Please confirm your approval here and submit this request in the self-addressed, stamped envelope supplied. I’ve included a duplicate of this request for your records. Permission was given.Permission is given subject to the following conditions:Permission has been refused.   Regards, Name Department Company   Signature Date:  Comment:  
Q11.Research the Australian Privacy Principles from oaic.gov.au? List all ten (10) with a brief description as bullet points.  Satisfactory response
Yes ☐No ☐
Answer: NPP1: Method and Purpose of Collection An organisation must not gather personal information unless absolutely essential, and collection must be done in a legitimate and fair manner (unintrusive). Torganizationion must take reasonable efforts to ensure that the individual is informed of the purpose, to who it will be revealed, the repercussions for failing to provide, how to contact the organization, and how to acquire access to the information gathered.   NPP2: Data Utilization and Disclosure Organizations must only use or disclose information about individuals for the primary purpose for which it was collected unless a secondary purpose applies to the first and the individual would reasonably expect the organization to disclose OR the individual has consented to the use or disclosure OR the information is not sensitive AND the use is for research purposes.  NPP3-4: Data Security and Quality 3. The organisation shall take reasonable means to ensure that the personal information it collects and discloses is accurate, full, and up to date.   4. The organisation shall take reasonable precautions to protect personal information against abuse and loss as a result of unauthorized access. Organizations must also take reasonable efforts to discard or permanently de-identify personal information that is no longer required for the original purpose for which it was produced.   NPP5-6: Access and Openness   5. The organization’s policy on the management of personal information must be clearly stated. These policies must be made available to anybody who requests them. On request, organizations must take reasonable measures to provide information about the information obtained, why it was gathered, and how it was collected, stored, utilized, and disclosed. 6. Individuals must be granted access to their personal information by an organisation UNLESS it could cause serious/imminent harm to any individual, it could unreasonably infringe on the privacy of others, the request is frivolous or vexatious, relates to legal proceedings involving the individual, access would be unlawful, denying access is required by law or other stipulations.   NPP7: Identifiers   Other organisations’ or agencies’ IDs must not be utilized or disclosed by the organisation.   NPP8: Confidentiality   Individuals must have the choice of staying anonymous if lawful and possible.   NPP9: Flaws in Cross-Border Data   Under certain instances, an organisation in Australia (or an external territory) may transfer personal information about an individual to someone (other than the individual or the organisation) in a foreign nation. NPP10: Confidential Information   An organisation may not acquire sensitive information on an individual unless the subject has agreed, the law requires it, or there are other conditions.  Comment:  
Q12.Source the ACS Privacy Policy. Provide url.Satisfactory response
Yes ☐No ☐
Answer: https://www.acs.org.au/privacy-policy.html  Comment:  
Q13.Does the ACS Privacy Policy support the principles of privacy legislation? This should be no longer than one paragraph.Satisfactory response
Yes ☐No ☐
Answer: Yes. It explains why and how it gathers and stores information, as well as how to access and change it, as well as how to complain, and who to contact.Comment:  
Q14.Source the ACS Code of Ethics. Provide url.Satisfactory response
Yes ☐No ☐
Answer:   https://www.acs.org.au/content/dam/acs/acs-documents/Code-of-Ethics.pdf  Comment:  
Q15.Does the ACS Code of Ethics support the main fundamentals of workplace ethics? Satisfactory response
Yes ☐No ☐
Answer: Yes, it promotes integrity, professional growth, professionalism, and competence.  Comment:  
Scenarios …The scenarios below will apply your knowledge of workplace ethics in the workplace.
Q16.Scenario 1: Jean’s problem solving. Jean, a statistical database programmer, is trying to write a large statistical program needed by her company. Programmers in this company are encouraged to write about their work and then publish their algorithms in professional journals. This is detailed in the company code of conduct. After months of tedious programming, Jean has found herself stuck on several parts of the program.  Her manager, not recognising the complexity of the problem, wants the job completed within the next few days. Not knowing how to solve the problems, Jean remembers that a co-worker had given her source code listings from his current work and from an early version of a commercial software package developed at another company. On studying these programs, she sees two areas of code which could be directly incorporated into her own program. She uses segments of code from both her co-worker and the commercial software but does not tell anyone or mention it in the documentation.  She completed the project and turns it in a day ahead of time. Jean says that she is unaware of the company code of conduct. How do you see this situation? Choose the correct answer(s) below. Jean should take the day off and reward herself with a massage.Jean should have waited until the deadline and not a day earlier, before turning her work in early. Now her manager may give her extra work.Jean could have approached her manager about the complexity of the issue and discussed her concerns.Jean needs to ask permission before using the code from her co-workers. Jean needs to mention her co-workers, and the use of their code, giving them credit for their work in her documentation. Acknowledgement: Burmeiser, OK (2000), ‘Applying the ACS code of ethics’, Journal of Research and Practice in Information Technology. Vol. 32, no.2, pp. 107-120.  Satisfactory response
Yes ☐No ☐
Answer: Jean could have approached her manager about the complexity of the issue and discussed her concerns Because rest of them does not apply because, while the work was developed by a co-worker, it was created while they were employed by a corporation, and as such, that firm owns the and also they do not apply because no permission was sought. Giving credit does not imply.Comment:  
Q17.How would you ensure that current and future employees understand their obligations and the rights of others in Q16?Satisfactory response
Yes ☐No ☐
Answer: By checking three and six months after implementation, as well as once a year during performance evaluations. We can ensure through team meetings or directly soliciting comments from employees and also by HR incident reports.Comment:  
Q18.Scenario 2: The Employment Agency request An employment agency is determining requirements for an information system to be used. The agency’s organizational policy discusses equal opportunity employment in alignment with state and federal government laws. The agency has consulted with you as a programmer to develop the IT software to develop the software design. At a production meeting the client explains that when displaying applications whose qualifications appear to match those required for a particular job, the names of white applicants are to be displayed ahead of those of non-white applicants. An additional requirement is for the names of male applicants are to be displayed ahead of female applicants. What would you do? Choose the correct answer(s) below: Say nothing, go home and go to your pump class – that cute instructor is running the class tonight ;)Change it to female applicants to be displayed ahead of male applicants.You take steps in rectifying the matter by contacting your manager about the issue and discussing your concerns with the client. Demand a pay rise. Acknowledgement: Burmeiser, OK (2000), ‘Applying the ACS code of ethics’, Journal of Research and Practise in Information Technology. Vol. 32, no.2, pp. 107-120.Satisfactory response
Yes ☐No ☐
Answer: c.         You take steps in rectifying the matter by contacting your manager about the issue and discussing your concerns with the client.Comment:  
Q19.What is the main issue in Q18?Satisfactory response
Yes ☐No ☐
Answer: Racism and sexism are on display! This is an ethical issue since discrimination should be included in a company’s code of conduct, regardless of whether it is legal under federal or state law.  Comment:  
Q20.Where would find standards or legislation to support your choices for Q19?Satisfactory response
Yes ☐No ☐
Answer: Within the framework of anti-discrimination legislation (particularly the Racial Discrimination Act of 1975 and the Sex Discrimination Act of 1984), as well as my organization’s Code of Conduct.Comment:  
Q21.Scenario 3: Joseph’s logo design. Joseph is a Melbourne based designer and has been asked to design an original logo for a local small business. He commences research and creates a few original concept designs. After he shows his client his initial designs the client is unhappy with those concepts. Joseph goes away and works on a new design but the client emails through an image of a logo design that they like. The logo is of a competitor and the client wants their logo to look the same, but with only a small change to the lettering only. What should Joseph do? Choose the correct answer(s) below. Joseph should just follow the instructions of the client and complete the job he can buy those new pair of shoes on sale with the money he makes.Joseph should discuss his ethical concerns with his client. Joseph should just design a logo he likes regardless of what the client requests or needs and disregard the email entirely. Who cares?Joseph should design an original design and use the emailed logo as a reference.Run away and curl up in a ball somewhereSatisfactory response
Yes ☐No ☐
Answer: Joseph should discuss his ethical concerns with his client. Joseph should design an original design and use the emailed logo as a referenceComment:  
Q22.What would you say to your client to support your answer(s) at Q21?  Write no more than two paragraphs.Satisfactory response
Yes ☐No ☐
Answer: In Australia, copyright law is automatically applied to original work, which includes the logo sample you submitted. Unfortunately, we cannot utilise this design without exposing your company to potential Copyright difficulties; however, we could get permission from the company to use it. Alternatively, I may utilise this as a starting point to create something unique for you.Comment:  
Q23.Where would find standards or legislation to support your answer for Q22?Satisfactory response
Yes ☐No ☐
Answer: Source: Copyright Act 1968 https://www.legislation.gov.au/  Comment:  
Q24.Scenario 4: Deedee and her data. Deedee has been asked to collect data from a competition to determine the demographics of the online magazine readers. The competition terms and conditions state that information will only be used for demographic research purposes only once the competition has ended. Deedee receives the final spread sheet with the competition entrants detailing each persons’ name, age, email, and location. The information is secure on Deedee’s computer and only she has access to that data. Jules has asked for access to the spreadsheet so she can email each person weekly email newsletter selling online products. There is no provision in the terms and conditions Deedee used to collect the data for other purposes other than research. It is extremely specific. You find that the company privacy policy is very vague and general. It is not in accordance with National Privacy Principles. Jules asks for Deedee’s log in. What should Deedee do? Choose the correct answer below. Deedee should go ahead and give Jules the access to the spread sheet. The more products Jules and Deedee can sell online means the possibility of a monthly bonus. Deedee is saving to go on vacation to Ibiza. She needs a holiday!Deedee should inform Jules this is not a good decision and advises against using the data to email each customer directly.Everyone in the office should have access to Deedee’s data.  Satisfactory response
Yes ☐No ☐
Answer: Deedee should inform Jules this is not a good decision and advises against using the data to email each customer directly.  Comment:  
Q25.In less than one paragraph, discuss your reasons for your answer for Q24. You may use bullet points instead.Satisfactory response
Yes ☐No ☐
Answer: The terms and conditions specifically declare that individuals’ information would be gathered solely for research purposes; no mention of marketing or newsletters was made. 
Q26.Where would you find standards or legislation to support your choices for Q24? What is the main issue here?Satisfactory response
Yes ☐No ☐
Answer: The National Privacy Principles OR the Privacy Act of 1988. It would be a violation of privacy to distribute newsletters or commercial materials.Comment:  
Q27.Does the privacy policy in Q24 need to be reviewed? Why?Satisfactory response
Yes ☐No ☐
Answer: Yes, because the policy is ambiguous and broad, and therefore violates the National Privacy Principles.Comment:  
Q28.Scenario 5: Deedee and her policy After the debacle above in scenario 4, Management are impressed with Deedee’s work ethic. She has now been asked to update the company privacy policy to be alignment with the National Privacy Principles. This new policy change should then be applied to upholding competition term and conditions in future or changing them to be in accordance with the APP when appropriate. Deedee has written a draft and the policy is now more specific, detailing the rights of all stakeholders and mentions the principles in detail. The company code of conduct has also been reviewed and now includes the duties of staff to maintain the privacy rights of all customers along with general ethical conduct in the workplace such as professional development and good moral conduct. Deedee interviews the staff members in her work area about the new policy update. She asks them to source the company privacy policy and code of conduct, discuss its relevance to their job and records their feedback. After the interview she discovers the following: Two staff members do not actually know where to find the code of conduct or privacy policy. Five do not understand the guidelines behind the National Privacy Principles Only 2 understand the potential consequences of breaching the APP and do not see the big deal.Three mention the wording is too complicated and too wordy.5 say the type is too small and they struggle to read the documents.Five staff still do not understand what this has to do with their competition terms and conditions that they email out to customers or put on raffle tickets on a regular basis.Management have asked for all staff to undergo training in some manner and for Deedee to organize this.You realize that customer data files have are not backed up. What should Deedee do? Choose the correct answer(s) below. Deedee should consider this a job well done.Deedee should panic, take an aspirin go to bed. Let someone else deal with this rubbish.Deedee should update the policy again incorporating her recorded feedback, distribute it again and revise the policy again in future?Deedee should make the wording even more difficult to read because she doesn’t really understand it either.Deedee need not worry about educating the staff about the APP. Most staff leave the company within a few months, so why waste so much time and money?Satisfactory response
Yes ☐No ☐
Answer: Deedee should consider this a job well done.   Deedee should update the policy again incorporating her recorded feedback, distribute it again and revise the policy again in future?  Comment:  
Q29.If the policy were to be updated again what feedback should be considered based on the interviews in Q28?Satisfactory response
Yes ☐No ☐
Answer: Objectives To explain the ideas underlying the national privacy principles.Where can I find the code of conduct and privacy statement?As far as feasible, simplify the phrasing (without changing meaning)Describe the ramifications of violating the NPP.Increase type sizeCreate more meetings to explain why this is significant to all information gathered Implement data file backupsComment:  
Q30.List two (2) ways you could advise staff about the location of the policy and the fact it has been updated again?Satisfactory response
Yes ☐No ☐
Answer: 1. Via Meetings 2. Via emailComment:  
Q31.How would staff be trained / educated about the APP and its relevance to their competitions?Satisfactory response
Yes ☐No ☐
Answer: Create a training package that includes one-on-one conversations, tests, group discussions, and so on.Comment:  
Q32.How would you review the final policy once you updated it? Satisfactory response
Yes ☐No ☐
Answer: Distribute to employees and solicit feedback.Comment:  
Q33.List one (1) way you check that staff are understanding and applying the new codes?   Satisfactory response
Yes ☐No ☐
Answer: Monitoring and team meetings are used to accomplish this.Comment:  
Q34.List one (1) way Deedee could improve the security of customer data based on the information given at Q28??Satisfactory response
Yes ☐No ☐
Answer: Ensure that server backup are stored both locally and in the cloud, that they are encrypted, and that access to them is controlled.Comment:  

 

 

 

Assessment Submission Cover Sheet (VET)

By submitting this assessment task and signing the below, I acknowledge and agree that: This completed assessment task is my own work. I understand the serious nature of plagiarism and I am aware of the penalties that exist for breaching this.I have kept a copy of this assessment task. The assessor may provide a copy of this assessment task to another member of the Institute for validation and/or benchmarking purposes.
Student ID:Student name:
Submission or observation date: 
Student signature For electronic submissions: By typing your name in the student signature field, you are accepting the above declaration. 
Section F – Feedback to Student
Has the student successfully completed this assessment task?YesNo
Additional Assessor comments (as appropriate):
 
Resubmission allowed:Yes ☐No ☐Resubmission due date: 
Assessor name: 
Assessor signature: 
Date Assessed: 


Supporting documents

Observation task


Unit code:
(W4)

ICTICT418
Unit title:(Ethics)

Contribute to copyright, ethics and privacy in an ICT environment

Part 1 – Observation task

Skills to be observed during this task to the required standard
1.Setup
Client: We are looking for a developer. Our current website has become very popular and we want to incorporate new website content, including a new game with some in app purchases. Developer: Could you tell me about the target audience? Client: Oh, our main users are teenagers in schools who read our site forums, and play our games while on the way to school, or in class, when they should be doing work. We have also discovered our site is popular with students with various issues. Developer: What type of issues? Client: Our research shows we have become popular with several schools who have a lot of blind and vision impaired students. Developer: Oh ok. We need to consider this when creating your new content to improve accessibility for those users. Client: We heard something about this, but we were not really sure what we could do or what it is.   Question  Client: Please discuss the importance of web design accessibility and equity in the ICT industry? Please describe two (2) examples of how to apply this. Answer:   Allow access to the keyboard For visually handicapped users, keyboard shortcuts can make navigation much easier. Because it demands hand-eye coordination, navigating with a mouse is not possible. This is especially true for blind people who use screen readers to navigate the site. Keyboard instructions allow persons with low vision to visit a website without having to strain their eyes to focus and follow a mouse pointer across the screen.   We can provide PDF on the website, so that screen readers can read the text. Also, we need to add some quizzes or games with the content, so that users can engage with the site.  
2.Setup

Client: Thanks for this information. Is this mandatory? Developer: There are accessibility standards and guidelines. Question Client: Where would you source state or federal law about these standards? Answer: Developers who wish to produce high-quality websites and web tools without excluding people from using their services must consider accessibility. Web Content Accessibility Guidelines 2.0 Level AA, as defined on www.w3.org, are required in Australia.
3.Setup

Client: Interesting stuff. So we kind of understand the laws and reasons why we need these standards. Thanks. So far our website implements some of these but not all of what you have suggested. Question Client: What would be a negative consequence of failing to incorporate accessibility and equity into a website or game design? I mean, why should we care about a minority of users? Please mention two (2) consequences.   Answer: Excluding individuals with disabilities from accessing any or all of your websites is not only discriminatory and may be illegal in some countries, but it is also a failure as a business, perhaps causing your business to lose out to a rival. You might lose a lot of prospective consumers if your site isn’t accessible to everyone in your target market. They will rapidly lose interest, struggle to find information, and may quit the site with negative feedback.
4.Setup 

Client: Are there any other laws or guidelines we should be aware of? Developer: We can take a look at your current privacy policy, copyright policy and code of ethics and check your staff are implementing these. Client: We don’t have a formal policy. We wouldn’t know where to start. I mean, it’s just kids on our site for the most part. Developer: We can help you create and flesh out the policies for you. Client: Where do we begin? Questions Client: Could you show me where to download a privacy policy template? Answer: You can download a privacy policy template from: https://www.iubenda.com/en/?utm_source=adwords&utm_medium=ppc&utm_campaign=aw_brand_global_bmm&utm_term=privacy%20policy%20generator&utm_content=585587635886&gclid=CjwKCAjwopWSBhB6EiwAjxmqDcE7xNruR-NlAOu0d-8DHxGti6Yzee7BrO6E7iW0Uycy75lm8zeEbBoC84kQAvD_BwE The above link. Client: Can you show us how to fill it in? Answer: 1. Login with your mail and password and enter your website name. 2. Substitute your company’s details for the bold elements in square brackets. 3. Update material to reflect your company’s privacy policies. 4. Use the amended wording to create or edit the privacy policy page on your website. Client: Can you show us what a copyright policy looks like? Answer: Here is the sample: https://www.universalassignment.com/copyright-policy  
5.Setup Client: Are there any other laws or guidelines we should be aware of regarding privacy? Developer:  Yes there are. Question Client: Where would you source state or federal law information about these standards? Answer: Here is the link: https://www.oaic.gov.au/privacy/the-privacy-act  
6.Setup

Client: Applying these laws seems complicated. I need a little more information.   Question Client: Please describe two (2) privacy expectations in the ICT industry? Answer: 1. Comply with national privacy rules regarding data collection, customer choices, data access, and security. 2. In all subscriptions, there are opt-out choices. By using this the website will look more loyal and engageable to the customers. How can we apply these in our own company? Answer:  Don’t disclose client information or personal information               Any information that, if made public, might harm a company’s reputation or ability to conduct business. Such data is confidential or sensitive in nature. Follow your company’s privacy policies A privacy policy is a document that specifies how an organization handles any information obtained from customers, clients, or employees throughout its operations. The privacy policies of most websites are visible to site users. Inform users about any website cookies (optional) A cookie file is stored on your PC, phone, or tablet when you visit a website that uses cookies. It saves the name of the website as well as a unique ID for you as a user. That way, the website will recognize you if you visit it again. Stay up to date on these laws and rules  
7.Setup

Client: Oh my. This is great. Just to let you know, this has opened a can of worms for us, I think we also need to also look at WHS in our company. Developer:  We can help you Question Client: Describe two (2) WHS issues/expectations in the ICT industry which we need to apply. Answer: Maintain a safe working environment, which includes keeping workplaces clean and neat. Consider how frequently, and in what manner, you communicate the significance of workplace safety to your staff. Is it discussed on a monthly basis? Quarterly? Annually? Consider making workplace safety an essential part of your company’s culture if you want to prevent workplace injuries. To begin, learn the fundamental causes of your most significant workplace accidents and do frequent workplace surveys for possible safety concerns in equipment and job design. Keep a record of all instances. Keeping incident records gives a wealth of information about the situation and aids in the development of a better plan for future incident prevention.
8.Setup

Client: Thanks. Are there laws or guidelines we should be aware of? Developer:  Yes there are. Question Client: Where would you source state or federal law information about WHS? Answer: Here is the source : https://business.gov.au/Risk-management/Health-and-safety/Work-health-and-safety  & https://www.safeworkaustralia.gov.au/  
9.Setup

Client: Thanks. Could we talk about our website? We need a new logo for the new game we want and need to protect it legally. Does it cost money to have it protected? I’ve heard Australia has specific laws about this. Developer:  You’re talking about Copyright law and Intellectual Property. Question Client: Could you please discuss three (3) points about copyright law in Australia and how it applies our logo? Answer: Authorship’s Contribution Prerequisite: What is the definition of a work of authorship? The term “copyright” refers to a wide variety of works, both published and unpublished, such as All types of literary or linguistic works (including novels, short stories, biographies, articles, news stories, poems, outlines, letters, email messages, etc.). Sculptural, graphic, and pictorial works. Works that are musical, theatrical, or coordinated or performances of songs, public speeches, books on tape). The Originality Requirement: “Originality” is a constitutional requirement, but it is a minimum requirement under copyright, not analogous to the patent “no obviousness” criterion. So long as it is not plagiarised from earlier work and includes a smidgeon of inventiveness, a hackneyed or trivial work might be considered unique enough for copyright protection. What would be an example of a lack of creativity? Putting names in alphabetical order in a phone directory. The Fixation Requirement: In order to enjoy copyright protection, a work must be “fixed” under copyright law. This does not imply that it must be the ultimate or well-thought-out version of the work. Rather, the phrase alludes to the demand that an embodiment of the work is set down or “fixed in a concrete medium of expression” for a longer than the transitory length of time. A book draught on paper, “rushes” from a film before editing, a beta version of computer software on a CD-ROM drive, a snapshot on film, or the flash memory of a digital camera are all “fixed” works under copyright law. The most brilliant and creative improvisation, on the other hand, is not “fixed” if it is unscripted and documented.   The Commonwealth Copyright Act 1968 applies immediately to original work such as your logo. You do not need to file a copyright application, and the logo is copyright protected throughout the creator’s lifetime (70 years).  
10.Setup

Client: Thanks. Are there laws or guidelines we should be aware of? Developer:  Yes there are. Question Client: Where would you source state or federal law information about copyright? Answer:, you’ll find a useful information and easy-to-understand fact sheets on www.copyright.org.au  
11.Setup Client: Wow I’ve learnt so much today. You have been a great help. Joe Blog across the road, who worked on our site last year, didn’t advise us of any of this. Developer:  Seriously? That’s not good.  We have a strict code of ethics and we believe in abiding by these, not just for ourselves, but for the benefit and betterment of all our clients businesses also. Client: That’s good to hear. Client: Tell us about this code of ethics. What can we do to improve our own code of ethics? Questions: Client: What are code of ethics? Answer: A code of ethics is a set of guidelines for your staff to follow in order to do business with honesty. In the same way that a code of conduct specifies behavior requirements for workers and third parties, a code of ethics does the same. A code of ethics, on the other hand, is closer since it delves further into the principles that should govern their behavior and addresses concerns like harassment, safety, and conflicts of interest. This code is frequently seen as an ethical code. Client: How should we go about implementing a code of ethics in our business? Describe at least seven (7) steps needed in implement a code of ethics. Answer: Seven Steps to Code of Ethics Success to assist firms in developing a good code of ethics for their the company, not just their leadership team: 1. Be specific about the goals you want the code to achieve. 2. Obtain code support and suggestions from all levels of the company. 3. Stay up to date on the newest changes in the rules and regulations that influence your sector. 4. Write in as few words and as clearly as possible. Avoid using legal language and broad generalizations. 5. Respond to questions and circumstances from real life. 6. Provide resources for further knowledge and direction. 7. Make it user-friendly in all forms; ultimately, a code fails if it is not used.
12Setup  Developer: As part of a code of ethics and protecting privacy you must also think about your business’s hardware and software. What about your own server security? Have you taken steps to secure your servers and the data they hold? Client: We aren’t sure. What can we do to ensure or customer data is safe? Can we have more info on this? Questions:  Client: Could you please discuss at least two (2) features of a secure server / operating system? Answer: Firewall The deployment of a firewall is a common approach for improving system security. Between an internal computer network and the Internet, a firewall is made up of software and hardware. The rules for the firewall to filter out undesirable incursions are set up by a computer network manager. Unauthorized access is significantly more difficult to get with these regulations in place. For example, a system administrator might determine that only users inside the firewall have access to certain files, or that those outside the firewall have restricted the ability to edit the files. You may also set up a firewall on your own computer, which is incorporated into the operating system on many computers. Encryption Encryption is one method for keeping files and data secure. This is frequently used when data is sent over the Internet, where it may be seen by others. Encryption is the practise of encrypting communications so that only authorised persons may access them. To render the communication unreadable, an encryption key is employed, and a secret decryption key is utilised to decipher the message. Encryption is commonly employed in systems such as e-commerce and Internet banking, where databases store highly sensitive data. If you’ve ever made an online transaction using a credit card, you’ve almost certainly utilised encryption. Client: what can we do to ensure any data we have collected is safe? Describe at one (1) way to do this. Answer: Having each employee have their own log in for the system is an excellent approach to safeguard the data acquired. If necessary, you might even limit access to particular folders and files to only a few employees.  
13Setup  Developer: Now that you have a new code of ethics and a privacy policy you must apply these in your day to day business. Client: Thank you for this. This is going to improve our work culture J Questions  Client: How often should I check to see if my staff are adhering to my policies? Give one (1) answer. Answer: Once every three months we should check to see if my staff are adhering to my policies Client: Describe at least one (1) ways we can check to see if they are being applied and understood? Answer: One to one meeting: A frequent check-in between two persons in an organization, usually a manager and an employee, is known as a one-to-one meeting. It’s utilized to provide feedback, keep each other informed, manage problems, and assist participants to advance in their professions. Client: Describe at least two (2) ways we can collect feedback from staff? Answer: Suggestion box for employees An old-fashioned employee suggestion box still has a place in an age of digital innovation. Employees may be hesitant to provide candid criticism through alternative channels for fear of reprisal. They can provide anonymous comments in a suggestion box without leaving a digital imprint. Place the box somewhere that is easy to find but not where people congregate. Employees might, for example, drop their criticism in a box at the front desk on their way home, but they could feel uneasy if the box was in a highly used break room. Employee engagement polls Employee engagement surveys, whether yearly, biennial, or quarterly, are an excellent method to collect huge quantities of employee input at once. These are frequently fairly extensive, concentrating on anything and everything that might be influencing employee happiness, engagement, and retention. Increase survey completion rates by talking with your staff about the purpose of the survey and ensuring that input is anonymous. Sharing the findings and acting on comments can help to guarantee that future polls are favourably received as well.  


Classroom Code of Ethics 2020

As a class member you must uphold the law, maintain good morals and undergo professional development. In addition to being a good citizen you adhere to the following: 

  1. Privacy and confidentiality
    1. <YOUR STATEMENT>
    2. Your Student ID is used for administration purposes and help provide security of your information.
    3. You should treat any information received pertaining to facts, details or data from a client as confidential. This is relevant to information that is not common knowledge or part of the public domain.
  2. Copyright procedures for all assessments
    1. <YOUR STATEMENT>
    2. If you have used images or fonts downloaded from the internet which are protected by copyright and not licensed, you must seek permission from the owner before you use it.
    3. Follow instructions on how to credit the owner or refer to their terms of use within their terms & conditions.
  3. Ethical behaviours as a designer/developer in class
    1. <YOUR STATEMENT>
    2. Create original work
    3. Follow the Laws and standards pertaining to Privacy, Copyright and Discrimination.
  4. WHS procedure and issues
    1. Be aware of and abide by WHS procedures
    2. <YOUR STATEMENT>
    3. Participate in WHS consultation as required and provide feedback
  5. Communication strategy and class behaviour
    1. Be courteous and polite in class
    2. <YOUR STATEMENT>
    3. Be aware of your communication methods outside of class, i.e. via Brightspace or email.
Universal Assignment (April 16, 2025) ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment. Retrieved from https://universalassignment.com/ictict418-2/.
"ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment." Universal Assignment - April 16, 2025, https://universalassignment.com/ictict418-2/
Universal Assignment June 26, 2022 ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment., viewed April 16, 2025,<https://universalassignment.com/ictict418-2/>
Universal Assignment - ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment. [Internet]. [Accessed April 16, 2025]. Available from: https://universalassignment.com/ictict418-2/
"ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment." Universal Assignment - Accessed April 16, 2025. https://universalassignment.com/ictict418-2/
"ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment." Universal Assignment [Online]. Available: https://universalassignment.com/ictict418-2/. [Accessed: April 16, 2025]
Order Now
No Fields Found.
Universal Assignment (April 16, 2025) ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment. Retrieved from https://universalassignment.com/ictict418-2/.
"ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment." Universal Assignment - April 16, 2025, https://universalassignment.com/ictict418-2/
Universal Assignment June 26, 2022 ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment., viewed April 16, 2025,<https://universalassignment.com/ictict418-2/>
Universal Assignment - ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment. [Internet]. [Accessed April 16, 2025]. Available from: https://universalassignment.com/ictict418-2/
"ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment." Universal Assignment - Accessed April 16, 2025. https://universalassignment.com/ictict418-2/
"ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment." Universal Assignment [Online]. Available: https://universalassignment.com/ictict418-2/. [Accessed: April 16, 2025]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

STM1001: Assignment 3 for Science/Health Stream Students

STM1001: Assignment 3 Science/Health Stream Students Only Academic Integrity Information In submitting your work, you are consenting that it may be copied and transmitted by the University for the detection of plagiarism. If you are unsure of your academic integrity responsibilities, please check the information provided in the Assessment Overview

Read More »

ACCG1000 Accounting for Decision Making Xero Assignment

1ACCG1000Accounting for Decision MakingXero AssignmentInformation packSession 2 2024Due Date: Friday 18th October 2024 at 11.55pm2Xero AssignmentIntroductionThe Xero assignment is designed to provide introductory accounting students with an overview of the Xero Accounting Software by completing a one-month accounting cycle for a fictional business. This is an online assignment worth 20%

Read More »

WRIT1001 Assessment Notification 2

6Final Essay: Rhetorical analysisDue: Friday 18 October 2024 at 23:59 (Sydney time)Length: 1500 words, worth 40% of the overall grade for the unitSubmit: as a Word document or PDF, via Canvas AssignmentMain question:● Present a scholarly essay that analyses the rhetoric used in arguments about thecontentious topic you have been

Read More »

WRIT1000 Assessment Four

Title: Self-ReflectionDue: Friday October 18 by 11:59PM.Length: 500 words (+/- 10%)Weight: 10% of the total gradeFormat: Times New Roman, double-spaced, 12pt. Your project should have the title“WRIT1000 Assessment Four – Self Reflection for xxxxxxx” where “xxxxxxxx” is yourstudent number. Please only submit Word documents (.doc or .docx). Turnitin doesnot recognise

Read More »

Written Assessment – Psychosocial Research Perspectives

Written Assessment – Psychosocial Research Perspectives TRIGGER WARNING: This is a case study of a real person. Katherine Knight was the first woman in Australia to receive a life sentence without parole after she decapitated and cooked her lover. If you think that you will have problems reading about this

Read More »

RES800 Assessment 1 – Research Question and Literature Review

Subject Title Business Research Subject Code RES800 Assessment Title Assessment 1 – Research Question and Literature Review Learning Outcome/s     Utilise critical thinking to analyse managerial problems and formulate relevant research questions and a research design   Apply research theories and methodologies to assist in developing a business research

Read More »

Assessment Task 2 Health advocacy and communication plan

Assessment Task 2 Health advocacy and communication plan Rationale and multimedia plan presentation Submission requirements Due date and time:         Rationale: 8pm AEST Monday 23 September 2024 (Week 11) Multimedia plan presentation: 8pm AEST Monday 30 September 2024 (Study Period) % of final grade:         50% of overall grade Word limit: Time

Read More »

MLI500 Leadership and innovation Assessment 1

Subject Title Leadership and innovation Subject Code MLI500 Assessment Assessment 1: Leadership development plan Individual/Group Individual Length 1500 words Learning Outcomes LO1 Examine the role of leaders in fostering creativity and innovation LO5 Reflect on and take responsibility for their own learning and leadership development processes Submission   Weighting 30%

Read More »

FPC006 Taxation for Financial Planning

Assignment 2 Instructions Assignment marks: 95 | Referencing and presentation: 5 Total marks: 100 Total word limit: 3,000 words Weighting: 40% Download and use the Assignment 2 Answer Template provided in KapLearn to complete your assignment. Your assignment should be loaded into KapLearn by 11.30 pm AEST/AEDT on the wdue

Read More »

TCHR5001 Assessment Brief 1

TCHR5001 Assessment Brief 1 Assessment Details Item Assessment 1: Pitch your pedagogy Type Digital Presentation (Recorded) Due Monday, 16th September 2024, 11:59 pm AEST (start of Week 4) Group type Individual Length 10 minutes (equivalent to 1500 words) Weight 50% Gen AI use Permitted, restrictions apply Aligned ULOS ULO1, ULO2,

Read More »

HSH725 Assessment Task 2

turquoise By changing the Heading 3 above with the following teal, turquoise, orange or pink you can change the colour theme of your CloudFirst CloudDeakin template page. When this page is published the Heading 3 above will be removed, but it will still be here in edit mode if you wish to change the colour theme.

Read More »

Evidence in Health Assessment 2: Evidence Selection

Evidence in Health Assessment 2: Evidence Selection Student name:                                                                    Student ID: Section 1: PICO and search strategy Evidence Question: Insert evidence question from chosen scenario here including all key PICO terms.       PICO Search Terms                                                                                                                                                                                                          Complete the following table.   Subject headings Keywords Synonyms Population  

Read More »

Assessment 1 – Lesson Plan and annotation

ASSESSMENT TASK INFORMATION: XNB390 Assessment 1 – Lesson Plan and annotation This document provides you with information about the requirements for your assessment. Detailed instructions and resources are included for completing the task. The Criterion Reference Assessment (CRA) Marking Matrix that XNB390 markers will use to grade the assessment task

Read More »

XNB390 Task 1 – Professional Lesson Plan

XNB390 Template for Task 1 – Professional Lesson Plan CONTEXT FOR LESSON: SOCIAL JUSTICE CONSIDERATIONS: Equity Diversity Supportive Environment UNIT TITLE:    TERM WEEK DAY TIME 1   5           YEAR/CLASS STUDENT NUMBERS/CONTEXT LOCATION LESSON DURATION         28 Children (chl): 16 boys; 12

Read More »

A2 Critical Review Assignment

YouthSolutions Summary The summary should summarise the key points of the critical review. It should state the aims/purpose of the program and give an overview of the program or strategy you have chosen. This should be 200 words – included in the word count. Critical analysis and evaluation Your critical

Read More »

PUN364 – Workplace activity Assignment

Assessment 1 – DetailsOverviewFor those of you attending the on-campus workshop, you will prepare a report on the simulated simulated inspection below. For those of you who are not attending, you will be required to carry out your own food business inspection under the supervision of a suitably qualified Environmental

Read More »

FPC006 Taxation for Financial Planning

Assignment 1 Instructions Assignment marks: 95 | Referencing and presentation: 5 Total marks: 100 Total word limit: 3,600 words Weighting: 40% Download and use the Assignment 1 Answer Template provided in KapLearn to complete your assignment. Your assignment should be loaded into KapLearn by 11.30 pm AEST/AEDT on the due

Read More »

Mental health Nursing assignment

Due Aug 31 This is based on a Mental health Nursing assignment Used Microsoft word The family genogram is a useful tool for the assessment of individuals, couples, and families.  It can yield significant data and lead to important, new patient understandings and insights as multigenerational patterns take shape and

Read More »

Assessment 2: Research and Policy Review

Length: 2000 words +/- 10% (excluding references)For this assessment, you must choose eight sources (academic readings and policy documents) as the basis of your Research and Policy Review. You must choose your set of sources from the ‘REFERENCES MENU’ on the moodle site, noting the minimum number of sources required

Read More »

HSN702 – Lifespan Nutrition

Assessment Task: 2 Assignment title: Population Nutrition Report and Reflection Assignment task type: Written report, reflection, and short oral presentation Task details The primary focus of this assignment is on population nutrition. Nutritionists play an important role in promoting population health through optimal nutritional intake. You will be asked to

Read More »

Written Assessment 1: Case Study

Billy a 32-year-old male was admitted to the intensive care unit (ICU) with a suspected overdose of tricyclic antidepressants. He is obese (weight 160kg, height 172cm) and has a history of depression and chronic back pain for which he takes oxycodone. On admission to the emergency department, Paramedics were maintaining

Read More »

Assessment Task 8 – Plan and prepare to assess competence

Assessment Task 8 – Plan and prepare to assess competence Assessment Task 8 consists of the following sections: Section 1:      Short answer questions Section 2:      Analyse an assessment tool Section 3:      Determine reasonable adjustment and customisation of assessment process Section 4:      Develop an assessment plan Student Instructions To complete this

Read More »

Nutrition Reviews Assignment 2 – Part A and Part B

This assignment provides you with the opportunity to determine an important research question that is crucial to address based on your reading of one of the two systematic reviews below (Part A). You will then develop a research proposal outlining the study design and methodology needed to answer that question

Read More »

NUR332 – TASK 3 – WRITTEN ASSIGNMENT

NUR332 – TASK 3 – WRITTEN ASSIGNMENT for S2 2024. DESCRIPTION (For this Task 3, the word ‘Indigenous Australians’, refers to the Aboriginal and Torres Strait Islander Peoples of Australia) NUR332 Task 3 – Written Assignment – Due – WEEK 12 – via CANVAS on Wednesday, Midday (1200hrs) 16/10/2024. The

Read More »

NUR100 Task 3 – Case study

NUR100 Task 3 – Case study To identify a key child health issue and discuss this issue in the Australian context. You will demonstrate understanding of contemporary families in Australia. You will discuss the role of the family and reflect on how the family can influence the overall health outcomes

Read More »

NUR 100 Task 2 Health Promotion Poster

NUR 100 Task 2 Health Promotion Poster The weighting for this assessment is 40%. Task instructions You are not permitted to use generative AI tools in this task. Use of AI in this task constitutes student misconduct and is considered contract cheating. This assessment requires you to develop scholarship and

Read More »

BMS 291 Pathophysiology and Pharmacology CASE STUDY

BMS 291 Pathophysiology and Pharmacology CASE STUDY Assessment No: 1 Weighting: 40% Due date Part A: midnight Friday 2nd August 2024 Due date Part B: midnight Sunday 29th September 2024 General information In this assessment, you will develop your skills for analysing, integrating and presenting information for effective evidence-based communication.

Read More »

Can't Find Your Assignment?

Open chat
1
Free Assistance
Universal Assignment
Hello 👋
How can we help you?