Sunteți pe pagina 1din 1

Assessment Event 1

Contribute to copyright, ethics and privacy in an


ICT environment
Short answer questions - Theory questions
Name one network protocol or technology that can be used to provide security when transferring data
over the internet.  Provide a brief overview of how the chosen protocol/technology provides for secure
data transfer.

Your answer
TCP/IP or Transmission Control Protocol/Internet Protocol is widely used throughout the world to provide
network communications. TCP/IP communications are composed of four layers that work together which
are: Application Layer, Transport Layer, Network Layer and Data Link Layer.
These layers allow packets of data, application programs and physical network equipment to communicate
with one another over the Internet through compiling packets of data and sending them to right location.
1.4

List and discuss briefly three elements (i.e. specific parts or sections of the document, often headings
within the document) that should be included in any Copyright Policy for an IT company. 

Your answer
Copyright policy should include an introduction of copyright: What copyright is? What does copyright
protects? Rights of the creator of any work, how much work of others can be used? How to seek permission
from owner if you want to use a copyrighted work? How to get advice if someone’s work is being infringed?
1.5

Describe two positive examples of how IT professionals are able to protect their copyright. 

Your answer
Copyright notice is good way which makes the visitors aware that the content on your website are legally
yours and no one has the right to use it without your permission.
Copyright is granted by law and IT professionals could seek assistance from a Government department or
lawyer to protect their rights.
Information and advice about copyright can be found through Australian Copyright Council (ACC).

S-ar putea să vă placă și