Code of Conduct By Leo Coroneos

Slides:



Advertisements
Similar presentations
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Advertisements

The Staff Code of Conduct ACS Roundtable Forum Presented by Elle Ackland Friday 17 August 2012.
Gaucho Round-Up FAQ’s This presentation covers some of the FAQ’s about campus clean-up day. Presentation #4 2/3/
1 Discipline, Capability and Grievance resolution: for those with responsibility for others Jessie Monck, PPD, Human Resources Division.
Real expectations. Code of Conduct. What is the Code of Conduct? Purpose: Outline and explain the expected behaviors, values and standards that guide.
Professional Wills: Meeting our Obligations Alan Slusky, Ph.D., C. Psych. Registrar – Psychological Association of Manitoba Nov. 14, 2012.
Information Systems Unit 3 – Outcome 3 Legal Obligations of Programmers Student Lecture.
ICAICT202A - Work and communicate effectively in an IT environment
Department of Information System Faculty of Computing & Information Technology King Abdul Aziz University, Jeddah, KSA.
Towards a Freedom of Information Law in Qatar Fahad bin Mohammed Al Attiya Executive Chairman, Qatar National Food Security Programme.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
DATA PROTECTION AND PATIENT CONFIDENTIALITY IN RESEARCH Nic Drew Data Protection Manager University Hospital of Wales   
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Attorney at the Bars of Paris and Brussels Database exploitation & Data protection Thibault Verbiest Amsterdam 1 April 2005
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
Handling information 14 Standard.
Maintain Ethical Conduct
Data Protection and You Your Rights & The Law Registration Basics Other Activities Disclaimer: This presentation only provides an introductory info. Please.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
Computer Legislation The need for computer laws Go to Contents.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Copyright ©2012 Pearson Education, Inc. publishing as Prentice Hall Chapter 14 Respecting Employee Rights and Managing Discipline 14-1.
Data Protection Act AS Module Heathcote Ch. 12.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Lassen Community College NEW STUDENT ORIENTATION Introduction Lassen Community College is an academic community dedicated to providing an agreeable atmosphere.
ETHICS, POLICY & SECURITY ISSUES
The Data Protection Act [1998]
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Teacher Rooming Equipment Rules / Expectations Login / Passwords Technical Issues Homework Printing.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Lecture 6: More on Ethics. Respect for Dignity of Persons Respecting the rights of individuals Respecting the rights of individuals Non-discriminatory.
Copyright Issues in Data Management CHRISTINE FRUIN / SCHOLARLY COMMUNICATIONS LIBRARIAN.
Induction toolkit 4. HOW DO I CARRY OUT MY ROLE? © GovernWell
INFORMATION GOVERNANCE AND CONFIDENTIALITY Information Governance Facilitator.
Data Protection and research Rachael Maguire Records Manager.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
Data Protection Philip Reed. Introduction What is data? What is data protection? Who needs your data? Who wants your data? Who does not need your data?
Ethics Jacob Bryan ECE 445 Lecture 4. Ethics and Morals  Individual and collective standards –I feel morally bound to volunteer in my community –I am.
Library Security Issues and Policies Patron access and protection: Staff Security: Mitigating Actions By John R. Sanders LIS Aug 2004.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Successes criteria : All will be able to: You need to have a definition of legislation, policies and procedures then sate which ones do you have to follow.
Introduction [September 2015].
ASSESSMENT COVER SHEET
FMB 2120 Human Resource Management
Slides Template for Module 5
MIDLANDS STATE UNIVERSITY FACULTY OF COMMERCE
Handout 2: Data Protection and Copyright
Standards and Intellectual Property Rights in ITU
Bourbon County Schools
Legal and Ethical Issues in E-Commerce
Academic Integrity An essential requirement in tertiary study
LAUSD Responsible Use Policy (RUP)
General Data Protection Regulation
Data Protection Legislation
PERSONAL DATA PROTECTION ACT 2010
EU Directive 95/46/EC (Paragraph 2) “Whereas data-processing systems are designed to serve man; whereas they must Respect their fundamental rights.
GENERAL DATA PROTECTION REGULATION (GDPR)
Academic Integrity An essential requirement in tertiary study
How we use Your Health Records
General Data Protection Regulations 2018
Code of Conduct Training and Statement of Understanding 2018
Confidentiality of Information Acknowledgment and Agreement 2018
Note Well This is a reminder of IETF policies in effect on various topics such as patents or code of conduct. It is only meant to point you in the right.
“Seven-minute Staff Meeting”
Handling information 14 Standard.
ACADEMIC HONESTY MYP International baccalaureate
Presentation transcript:

Code of Conduct By Leo Coroneos “Contribute to copyright, ethics and privacy in an ICT environment” – Code of Conduct (oral presentation by Leo Coroneos, 8 March 2017)

Copyright and Intellectual Property Privacy Code of Ethics Contents Copyright and Intellectual Property Privacy Code of Ethics Three components of this oral presentation, as listed above

An overview of my Code of Conduct as it applies to South Regional TAFE Introduction An overview of my Code of Conduct as it applies to South Regional TAFE Question and answer sections (x2) Hand-out: South Regional TAFE Code of Conduct (to pass around class) Pictures/photos relevant to topics at hand Dot points which I will expand on during presentation What will this presentation be about?

My approach to this subject Legislation cited question section #1 Please take a quick look at the handout I am passing around the class and ask any relevant questions that come to mind. Suggested topics for questions include: My approach to this subject Legislation cited What other documents may be referenced in this Code How the policy applies to us as students References/sources Further information? “Enthusiastic and proactive approach” Legislation cited: Copyright Act 1968; Privacy Act 1988 No other documents referenced in this Code of Conduct Policy applies to everything we do in class, during breaks and while otherwise attending SR TAFE. For further information, consult lecturer or do research online.

Copyright and ip

Respect copyrights of software Duties of lecturers: Copyright and ip Duties of students: Back up data Do not plagiarise Respect copyrights of software Duties of lecturers: Use copyrighted materials according to “fair dealing” provisions of law Store students’ work safely and securely Respect copyright and IP of students Etc.

privacy Privacy is an important topic nowadays, when privacy concerns are more prevalent than ever, e.g. regarding online transactions, social media, images, email, work documents and records, and other data.

Personal information collected using only lawful and fair means Privacy Records about students are kept for specific lengths of time depending on the type of information they contain (see Department of Education Policies under Records Management) Personal information collected using only lawful and fair means Individuals must consent to disclosure of information or be “reasonably aware” of its possible disclosure to organisations or relevant parties Records to be kept securely and for no longer than required Disputes to be handled by SR TAFE’s HR department Refer to printed copy of Code of Conduct where necessary

Code of ethics

Bullying and harassment Cheating and plagiarism (cf. Copyright and IP) Code of ethics Alcohol and drugs Smoking Bullying and harassment Cheating and plagiarism (cf. Copyright and IP) Confidentiality Commitment to learning

Question section #2

CONCLUSION