Course Title: Ensure privacy for users

Part A: Course Overview

Program: C5194

Course Title: Ensure privacy for users

Portfolio: BUS

Nominal Hours: 20.0

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Course Code




Learning Mode

Teaching Period(s)


City Campus


650T TAFE Business

Face-to-Face or Internet or Workplace

Term1 2012

Course Contact: Catherine Han Lin

Course Contact Phone: +61 3 9925 1336

Course Contact Email:

Course Description

This unit defines the competency required to ensure IT services meet current and future internal operational enterprise requirements.

If you are undertaking this course in Melbourne from semester 2, 2012 onwards your teacher will advise you if you require access to a computer for the course. It is recommended that you have access to a mobile computing device to allow greater flexibility in terms of where you can work on campus outside class times.

Pre-requisite Courses and Assumed Knowledge and Capabilities


This course is co-delivered and co-ssessed holisticatlly along with three (3) other competencies: 
ICAA5158B COSC 6066C Translate business needs into technical requirements; PSPPM502B BUSM 7779C Manage Complex Projects;ICAP5039B  COSC 6067C Match IT needs with the strategic directions of the enterprise

National Competency Codes and Titles

National Element Code & Title:

ICAS5202B Ensure privacy for users


1. Review privacy policy in relation to legislation
2. Determine policy shortfalls
3. Update and review policies

Learning Outcomes

Overview of Assessment

Students must demonstrate an understanding of all elements of competency to be deemed competent.
A range of assessment methods are used to assess practical skills and knowledge, for example:
• direct questioning combined with review of portfolios of evidence and third party workplace reports of on-the-job performance by the candidate
• review of authenticated documents from the workplace or training environment
• demonstration of techniques