Project Management Assessment Part 1 – Determine Project Requirements Task 1, Write a detailed description of the client’s requirements and draft 3 questions that you may need to ask the steering committee to clarify their requirements or get additional information. The client wants a setup of a network to their new branch office in Brisbane. … Continue reading “Determine Project Requirements | My Assignment Tutor”
Project Management Assessment Part 1 – Determine Project Requirements Task 1, Write a detailed description of the client’s requirements and draft 3 questions that you may need to ask the steering committee to clarify their requirements or get additional information. The client wants a setup of a network to their new branch office in Brisbane. The client’s requirements are: Network Design should allow for up to 510 staff per departmentThere are 4 departments: Sales, Operations Management and Exploration.The management departments server must not be accessible from the other 3 departments but the management departments staff must have full access to the other 3 departments network.All host, including all servers, require internet access.The head office uses the 172.20.0.0 network for its private addresses. Head office use the 172.16.0.0 network for private addresses.Check the data cabling is suitableSubmit a network design proposal with a fully costed bill of materials and a network diagram.Use one cisco 2811 router and 2960 switches in the initial design.Head office requires a remote login to the switches and router.IP address should be assigned dynamically.20 PC’s and 1 server per department.Supply the cables and connectors as required.Configure both ends of the WAN link, OSPF across the link.Research some SNMP monitoring softwareWireless site survey.They got a E1 WAN connection at the moment but are considering a more cost effective one, they also plan to install a non cisco router at the head office. NBN will be installed in the future. The 3 question for the steering committee are: What is the project budget?How are we going to achieve all the task by the deadline?What is the key driver of the project? Task 2, Prepare a Work Breakdown Structure for the project Task 3, Prepare a stakeholder analysis showing involved persons and their relation to the project. List 3 data gathering techniques that you could use as a project manager to get this information. StakeholderRelation to the projectEstimated Project Impact Estimated Project ImportanceWestern MiningWestern Mining is The client.HIGHHIGHPacific ITPacific IT is the service provider in charge for making the project succeed.HIGHHIGHJames TJames T is Western Mining’s General Manager, he directs the strategy and development of the organization.MEDIUMMEDIUMDeana TroyDeana Troy is the systems Architect, responsible to accomplish the tasks.LOWLOWJack CrusherJack Crusher is the Branch Office Manager he will be recruiting the staff to realize the tasks, and acquiring needed material and resources.HIGHLOWGaganpreet SinghThe project manager have the responsibility of the planning, procurement and execution of a project, in any undertaking that has a defined scope, defined start and a defined finish; regardless of industry.HIGHHIGH the 3 gathering Techniques that I could us as a project manager are: BenchmarkingBrainstormingCheck SheetsChecklist Task 4, Complete the Project Charter document. Draft an email to James T. Kirk advising him that you have attached the Project Charter document and requesting his approval, comments, and/or any changes that are required. Hello James T I have been hard at work envisioning the ideal to setup of a network in Brisbane. I would like to request your approval for the Project Charter document that I attached. Please let us know if there is any other information or require any changes that you need regarding our proposal to help you make your decision. Thanks, Gaganpreet Singh, Project Manager. Task 5, List 3 SNMP monitors that Western Mining could use to collect and display SNMP data. Cacti, is a complete network graphing solution designed to harness the power of RRDTool’s data storage and graphing functionality. Cacti provides a fast poller, advanced graph templating, multiple data acquisition methods, and user management features out of the box.PRTG, Monitor all the system, devices, traffic, and applications in your IT infrastructure. There is no need for additional plugins or downloads and is a powerful and easy to use solution, which is suitable for businesses of all sizes.OpenNMS, monitors millions of devices from a single instance, it has flexible and extensible architecture of OpenNMS to extend service polling and performance data collection frameworks. Also, published under AGPLv3 license, OpenNMS is a fully open source solution. Task 6, Describe 3 characteristics of successful technical teams in a project Small number of people, project teams are assigned based on the project scope and requirements. Too many people lead to a waste of time and resources; too few people risk project delays due to shortage of resources.A Common Purpose, Membership buy-in is crucial and a project framework is ideal for facilitating this objective.Approach, A project plan is fundamentals it outlines an approach to project completion. The ideal project approach to achieve excellence is where planning is combined with more relationship focused efforts that help ensure project success. Part 2 – Scheduling and Managing Task 1, Use Microsoft Project to create a Gantt chart showing required tasks, their duration, resource assignment and critical path. See attached file Gantt Chart Western Mining Task 2 Prepare a communications Plan including a communications register stating the communications requirements of the project, the mechanism of communication (email, phone, website etc) and the frequency (as required, weekly, monthly etc.) Message ContentRecipientsDelivery MethodFrequencyPreliminary Project ConceptSponsorMeetingOnce at the beginning of the projectProject UpdatesProject Team Jack CrusherEmailWeeklyAgendaProject TeamEmailAs requiredProject ScheduleProject TeamMeetingAs requiredProject ChangesJames T.EmailAs requiredProject Status ReportJack CrusherEmailEvery 2 weeksRisk Management ReportProject ManagerEmailWeeklyEvaluation ReportJames T.EmailEvery 2 weeksTechnology UpdatesNetwork Engineers and Deana TroyEmailAs required Task 3, Create a Risk Management Plan including a risk register showing potential risks to the project, their probability and cost. Mitigation and/or risk avoidance strategies are to be described. RiskProbabilityCostsMitigationProject purpose and needs is not well-definedMedium$5.000Complete a business case if not already provided and ensure purpose is well defined.Project design and deliverable definition is incomplete.Low$5.000Define the scope in detail via design workshop with input from subject matter experts.Project schedule is not clearly defined or understoodLow$5.000Hold scheduling workshops with the project team so they understand the plan and likelihood for missed tasks is reduced.No control over staff prioritiesMedium$2.000The project sponsor will brief team managers on the importance of the project. Soft book resources as early as possible and then communicate final booking dates after the scheduling workshops.Consultant or contractor delaysMedium$5.000Include late penalties in contracts. Build in and protect lead time in the schedule.Untrained operations and maintenance people to run the tasksHigh$2.000Schedule trainings during commissioning by the project manager.Equipment FailureHigh$10.000Preventive and corrective maintenance.Customer Changes initial requirementHigh$10.000Change request form Task 4 Prepare a Project Closure Report that identifies the project outcomes and lessons learned. Western Mining Project Closure Report DescriptionProject NameBrisbane Branch OfficeProject DescriptionDesign of a networkProject ManagerGaganpreet SinghMangerJames TProject SponsorWestern Mining Table of Contents 1 Project closure report purpose. 7 2 Project closure report goals. 7 3 Project closure report summary. 7 Project Background OverviewProject Highlight and best performancesProject closure synopsis 4 Project metrics performance………………………………………………………………………………………….. 8 I. Goals and Objectives Performance. 9 II. Success Criteria Performance. 9 III. Budget Performance …………………………………………………………………………………………………..9 IV. Milestone and Deliverables Performance. 9 V. Schedule Performance. 9 VI. Metrics Performance Recommendations ……………………………………………………………………9 5 Project closure tasks. 10 I. Resource Management. 10 II. Issue Management. 11 III. Risk Management. 11 IV. Quality Management. 11 V. Communication Management. 11 VI. Customer Expectation Management. 11 VII. Asset Management. 11 VIII. Lessons Learned. 11 IX. Project Closure Recommendation. 11 6 PROJECT CLOSURE REPORT APPROVALS. 12 Project Closure Report Purpose The purpose of this Project Closure Report is to communicate to the project stakeholders the work achieved by the project team coupled with addressing any final issues while bringing the project to an end. Project Closure Report Goals The project Closure Report provides an overview of the project timeline to include milestones, successes and issues experienced throughout the development of the project. This allows for stakeholders and members to quickly acquaint themselves with the following: Check and authenticate the milestones and achievement of the project.Summary of tasks required to finish the project.Check outstanding issues, risks and recommendations.Identify project highlights and best practices for future projects. Project Closure Report SummaryProject Background OverviewNetwork design should allow 510 staff per departmentThere will be 4 departments: Sales, Management, Operations and ExplorationThe Management departments server must not be accessible from the other 3 departments but must have full access to the other 3All hosts and server require internet accessThe head office uses the 172.20.0.0 network for its private addresses. Head office use the 172.16.0.0 network for private addresses.Check if data cabling is suitableEquipment installationSoftware installationNetwork codingPlanning, designing and deployment of network.Configure both ends of the Wan link, OSPF across the linkSubmission of a network design proposal with a fully costed bill of materials and a network diagram.Network devices provided are a cisco 2811 router and 2960 switches.Head office requires a remote login to the switches and routerIP address should be assigned dynamically20 PC’s and 1 server per departmentWireless networkSetup a network monitoring system (SNMP) Project Highlights and best practicesPacific IT established a clear project planPacific IT minded the team workloadPacific IT clarified project roles and responsibilitiesPacific IT effective monitoring and evaluation of the project tasksPacific IT completed the design of the network on the timeframePacific IT avoided estimating projects in a vacuum Project Closure Synopsis The project was completed within budget and on time. Project Metrics PerformanceGoals and Objectives Performance The project objectives were completed within budget and on time. Success Criteria Performance Network were successfully design and implemented. Budget Performance The budget stayed within the agreed upon constraints. The replacement Graphic Designer joined the team at a lower salary, which off-set the cost of replacing the hard drive after it crashed. The project budget corrective actions will be conducted in 30 days by evaluation of costs for continued data analysis and course maintenance. Milestone and Deliverables Performance Every Milestone and deliverables were successfully achieved with high over coming customer expectation. Schedule PerformanceProject Schedule Overview The project schedule offers a balance between what was planned and what has been consumed in order to allow a better manage the project costs. The initial schedule was met by January 19, 2020 deadline. The project went live on the agreed upon date of January 20, 2020. Project Schedule Control Process All deliverables were studied and signed-off by the review team. Any items that required modification were resolved. Project Schedule Corrective Actions No corrective actions were required as a full planned process was executed, fixed with a strong communication between the team members. Project Schedule integration with Managing Project It was realized without any issues as a result of the pre-project preparation coupled with the communication of roles. Metrics Performance RecommendationsContingency plan (More Back-ups)Team members should be evaluated on attendance and efficiency. Project Closure TasksResource management Replacement of a hard drive, allowing to support future projects. Issue ManagementNetwork SecurityTeam member performance Quality Management Pacific IT has regularly meetings with Western Mining to keep them well informed about the progress of the project. Resolving all their question, receiving their feedbacks and discussing any change they would suggest. Risk Management Pacific IT recommend an implementation of a network security to the existing network Communication Management The communication plan was very effective as all the tasks were clear to follow coupled with team members. Customer Expectation Management Customer expectation did not vary as the plan needs and training needs were well developed and agreed upon. Asset Management Implement network security Lesson LearnedVerify data early in the process. Bad data found later extends projects and breaks project focus.Do not underestimate risksCreate strong relationship with stakeholdersExcellent process to get support to changeTeams would be under five members. Too many makes it difficult to schedule meetings. Project Closure Recommendations I am requesting, for Project Closure approval. By signing below and upon my receipt of the signatures, this project will be closed. I will receive any question, request or concern regarding the actual course and compile, measure, and drive the performance results of the course outcome. Project Closure Report Approvals Prepared by Gaganpret Singh __________________________ Project Manager Approved by James T _____________________ Western Mining’s General Manager __________________________________ ([Job Title]) __________________________________ ([Job Title]) Approval Date 17/02/2020 Part 3 – Question and Answer Question 1, During the initial stages of the project you will interview a range of stakeholders to gather information about project requirements, risks, and assumptions. Name 2 types of questions that you should include in interviews? I should include open-ended questions and Probe question. Open-ended question is more than just one response. Most probing question begin with “what” or “How”. To answer an Open-Ended question, the response can be compared to information that is already known to the questioner. Probe question are intended to deepen the understanding of the situation we are researching. Question 2, Privacy requirements References: Privacy Act 1988 Now that Western Mining are expanding their operations it is essential that their policies and procedures comply with current Australian requirements. You have been tasked with reviewing and revising their Privacy Policy and Procedures to ensure that they comply with regulatory requirements. As with many organisations Western Mining currently do not adequately protect the privacy of identity information they collect and store on their customers and staff. At the present time Western Mining have a written privacy policy but that is all. The Western Mining Privacy Policy is as follows: “In all areas of our business we seek to protect the privacy of our customer’s data. We will not: -divulge any private data on our customers unless explicitly required to by law -all private data will be treated in-confidence and stored in secure storage facilities when not in use -all private data on our customers will be archived to secure facilities after three years of inactivity i.e. three years after the last trip booked through Western Mining -credit card details will not be stored, only a card transaction identified (last four digits of the credit card) will be kept against a transaction.” Your task is to: 1. Review the above privacy policy and identify any shortcomings. A privacy policy from the Privacy Act 1988 does not comply with regulatory requirements. The Privacy Act 1988 defines personal information as: personal information means information or an opinion about an identified individual, or an individual who is reasonably identifiable: (a) whether the information or opinion is true or not; and (b) whether the information or opinion is recorded in a material form or not. Common examples are an individual’s name, signature, address, telephone number, date of birth, medical records, customer data, bank account details and commentary or opinion about a person. The Privacy Act includes thirteen Australian Privacy Principles (APPs), which apply to some private sector organisations. 2. Construct a Privacy Policy and Procedures Manual that adheres to the 13 privacy principles and corrects the deficiencies, if any, that you have identified in the privacy policy outlines above. The Privacy Policy and Procedures Manual should include: -Statements of Western Mining new policy in regard to protection of private data. A statement on each of the privacy principles in Australian privacy legislation is required. These policy statements must address both customer data and employee data since the information collected and the frequency of refresh (or deletion) will differ between the two data sets. -A procedures statement as to how Western Mining will achieve adherence to the privacy principles. This translates the policy statements into activities required to achieve the policy. Note that while there will typically be a policy statement for each privacy principle, a procedures statement may cover more than one principle. For instance an end-of-month processes might archive a subset of identity data (deleting sensitive data no longer needed) and purge archive data that has not been refreshed. In preparing your document you should: -refer to the privacy principles in the Federal law regarding protection of privacy data -refer to technology such as website security mechanisms for protecting Western Mining client details while they are using on-line services -make use of mechanisms such as secure file transfer technology (HTTPS, SSL etc.) -use an information architecture approach whereby identities records consist of sensitive and non-sensitive pieces of data that can be treated differently in order to adhere to privacy legislation -describe how privacy protection procedures will apply to back-ups and storage of files containing sensitive data -use secure database management technology so that access to sensitive attributes in the data will be controlled with timely and accurate authentication of database administrators -include direction on physical network layout that ensures, for instance, a workstation capable of accessing sensitive personal information is not placed in an open office environment in which the screen could be viewed by non-authorised persons. You have been provided with the privacy policies of NEC, MACQUARIE TELECOM, and NEXTDC LIMITED for reference. You may also use any other publicly available privacy policy of any organization as a reference. Privacy Policy – Western Mining Purpose: Pacific Internet Solution Policy refers to our commitment to treat the data of customers, employees and other parties involved to the company with care and confidentially, following the privacy act 1988 (Cth) (the Privacy Act). Ensuring that we store and handle data honestly, transparently and with respect towards individual rights. Your privacy is important to us. This privacy statement explains the personal data Pacific Internet Solution processes the data. Scope: This policy brings up to employees, customers, suppliers and other parties that are involved to the company who provides information to us. Pacific Internet Solution Privacy ensures the protection of data under the 13 privacy principles of Australian legislation. Policy elements: In order to operates, we would need to obtain and process information. Information includes personal data of a person such as names, addresses, usernames and passwords, photographs, financial data, telephone, email address, date of birth, opinions that you have write to the company and other personal information that you are willing to share with us. Pacific Internet Solution gathers this information with the full cooperation and understanding of interested parties. You have the option to refuse to provide any personal information to Pacific Internet Solution. We usually received the information via internet application, phone or a meeting with us when you place a service or are working with us. In order to process your enquiry, we may request some personal information by an online form or you could send an email providing the same information. When this information is available in our systems, we will: Preserved in confidenceStored in a secure storage facilityArchived to secure facilities after three years of inactivity.Inform to any party that we have stored any information which of their data is collected.Inform to any party that we have stored any information how we will process their data.Inform to any party that we have stored any information who has access to their information.Have backups of this information, avoiding any lost or corrupted data. How long do we keep your personal data? We ensure that personal data is retained only for as long as necessary in accordance with the laws. We may be required to retain your personal data for a number of years in order to satisfy legal or contractual obligations, or in order to stablish, exercise or defend legal claims. When your personal data is no longer necessary for these purposes, the personal data will be delete. We will only use this information for the purpose for which we collected. We could use it for: Record your identity in order to contact you.Realize the request.Provide assistance and solve any doubt.Deliver some marketing information about the services of the company (you could decline this marketing information). If we are going to use the information that we collect from you for another purpose that is not state above, we will contact you to request your consent. Pacific Internet Solution complies with the privacy Act by: Ensuring that we have a Privacy policy that address all the key Australian Privacy Principles to ensure customers understand what information we are collecting from them and also what we are going to do with the information.Develop a privacy manual (Formal training process) that outline how we collect, use, store and handle personal information. A privacy officer will be in charge of the training and solve any question that the employees could have.Establish some barriers, like limiting access to personal information to those who need it to perform their everyday tasks.Inform the customers by active methods to ensure that our customers remain informed about our Privacy Policy. How Pacific Internet Solution Protect your personal information? We design and administer our web services to limit the amount of data collected. We endeavour to protect users and their data when we process data collected. We use website security mechanism to protect Pacific Internet Solutions client information while they are using our on-line services. In order to send files, we use File Transfer Protocol and to secure it we use Hypertext Transfer Protocol Secure (HTTPS). HTTPS adds security to HTTP by offering certificate authentication. Additionally, it encrypts a website’s inbound traffic and introduces an encryption layer via TLS to ensures data integrity and privacy. Personally identifiable information (PII) is information that, when used alone or with other relevant data, can identify and individual. Big data, is being collected, analysed, and processed by businesses and shared with other companies. The wealth of information provided by big data has enabled companies to gain insight into how to better interact with customer. However, the emergence of big data has also increased the number of data breaches and cyber-attacks by entities who realize the value of this information. Pacific Internet Solution use an information architecture approach, where we record our sensitive and non-sensitive data by separate and are treated differently in order to adhere to privacy legislations. We segregate between its sensitive and non-sensitive data to outline a strict process for handling important information. Corporate data is classified into public, private and restricted. And security measures can be enacted accordingly. While public data requires minimal security, private data needs to be handled cautiously. On the case of restricted data, employees can be given access on the need basis only. Examples of sensitive date is: Full nameSocial Security Number (SSN)Driver’s licenseMailing AddressCredit Card informationPassport information Examples of Non-sensitive is: Zip codeRaceGenderDate of BirthPlace of birthReligion The Privacy Act 1988 (Cth)(the Act) sets out 13 APPs, which guide organisations in dealing with personal information. The principles cover the following areas: The open and transparent management of personal information. Anonymity and pseudonymity. Pacific Internet Solution data will be treated in confidence, does not share, sell rent or otherwise disclose your personal information. The collection of solicited personal information. Pacific Internet Solution will not receive and store any sensitive personal data. We are only allowed to store non-sensitive data such as email addresses, mobile advertisements or cookies ID. Dealing with unsolicited personal information.Notification of the collection of personal information. Use or disclosure of personal information. Pacific Internet Solution will not divulge any private data except requested by law. Do not use information for direct marketing.Cross-border disclosure of personal information.Adoption, use or disclosure of government-related identifiers.Quality of personal information.Security of personal information. Pacific Internet Solution will store any data in secure storage facilities. Also, the data will be secure by website security as HTTPS and SSL, all data will be encrypted and accessed only by authentication to ensure privacy. Provide access to an individual to personal information.The correction of personal information. Is critical for Pacific Internet solution follow the privacy protection procedures in order to store sensitive data, securing it and preventing loss of data through unauthorized access. It includes protecting data from attacks, such as ransomware or attacks that may modify data, making it unreliable. To prevent personal information that Pacific Internet Solution holds from being lost. The company makes copies of important files and store them on a physical device using a cloud-based storage solution. Pacific Internet Solution use Secure database management technology so that access to sensitive attributes in the data will be controlled with timely and accurate authentication of database administrator. Pacific Internet Solution workstation with sensitive information are not allocated on public places where non-authorized persons could access, also, employees need to take certain precautionary steps like not leaving laptops and devices unattended at public places. And in case of missing device, the theft needs to be reported immediately. Also they need to take a proactive approach to ensure that the data on their devices are encrypted. By following these measures, vigilant employees can make a significant contribution in reducing the risk of data breaches. Consequences: Everything state on this policy must be followed. A breach of any principle will raise disciplinary and legal action. Question 3, Copyright References: Short Guide to copyright, useful links. One of your roles as Project Manager is to oversee intellectual property and copyright compliance. Answer the following questions in relation to this role. 3.1 Name Australian legislation that deals with the following areas of intellectual property and copyright: Patents: Patents Act 1990 Trade Marks Trade Marks Act 1995 Designs Designs Act 2003 Plant Breeders Rights Plant Breeder’s Act 1994 Circuit Layouts Circuit Layouts Act 1989 Copyright Copyright Act 1968 3.2 A colleague has found an interesting article in an industry journal and suggests that it should be scanned and emailed to all staff. What would you advise your colleague? I would advise him to ensure that he has the permission of the author 3.3 You discover that one of the clients for which Western Mining provides hosting services operates a website that encourages members of the public to upload commercially available music and videos which can then be downloaded by anyone else. Is Western Mining in breach of copyright legislation? Why or why not? You may write your answer below or submit a word processed document. Ref: http://www.iinet.net.au/about/mediacentre/copyright-case/ No. Because Pacific Internet Solutions provides hosting services, that are not design to infringement copyright. If one of the clients are in breach of a copyright legislation, it is not caused by using the hosting service. The service provider is not responsible for the client decision. For example, in 20 April 2012, the High Court dismissed the final appeal lodged by Roadshow Films & Others against iiNet, claiming that iiNet authorized copyright theft because iiNet didn’t prevent or deal with that user to download and share infringing copies of films and television programs using Bittorrent. Chief Executive Officer, Michael Malone, said the judgment supported the company’s position and proved the claims made against it were unfounded. Thus, Founded on this case (https://www.iinet.net.au/about/mediacentre/copyright-case/), the same decision could be made for Pacific Internet Solutions. Pacific Internet Solution doesn’t allow copyright infringement and it is not in breach of copyright. 3.4 Write a copyright policy for Western Mining that describes how Western Mining views and deals with these issues. (To be submitted as a word processed document) (You should consult the references provided) Copyright is a law that gives the owner of a work the right to say how other people can use it, exclusives rights for creators of original works like a literary work, song, movie or software. These rights include the right to reproduce the work, to prepare derivative works, to distribute copies, and to perform and display the work publicly. Western Mining does not authorise any copyright infringement. We do not allow to reproduce, modify, distribute or republish materials without our prior written permission from the author. Western Mining customers must not use any of our services to commit any copyright infringe. COPYRIGHT POLICY – PACIFIC INTERNET SOLUTIONS We Western Mining recognize and respect intellectual property rights and are committed to fulfilling our moral and legal obligations with respect to our use of copyright protected works, such as, music, films, software and other literary, artistic and scientific works. As a matter of moral integrity and adherence to copyright law, Pacific Internet Solution sets forth these policies for all employees: No employee of Western Mining may reproduce any copyrighted work in print, video or digital form in violation of the law. Works are considered protected even if they are not registered agency.Western Mining holds an Annual Copyright License which enables employees of Pacific Internet Solutions to lawfully reproduce and distribute content, in print or electronic format, as needed within the company. Under the license Pacific Internet Solutions employees can copy and internally distribute excepts from newspaper, magazines, journals and other copyright protected works licensed by any Copyright agency.Western Mining employees and clients cannot upload or download any unauthorised copy from Pacific Internet Solutions equipment.Western Mining employees and customers cannot install or run peer-to-peer “file sharing” software or operate a peer-to-peer index or server on Western Mining systems without Pacific Internet Solutions permission. Western Mining expects its employees to be responsible consumers of copyrighted materials. We also encourage employees to educate their peers on copyright compliance. If any employee witnesses a potential copyright infringement, please let us know of the individual to our copyright compliance officer. Employees who duplicate copyrighted works may be subject to disciplinary action up to and including termination. ——————————————————– Employee Signature and date Question 4 Ethics References: ACS code of ethics, iinet code of conduct, NBN code of conduct. Write a code of conduct for Western Mining that will inform anyone working for Western Mining of the standard of behaviour expected. (You should consult the references provided) (To be submitted as a word processed document) Scope: This Code of Conduct applies to all of Pacific Internet Solution, employees, volunteers and contractor. Policy elements: Compliance with law On Pacific Internet Solution all the employees have the obligation to protect our company’s legality. Complying with environmental and safety laws, behaving ethical and responsible at any moment working at the company. Respect in the workplace Pacific Internet Solution employees should respect any colleagues or customer, preventing racial discrimination, sexism, fair recruitment policies and working conditions. Employees should behave in this manner in all the aspects of their work. Protection of company property Pacific Internet Solution employees should protect its assets (Material or immaterial) and ensure their efficient use for legitimate business purpose. Employee acknowledges that this property is confidential and is not readily accessible to Company’s competitors. Professionalism Pacific Internet Solution employees must show integrity and professionalism in the workplace: Personal appearance: Pacific Internet Solution employees must follow the dress code and personal appearance guidelines. Job duties and authority: Pacific Internet Solution employees should realize their tasks with integrity and respect toward customers and employees. Authorities like supervisors and managers cannot abuse from their job position. Collaboration: Pacific Internet Solution employees should be friendly and collaborative. They should try not to disrupt the workplace or present obstacle to their colleagues’ work. Tardiness and Absenteeism: Pacific Internet Solution employees must follow their schedules, arriving and leaving at the time scheduled, unless, there is an unexpected issue that the company could make an exception. Corruption: Pacific Internet Solution discourage employees from accepting gifts from clients or co-workers. Communication: Co-operate in advancing by communication with other professionals, students and the public. Conflict of interest: Pacific Internet Solution encourage employees to avoid any personal, financial or other interest that might delay/obstruct their capability to perform their job duties. Policies Equity and justice: Pacific Internet Solution employees should treat each person the same. Everyone enjoy the same opportunity and rights, and nobody is disadvantaged. As such, the aim of equity in Australia’s legal system ensures each person is treated in the same way no matter who they are. Also, Pacific Internet Solution is committed to a policy of equal opportunity in employment. It accepts that it has a responsibility to create an environment free from discrimination, and to ensure that the principle of merit is the most important. Equity of access to employment and programs: Pacific Internet Solution is pursuing and committed to provide a job environment of equal chances. We encourage that our employees on the pursuit of their professional goals and following on the same line the successes of the company aims. Achievement Relative to Opportunity: Pacific Internet Solution encourage and give more weight for overall quality and impact of achievements than the quantity, rate or breadth of particular achievements. Western Mining is committed to the fair assessments of employees and a workplace culture that values and supports life balance in order to attract, develop and retain the highest quality staff. Harassment: Pacific Internet Solution is committed to maintain an environment free of discrimination of any form as racism, bullying, or sexism. Such behaviour is unacceptable and will not be tolerate, forcing to realize disciplinary actions. Discrimination: Pacific Internet Solution employees are responsible to prevent and avoid any unlawful discrimination in the workplace. Discrimination means in hiring, discharge, promotion, referral, and other facets of employment, on the basis of colour, race, religion, sex, disability, age or national origin. Section 76 of the OHS Act prohibits an employer from dismissing an employee, discriminating against an employee or treating an employee lee favourably because that employee is or has been an elected Health and Safety Representative (HSR). An employer (or prospective employer) is guilty of an indictable offence if the dominant reason for: dismissing an employee, injuring an employee or altering the employee’s position to detriment of the employee;threatening to do any of the above things to an employee;refusing or failing to offer employment to a prospective employee or discriminating between prospective employees in offering terms of employment;is because the employee or prospective employee:is or has been an OHS rep or a member of a Health and Safety Committee (HSC);exercises or has exercised a power as a rep or a member of an HSC;assists or has assisted or gives or has given any information to an inspector, a rep or a member of an HSR; or This includes deputy reps. WorkSafe has stated that it treats any cases of alleged discrimination seriously and ‘under its compliance and enforcement policy and general prosecution guidelines, prioritises allegations of discrimination for comprehensive investigation.’ If charges are laid under this section of the Act, the burden is on the employer to prove that the dominant reason for their action was not any of the matters outlined above. Occupational Safety and Health: The OSH Act places certain duties on employers, employees, self-employed people, manufacturers, designers, importers and suppliers. It also places emphasis on the prevention of accidents and injury. Pacific Internet Solution employees are responsible to have a workplace free of work related injuries and diseases. Consistent with nationally agreed priorities and targets, WorkSafe aims to reduce fatalities and injury and disease rates, by: Reducing high incident/severity risks:Improving the capacity of business operators and workers to manage occupational safety and health effectively.Preventing occupational disease more effectivelyEliminating hazards at the design stageStrengthening the capacity of government to influence occupational safety and health outcomes. Disciplinary actions: Pacific Internet Solution may have to proceeds on a disciplinary action if an employee has done repeatedly or intentionally fail Western Mining code of conduct. The possible consequences after commit the violations are Verbal warning, written warning, performance improvement plan, temporary pay cut, loss of privileges, suspension, demotion or termination. On cases of corruption, theft, embezzlement or other unlawful behaviour, Wester Mining would take legal actions.