Please enable JavaScript.
Coggle requires JavaScript to display documents.
LO1-Protocols - Coggle Diagram
LO1-Protocols
Confedentiality
The procedures that employees or managers within a business hierarchy have to follow when making decisions, communicating with customers and making payments.
-
Confidentiality protocols mean set procedures that are in place to maintain the confidentiality of documents and data, limiting them to who needs to see them and protecting them from people that do not need to have access to them.
-
-
Some situations require confidentiality to be breached, whistle-blowers
Authority Protocols
-
-
make payments,make decisions, deal with complaints
Document Constraints
A restriction or limitation on what is allowed to be completed, either enforced or circumstantially.
-
Some constraints on document content are set out in legislation - it is a legal requirement that an organisation adheres to these constraints.
Organisational - used for consistency, might include use of formatting tools, the content of email signatures
-
IT Security
Procedures put in place in relation to the appropriate and secure use of IT equipment and software. IT Security protocols should cover: unauthorised use and inapropriate use
-
-
The Computer Misuse Act 1990 is a piece of law that deals specifically with the crime of accessing or modifying data stored on a computer system without being authorised to do so.
-
-