Please enable JavaScript.
Coggle requires JavaScript to display documents.
LO1 Knowledge Organiser - Coggle Diagram
LO1 Knowledge Organiser
Confidentiality protocols
Lesson 2
Confidentiality is used to:
Protect personal and sensitive material
like bank rrecods and health records
Commercially sensitive material like business info, patents and trade secrets
Confidentiality prrotocols:
Set procedures that maintain confidentiality of data
and protecting them from people who should not have
access to them
Ways to maintain confidentiallity:
Limit employees access to levels of authority
Limit information to need to know
Lock screens, screen savers, passwords, firewalls
Cabinets and security protcols
Key Terms:
Hierachy
Span of control
chain of command
Centralised decision making
Decentralised decision making
Enpowerment
Consequences of breaking confidentiallity:
Procecution
Loss of commercial advise
Loss of reputation
Employment Protocols
Lesson 6
Health and safety in the workplace:
Employers have a duty to ensure the workspace they are providing is safe and secure for the employees
Staff have the responsibility to use training equipment, tools and clothing provided to them
Staff mist take responsibility for their owns safety and report anything that is putting others at risk
Employmentt Legislations that. must be followed:
Equal opportunities act
Health and safety at work act
Employment rights act
Sex and discrimination act
-Equal pay act
Disability discrimination act
National minimum. wage act
Working time directive
Employment relation act
Employers must ensure they do not discriminate against others when in thing like job interviews (Equal opportunities act)
Authority Potocols
Lesson 1
Authority Protocols:
Confidentiality potocol
Document constaints
Checking protocols
IT security protocols
Employment protocols
Authority protocols are the procedures
that employees ora mangers within a business has to follow
The level of authority depends on where they are in the hierarchy
What are protocools:
Protocols are an organised way for a companies staff to work in oder to make sure that everything is set out for success
They outline how a business expects their staff to be
Key Terms:
Hierraxchy
Span of control
Chain of command
Centralised decision making
Decentralised decision making
Why is authority ina. workplace needed:
Senior staff are responsible for more strategic issues
Allows the business to minnumize mistakes
The risk of fraud is reduces as all payments requires authorisation from a manager or a senior leader
Cann motivate newer staff
Upholds standards
IT. security protocols
Lesson 5
IT potholes should cover:
Unauthorised use and inappropriate use
The computer misses ac 1990t
Apiece pot law the specifically deals with the crime of
accessing or modifying data stored on a computer system
without being authorised to do so
IT security protocols are put in place
in relation to the appropriate and secure use of IT equipment and software.
IT security protocols:
Passwords
Levels oof security
Screen savers
Firewalls
Incryption
User policies
Anti virus malware software
Inappropriate Use of IT equipment:
Employees using work computers for personal reasons
Unauthorised installation of software such as games
Illegal use of workplace hardware or software
Lss of company Information due to missues
Checking Protocols
Lesson 4
if the checking of business documents in not carried out then
this could have a negative aeffect on the businesses reputation and decrease the trust that they have with consumers
People who check business doocumnets:
Managers
solicitorrs
Proof readers
an agency
By checking your work when in a business you eliminate the possibility of:
Damage of reputation
Errors and inaccuracies
Ommisions
Loss of clarity
Document Constraints and Checking Protocols
Lesson 3
Legal Documents: Copyright, DPA,
Consumer protection, Equal Oppotunities
Voluntary constrains:
Organisational
- Businesses may have
specific requirement to ensure
consistency across all employees
Ethical
- Businesses may have guidelines relating
to sterotypes, whistle blowing or privacy
that affect how someones dcumnents are worded
Codes of practice are procedures that alls staff must
follow to deal with situations like complaints
Key Terms
: Plagiarism, Ethical, FSC, Fair Trade
Legal contraints:
Copyright
- Avoiding Plagiarism
Data protection
- Personal data must be protected
Consumer protection
- All gods and services must
be fit for purpose
Equal opportunities
- Employers must not
discriminate against
groups of people
ASA
- Advertising Standards Authority
Ethical Businesses
- Are they taking care of the environment ?
Are they being truthful about the production of their product ?
Are they decreasing the amount of waste they create over time ?