Please enable JavaScript.
Coggle requires JavaScript to display documents.
LO1 Knowledge Organiser - Coggle Diagram
LO1 Knowledge Organiser
Authority Protocols
Authority protocols are the procedures that employees or managers within a business hierarchy have to follow.
-
-
-
Authority is important in the workplace as it authorizes payments,make decisions, for accountability reasons and to help deal with complaints.
Authority in the workplace is needed because senior staff can concentrate on strategic issues, rather than day-to-day administration. it also helps to minimise mistakes and errors in the business/workplace. It can also help reduce the risk of fraud is as payments require authorisation by a manager
-
Constraints
-
Ethical constraints:Ethical - Businesses may have guidelines relating to stereotypes, whistle blowing, or privacy that affect how some documents are worded.
Organisational constraints:Businesses may have specific requirements to ensure consistency across all employees, e.g. all staff may be required to conclude an email with their signature
Codes of practice constraints: Businesses have codes of practice - e.g. complaints procedures which should be followed by all staff.
Copyright;Businesses must avoid plagiarism and quote any sources used when producing business documents
Data protection:Any business documents must comply with data protection by only including relevant personal data
Equal Opportunities:The Equality Act 2010 means that business documents, such as job adverts cannot discriminate against groups of people
Consumer Protection:The Consumer Rights Act 2015 requires goods or services to be fit for purpose, as described and satisfactory quality.
Checking Protocols
Businesses need to ensure they have processes in place to check documents before they are released to the public to protect the image of business/legislation/company brand
Omissions:Documents need to be checked to ensure that they contain all the information that they should
-
Accuracy:Information contained within business documents should be accurate, up to date and fee of errors.
An agency, manager, solicitor or proofreader are the people who can check business documents
IT Security Protocols:
Procedures put in place in relation to the appropriate and secure use of IT equipment and software. IT Security protocols should cover:
Inappropriate use use and Unauthorised use
The Computer Misuse Act 1990 is a piece of law that deals specifically with the crime of accessing or modifying data stored on a computer system without being authorised to do so.