Please enable JavaScript.
Coggle requires JavaScript to display documents.
L01 Knowledge Organiser - Coggle Diagram
L01 Knowledge Organiser
Protocols
-
-
Authority protocols
-
authority can be passed down the chain of command - responsibility is passed up to staff at a higher level
-
-
A clear chain of command is needed so that an employee knows what decisions they can make and cannot make, and who to escalate issues to if they arise.
Document constraints
Legal - Copyright, DPA, Consumer protection, Equal opportunities
Data protection - Any business documents must comply with DP by only including relevant personal data
-
Copyright - Businesses must avoid plagiarism and quote any sources when producing business documents
Equal opportunities - businesss documents, such as job adverts cannot discriminate against groups of people
Voluntary - Ethical codes internally and externally, Organisational, Industry codes of practice
Ethical - Businesses may have guidelines relating to stereotypes, whistle blowing, or privacy that affect how some documents are worded.
Codes of practice - Businesses have codes of practice - e.g. complaints procedures which should be followed by all staff.
Organisational - Businesses may have specific requirements to ensure consistency across all employees
Checking protocols
Businesses need to ensure they have processes in place to check documents before they are released to the public to protect the image of business/legislation/company brand.
The person producing a document should check what they produce. Most documents will also be checked by at least one other person for “sign-off” e.g manager, proof reader etc
Documents need to be checked for : errors and accuracy, omissions (that they contain all the information that they should) and clarity - clear and avoid confusion
Protocols
Employment protocols
-
-
These include : Equal Opportunities Act
Health and Safety at Work Act
Employment Rights Act
Sex Discrimination Act
Equal Pay Act
Disability Discrimination Act
National Minimum Wage Act
Working Time Directive
Employment Relation Act
IT Security
Procedures put in place in relation to the appropriate and secure use of IT equipment and software. IT security protocols should cover, inappropriate use and unauthorised use.
Some IT security protocols are : passwords, firewalls, encryption
The Computer Misuse Act 1990 is a piece of law that deals specifically with the crime of accessing or modifying data stored on a computer system without being authorised to do so.
Inappropriate use includes : Employees using workplace computers for personal reasons (e.g. to access social media) , Unauthorised installation of software such as games, Illegal use of workplace hardware / software
Loss of information due to misuse.
Consequences of inappropriate use : Lower productivity, Waste of business time and money , Possible lawsuits or fines for illegal activities