L01 - Understand Protocols To Be Followed When Working In Business Flashcards

1
Q

What are Authority Protocols

A
  • Authority protocols provide a framework for employees to follow.
  • They are usually associated with the different levels of responsibility that employees and managers have in the business hierarchy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

KEY TERM - Protocol

A

Procedure or rules that must be followed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

KEY TERM - Line Manager

A

The superior to whom an employee reports to. Usually this is the person directly above the employee on an organisational chart.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authority protocols on decision making

A
  • Employees are trained to carry out their day to day tasks, such as customer service
  • Sometimes a task or problem needs to be escalated to their line manager, because they have greater authority
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authority on authorisation

A
  • Employees who may have the authority to carry out certain tasks in this case, responsibility sits with their line manager
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are The Reasons for Authority Protocols

A
  • Allows a manger to delegate tasks to a subordinate whilst still overseeing the outcomes
    Lowers the risk of fraud if more than one person is involved in the preparation and authorisation of payments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Organisational protocols to Maintain Confidentiality

A
  • Ensure those who need to see specific information have access to it
  • Using blind copy (BCC) line in e-mails to several external recipients so that email addresses are not shares
  • Require employees to sign a Non-Disclosure agreement if they have access to confidential information
  • Business can include in a job description that disclosing confidential information will be deemed gross misconduct
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Storage of data and information

A
  • Manual storage includes the use of secured filing cabinets for hard copies of documentation and ensuring that confidential documents are not released from the premesis
  • Electronic data can be stored securely by password protecting computers. This ensures that only the individual that the computer belongs to to be able to access the data and documents
  • Network passwords can be used so that only those employees provided with the password can access certain documents
  • Passwords can be used to protect data back-ups for unauthorised access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are The Implications of Breaching Confidentiality?

A
  • Breaching confidentiality is considered gross misconduct
  • Employees unlikely to receive a reference which affects future employabiltiy
  • Legal action could be taken by the business against the individual were there a breach of legislation such as data protection
  • Risk of identity theft and loss of trust from the business
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Some Reasons Why Confidentiality May Be Breached?

A
  • Some employees may attempt to utilise protocols for personal gain
  • If they are suspected of fraud or embezzlement it may be necessary to access their e-mails and documents to identify whether this is the cause
  • Times where an employee must be contacted in an emergency
  • If data can harm the person, someone else or it is breaking the law
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Are Organisational Voluntary Constrains?

A
  • Business’ may have special requirements to ensure consistency access all employees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Ethical Voluntary Constraints

A
  • Business may have specific guidelines relating to stereotypes
  • Whistle blowing or privacy that affect how some documents are worded, so as not to offend or betray confidences
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Codes of Practice

A

Some job roles and business’ have codes of practice to follow e.g. the code of practice for social workers requires that workers maintain clear and accurate records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Copyright legislation

A
  • Works protected by copyright, designs or protocols
  • Includes music, books, leaflets, newsletters, film and structure
  • Business must ensure that permission is gained to use it
  • Sources should be quoted
  • If the business itself has works than any individual or business wanting to reproduce these must ask permission from the copyright holder and pay a fee if necassary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Protection Legislation

A
  • Requires all personal information to be protected
  • Any documents that contain these details must therefore be secure
  • Personal details should be included in documents when relevant
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Consumer Protection Legislation

A
  • Impacts content of documents produced
17
Q

Equal opportunities legislation

A
  • Protects individuals from discrimination
18
Q

KEY WORD - Plagarism

A

Using someone else work ad leading others to believe that is is your own

19
Q

Checking protocols

A
  • Documents should be checked for errors or possible misinterpretation
  • Checks can be carried out by specialists
  • Checks can be carried out by more senior employees
  • Checks can be carried out by those whom the document refers
  • Checks can be carried out by a proofreader
  • Checks can be carried out by an external communication company
  • Checks may take time and cost money in short term but could prevent problems in the long term
20
Q

Checking of Arrangements

A
  • When arrangements are made it must be ensured that all relevant staff have received the details and that the details themselves have been copied accurately
21
Q

What are the Implications of Poor Checking?

A
  • time wasted
  • Money wasted
  • Business opportunities missed
  • May be impossible to make important decisions
  • Reputation and professionalism questioned
22
Q

Protection of information against un-authorised access

A
  • Password protected documents, computers and networking
  • Installing anti-virus software that constantly searches a computer to identify and attempt to rectify any activity or threats from a virus
  • Installing anti-spyware software monitoring incoming data
  • Granting staff varied levels of access
  • Having a screen time-out
  • Positioning screens so that general public can not see them
23
Q

Inappropriate Use of IT Equipment and Software

A
  • Using software for non-work activities
  • Installing unauthorised data e.g. games
  • Installing software listened only for business use on home computers
  • Consequences of inappropriate use could range from wasted time to gross misconduct
24
Q

Health and Safety Legislation

A
  • H&S at work act along with legislation such as the workplace H&S and welfare regulations and the H&s Display screen equipment regulations detail protocols that must be followed
  • Includes providing adequate lighting, ventilation, providing regular eye tests for employees who use computer screen and ensuring that risk assessments are carried out
25
Q

Equal opportunities legislation

A
  • All staff must be aware of legislation such as equality act
  • Many business’ offer induction and ongoing training in factors such as what can or cannot be included in communication, to ensure that discrimination does not occur
26
Q

Punctuality

A

All employees are expected to arrive at work on time. Repeated lateness is unprofessional and may result in disciplinary procedure

27
Q

Appearance & Dress code

A

Requirements for appearance & dress vary from business to business

28
Q

Use of Appropriate Language

A

Swearing, slang words and open complaints about the business should be avoided, particularly when dealing with customers or third party employees should be aware that when talking among themselves they are still representing the business.