Preview

Unit 219 Nvq L3 Business and Administration

Better Essays
Open Document
Open Document
1681 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 219 Nvq L3 Business and Administration
1.1 – Explain the purpose of storing and retrieving required information

The purpose of storing and retrieving required information is so you can readily retrieve it when it becomes required.
Information is logged on a spreadsheet and filed with the log number this is so the information can easily be found if required.
The information is stored in locked filing cabinets as the information can hold company details and account numbers this is only accessible by the Administration staff and each file is signed out on a register.

1.2 – Describe the different information systems and their main features

The different information systems are filing cabinets where hard copies are stores or electronically which can be saved changes can be made and they can be made safe with a password.
Filing Cabinets – The information in the filing cabinets is logged on a spread sheet and issued a file number this is so the information is easily ready and available to find is require, the filing cabinets are also locked as they can contain private and confidential information, the Administration staff are the only department that can access these files and each one taken is signed out.
Electronic File – The information can be easily shared between personnel in the company if required and any changes amendments can be easily changed, these files can also be password protected or read only if required so other personnel can’t make any changes.

1.3 - Explain the purpose of legal and organizational requirements for the security and confidentiality of information
Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,

You May Also Find These Documents Helpful

  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    As with any other system, all data needs to be kept secure. Employee confidentiality is of paramount importance, particularly in a system that hold and utilizes potentially sensitive personal employee information. Moreover, seemingly innocuous information such as standards and procedures within the company also need to be kept secure. Any secure, sensitive, or proprietary information should be encrypted and password…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BA L2 Unit 14

    • 449 Words
    • 2 Pages

    1.4 Confidential business information should be properly secured. If it isn't, data can potentially be misused. For instance, making sure the files you are using have a password put in place to…

    • 449 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    In addition, organizations constantly face legal, ethical, and regulatory requirements from governments, business partners, and others they work with. These will add additional factors when weighing the costs and benefits of different solutions to information security risks. In fact, these requirements may even make some risks more important, often because a company will not want to get in trouble with a government even though they might normally live with the risk they are being forced to resolve through regulations. Understanding the various laws that will affect data is of prime importance to any security…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Electronically Stored Information: Refers to all forms of electronic data and documents including, but not limited to, metadata, electronic mail, word processing documents, calendars, voice messages, videos, digital photographs, information in personal digital assistants (PDAs), jump drives, home computers, and in any location where data may be stored.…

    • 1996 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Acct 504 Week 1 Quiz

    • 4686 Words
    • 19 Pages

    cabinet. Similarly, a hard copy of information pertaining to past, present, and possible clients is also kept.…

    • 4686 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    Information can come from numerous sources, for example, other people such as colleagues or friends, online knowledge bases such as Wikipedia or books on the subject in question…

    • 630 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    All size facilities use similar security measures when using an electronic filing system. Most facilities use passwords and access codes to access the information. Passwords and access codes are only given to certain staff members, not the entire staff. Limiting the number of people with access to records can cut down on the possibility of the information falling into the wrong hands. In the case of some small facilities, only one person has the access code/password to the system.…

    • 843 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    To ensure records are stored correctly and securely you can keep stored on a computer with a secure password.…

    • 246 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    In order to produce results, information must be communicated and shared amongst an organization. This information can be shared in various ways such as verbal and technical communications. Information within an organization is used to comprehend the importance of the input and outputs of the business processes in such ways as collaborations of ideas, sharing of concepts, rules, regulations, and business processes. Every organization has data, files, business, and personal records. Organizations have become more reliant on technology. With this reliance comes a sense of dependence on technology for daily business operations, therefore it is very important that organizations protect their information because they can easily be exposed and vulnerable to cyber attacks.…

    • 614 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    LEVEL 2 BEAUTY

    • 303 Words
    • 2 Pages

    All confidential data is stored and used that complies with the data protection act, should ensure your clients privacy and confidential information is safe and secure either on a computer or paper filled system.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 351 Words
    • 2 Pages

    Depending on the individuals position and job requirements, they should only be able to access the information that they need to do their job and nothing more.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1) To comply with legislative and regulatory requirements – Organisations need to collect data in order to comply with regulations such as minimum wage, working time directive, health and safety and even health and safety.…

    • 771 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    It is important for all businesses, that there are procedures in place for filing data and information. All staff members should follow these procedures as this ensures that information is stored away correctly. Having an efficient filing and storing system ensures that when someone is looking for information, that they know how and where to find it; this saves time and resources. Storage systems need to be maintained, consistent and easy to use, having these qualities will ensure a more smooth…

    • 82 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Company information is as valuable a company asset as money in the bank. In fact, some information can be even more valuable than cash, so protecting the company 's information with appropriate security is critical to business success. The network and data security measures you put in place for your business, from a firewall to a data backup system, are physical manifestations of business rules. You make business decisions about how important your computer network and the data it holds are to your business, and as well as how you want to protect it. Data security systems are the direct result of those business decisions.…

    • 2543 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    If someone comes into the company then they will get an induction pack and within the induction pack it will have information on how to handle information. This will include once reading the information you should lock the information away securely. If you are passing on sensitive information via email then it should have a password encrypting the file.…

    • 348 Words
    • 1 Page
    Satisfactory Essays