L01 - Understand Protocols To Be Followed When Working In Business Flashcards
What are Authority Protocols
- Authority protocols provide a framework for employees to follow.
- They are usually associated with the different levels of responsibility that employees and managers have in the business hierarchy
KEY TERM - Protocol
Procedure or rules that must be followed
KEY TERM - Line Manager
The superior to whom an employee reports to. Usually this is the person directly above the employee on an organisational chart.
Authority protocols on decision making
- Employees are trained to carry out their day to day tasks, such as customer service
- Sometimes a task or problem needs to be escalated to their line manager, because they have greater authority
Authority on authorisation
- Employees who may have the authority to carry out certain tasks in this case, responsibility sits with their line manager
What are The Reasons for Authority Protocols
- Allows a manger to delegate tasks to a subordinate whilst still overseeing the outcomes
Lowers the risk of fraud if more than one person is involved in the preparation and authorisation of payments
Organisational protocols to Maintain Confidentiality
- Ensure those who need to see specific information have access to it
- Using blind copy (BCC) line in e-mails to several external recipients so that email addresses are not shares
- Require employees to sign a Non-Disclosure agreement if they have access to confidential information
- Business can include in a job description that disclosing confidential information will be deemed gross misconduct
Storage of data and information
- Manual storage includes the use of secured filing cabinets for hard copies of documentation and ensuring that confidential documents are not released from the premesis
- Electronic data can be stored securely by password protecting computers. This ensures that only the individual that the computer belongs to to be able to access the data and documents
- Network passwords can be used so that only those employees provided with the password can access certain documents
- Passwords can be used to protect data back-ups for unauthorised access
What are The Implications of Breaching Confidentiality?
- Breaching confidentiality is considered gross misconduct
- Employees unlikely to receive a reference which affects future employabiltiy
- Legal action could be taken by the business against the individual were there a breach of legislation such as data protection
- Risk of identity theft and loss of trust from the business
What are Some Reasons Why Confidentiality May Be Breached?
- Some employees may attempt to utilise protocols for personal gain
- If they are suspected of fraud or embezzlement it may be necessary to access their e-mails and documents to identify whether this is the cause
- Times where an employee must be contacted in an emergency
- If data can harm the person, someone else or it is breaking the law
What Are Organisational Voluntary Constrains?
- Business’ may have special requirements to ensure consistency access all employees
What are Ethical Voluntary Constraints
- Business may have specific guidelines relating to stereotypes
- Whistle blowing or privacy that affect how some documents are worded, so as not to offend or betray confidences
What are Codes of Practice
Some job roles and business’ have codes of practice to follow e.g. the code of practice for social workers requires that workers maintain clear and accurate records
Copyright legislation
- Works protected by copyright, designs or protocols
- Includes music, books, leaflets, newsletters, film and structure
- Business must ensure that permission is gained to use it
- Sources should be quoted
- If the business itself has works than any individual or business wanting to reproduce these must ask permission from the copyright holder and pay a fee if necassary
Data Protection Legislation
- Requires all personal information to be protected
- Any documents that contain these details must therefore be secure
- Personal details should be included in documents when relevant