protocools for working in a business pt 2 Flashcards

1
Q

Voluntary constraints include:

A

• organisational constraints (within the business itself), to maintain consistency and quality.
• ethical constraints (e.g. avoiding words or stereotypes that may be offensive)
• codes of practice (see below)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a code of practice

A

A code of practice is a written document published by a professional organisation that establishes ethical standards for a profession, trade, occupation or organisation. However, it is not legally enforceable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

legal constraints include

A

data protection (the Data Protection Act and GDPR), which ensure that personal information is protected.
• consumer protection laws (The Consumer Rights Act), which prevent businesses from making misleading statements about their products.
• equal opportunities (The Equal Opportunities Act), which prevents businesses from making discriminating statements on the basis of gender, race, ethnicity, age or disability.
• copyright, which protects the owner of ‘intellectual property’ (e.g. written materials, music) by stopping others using it without the owner’s permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is copyright used to make sure of

A

Copyright is intended to ensure the avoidance of plagiarism (copying other documents) and includes the need to quote sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

checking protocools include:

A

• Checking of documents (for breaches of any of the constraints in the previous section)
• Checking of arrangements (for meetings and for travel)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

why should communications be checked

A

All communications must be checked to ensure their accuracy and to ensure that there are no omissions or confusing statements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

communications about

A

Communication about meetings, travel, and accommodation must also be checked to ensure that all parties have been informed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how documents and arrangements can be checked

A

• By more senior employees (e.g. managers)
• By specialists (e.g. a solicitor for a legal document)
• By a proof-reader (to check the spelling, grammar and professionalism of a document)
• By using an external communications company (e.g. to prepare a press release)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

drawbacks of carrying out checks

A

They take time and may cost money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

implication of poor checking

A

• Damage to the reputation and image of the business (which may cause the business to lose customers, shareholders and employees).
• Providing incorrect information and meetings or travel could prevent people from attending the meeting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IT security protocols include:

A

• Protection of information against unauthorised access
• Inappropriate use of IT equipment and software (e.g. using workplace computers for non-work activities such as social media or games)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Reasons for IT security protocols / Why data is protected

A

• If businesses do not keep employees’ personal information confidential, they are breaking the law (The Data Protection Act and GDPR).
• Maintaining confidentiality prevents sensitive information about employees being widely known, which could damage staff morale and working relationships.
• Maintaining confidentiality prevents sensitive information about the financial position of the business, or the business’s plans for the future, reaching competitors, employees, or other third parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How data is protected

A

• using passwords to limit access to electronic data that is saved on IT systems.
• using screen savers which automatically produce an image if the computer has not been used for a few minutes.
• locked files, which are only accessible to specific individuals in an organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly