HEALTH, SAFETY AND SECURITY. HEALTH AND SAFETY POLICY This is a statement that sets out how a firm manages health and safety in the workplace. Shows the.

Slides:



Advertisements
Similar presentations
What makes a good reception area?
Advertisements

Administration Intermediate 1 & 2 Command Words Identify 2 pieces of information included in the contract of Employment, apart from employees personal.
PHYSICAL SECURITY A basic overview of some specific things that can be done by our general campus population to help ensure the Physical Security of our.
PROPOSED SECURITY MEASURES David Gourley Elementary.
Emergency Preparedness and Response
Organise Workplace Information
Clearly visible on entering the building Clearly signposted All visitors should report to Reception On 1 st Floor.
Administrative Practices Outcome 1
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Presentation Retail Security Key Holding Mobile Patrols Access Control Systems Manned Security Receptionist CCTV Monitoring.
 Induction training to cover H & S  Hazards in the workplace and measures taken to ensure safe practice  The procedure to be followed when an accident.
University of Bedfordshire Workplace Induction. Organising the workspace Items to remember:  Security (keys)  Login/Passwords  Arrange Workspace/ equipment.
Admin & IT. Identification of Hazards and measures to ensure safe practice Accidents happen but it is important that hazards minimised to reduce the number.
OUTCOME 2 Describe factors affecting the administrative assistant in the work environment.
10 Essential Security Measures PA Turnpike Commission.
1 CHCOHS312A Follow safety procedures for direct care work.
Administrative Practices Outcome 1
Reception.
ADMINISTRATION REVISION - BLOCK 3 RECEPTION. Reception is the first area someone enters when they visit an organisation and therefore it must create the.
Reception Unit 2c.
Safe Working Practices - Contents
Occupational health and safety
Handling information 14 Standard.
Learning Objectives Discuss measures to address: –Physical Security –Technical Security –Administrative Security.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Security and backups GCSE ICT.
PANTHER SECURITY AND PRIVATE INVESTIGATION Security is degree of protection against danger, damage, loss and crime.
Group 3 Angela, Rachael, Misty, Kayelee, and Krysta.
UNIT 15 WEEK 3 CLASS 1 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Organisational policies and procedures What is the purpose of policies and procedures and who does it effect?
Cmpe 471: Personnel and Legal Issues. Personnel Crime is a human issue not a technological one Hiring On-going management Unauthorised access Redundancy.
Communication in Administration (Security)
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Higher Administration Administrative Services Outcome 1.3.
Physical security By Ola Abd el-latif Abbass Hassan.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Prepared by Jennie Yeung Summer School Safety Never leave school with anyone without a Parent Pass. May I see your Parent Pass? Although this did.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Computer Security Sample security policy Dr Alexei Vernitski.
Appropriate record of compliance with customs requirements Satisfactory system of managing commercial and, where appropriate, transport.
Admin Services Int 1 - Outcome 21 Outcome 2 Outline factors affecting the administrative assistant in the work environment Working practices and benefits.
Admin Services Int 2 - Outcome 21 Outcome 2 Outline factors affecting the administrative assistant in the work environment Working practices and benefits.
CONTENT Introduction Objective Scope and methodologies Proposal chapters Proposed policies and recommendations Conclusion.
Higher Administration & IT
Explaining strategies to ensure compliance with workplace legislation
Administrative Practices Outcome 1
Preparing for OB Clinicals: Infant Safety and Security
Health & Safety Team | Edinburgh Napier University
Health & Safety Team | Edinburgh Napier University
C-TPAT Awareness Training Program
Security of People, Property and Information
Provide reception services
Protecting IT systems (2)
Security of Data  
Title: Health and Safety Learning Intentions
Business Connect Visitor Management February 2017.
Lesson 1: Introduction to HIPAA
Confidentiality.
SECURITY TRAINING AND THREAT AWARENESS
Whose Job Is It? Responsibility for Laboratory Safety and Security
Safeguarding across VLUK sites
KOPS Advisory Committee
Presentation transcript:

HEALTH, SAFETY AND SECURITY

HEALTH AND SAFETY POLICY This is a statement that sets out how a firm manages health and safety in the workplace. Shows the steps and arrangements in place to ensure the firm is following all health and safety legislation. The policy is a requirement under the Health and Safety at Work Act (1974)

COMMON SECURITY MEASURES STAFF ENTRY AND MOVEMENT Only authorised personnel have access to premises. Methods include: Intercom or security doors Identification passes – with name, photo and maybe used as a swipe card Careful handling and issuing of keys

VISITORS Visitors should report to reception on arrival Keep other entrances to a minimum Visitors should be given a visitors badge Visitors should not be left unsupervised. Receptionist should ensure that the visitor leaves the building and hands back the pass.

ACCESS TO INFORMATION AND TECHNOLOGY Passwords – not obvious and changed regularly Read-Only Files – which cannot be changed by anyone Virus software Locked rooms or filing cabinets Shredded any confidential documents that are not needed

GENERAL SECURITY MEASURES Hiring security staff Use of CCTV Serial numbers equipment and keep a record Ultra-violet markers used to identify equipment