Communication in Administration (Security)

Slides:



Advertisements
Similar presentations
HEALTH, SAFETY AND SECURITY. HEALTH AND SAFETY POLICY This is a statement that sets out how a firm manages health and safety in the workplace. Shows the.
Advertisements

Organise Workplace Information
I.T.F.M. Learning Outcome 2 Describe the impact of ICT on workflow, working practices and management and security of information.
GENERAL POLICY GUIDE © Marin Management, Inc. 1 A. The Purpose of This Policy The purposes of this policy are to summarize our procedures for the retention.
OFFICE LAYOUT. Open-Plan ( Flexible ) Layout More space for work activities than individual rooms Easier to share/access equipment Often a more up-to-
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Randy Benson RHQN Executive Director May, Compliance Issues During Survey Compliance Officers monitor healthcare facilities (hospitals and clinics)
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
ITFM – Preparation for Prelim These notes will be expanded when we complete the full unit.
Factors to be taken into account when designing ICT Security Policies
New Data Regulation Law 201 CMR TJX Video.
Administrative Practices Outcome 1
Higher Administration
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Impact of ICT on Work Practices and Management of Info
General Purpose Packages
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Handling information 14 Standard.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
1.1 System Performance Security Module 1 Version 5.
Security and backups GCSE ICT.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
Important points and activities.  The objective is to secure life, property, information in the event of a disaster and to facilitate business continuity.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
1 Higher Administration Information Technology for Management Outcome 2: The impact of ICT on workflow, working practices and the management and security.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Data Security.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.
SCHOOLS FINANCE OFFICERS MEETINGS Records Management, “Paper-Lite” Environments and Procedures when a school closes Elizabeth Barber.
FIT03.05 Explain features of network maintenance.
 Face to face  Oral  Written  Visual  Electronic Communication in Administration 2.
25 Years and Beyond: The Benefits of Managing over 25 Year Old Records John Roberts, Group Manager Archives Management Archives New Zealand.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Describe the Impact of ICT on Workflow, Working Practices and Management and Security of Information ITFM Outcome 2 Learning Intention Security of Information.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Computer Security Sample security policy Dr Alexei Vernitski.
First Tuna Data Workshop (TDW-1) October 2006, Noumea, New Caledonia Oceanic Fisheries Programme (OFP) Secretariat of the Pacific Community (SPC)
Scientific data storage: How are computers involved in the following?
Warehousing and Storage Principles Session 12 – Security Day 6 / PM.
The Office Procedures and Technology Chapter 7 Time and Workstation Management Copyright© 2007 Thomson/South-Western.
Welcome to the ICT Department Unit 3_5 Security Policies.
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Information Security and Privacy in HRIS
Impact of ICT on Working Practices & Workflow
Explaining strategies to ensure compliance with workplace legislation
Security Of Information Systems
Administrative Practices Outcome 1
Archive / Destruction / Disposal
COMMUNICATION IN ADMINISTRATION
Unit 7 – Organisational Systems Security
Security of People, Property and Information
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Communication in Administration (Security)

Electronic File Management Higher Administration 2015-2016

What is File Management? Choosing appropriate file locations Folder structures and File Names Version Control Housekeeping & Archive procedures Backup procedures You may wish to appoint one individual to have an overview of data management within the organisation. Can you explain why these are important?

File Management Benefits of Good… Consequences of Poor… Less time wasted finding files Improved customer service Improved security of data More efficient use of storage Compliance with Data Protection Act Out-of-Date information accessed Sharing files difficult – can’t find the right file Confidential information accessed Workflow disrupted

Security and Confidentiality Procedures Higher Administration 2015-2016

Some Security Terms Security: means protecting data against theft, damage and destruction Integrity: means ensuring that the data is accurate, up-to- date and error free Privacy: means that the data must be held securely so that only those who need access to the data can access it Confidentiality: means that those who do not have access to the data respect it, and do not discuss it with others that do not have a right to know what it says

Physical Threats Ensures offices are locked and windows closed Alarm the building Use CCTV to monitor the premises Restrict the access points Keep visitors away from restricted areas Security guards/lights on in the grounds Train staff on moving equipment (prevent damage) Fire doors closed/fire fighting equipment provided Lag pipes to save bursts in winter Take out adequate insurance

Protecting Electronic Files Password protect – restricts access, must be changed regularly Regular backups – ideally stored offsite, saves recreating files from scratch Anti-virus software – prevents unauthorised modification of files Access rights/levels – ensure that only authorised personnel can read/edit/delete Lock workstation – when away eg on a break or helping a customer Voice/Iris/Fingerprint/Dongle – restricts access Read-only Files – cannot be edited Firewalls – prevents hackers gaining access to company data. Mr Illingworth example

Protecting Paper-Based Files Return files to the filing cabinet after use Keep filing cabinets locked Don’t leave papers at the photocopier (very easy to do!) Don’t leave papers unattended Shred and dispose of unneeded items

Communication in Administration (Security)