Preview

store and retrive information unit 219

Good Essays
Open Document
Open Document
777 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
store and retrive information unit 219
Understand processes and procedures for storing and retrieving information
Explain the purpose of storing and retrieving required information:
The reason you store information is so you when you need it in the future you can easily find it. Most companies have to either store documents in fire proof cabinet’s or on hard disks or any other electronic storage devices. Most companies have confidential files about the company, employees or customers that have to follow the data protection act.
Describe different information systems and their main features:
Server - on the server at our company we use the server to store all are files for example financial data, HR files, sage and accounts, maintenance, training, HSBC, customers, employees, etc. these are all in relevant files so you can locate them easily. GX – our bespoke system saves all of the work that we have processed so you can locate them by going on to contracts and finding the relevant customer’s and looking what they have had from when they joined with our company and we can also look back in the past to see how much we have made and how many pieces we have sent out.
Explain the purpose of legal and organizational requirements for the security and confidentiality of information: Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.
Explain the purpose of confirming information to be stored and retrieved:
All companies store a lot of information, but if you store the wrong information that isn’t up to date or is not correct there is no use of it. So when storing information you should be cautious that it is proof read. You keep

You May Also Find These Documents Helpful

  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Explain the purpose of legal and organisational requirements for the security and confidentiality of information (for example passwords for computers or locks on filing cabinets)…

    • 1438 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Xcom/285 Week 1

    • 412 Words
    • 2 Pages

    I can see how this must have been a business nightmare with the storage of this information. Now with our advance technology we are able to order faster, save information to disc or the hard drive of the business computers which will allow faster references for future sales.…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    contractual agreement that the information will be kept confidential and used solely for the business purpose for which it was conveyed. Employees, officers and directors are required to secure from unauthorized access and public view documents under their control that contain confidential or proprietary information. When such information is discarded, appropriate…

    • 403 Words
    • 2 Pages
    Good Essays
  • Good Essays

    3rai Cipd Level 3

    • 791 Words
    • 4 Pages

    There are many methods of storing records, an example is: Electronic which includes hard disks drive – PC, CD – recorder, DVD, databases and spreadsheets, internet or intranet, USB devices, emails and virtual learning environments.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Management have the final responsibility in ensuring information held on residents is wherever possible non-identifiable, used only when necessary and by the people who need to know and is stored securely. Most importantly that the company’s policies are adhered to and are working in relation to the handling and collecting and using and storing of information.…

    • 611 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Security Principles

    • 682 Words
    • 3 Pages

    The security principles of information technology (IT) are confidentiality, integrity, and availability for your company data. Confidentiality is the way that a computing system’s assets can be read only by authorized parties. Integrity is that you can only be modified or deleted by authorized parties or in authorized ways. Availability is that the data is accessible to the authorized parties in a timely fashion (Principles of IT Seurity, 2012). Ensure the physical security of the data and telecommunications centers and resources. By regulate authorized access to resources through security measures such as user IDs, passwords, and digital certificates. Also by implement auditable authorization processes that adhere to policies provide security awareness training and resources. Keep the Security Department informed of any system/data custodian issues concerning access rules and security violations.…

    • 682 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Let’s look at confidentiality which is one of the most important measures to maintain safety and security. Not following procedures according to Data Protection Act 1998, which objectives aim at secure data processing and storage, may result in legal action against employers. These procedures may vary depend on the nature of the business. Nowadays vast majority of the business relay on computerised filling system, therefore, employers must take every necessary measure to protect that system from for example, hackers. Employees, on the other hand must follow all procedures to ensure they use system correctly and legally. Consequently, not following health, safety and security procedures may also lead to economic crises of an organisation, for example, court may order to pay very high fine or close down the business and loss of the customers. Moreover, an employer who failed to follow health, safety and security procedures where as a result employees are getting harmed at work is highly likely to be exposed to organisational grievance or disciplinary procedures. For example, in a care home failure to provide moving and handling training to induction staff would have catastrophic consequences such as: spine injuries acquired by using incorrectly equipment or by not using it at all when necessary or even a death of a care taker if handled inappropriately using unsecured hoist. This scenario would not…

    • 335 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    Ruzaif Adli M.D. (2004). Public Awareness of Records as Core Organizational Asset. In Proceedings of National Seminar on Management of Corporate Memory: Key Challenges, Issues and Trends. Vol. 1 (pp. 50-58).Universiti Teknologi MARA.…

    • 3476 Words
    • 14 Pages
    Best Essays
  • Satisfactory Essays

    It all depends on the business you are running. You may need more or less data than another company. No matter what you need stored and remembered, it is always more important to have good communication or your business could have a number of…

    • 366 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Internet Security Overview

    • 9590 Words
    • 39 Pages

    When information is read or copied by someone not authorized to do so, the result is known as loss of confidentiality. For some types of information, confidentiality is a very important attribute. Examples include research data, medical and insurance records, new product specifications, and corporate investment strategies. In some locations, there may be a legal obligation to protect the…

    • 9590 Words
    • 39 Pages
    Powerful Essays
  • Powerful Essays

    With the use of IT, as with most things, comes the possibility of abuse. Data integrity and security is of prime importance to ensure validity and privacy of the information being held. Managing the information involves identifying what should be kept, how it should be organized, where it should be held and who should have access to it. The quality of this management will dictate the quality of the decisions being taken and ultimately the organization 's survival.[3]…

    • 4023 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Lending System

    • 431 Words
    • 2 Pages

    * lack of security:since data is stored in filing cabinets it is freely available to anyone.if information falls into the wrong hands it can be used against the company and customers and can blackmail them.…

    • 431 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Crime

    • 791 Words
    • 4 Pages

    Some organizations transfer information between themselves, example Government entities and small businesses, like Colleges, Schools etc. They store Information for learning purposes, like: video, voice, images etc. Most of those Entities / Organizations are not properly secured, which makes their Computer system…

    • 791 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Sales and Inventory System

    • 1627 Words
    • 6 Pages

    All files can be kept on a computer, taking up far less space than having to house filing cabinets and drawers to keep track on the paperwork.…

    • 1627 Words
    • 6 Pages
    Powerful Essays