Unit 1 Communication and Employability Skills for IT 1.

Slides:



Advertisements
Similar presentations
Pennsylvania BANNER Users Group 2007 Disaster Recover For The Financial Aid Environment.
Advertisements

Work-based learning Click on the speaker on each slide to learn more!
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
OHS Induction Training
Meet Grace! Grace is our newest team member! She is here to make it easier to keep track of all your HR related documents digitally. Grace will always.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
The purpose of this Unit is to enable individuals to develop the key principles, values and attitude which are central to high quality care practice Key.
Understanding the management of risks to health and safety on the premises of a retail business Unit 352.
Understand your role 1 Standard.
Health and Safety Legislation
2. 11 Rights of employers and employees Rights of employer and employees Rights and responsibilities  Both employees and employers have legal rights.
Week 7 ASR plus a little CHANGE & INNOVATION
OSHA Long Term Care Worker Protection Train the Trainer Program Part 1: Introduction.
HEALTH AND SAFETY AT WORK ACT (HASWA). What does it do ? HASWA is there to secure the health and safety of people at work. HASWA is there to secure the.
Risk Assessment – An Essential Standard
New Data Regulation Law 201 CMR TJX Video.
NEW EMPLOYEE ORIENTATION Starting on the Right Foot!
Higher Administration
Work-based experience
Teachers directing the work of paraprofessionals
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Student Briefing College Of Engineering February 2011.
Introduction Definition Advantages for employees and employers
More information can be found on
Roles and Responsibilities
Level 2 Award in Employability Skills
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
2010 Test Security 2011 Campus Test Coordinator Training Test Security January 26, 2011 Freeport Intermediate school.
Working in the IT Industry.  On completion of this unit a learner should: 1. Know the characteristics that are valued by employers in the IT industry.
Privacy and Information Management ICT Guidelines.
UNIT 27: UNDERSTANDING HEALTH AND SAFETY IN THE BUSINESS WORKPLACE
Welcome Return to work: part of good occupational health and safety HCHSA Toronto, Ontario February 21, 2005.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Health and Safety in Adult Social Care.
Roles and Responsibilities Explain the roles and responsibilities for health and safety of key personnel in selected workplace.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Reminder: these tasks are due in before half term 23 October: Check that you have added these tasks on Outlook ! 1.Key Terms 2.Technical Skills 3.Proposal.
Health, Safety and Environment Induction. What you need to do? Complete the Health, Safety and Environment Induction Report (S010F) (this includes all.
Unit 1 Communication & Employability Skills for IT.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Unit 1 Communication and Employability Skills for IT 1.
Unit 1 Communication and Employability Skills for IT 1.
Admin Services Int 1 - Outcome 21 Outcome 2 Outline factors affecting the administrative assistant in the work environment Working practices and benefits.
Communication and Employability Skills for IT
Addressing personal development needs Step 3: Addressing needs Communication and Employability Skills for IT Unit 1 1.
Adult Skills Induction. Welcome to learndirect We are a training provider with 15 years experience at helping people gain qualifications and improve their.
Methods of Training Starter Create your own definition of training. Give an example of training you have undertaken in your life so far. Did you have a.
6 th Form Study Skills Session 2. Prize draw! Thanks for attending the session today At the end of the session we will draw a name to win a voucher.
Unit 1 Communication and Employability Skills for IT 1.
Communication and Employability Skills for IT Unit 1 1.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
USING IT TO COMMUNICATE EFFECTIVELY Communication and Employability Skills for IT Unit 1 1 Oxanne Wilson.
Admin Services Int 2 - Outcome 21 Outcome 2 Outline factors affecting the administrative assistant in the work environment Working practices and benefits.
Communication and Employability Skills for IT Unit 1 1 Life Skills.
Level 3 Sport.
PowerPoint presentation
Understanding of Health and Safety
Recruiting & Training staff Pages
OHS–Occupational Health & Safety
IT & Security Training Skills.
D3 Confidentiality.
Communication and Employability Skill for IT
Handling information 14 Standard.
Presentation transcript:

Unit 1 Communication and Employability Skills for IT 1

Basic Housekeeping Check Lanyards Complete Register Health and Safety check Reminder about use of mobile phones Reminder about classroom rules No food or drink, thank you! Recap last week’s activities 2

Systems Life Cycle – lesson starter

Today’s Learning Outcomes Revising key terms Understand specific personal attributes valued by employers: Job-related attributes (covered last week) Working procedures Work attitudes Introduction to assignment 4

Key Terms: attitudes, attributes and abilities, skills, work ethic, soft skills, goal, strategy, objectives, prioritising, address book, diary, target, in-tray, independence, integrity, procedures, time management, workflow, creativity, integrity, tolerance, dependability, leadership, house style 5

Key terms GAME! Key terms GAME! 6

Lesson Starter 1.Do we need Health and Safety? 2.QuizQuiz 3.What happens when H&S is followed? 4.Meet the land of H&S is forgotten….Meet the land of H&S is forgotten…. 7

8

9

10

11

12

13

14

15

16

17

18

Working procedures and systems When you start your first job, you will realise that there is a lot more to employment than physically doing your job. You will need to familiarise yourself with organisational working procedures that affect the way that you work. 19

Good working procedures Class discussion: working procedures Class discussion: GOOD working procedures Working procedures can be called ‘good’ when they take into account health and safety and security issues. Have you ever had to follow a working procedure before? – Share with the rest of the class. 20

Common Examples: If you are unwell, you should stay off work until you recover. Staggering in with flu or a virus and giving it to everyone else in the office is counterproductive. If you are an employee who has been injured at work, seen a dangerous occurrence, or your doctor has certified that you have a work related reportable disease, you must inform your employer. Information that you find out while doing your job is confidential. This might include personal details of customers or industry-sensitive material about the design of a product. You are expected to respect the confidentiality and security of this material. 21

Health & Safety at Work Act 1974 and The Management of Health and Safety at Work Regulations 1999 These Acts set out the legal responsibilities of both employees and employers within the workplace. In terms of your responsibilities as a new employee, you will be expected to know the basic health and safety issues around the job for which you are engaged (for example, isolating high-voltage power supplies when working inside a computer case) before you start. 22

Health & Safety at Work Act 1974 and The Management of Health and Safety at Work Regulations 1999 In addition, there are more generic aspects of your responsibilities. The most obvious and basic requirements for employees are:  be observant in your own and others’ working environments, and identify any obvious hazards or dangers;  report any hazards or dangers you have identified to relevant individuals or groups of individuals to ensure the safety of yourself and others;  anticipate any possible hazards and be proactive in helping the organisation overcome these. 23

Health & Safety at Work Act 1974 and The Management of Health and Safety at Work Regulations 1999 Employers also have fundamental and legal responsibilities to ensure you have a safe working environment. These include giving you the correct tools and any Health and Safety equipment as required by your job. 24

Security All organisations have sensitive and confidential data and information. Employees have a duty to keep this safe. Some organisations ask employees to sign nondisclosure agreements, which mean that the employee is not allowed to discuss sensitive and confidential information with individuals or groups who are outside the organisation, either while employed by the organisation or after they leave. 25

Security In addition, organisations can implement a series of physical and logical security techniques to ensure that data and information are secure. Physical security techniques include locks on doors and alarm systems to prevent unauthorised access to computers and/or paper files. Many organisations also prohibit staff from using USB flash drives in their systems or from making CD or DVD copies of data. Some companies even remove these devices to reduce the temptation of copying files. Logical security techniques include encryption protocols (designed to scramble the data and make it useless to anyone who does not have the decryption software) and password protection. 26

Procedures Some of the procedures in place at Selby College: 27

Procedures Some of the procedures in place at Selby College: 28

Work attitudes Employees work in return for a wage. However, each employee’s attitude to work is important and, from the employer’s point of view, a good work ethic is required. Examples are team work, leadership, motivated, punctual and so on. 29

Assignment 1 House Style – discussion and examples Introduction to Assignment 1 – IMPORTANT INFO Introduction to Assignment 1 Proposal - PLANNING 30

At the end of the session revisit aims and objectives to check if the learning took place aims and objectives aims and objectives 31