Handout 4: Document distribution

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
ADMINISTRATION REVISION - BLOCK 4 HANDLING THE MAIL.
1 Information Security for HIPAA Second Meeting for Researchers Michael Caputo February 18, 2003.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
AS Level ICT Capturing data. Data can be captured (or collected) for processing from a variety of sources. These sources can include: –Data capture forms,
The Legal Framework Can you work out which slide each bullet point should go on?!
Writing Reader-Oriented Informal Reports CHAPTER 13.
Practical Information Management
General Purpose Packages
CPS Acceptable Use Policy Day 2 – Technology Session.
Health & Social Care Apprenticeships & Diploma
1.1 System Performance Security Module 1 Version 5.
Privacy and Information Management ICT Guidelines.
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
Dylan Bayliff. Contents: 1- Sending s & Using etiquette 2- Staying safe and Accessing 3- Open s 4- Replying to s 5- Setting up contacts.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
ISO/IEC 27001:2013 Annex A.8 Asset management
Secure . is a means of exchanging digital messages from an author to one or more recipients – it is instant with no delay or postal costs.
ISO DOCUMENT CONTROL. ISO Environmental Management Systems2 Lesson Learning Goals At the end of this lesson you should be able to: 
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Scientific data storage: How are computers involved in the following?
222 About RPost Leader in security since 2000 Endorsed by more than 20 major bar/law associations Used by U.S. Government Used by insurance carriers.
Unit 3 Providing safe environments for children
Online Training Course
PowerPoint presentation
Headline Records Retention Policy Information December 2016.
PowerPoint presentation
Mysale Information Classification 101
Records Retention NYS Magistrates’ Association
Administrative Practices Outcome 1
Handout 5: Storing information
Handout 2: Data Protection and Copyright
Protecting Client Confidentiality for Volunteers and Agency Staff
Dining with Diabetes IRB Training 2017.
PNDBF – Incoming Mail (B)
Data Protection Legislation
The E-Filing Procedure and Process for Guardianship/Probate
PERSONAL DATA PROTECTION ACT 2010
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Red Flags Rule An Introduction County College of Morris
New Data Protection Legislation
Security of People, Property and Information
An Overview.
Fraud Examination Chapter 8
G.D.P.R General Data Protection Regulations
Introduction to Records Management, FOI & Data Protection
Lesson 12 -Maintaining Documents & Macros Lesson 13 - Protecting & sharing documents Lesson 14 - Advanced Options #1.12, #1.13, & #1.14.
Information management and communication
Mysale Information Classification 101
The E-Filing Procedure and Process
Recording Clinical Data
H2.9b Maintain Information
Subject Access Request received
Good Spirit School Division
Understanding Data Protection
The Office of Open Records webinar will begin soon
General Data Protection Regulation Q & A Session
Data Protection What can I do? GDPR Principles General Data Protection
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Handling Information Securely
The E-Filing Procedure and Process for Dependency
The E-Filing Procedure and Process for Criminal
Chapter 5 Computer Security
Confidentiality Training 2014
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Presentation transcript:

Handout 4: Document distribution PowerPoint presentation Principles of business document production and information management Handout 4: Document distribution

Introduction Documents are created primarily for distribution. By their very nature they require the involvement of more than one person before they serve their purpose. For example, letters involve the writer and the reader. Documents may require the involvement of many people. For example, one person might create a document, others might review it and add or change content, and a manager might then approve it for publication. In advance of meetings or during conferences, relevant documents may be distributed to attendees.

Readability/accessibility. Security. Possible problems Readability/accessibility. Security. Unintended disclosure of protected information. Ease of delivery/receipt. Keep written information secure by taking relevant precautions when preparing, reproducing and circulating documents. The method of circulating documents, either electronically or in written form, must be appropriate to their sensitivity. Keep written information secure by taking relevant precautions Not leaving out on desk or on photocopier or open on screen Marking them as Confidential Shredding unwanted copies Using passwords to protect electronic files Taking care when forwarding emails that the previous information is suitable for reading by the new recipient.

Distribution lists Where a document is to be distributed to several recipients, a distribution list needs to be compiled to include all those who should receive it. There should be a way to record that the document has been sent to each recipient.

Manual distribution Circulation slips – are a form of internal distribution for circulating non-sensitive material. Copies of letters that are marked ‘cc’ need to be sent out with a compliments slip to the person copied in. When distributing sensitive material, internally or externally, by hard copy, it should be sealed in an envelope and marked as Confidential.

Electronic distribution Documents can be sent via e-mail to one or more recipients. Documents can be posted on online bulletin boards for downloading by interested parties. If documents contain sensitive or confidential material they should be password protected against opening/download.

Wider distribution Some documents may need to be distributed to the wider public. When documents are intended for distribution as a download they should be created in a widely available format, eg PDF documents and protected from alteration. Protection can also prevent unauthorised access by requiring passwords to open and view the documents. For example, PDF documents can be locked against modifications with password protection. The Data Protection Act applies to the distribution and storage of any personal data by requiring that personal details are not circulated to third parties and stored data is accurate, up-to-date, relevant and not kept for longer than necessary.