Preview

Admin Store and Retrieve Information

Satisfactory Essays
Open Document
Open Document
802 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Admin Store and Retrieve Information
Unit 219
Store & Retrieve Information

Outcome 1:
Understand processes and procedures for storing and retrieving information
1.1 – Explain the purpose of storing and retrieving required information
The purpose of storing and retrieving required information is so you can readily retrieve it when it becomes required.
Information is logged on a spreadsheet and filed with the log number this is so the information can easily be found if required.
The information is stored in locked filing cabinets as the information can hold company details and account numbers this is only accessible by the Administration staff and each file is signed out on a register.
1.2 – Describe the different information systems and their main features
The different information systems are filing cabinets where hard copies are stores or electronically which can be saved changes can be made and they can be made safe with a password.
Filing Cabinets – The information in the filing cabinets is logged on a spread sheet and issued a file number this is so the information is easily ready and available to find is require, the filing cabinets are also locked as they can contain private and confidential information, the Administration staff are the only department that can access these files and each one taken is signed out.
Electronic File – The information can be easily shared between personnel in the company if required and any changes amendments can be easily changed, these files can also be password protected or read only if required so other personnel can’t make any changes.
1.3 – Explain the purpose of legal and organisational requirements for the security and confidentiality of information.
The purpose of legal and organisational requirements is to ensure all personnel files of staff is kept safe and confidential if an organisation stores any information on staff, we need to meet the Data Protection Act. The information should be stored securely paper-based or electronically. The

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    In addition, organizations constantly face legal, ethical, and regulatory requirements from governments, business partners, and others they work with. These will add additional factors when weighing the costs and benefits of different solutions to information security risks. In fact, these requirements may even make some risks more important, often because a company will not want to get in trouble with a government even though they might normally live with the risk they are being forced to resolve through regulations. Understanding the various laws that will affect data is of prime importance to any security…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Electronically Stored Information: Refers to all forms of electronic data and documents including, but not limited to, metadata, electronic mail, word processing documents, calendars, voice messages, videos, digital photographs, information in personal digital assistants (PDAs), jump drives, home computers, and in any location where data may be stored.…

    • 1996 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. Information security is necessary for protecting confidentiality, privacy, integrity of processing, and availability of information resources. (Correct. As Figure 8-2 shows, security is the foundation for achieving the other four components of system reliability.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Good Essays

    The reason you store information is so you when you need it in the future you can easily find it. Most companies have to either store documents in fire proof cabinet’s or on hard disks or any other electronic storage devices. Most companies have confidential files about the company, employees or customers that have to follow the data protection act.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Input Input within information systems has two different parts. There is accurate data which is collected then it is processed and that then creates the starting point for the output from the information system. The user must tell the system what sort of data inspection they want the system to perform Storage The data must be stored in the most accurate and safest way possible within the organization. Most companies have a IT department or a technician and what they should do is backup the data as often as possible.…

    • 843 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Record Controls

    • 747 Words
    • 2 Pages

    In the interview threads most of the small and large facilities kept their records in one locations, larger facilities were more likely to use different locations. Some facilities that did use different locations used extra filing locations because of the large amounts of patients that were treated. Many of the similarities and differences in the circulation, tracking and security measures of record handling and storage are determined mainly by the filing system in my opinion. Small, medium, and large facilities had similar security measures when using an electronic record filing system. Most of the facilities only allowed authorized personnel to access patient’s files. When a filing cabinet was used the patient’s records were locked, when filing storage areas were used then the doors were locked, and files are checked out only to authorize personnel.…

    • 747 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Confidentiality and information security are key factors for an organisation. It allows organisations to ensure they preserve these along with…

    • 2721 Words
    • 11 Pages
    Satisfactory Essays
  • Better Essays

    Within any business storing information or documents is a procedure that needs to be followed because there will be no faults with finding the documents or information again when they need to be retrieved. There are different ways to file different types of documents for example certain types of information have to be stored within fire proof cabinets and some have to be recorded on hard copies or soft copies electronically.…

    • 2879 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Bananas

    • 344 Words
    • 2 Pages

    ▪ The data must be stored in a locked drawer, room, or an area where access is controlled by a guard, cipher lock, or a card reader. The area must have sufficient physical access control measures to afford adequate protection and prevent unauthorized access by visitors or other persons without a need-to-know.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    the principles of secure information system use and the responsibility of users to follow them.…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    LEVEL 2 BEAUTY

    • 303 Words
    • 2 Pages

    All confidential data is stored and used that complies with the data protection act, should ensure your clients privacy and confidential information is safe and secure either on a computer or paper filled system.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    During my review I discovered that had 2 methods on holding these types of information. A manual filing system, where documents are stored in filing cabinets and in their computerised system, , where documents are created, stored and scanned into the company computer system.…

    • 998 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Computer Based | -Everything is backed up and stored securely -Password protection is in place. | - If the computer breaks down all files and records will be lost. -If the passwords are forgotten data may be lost. |…

    • 731 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Human Resource Policy

    • 13129 Words
    • 53 Pages

    Personnel Files Personnel Information and Employee Privacy . . References and External Requests for Employee Information Employee Access to Personnel Files . . . .…

    • 13129 Words
    • 53 Pages
    Powerful Essays