Preview

store and retrive information unit 219

Good Essays
Open Document
Open Document
777 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
store and retrive information unit 219
Understand processes and procedures for storing and retrieving information
Explain the purpose of storing and retrieving required information:
The reason you store information is so you when you need it in the future you can easily find it. Most companies have to either store documents in fire proof cabinet’s or on hard disks or any other electronic storage devices. Most companies have confidential files about the company, employees or customers that have to follow the data protection act.
Describe different information systems and their main features:
Server - on the server at our company we use the server to store all are files for example financial data, HR files, sage and accounts, maintenance, training, HSBC, customers, employees, etc. these are all in relevant files so you can locate them easily. GX – our bespoke system saves all of the work that we have processed so you can locate them by going on to contracts and finding the relevant customer’s and looking what they have had from when they joined with our company and we can also look back in the past to see how much we have made and how many pieces we have sent out.
Explain the purpose of legal and organizational requirements for the security and confidentiality of information: Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.
Explain the purpose of confirming information to be stored and retrieved:
All companies store a lot of information, but if you store the wrong information that isn’t up to date or is not correct there is no use of it. So when storing information you should be cautious that it is proof read. You keep

You May Also Find These Documents Helpful

  • Satisfactory Essays

    8) Which of the tenets of information security is most related to the “need to know” property? C) Confidentiality…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Information in this day and age is power. Because if you look at information all it is a collection of knowledge stored within a database for people to look at. This article goes over information and how it is used in my company, how we use our information and the safeguards we use from the employee as an individual and as a company to protect our clients…

    • 909 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The different information systems are filing cabinets where hard copies are stores or electronically which can be saved changes can be made and they can be made safe with a password. Filing Cabinets – The information in the filing cabinets is logged on a spread sheet and issued a file number this is so the information is easily ready and available to find is require, the filing cabinets are also locked as they can contain private and confidential information, the Administration staff are the only department that can access these files and each one taken is signed out. Electronic File – The information can be easily shared between personnel in the company if required and any changes amendments can be easily changed, these files can also be password protected or read only if required so other personnel can’t make any changes.…

    • 1438 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Xcom/285 Week 1

    • 412 Words
    • 2 Pages

    I can see how this must have been a business nightmare with the storage of this information. Now with our advance technology we are able to order faster, save information to disc or the hard drive of the business computers which will allow faster references for future sales.…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Confidentiality is a very important factor. All the data relative to recruitment, compensation, and management of employees is highly sensitive as it discloses private information about the employees and the company. So if these land in the wrong people, it can be misused to commit criminal behaviour such as fraud. Confidentiality maintenance also relates to professionalism of the organisation. So employees must make sure they maintain a professional attitude and not share private information about the rest of the employees or about the company.…

    • 2721 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    3rai Cipd Level 3

    • 791 Words
    • 4 Pages

    There are many methods of storing records, an example is: Electronic which includes hard disks drive – PC, CD – recorder, DVD, databases and spreadsheets, internet or intranet, USB devices, emails and virtual learning environments.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Security Principles

    • 682 Words
    • 3 Pages

    The security principles of information technology (IT) are confidentiality, integrity, and availability for your company data. Confidentiality is the way that a computing system’s assets can be read only by authorized parties. Integrity is that you can only be modified or deleted by authorized parties or in authorized ways. Availability is that the data is accessible to the authorized parties in a timely fashion (Principles of IT Seurity, 2012). Ensure the physical security of the data and telecommunications centers and resources. By regulate authorized access to resources through security measures such as user IDs, passwords, and digital certificates. Also by implement auditable authorization processes that adhere to policies provide security awareness training and resources. Keep the Security Department informed of any system/data custodian issues concerning access rules and security violations.…

    • 682 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Ruzaif Adli M.D. (2004). Public Awareness of Records as Core Organizational Asset. In Proceedings of National Seminar on Management of Corporate Memory: Key Challenges, Issues and Trends. Vol. 1 (pp. 50-58).Universiti Teknologi MARA.…

    • 3476 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    Internet Security Overview

    • 9590 Words
    • 39 Pages

    When information is read or copied by someone not authorized to do so, the result is known as loss of confidentiality. For some types of information, confidentiality is a very important attribute. Examples include research data, medical and insurance records, new product specifications, and corporate investment strategies. In some locations, there may be a legal obligation to protect the…

    • 9590 Words
    • 39 Pages
    Powerful Essays
  • Powerful Essays

    Sales and Inventory System

    • 1627 Words
    • 6 Pages

    All files can be kept on a computer, taking up far less space than having to house filing cabinets and drawers to keep track on the paperwork.…

    • 1627 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    With the use of IT, as with most things, comes the possibility of abuse. Data integrity and security is of prime importance to ensure validity and privacy of the information being held. Managing the information involves identifying what should be kept, how it should be organized, where it should be held and who should have access to it. The quality of this management will dictate the quality of the decisions being taken and ultimately the organization 's survival.[3]…

    • 4023 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    It all depends on the business you are running. You may need more or less data than another company. No matter what you need stored and remembered, it is always more important to have good communication or your business could have a number of…

    • 366 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lending System

    • 431 Words
    • 2 Pages

    * lack of security:since data is stored in filing cabinets it is freely available to anyone.if information falls into the wrong hands it can be used against the company and customers and can blackmail them.…

    • 431 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Crime

    • 791 Words
    • 4 Pages

    Some organizations transfer information between themselves, example Government entities and small businesses, like Colleges, Schools etc. They store Information for learning purposes, like: video, voice, images etc. Most of those Entities / Organizations are not properly secured, which makes their Computer system…

    • 791 Words
    • 4 Pages
    Good Essays