10
Communication in Administration (Security)

Communication in Administration (Security). Electronic File Management Higher Administration 2015-2016

Embed Size (px)

Citation preview

Page 1: Communication in Administration (Security). Electronic File Management Higher Administration 2015-2016

Communication in Administration (Security)

Page 2: Communication in Administration (Security). Electronic File Management Higher Administration 2015-2016

Electronic File ManagementHigher Administration 2015-2016

Page 3: Communication in Administration (Security). Electronic File Management Higher Administration 2015-2016

3

What is File Management?

Choosing appropriate file locations

Folder structures and File Names

Version Control

Housekeeping & Archive procedures

Backup procedures

You may wish to appoint one individual to have an overview of data management within the organisation.

Can you explain

why these are

important?

Page 4: Communication in Administration (Security). Electronic File Management Higher Administration 2015-2016

4

File Management

Benefits of Good…

Less time wasted finding files

Improved customer service

Improved security of data

More efficient use of storage

Compliance with Data Protection Act

Consequences of Poor…

Out-of-Date information accessed

Sharing files difficult – can’t find the right file

Confidential information accessed

Workflow disrupted

Page 5: Communication in Administration (Security). Electronic File Management Higher Administration 2015-2016

Security and Confidentiality ProceduresHigher Administration 2015-2016

Page 6: Communication in Administration (Security). Electronic File Management Higher Administration 2015-2016

6

Some Security Terms

Security: means protecting data against theft, damage and destruction

Integrity: means ensuring that the data is accurate, up-to-date and error free

Privacy: means that the data must be held securely so that only those who need access to the data can access it

Confidentiality: means that those who do not have access to the data respect it, and do not discuss it with others that do not have a right to know what it says

Page 7: Communication in Administration (Security). Electronic File Management Higher Administration 2015-2016

7

Physical Threats

Ensures offices are locked and windows closed

Alarm the building

Use CCTV to monitor the premises

Restrict the access points

Keep visitors away from restricted areas

Security guards/lights on in the grounds

Train staff on moving equipment (prevent damage)

Fire doors closed/fire fighting equipment provided

Lag pipes to save bursts in winter

Take out adequate insurance

Page 8: Communication in Administration (Security). Electronic File Management Higher Administration 2015-2016

8

Protecting Electronic Files

Password protect – restricts access, must be changed regularly

Regular backups – ideally stored offsite, saves recreating files from scratch

Anti-virus software – prevents unauthorised modification of files

Access rights/levels – ensure that only authorised personnel can read/edit/delete

Lock workstation – when away eg on a break or helping a customer

Voice/Iris/Fingerprint/Dongle – restricts access

Read-only Files – cannot be edited

Firewalls – prevents hackers gaining access to company data.

Mr Illingwort

h example

Page 9: Communication in Administration (Security). Electronic File Management Higher Administration 2015-2016

9

Protecting Paper-Based Files

Return files to the filing cabinet after use

Keep filing cabinets locked

Don’t leave papers at the photocopier (very easy to do!)

Don’t leave papers unattended

Shred and dispose of unneeded items

Page 10: Communication in Administration (Security). Electronic File Management Higher Administration 2015-2016

Communication in Administration (Security)