Learning Outcome 1 The learner will: Understand the functions and operating modes of different business information systems. Indicative Content

Size: px
Start display at page:

Download "Learning Outcome 1 The learner will: Understand the functions and operating modes of different business information systems. Indicative Content"

Transcription

1 Unit Title: Information Systems Applications for Business Unit Reference Number: H/601/3904 Guided Learning Hours: 160 Level: Level 5 Number of Credits: 18 Learning Outcome 1 The learner will: Understand the functions and operating modes of different business information systems. 1.1 Explain the functions of Transaction Processing Systems, Decision Support Systems, Executive Support Systems and Management Information Systems, giving current examples Categorise computer systems according to their primary business functions Explain the functions of Transaction Processing Systems, Decision Support Systems, Executive Support Systems and Management Information Systems, giving current business examples. 1.2 Relate each type of system to the information needs of different levels of management Show how the separate levels of management require different types of information Relate the information needs of each level of management to particular categories of computer system. 1.3 Distinguish between batch, online and real-time operating modes Distinguish between batch, online and real-time operating modes Choose appropriate operating modes for common business processes and justify their selection. Learning Outcome 2 The learner will: Understand the features and business benefits of Local Area Networks (LANs). 2.1 Compare the commonly used LAN topologies, using diagrams where appropriate Explain the concept of a local area network (LAN) Compare the commonly used LAN topologies, and, with the aid of diagrams, illustrate their components and organisation.

2 2.2 Assess the benefits and drawbacks of employing LANs in business applications Describe the potential benefits of using a LAN in a typical business setting Assess the possible pitfalls of the use of LANs. Learning Outcome 3 The learner will: Understand the features of Wide Area Networks (WANs) and the various communication technologies needed for their support. 3.1 Distinguish between LANs, WANs and Metropolitan Area Networks (MANs) in terms of their major components and applications Distinguish between LANs, WANs and MANs in terms of their configuration and applications Identify, and explain the function of, each of the layers of Open Systems Interconnection (OSI) 7 layer model. 3.2 Compare the main communication technologies in terms of media and channel capacities Identify the main media used for data transmission and compare their properties Describe, with the aid of diagrams, the media and devices used in typical LANs and WANs. 3.3 Explain the term Distributed Information System (DIS) and construct diagrams to compare alternative DIS structures Explain the term Distributed Information System (DIS), and justify the separation of a business application across several tiers Provide examples of DIS applications and construct diagrams to compare alternative DIS structures. Learning Outcome 4 The learner will: Understand the impact of the internet and other technologies on business models and commercial activities. 4.1 Distinguish between the common e-commerce business models employed on the internet, using examples Explain the term e-commerce and name the common business models supported by the internet Discuss, using a practical example, the features of each e-commerce business model.

3 4.2 Explain the use of mobile and m-commerce by describing current practical applications Explain how wireless technologies and modern hand-held devices have fostered the growth of mobile business applications Describe, in outline, the facilities and operation of current m-commerce applications. 4.3 Explain the business benefits of intranet and extranet applications such as supply chain management Distinguish between intranets and extranets by describing typical application areas Explain the business benefits of intranet and extranet applications such as supply chain management. 4.4 Describe the difficulties and drawbacks of implementing a commercial application on the internet Recognise the complexity, in terms of technologies and components, needed for the support of an e-commerce application Explain the practical difficulties and potential drawbacks of implementing a commercial application on the internet. Learning Outcome 5 The learner will: Understand the stages in the procurement of a computer system from suppliers. 5.1 Describe the essential preliminary work in project definition, risk analysis, budgeting and scheduling Recognise the many necessary technical, commercial and practical activities in the supply of an effective computer system Outline the essential preliminary work in project definition, risk analysis, budgeting and scheduling. 5.2 Explain how to create a system specification and invite proposals from suppliers Explain the need for a precise requirements specification and summarise its typical contents Outline the tendering process, in practical and legal terms, when inviting proposals from suppliers. 5.3 Explain how to shortlist proposals and proceed to a final selection based on agreed criteria Discuss the factors to be considered when evaluating tenders Describe a method of shortlisting proposals and reaching a final choice of supplier. 5.4 List and briefly explain List and briefly explain the typical sections in a contract

4 the typical sections in a contract for the supply and maintenance of a complete computer system. for the supply and maintenance of a complete computer system Identify and compare the different methods of defining cost and ownership in a contract. Learning Outcome 6 The learner will: Understand the options available in acquiring the requisite hardware, software and services for an information system. 6.1 Compare direct purchase, leasing and renting as methods of obtaining hardware Outline the main methods of obtaining hardware such as direct purchase, leasing and renting Assess, from the user s viewpoint, the different methods of obtaining hardware. 6.2 Assess the benefits and disadvantages of obtaining software by bespoke methods, package use, or a combination approach Describe the different methods of obtaining software for a business application Summarise the benefits and disadvantages of obtaining software by bespoke methods, package use, or a combination approach. 6.3 Evaluate the use of employees, contract staff, consultants and outsourcing in the provision of information system services Describe the main staffing choices available when providing information system services Compare direct employment, contract staff, consultants and outsourcing as methods of obtaining information system services. Learning Outcome 7 The learner will: Understand the importance of observing legislation in managing information systems. 7.1 Explain how to ensure that general legislation covering the workplace is complied with in areas such as health and safety Recognise that many areas of legislation affect the supply and operation of computer systems Summarise the employer s responsibilities to conform to health and safety legislation.

5 7.2 Explain information laws covering copyright, data protection and computer misuse Explain briefly how the UK Copyright, Designs and Patents Acts aim to protect intellectual property rights Summarise the eight principles of the UK Data Protection Act 1998 and explain the rights given to private individuals Outline the offences created under the UK Computer Misuse Act Learning Outcome 8 The learner will: Know how to devise effective plans for implementing a security policy. 8.1 Explain how to apply a comprehensive risk assessment and analysis method Describe the risk management approach used to achieve an adequate level of security Explain how risk identification and risk analysis can reveal the required levels of security protection. 8.2 Explain how to evaluate strategies for handling risks Describe the common methods of handling risk such as risk avoidance, retention, reduction and transfer. 8.3 Recommend procedures and practices in order to achieve the desired level of protection Emphasise the importance of implementing a board level policy for security throughout the organisation with regular reviews Recommend procedures and practices in order to achieve the desired level of protection against both accidental and deliberate threats to security. Assessment: Assessment method: written examination (unless otherwise stated). Written examinations are of three hours duration. All learning outcomes will be assessed. Recommended Reading: Please refer to the Tuition Resources section of the Members Area of the ABE website ( for the recommended reading for this subject.

Learning Outcome 1 The learner will: Understand the meaning of Information System and related terms. Indicative Content

Learning Outcome 1 The learner will: Understand the meaning of Information System and related terms. Indicative Content Unit Title: Introduction to Management Information Systems Unit Reference Number: F/505/4045 Guided Learning Hours: 100 Level: Level 4 Number of Credits: 12 Unit purpose and aim(s): This unit aims to give

More information

Learning Outcome 1 The learner will: Be able to initiate the preliminary stages of a project.

Learning Outcome 1 The learner will: Be able to initiate the preliminary stages of a project. Unit Title: Project Management Guided Learning Hours: 210 Level: Level 6 Number of Credits: 25 Learning Outcome 1 The learner will: Be able to initiate the preliminary stages of a 1.1 Identify an appropriate

More information

G055/IC. APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY Networking Solutions ADVANCED GCE INSTRUCTIONS FOR CANDIDATES JUNE 2011

G055/IC. APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY Networking Solutions ADVANCED GCE INSTRUCTIONS FOR CANDIDATES JUNE 2011 ADVANCED GCE APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY Networking Solutions G055/IC *G031150611* INSTRUCTIONS FOR CANDIDATES Pre-release Material and Tasks To be opened on receipt JUNE 2011 INFORMATION

More information

Higher Computing Networking 1

Higher Computing Networking 1 Networking Briefly state what is meant by a computer network. What does the term topology refer to in this context? What are the ideal goals a network designer should aim for? Compare and contrast a star

More information

Learning Outcome 1 The learner will: Understand the purposes and benefits of performance and reward management. Indicative Content

Learning Outcome 1 The learner will: Understand the purposes and benefits of performance and reward management. Indicative Content Unit Title: Performance Management and Reward Unit Reference Number: M/505/7118 Guided Learning Hours: 210 Level: Level 6 Number of Credits: 25 Unit purpose and aim(s): This unit aims to give learners

More information

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,

More information

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2) What is a computer network? Introduction Chapter 1 A number of separate but interconnected computers A collection of autonomous computers interconnected by a single technology COURSE FOCUS: design and

More information

Chapter 1 Instructor Version

Chapter 1 Instructor Version Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic

More information

GENERIC STANDARDS CUSTOMER RELATIONSHIPS FURTHER EXCELLENCE CUSTOMISED SOLUTIONS INDUSTRY STANDARDS TRAINING SERVICES THE ROUTE TO

GENERIC STANDARDS CUSTOMER RELATIONSHIPS FURTHER EXCELLENCE CUSTOMISED SOLUTIONS INDUSTRY STANDARDS TRAINING SERVICES THE ROUTE TO PROCESSES SUPPLY CHAIN SKILLED TALENT CUSTOMER RELATIONSHIPS FURTHER EXCELLENCE GENERIC STANDARDS INDUSTRY STANDARDS CUSTOMISED SOLUTIONS TRAINING SERVICES THE ROUTE TO ISO 9001:2015 FOREWORD The purpose

More information

ICTTEN2209A Build and maintain a secure network

ICTTEN2209A Build and maintain a secure network ICTTEN2209A Build and maintain a secure network Release: 1 ICTTEN2209A Build and maintain a secure network Modification History Not Applicable Unit Descriptor Unit descriptor This unit describes the performance

More information

FUNCTIONAL AREA 12. Network Administration (NET)

FUNCTIONAL AREA 12. Network Administration (NET) FUNCTIONAL AREA 12 Network Administration (NET) Incumbents in this functional area address interoperability issues related to hardware, software, and connectivity of communications such as cable, fiber

More information

MANAGEMENT INFORMATION SYSTEMS 8/E

MANAGEMENT INFORMATION SYSTEMS 8/E MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the

More information

Business Management & Administration

Business Management & Administration Business Management & Administration Main Aim(s) of the Unit: The unit introduces the student to a range of studies which are useful in understanding people in the workplace. It examines the concept of

More information

NOS for Network Support (903)

NOS for Network Support (903) NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure

More information

I want to submit a freedom of information request for the following information relating to ICT & Telecommunications:

I want to submit a freedom of information request for the following information relating to ICT & Telecommunications: Freedom of Information request 615-12 I want to submit a freedom of information request for the following information relating to ICT & Telecommunications: Current Fixed Line Provider- Supplier s name

More information

i) Question Type The following are guidelines on the type of questions and their approximate weightings:

i) Question Type The following are guidelines on the type of questions and their approximate weightings: Purpose Information Systems Strategy [MS2] Examination Blueprint 2014/2015 The Information Systems Strategy [MS2] examination has been constructed using an examination blueprint. The blueprint, also referred

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies

More information

ACCOUNTING INFORMATION SYSTEMS

ACCOUNTING INFORMATION SYSTEMS ACCOUNTING INFORMATION SYSTEMS Controls and Processes SECOND EDITION LESLIE TURIHIER WILEY MODULE 1 Introduction to AIS INTRODUCTION Defines business processes, AIS, and all foundational concepts.

More information

2 Basic Concepts. Contents

2 Basic Concepts. Contents 2. Basic Concepts Contents 2 Basic Concepts a. Link configuration b. Topology c. Transmission mode d. Classes of networks 1 a. Link Configuration Data links A direct data link is one that establishes a

More information

ecommerce in the Customer Empowerment Era 03/04/2014 Sameer S Paradkar

ecommerce in the Customer Empowerment Era 03/04/2014 Sameer S Paradkar ecommerce in the Customer Empowerment Era 03/04/2014 Sameer S Paradkar Abstract This Article begins with a description of the early years of ecommerce and the limitations of the existing ecommerce systems.

More information

DIPLOMA IN INTERNATIONAL PUBLIC FINANCIAL MANAGEMENT

DIPLOMA IN INTERNATIONAL PUBLIC FINANCIAL MANAGEMENT DIPLOMA IN INTERNATIONAL PUBLIC FINANCIAL MANAGEMENT MODULE SYLLABUS: MANAGING ORGANISATIONS 1. MODULE PROFILE Managing Organisations (MO) is one of four modules comprising the CIPFA Diploma in International

More information

BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS

BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and

More information

EUROPASS DIPLOMA SUPPLEMENT

EUROPASS DIPLOMA SUPPLEMENT EUROPASS DIPLOMA SUPPLEMENT TITLE OF THE DIPLOMA (ES) Técnico Superior en Administración de Sistemas Informáticos en Red TRANSLATED TITLE OF THE DIPLOMA (EN) (1) Higher Technician in Computer Network Systems

More information

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks Page 1 of 5 Title Demonstrate an understanding of local and wide area computer networks Level 7 Credits 10 Purpose People credited with this unit standard are able to: describe network types and standards;

More information

IAM Level 4. Diploma in Business and Administrative Management. Qualification handbook. 2011 edition

IAM Level 4. Diploma in Business and Administrative Management. Qualification handbook. 2011 edition IAM Level 4 Diploma in Business and Administrative Management Qualification handbook 2011 edition Published by the IAM IAM 2011 Registered charity number 254807 Published 2011 All rights reserved. This

More information

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information

More information

Module 3 Applications of Information Systems: Enterprise Systems

Module 3 Applications of Information Systems: Enterprise Systems Contents Module 1 Introduction to MIS Define management information systems and explain its key attributes Describe information as an asset and explain its core attributes Explain how information technology

More information

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006 Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which

More information

Learning Outcome 1 The learner will: Understand the nature of the communications process and the concept of integrated marketing communications.

Learning Outcome 1 The learner will: Understand the nature of the communications process and the concept of integrated marketing communications. Unit Title: Integrated Marketing Communications Guided Learning Hours: 210 Level: Level 6 Number of Credits: 25 Learning Outcome 1 The learner will: Understand the nature of the communications process

More information

Scheme of Work Units 1 and 2: Setting up a Business and Growing as a Business an Integrated Approach

Scheme of Work Units 1 and 2: Setting up a Business and Growing as a Business an Integrated Approach GCSE Business Studies Scheme of Work Units 1 and 2: Setting up a Business and Growing as a Business an Integrated Approach Copyright 2012 AQA and its licensors. All rights reserved. The Assessment and

More information

CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS

CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS Multiple Choice: 1. founded Amazon.com. A. Alan Kay B. Jeff Bezos C. Bill Gates D. Andy Grove Answer: B Reference: Jeff Bezos: The Virtual Bookseller Difficulty:

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

Lesson 24 Network Fundamentals

Lesson 24 Network Fundamentals Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Describe a network. Explain the benefits of a network. Identify the risks of network computing. Describe

More information

IT Services. We re the IT in OrganIsaTion. Large Organisations

IT Services. We re the IT in OrganIsaTion. Large Organisations IT Services. We re the IT in OrganIsaTion Large Organisations IT for Large Organisations. As the world of business technology has changed, so have we. From designing, building and optimising tailored

More information

Level 3 Install, configure and integrate networked hardware and software (7540-361)

Level 3 Install, configure and integrate networked hardware and software (7540-361) Level 3 Install, configure and integrate networked hardware and software (7540-361) Systems and Principles (QCF) Assignment guide for Candidates Assignment B www.cityandguilds.com July 2010 Version 4.0

More information

Network Technology (10101)

Network Technology (10101) Network Technology (10101) Rationale Statement: The goal of this course is to help students recognize the significant impact of computer networking in their lives. Virtually any career involves the use

More information

CONTRACTS STANDING ORDERS (CSOs) 2015 / 2016 CSO 2015-6 1

CONTRACTS STANDING ORDERS (CSOs) 2015 / 2016 CSO 2015-6 1 CONTRACTS STANDING ORDERS (CSOs) 2015 / 2016 CSO 2015-6 1 PART 3G Contracts Standing Orders 2015/16 Definitions Aggregation is the combining together of the total contract value from separate contracts

More information

Model Assignment Issued July 2013 Level 4 Diploma in Business and Administration

Model Assignment Issued July 2013 Level 4 Diploma in Business and Administration Model Assignment Issued July 2013 Level 4 Diploma in Business and Administration Unit 1 Supporting Business Activities Please note: This OCR model assignment may be used to provide evidence for the unit

More information

Harper Adams University College. Information Security Policy

Harper Adams University College. Information Security Policy Harper Adams University College Information Security Policy Introduction The University College recognises that information and information systems are valuable assets which play a major role in supporting

More information

ULH-IM&T-ISP06. Information Governance Board

ULH-IM&T-ISP06. Information Governance Board Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible

More information

CITY UNIVERSITY OF HONG KONG

CITY UNIVERSITY OF HONG KONG CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

NATIONAL CERTIFICATE (VOCATIONAL)

NATIONAL CERTIFICATE (VOCATIONAL) NATIONAL CERTIFICATE (VOCATIONAL) SUBJECT GUIDELINES DATA COMMUNICATION AND NETWORKING NQF Level 4 September 2007 DATA COMMUNICATION AND NETWORKING LEVEL 4 CONTENTS INTRODUCTION 1 DURATION AND TUITION

More information

Mobile Telephone and Wireless Handheld Devices Policy & Guideline. Information Management and Technology Policy

Mobile Telephone and Wireless Handheld Devices Policy & Guideline. Information Management and Technology Policy Information Management and Technology Policy TITLE: MOBILE TELEPHONE AND WIRELESS HANDHELD DEVICES 1 POLICY Purpose The purpose of this policy is to: 1. Establish a uniform and consistent approach to the

More information

Progress Record. Course 21 (V) Associate of Applied Science in Computer Information Technology and Systems Management

Progress Record. Course 21 (V) Associate of Applied Science in Computer Information Technology and Systems Management Progress Record Study your lessons in the order listed below. As graded examinations are returned to you, enter your grade in the space below. Set a schedule for yourself then watch your progress. Course

More information

Guide to the IT Passport Examination

Guide to the IT Passport Examination Information-Technology Engineers Examination Guide to the IT Passport Examination Information-technology Promotion Agency, Japan New Examination System Deliberation Committee Level 1 Examination Working

More information

E-COMMERCE AND ENTREPRENEURSHIP 579M. Essential Curriculum Course Overview. Total Hours: 125. 01 Should You Become an Entrepreneur?

E-COMMERCE AND ENTREPRENEURSHIP 579M. Essential Curriculum Course Overview. Total Hours: 125. 01 Should You Become an Entrepreneur? E-COMMERCE AND ENTREPRENEURSHIP 579M Essential Curriculum Course Overview Total Hours: 125 UNIT 1: THE BASICS OF ENTREPRENEURSHIP Hours: 10 01 Should You Become an Entrepreneur? (2 hours) The student will

More information

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their

More information

Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship

Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship University of Texas at El Paso Professional and Public Programs 500 W. University Kelly Hall Ste. 212 & 214 El Paso, TX 79968 http://www.ppp.utep.edu/ Contact: Sylvia Monsisvais 915-747-7578 samonsisvais@utep.edu

More information

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security

More information

GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT. CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4

GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT. CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4 GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4 PREFACE The following provides general guidance on data protection

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September

More information

Essex County Council Policy for Information Management and Security

Essex County Council Policy for Information Management and Security Essex County Council Policy for Information Management and Security Title Author/Owner Status Essex County Council Policy for Information Management and Security Information Management IS Final Version

More information

OCR Level 2 CAMBRIDGE TECHNICAL

OCR Level 2 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR Level 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT IT security J/601/4057 LEVEL 2 UNIT 18 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 IT SECURITY J/601/4057 LEVEL 2 Aim

More information

CLOUD-BASED BIM AND SMART ASSET MANAGEMENT: ADOPTING A SECURITY-MINDED APPROACH

CLOUD-BASED BIM AND SMART ASSET MANAGEMENT: ADOPTING A SECURITY-MINDED APPROACH CLOUD-BASED BIM AND SMART ASSET MANAGEMENT: ADOPTING A SECURITY-MINDED APPROACH March 2016 Disclaimer Reference to any specific commercial product, process or service by trade name, trademark, manufacturer,

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

This document contains the full BM syllabus, consisting of the overall aims and detailed learning outcomes.

This document contains the full BM syllabus, consisting of the overall aims and detailed learning outcomes. CIPFA PROFESSIONAL QUALIFICATION SYLLABUS BUSINESS MANAGEMENT MODULE PROFILE The Business Management (BM) module is designed to develop skills that are of crucial importance in modern public service organisations

More information

Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6)

Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6) Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6) Programme Structure STAGE ONE This stage makes up the Diploma in Information Technology (Level 5) 120

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT ORGANISATIONAL SYSTEMS SECURITY T/601/7312 LEVEL 3 UNIT 5 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 ORGANISATIONAL SYSTEMS

More information

Cloud (educational apps) software services and the Data Protection Act

Cloud (educational apps) software services and the Data Protection Act Cloud (educational apps) software services and the Data Protection Act Departmental advice for local authorities, school leaders, school staff and governing bodies October 2014 Contents 1. Summary 3 About

More information

Security & Privacy Current cover and Risk Management Services

Security & Privacy Current cover and Risk Management Services Security & Privacy Current cover and Risk Management Services Introduction Technological advancement has enabled greater working flexibility and increased methods of communications. However, new technology

More information

Contents. Section 4 Information Systems in Organisations 195. Section 5 Information: Policy, Strategy and Systems 287

Contents. Section 4 Information Systems in Organisations 195. Section 5 Information: Policy, Strategy and Systems 287 Contents Section 4 Information Systems in Organisations 195 Section 5 Information: Policy, Strategy and Systems 287 Appendix A AQA Specification Summary 350 iv Table of Contents SECTION 4 Chapter 36 Organisational

More information

Certificate in procurement and supply operations Unit content guide. Leading global excellence in procurement and supply

Certificate in procurement and supply operations Unit content guide. Leading global excellence in procurement and supply Certificate in procurement and supply operations Unit content guide Leading global excellence in procurement and supply Introduction The Chartered Institute of Procurement & Supply qualifications ladder

More information

BUDGET LETTER 05-03 PEER-TO-PEER FILE SHARING 4841.1, 4841.2, EXECUTIVE ORDER S-16-04

BUDGET LETTER 05-03 PEER-TO-PEER FILE SHARING 4841.1, 4841.2, EXECUTIVE ORDER S-16-04 BUDGET LETTER SUBJECT: PEER-TO-PEER FILE SHARING REFERENCES: STATE ADMINISTRATIVE MANUAL SECTIONS 4819.2, 4840.4, 4841.1, 4841.2, EXECUTIVE ORDER S-16-04 NUMBER: 05-03 DATE ISSUED: March 7, 2005 SUPERSEDES:

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems

Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Chapter 4 Electronic E-Business System Cross-Functional E-Business Applications. Major E-business applications

More information

information systems security policy...

information systems security policy... sales assessment.com information systems security policy... Approved: 2nd February 2010 Last updated: 2nd February 2010 sales assessment.com 2 index... 1. Policy Statement 2. IT Governance 3. IT Management

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

Implementing Business Portal in an Extranet Environment

Implementing Business Portal in an Extranet Environment Implementing Business Portal in an Extranet Environment Published: December 2005 Table of contents Introduction...1 What is extranet access?...1 Why deploy Business Portal in an extranet?...1 Order Management...1

More information

A GOOD PRACTICE GUIDE FOR EMPLOYERS

A GOOD PRACTICE GUIDE FOR EMPLOYERS MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade

More information

Fundamentals of Information Systems, Seventh Edition

Fundamentals of Information Systems, Seventh Edition Chapter 1 An Introduction to Information Systems in Organizations 1 Principles and Learning Objectives The value of information is directly linked to how it helps decision makers achieve the organization

More information

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical

More information

Network Topology Comparison

Network Topology Comparison Topology Star Bus Each computer connects to a central connection device. Bus Single cable connects everything. Ring Single cable configured in a ring. Information Transfer All information passes through

More information

Understanding Cloud Requirements - A Supply Chain Lifecycle Approach

Understanding Cloud Requirements - A Supply Chain Lifecycle Approach Understanding Cloud Requirements - A Supply Chain Lifecycle Approach Maik A. Lindner SAP Research SAP Labs, LLC Palo Alto, CA m.lindner@sap.com Fiona McDonald SAP Research SAP (UK) Ltd. Belfast, Northern

More information

Blacklisting Procedure

Blacklisting Procedure Blacklisting Procedure Related Policy ICT Services and Facilities Use Policy Responsible Approved by Approved and commenced August, 2014 Review by August, 2017 Responsible Organisational Unit Information

More information

Unit Title: Personnel Information Systems Unit Reference Number: F/601/7510 Guided Learning Hours: 160 Level: Level 5 Number of Credits: 18

Unit Title: Personnel Information Systems Unit Reference Number: F/601/7510 Guided Learning Hours: 160 Level: Level 5 Number of Credits: 18 Unit Title: Personnel Information Systems Unit Reference Number: F/601/7510 Guided Learning Hours: 160 Level: Level 5 Number of Credits: 18 Unit objective and aim(s): This unit aims to give learners a

More information

Our Capabilities. 3SIXTY Global, the specialist consulting company for buyers and providers of corporate travel services and expenses.

Our Capabilities. 3SIXTY Global, the specialist consulting company for buyers and providers of corporate travel services and expenses. Our Capabilities 3SIXTY Global, the specialist consulting company for buyers and providers of corporate travel services and expenses. 3SIXTY Global has the experience to improve how your company travels.

More information

ELA Certification for Logistics Professionals

ELA Certification for Logistics Professionals ELA Certification for Logistics Professionals Performance Criteria (Standards 2 nd Layer) 3 Senior Management Level (ESLog) 3.6 Supply Chain Flow and Network Management European Logistics Association 3.6.1

More information

Networking (Exploration 1)

Networking (Exploration 1) Unit 105: CCNA Fundamentals of Networking (Exploration 1) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose A/601/7537 BTEC in IT This unit introduces the architecture,

More information

IAM Levels 4 and 5. Certificate in Business and Administrative Management. Qualification handbook. 2011 edition

IAM Levels 4 and 5. Certificate in Business and Administrative Management. Qualification handbook. 2011 edition IAM Levels 4 and 5 Certificate in Business and Administrative Management Qualification handbook 2011 edition Published by the IAM IAM 2011 Registered charity number 254807 Published 2011 All rights reserved.

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT INFORMATION SYSTEMS H/601/7256 LEVEL 3 UNIT 2 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 INFORMATION SYSTEMS H/601/7256

More information

Education & Training Plan Business Information Systems Professional Certificate Program with Externship

Education & Training Plan Business Information Systems Professional Certificate Program with Externship Office of Professional & Continuing Education 301 OD Smith Hall Auburn, AL 36849 http://www.auburn.edu/mycaa Contact: Shavon Williams 334-844-3108; szw0063@auburn.edu Auburn University is an equal opportunity

More information

LONDON SCHOOL OF COMMERCE. Programme Specification for the. Cardiff Metropolitan University. BSc (Hons) in Computing

LONDON SCHOOL OF COMMERCE. Programme Specification for the. Cardiff Metropolitan University. BSc (Hons) in Computing LONDON SCHOOL OF COMMERCE Programme Specification for the Cardiff Metropolitan University BSc (Hons) in Computing Contents Programme Aims and Objectives Programme Structure Programme Outcomes Mapping of

More information

Encryption Policy Version 3.0

Encryption Policy Version 3.0 Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

PROCUREMENT & LOGISTICS DEPARTMENT

PROCUREMENT & LOGISTICS DEPARTMENT PROCUREMENT & LOGISTICS DEPARTMENT Tender/OJEU Procedure Overview This procedure applies to all purchases over 50,000 not covered by existing contracts and should be followed in conjunction with the Tender/OJEU

More information

Data Centre Networks Overview

Data Centre Networks Overview TELECOMMUNICATIONS TRANSFORMATION PROGRAM Data Centre Networks (DCN) Industry Day Data Centre Networks Overview Michel Fortin Director General, Telecommunications Transformation Program Transformation,

More information

Information Integrity & Data Management

Information Integrity & Data Management Group Standard Information Integrity & Data Management Serco recognises its responsibility to ensure that any information and data produced meets customer, legislative and regulatory requirements and is

More information

ET225 Networking Concepts. Chapter 1 What is a Computer Network?

ET225 Networking Concepts. Chapter 1 What is a Computer Network? ET225 Networking Concepts Chapter 1 What is a Computer Network? Objectives Identify the advantages of connecting computers and devices on a network. Recognize common network components in a lab setting.

More information

Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship

Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship Testing Services and Programs 1200 N. DuPont Highway Dover, DE 19901 https://www.desu.edu/academics/mycaa Contact: Amystique Harris-Church 302.857.6143 achurch@desu.edu Education & Training Plan IT Network

More information

Business Administration. Level 2 Diploma in Business Administration (QCF) 2014 Skills CFA B&A units L1 Page 1

Business Administration. Level 2 Diploma in Business Administration (QCF) 2014 Skills CFA B&A units L1 Page 1 Business Administration Level 2 Diploma in Business Administration (QCF) 2014 Skills CFA B&A units L1 Page 1 Level 2 Diploma in Business Administration (combined qualification) Qualification Title Credit

More information

Chapter 2 INDUSTRIAL BUYING BEHAVIOUR: DECISION MAKING IN PURCHASING

Chapter 2 INDUSTRIAL BUYING BEHAVIOUR: DECISION MAKING IN PURCHASING Chapter 1 THE ROLE OF PURCHASING IN THE VALUE CHAIN The role and importance of the purchasing and supply function in the value chain. The difference between concepts such as ordering, buying, purchasing,

More information

How To Manage A Contract

How To Manage A Contract Contract Management Checklist Preparation This section deals with laying good foundations before a contract is let. The contract should be actively managed. You should have a plan for doing this, which

More information

Job Description. To manage the College s accounting arrangements, financial planning and procurement. The Head of Finance is responsible for:

Job Description. To manage the College s accounting arrangements, financial planning and procurement. The Head of Finance is responsible for: Job Description Job title: Department: Grade: Responsible to: Responsible for: Head of Finance Finance 60,000 (spot salary) Chief Operating Officer All members of the Finance Department (8 FTE) with direct

More information

EUROPASS DIPLOMA SUPPLEMENT

EUROPASS DIPLOMA SUPPLEMENT EUROPASS DIPLOMA SUPPLEMENT TITLE OF THE DIPLOMA (ES) Técnico Superior en Sistemas de Telecomunicaciones e Informáticos TRANSLATED TITLE OF THE DIPLOMA (EN) (1) Higher Technician in Telecommunications

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

Oxford City Council ICT Strategy 2015 2018

Oxford City Council ICT Strategy 2015 2018 Oxford City Council ICT Strategy 2015 2018 1 Contents 2 Overview... 2 3 OCC Business Drivers... 2 4 ICT Principles... 3 4.1 Business Requirements... 3 4.2 Information Management... 3 4.3 Applications...

More information

Terms & Conditions Server Hosting

Terms & Conditions Server Hosting Terms & Conditions Server Hosting Contents 1. Charging and Invoices... 2 1.1 Set up charges... 2 1.2 Invoicing... 2 2. Netnorth Service Demarcation Diagram... 2 2.1 NIC... 2 2.2 NF... 3 2.3 Service Demarcation...

More information