You are on page 1of 17

ACCESS AND USE COMMON

BUSINESS TOOLS

GROUP 2
ESTREMOS, ALMIRA
TRADIO, GIA
TORREON, ROSEMARIE
VILLARANTE, LORREN
1.3 OBTAIN AND MAINTAIN BUSINESS TOOLS
REQUIRED TO SUPPORT WORKPLACE ACTIVITIES

OBJECTIVES:
• Identifying the return process.
• Identify the importance of the tools.
ROSTER
• allow users to plan for access and to allow planning for
events when the tool is being used by another.
MICROSOFT OUTLOOK
EXCEL
DAMAGE
• The business will need to establish rules and
responsibilities for tools that are damaged as a result of
negligent behavior by the user.
1.4 STORE BUSINESS TOOLS IN ACCORDANCE
WITH ENTERPRISE PROCEDURES AND TO
REDUCE THEFT AND FRAUDULENT ACTIVITY

SECURITY TOOLS
Swipe Card Access
Systems
can record each person that accesses the
storage area.
SECURITY TOOLS
Password
Computer systems can have password protection to
restrict access.
SECURITY TOOLS
Security Cameras
As well as recording access, security cameras can
record handling and use of the tool in the area.
SECURITY TOOLS
Police Checks
Individuals may apply or authorize others to perform
a police check which will disclose any charges that have
been made against a person.
EMPLOYMENT CONTRACT
Privacy
Terms in this section determine the nature of the
information that an employee can publish about the
business and the guests of the business.
EMPLOYMENT CONTRACT
Internet
If internet access is normally a part of the
employees duties it may be relevant to state the
allowable internet use that is allowed by an
employee.
LOCKABLE ACCESS
Locks can be used to prevent access and to enhance
the possibility of the tool being available for later use.
AUDITS
In this context an audit is the assessment of
the processes that are in place on how the business
tools are monitored, controlled and used.
STOCKTAKES
A periodical stocktake can be performed on
consumable resources to ensure there are sufficient
resources to meet the operational needs.
INFORMATION

Information is an
important business tool in a
modern organization. Like
the other tools it needs
protection from unauthorized
use and access. It needs
maintenance as information
that is old or outdated may be
useless and even dangerous.
LEGAL IMPLICATIONS
Where information is disclosed various privacy acts
and controls can impose penalties for the business and the
individual for acts that breach the act.

You might also like