SlideShare a Scribd company logo
ICAICT202A - WORK AND
COMMUNICATE
EFFECTIVELY IN AN IT
ENVIRONMENT
• Introduction
• ICT Roles
• Policies and Procedures
• KPIs
• Legislations
• Positive Communication
Strategies
• Written and Oral Communication
Information technology (IT) is the application of
computers and telecommunications equipment to
store, retrieve, transmit and manipulate data, often
in the context of a business or other enterprise.
IT ROLES
• There are many roles in an IT
or ICT, but most
organizations do not need
someone to fill all the roles
• Roles can be combined
• It can be outsourced
• Name give to IT roles vary
from organization to
organization – “it is
important to understand
the role rather than the title
of the job”
IT ROLES
• IT Consultants and
planners
• IT Operations technicians
(network support)
• IT user support
technicians (help desk
support)
• Network/systems
designers and engineers
• Software designers and
engineers
• Web developers and
producers
POLICIES AND
PROCEDURES
• Policies are general guides to
decision making
• Procedures, on the other
hand, are more specific
statements e.g. SOPs
• You need to have a clear
understanding of any SOPs
relating to your role and
tasks.
• Both policies and procedures
convey to employees and to
other stakeholders the
organization’s interests –
their vision, mission, goals
and methods they intend to
use to achieve these goals
Stakeholders – are the people
or entities with which your
organisation has contact
Enterprise priorities:
• Different classes of clients
• Different services and product lines
• New product/service launches
• Market research
• After sales service
• Customer complaints
KEY
PERFORMANCE
INDICATORS
• Meet the knowledge
requirements of your role
• Keep product knowledge
up-to-date at all times.
• Be able to provide clients
with information without
error
• Demonstrate the necessary
skills to access and input
data.
• Operate the enterprise’s
applications systems and
software correctly and in a
timely manner
LEGISLATIONS
• Equal Opportunity Act 1984
(SA and WA)
• Anti-discriminating Act
1994 (Qld)
• Racial Vilification Act 1996
(SA)
• Telecommunications Act
1997 (Cth)
• Privacy Act 1988 (Cth)
• Workplace health and
safety legislation
• Consumer protection and
sale of goods legislation
“IT IS YOUR RESPONSIBILITY
TO KNOW YOUR OBLIGATIONS
UNDER LEGISLATION AND THE
CONSEQUENCES, BOTH FOR
YOUR ENTERPRISE, AND FOR
YOURSELF, OF NON-
COMPLIANCE”
• Ethics – social
responsibility
• Information
collection records
and disclosure
• Data quality and
security
The following is a brief summary of the conditions you must comply with
when collecting , recording and disclosing information:
• You must not collect information unless the information is necessary for
one or more of the enterprise’s functions or activities.
• You must collect information only by lawful and fair means- not in an
unreasonably intrusive way.
• Upon collecting information from an individual, ensure that the
individual is of:
– The identity of the organisation and how to contact it.
– The fact that they are able to gain access to the information
– The purposes for which the information is collected
– The organisations or its types to which the information might be disclosed
– Any law that requires the particular information to be collected
– The main consequences (if any) for the individual if all or part of the
information is not provided.
• If it is reasonable and practicable to do so, an organisation must collect
personal information about an individual only from that individual
• If an organisation collects personal information about an individual
from someone else, it must take reasonable steps to ensure that the
individual is or has been made aware of this
• The collection of sensitive information
(health, beliefs, sexual preference, religion)
must be directly and demonstrably
related to the purpose of the collection.
• Policies
• Procedures
• Codes of Conduct
Document IT Policies and procedures and determine
whether they are applied in practice
Determine key players within the organisation and their role and
importance
SECTION 2: USE POSITIVE AND
VARIED COMMUNICATION
STRATEGIES WITH ICT CLIENTS
Receive request and enquiries regarding the use of ICT
equipment, operating systems and software from clients and
colleagues in a polite manner
Client enquires and request will be made
via various communication mediums:
• In person (face to face)
• Over the phone
• Email
• Letter
• fax
When greeting the client
always
• Smile
• Remember their name
• Engage them in a friendly
conversation
First impression counts…
ETHICAL BEHAVIOUR
A Code of ethics benefits the organisation
and the individual by
• Reinforcing the organisation's
standard of conduct
• Identifying practices that are and are
not permissible
• Allowing leaders, managers and others
to share experiences and ideas about
what is and what is not an ethical
position
• Developing a shared culture based on
ethics and accountability
Responding appropriately to client and colleague requirements and
identify options
• Oral- Spoken words-
conversation
• Written- written form-
memos- email- business
letter
Verbal
Communication
• Body language
• Gestures
Non-verbal Communication
Listening….
3 Levels of Listening
ACTIVE LISTENING IS SUPPORTED
BY EFFECTIVE QUESTIONING..
Open Questions
• How
• What
• When
• Where
• Why
• Explain
• Describe
• Tell me
Closed Questions
• Do you
• Are you
• Can you
• Will you
• Would you
Icaict202 a   work and communicate effectively in an

More Related Content

What's hot

Chapter 10_dp-pertemuan_15-16
 Chapter 10_dp-pertemuan_15-16 Chapter 10_dp-pertemuan_15-16
Chapter 10_dp-pertemuan_15-16
UNIVERSITAS TEKNOKRAT INDONESIA
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
Infinity Software Solutions
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
AnuMarySunny
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
imehreenx
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - Edinburgh
Rachel Aldighieri
 
Data protection compliance for tech startups
Data protection compliance for tech startupsData protection compliance for tech startups
Data protection compliance for tech startups
EkoInnovationCentre
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
Uc Man
 
Preparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillPreparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection Bill
Symptai Consulting Limited
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
WilmerHale
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
mrmwood
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection update
Rachel Aldighieri
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
UNIVERSITAS TEKNOKRAT INDONESIA
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
sp_krishna
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
Perry Slack
 
Insider Threat Experiences
Insider Threat ExperiencesInsider Threat Experiences
Insider Threat Experiences
Napier University
 
Chapter 8_dp-pertemuan_12-13
 Chapter 8_dp-pertemuan_12-13 Chapter 8_dp-pertemuan_12-13
Chapter 8_dp-pertemuan_12-13
UNIVERSITAS TEKNOKRAT INDONESIA
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)wtidwell
 

What's hot (17)

Chapter 10_dp-pertemuan_15-16
 Chapter 10_dp-pertemuan_15-16 Chapter 10_dp-pertemuan_15-16
Chapter 10_dp-pertemuan_15-16
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - Edinburgh
 
Data protection compliance for tech startups
Data protection compliance for tech startupsData protection compliance for tech startups
Data protection compliance for tech startups
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Preparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillPreparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection Bill
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection update
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Insider Threat Experiences
Insider Threat ExperiencesInsider Threat Experiences
Insider Threat Experiences
 
Chapter 8_dp-pertemuan_12-13
 Chapter 8_dp-pertemuan_12-13 Chapter 8_dp-pertemuan_12-13
Chapter 8_dp-pertemuan_12-13
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
 

Viewers also liked

Safety induction-june-11
Safety induction-june-11Safety induction-june-11
Safety induction-june-11
Nguyên Hà Văn
 
NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?
NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?
NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?
NUS-ISS
 
How to Communicate Effectively
How to Communicate EffectivelyHow to Communicate Effectively
How to Communicate Effectively
Manoj Vanjari (Leadership Coach)
 
Using Emails to Communicate Effectively
Using Emails to Communicate EffectivelyUsing Emails to Communicate Effectively
Using Emails to Communicate Effectively
Chinny Udechukwu
 
7 tips to effectively communicate with the next generation
7 tips to effectively communicate with the next generation7 tips to effectively communicate with the next generation
7 tips to effectively communicate with the next generation
Nick Skytland
 
People communicate effectively throughout the organisation
People communicate effectively throughout the organisationPeople communicate effectively throughout the organisation
People communicate effectively throughout the organisation
pludoni GmbH
 
Slideshare presentation pc
Slideshare presentation pcSlideshare presentation pc
Slideshare presentation pcmcnamara0724
 
How to communicate effectively and get things done
How to communicate effectively and get things doneHow to communicate effectively and get things done
How to communicate effectively and get things done
Sridhar laxman
 
Communicating in Today's Workplace
Communicating in Today's WorkplaceCommunicating in Today's Workplace
Communicating in Today's Workplace
Steve Wise
 
communication in an Organization
communication in an Organizationcommunication in an Organization
communication in an Organization
Amit Kumar
 
Communication Skills Ppt
Communication Skills PptCommunication Skills Ppt
Communication Skills Ppt
Prakash Ramakrishnan
 

Viewers also liked (12)

Safety induction-june-11
Safety induction-june-11Safety induction-june-11
Safety induction-june-11
 
NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?
NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?
NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?
 
How to Communicate Effectively
How to Communicate EffectivelyHow to Communicate Effectively
How to Communicate Effectively
 
Using Emails to Communicate Effectively
Using Emails to Communicate EffectivelyUsing Emails to Communicate Effectively
Using Emails to Communicate Effectively
 
7 tips to effectively communicate with the next generation
7 tips to effectively communicate with the next generation7 tips to effectively communicate with the next generation
7 tips to effectively communicate with the next generation
 
People communicate effectively throughout the organisation
People communicate effectively throughout the organisationPeople communicate effectively throughout the organisation
People communicate effectively throughout the organisation
 
Slideshare presentation pc
Slideshare presentation pcSlideshare presentation pc
Slideshare presentation pc
 
How to communicate effectively and get things done
How to communicate effectively and get things doneHow to communicate effectively and get things done
How to communicate effectively and get things done
 
Communicating in Today's Workplace
Communicating in Today's WorkplaceCommunicating in Today's Workplace
Communicating in Today's Workplace
 
communication in an Organization
communication in an Organizationcommunication in an Organization
communication in an Organization
 
Communication Skills Ppt
Communication Skills PptCommunication Skills Ppt
Communication Skills Ppt
 
effective communication skills ppt
effective communication skills ppteffective communication skills ppt
effective communication skills ppt
 

Similar to Icaict202 a work and communicate effectively in an

Week 4.pptx
Week 4.pptxWeek 4.pptx
Week 4.pptx
JohnLagman3
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
JohnLagman3
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
keturahhazelhurst
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
jeremylockett77
 
Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”
Bloomerang
 
ethcpp02.ppt
ethcpp02.pptethcpp02.ppt
ethcpp02.ppt
faridagushybana
 
2_updated.ppt
2_updated.ppt2_updated.ppt
2_updated.ppt
BandarAlmaslukh1
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
Kathirvel Ayyaswamy
 
GDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedGDPR Practicalities - The Data Shed
GDPR Practicalities - The Data Shed
Stewart Norriss
 
Chp 03 ethics and ethical analysis (shared) -
Chp 03   ethics and ethical analysis (shared) - Chp 03   ethics and ethical analysis (shared) -
Chp 03 ethics and ethical analysis (shared) -
YUSRA FERNANDO
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
Raymond Gao
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
Tom Walker
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
JagdeepSingh394
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptx
HillaryObomighie
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02stanbridge
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
SecurityScorecard
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
Fionnuala Hendrick
 

Similar to Icaict202 a work and communicate effectively in an (20)

Week 4.pptx
Week 4.pptxWeek 4.pptx
Week 4.pptx
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”
 
ethcpp02.ppt
ethcpp02.pptethcpp02.ppt
ethcpp02.ppt
 
2_updated.ppt
2_updated.ppt2_updated.ppt
2_updated.ppt
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
GDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedGDPR Practicalities - The Data Shed
GDPR Practicalities - The Data Shed
 
Chp 03 ethics and ethical analysis (shared) -
Chp 03   ethics and ethical analysis (shared) - Chp 03   ethics and ethical analysis (shared) -
Chp 03 ethics and ethical analysis (shared) -
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
Ppt
PptPpt
Ppt
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Icaict202 a work and communicate effectively in an

  • 1. ICAICT202A - WORK AND COMMUNICATE EFFECTIVELY IN AN IT ENVIRONMENT
  • 2. • Introduction • ICT Roles • Policies and Procedures • KPIs • Legislations • Positive Communication Strategies • Written and Oral Communication
  • 3. Information technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise.
  • 4. IT ROLES • There are many roles in an IT or ICT, but most organizations do not need someone to fill all the roles • Roles can be combined • It can be outsourced • Name give to IT roles vary from organization to organization – “it is important to understand the role rather than the title of the job”
  • 5. IT ROLES • IT Consultants and planners • IT Operations technicians (network support) • IT user support technicians (help desk support) • Network/systems designers and engineers • Software designers and engineers • Web developers and producers
  • 6. POLICIES AND PROCEDURES • Policies are general guides to decision making • Procedures, on the other hand, are more specific statements e.g. SOPs • You need to have a clear understanding of any SOPs relating to your role and tasks. • Both policies and procedures convey to employees and to other stakeholders the organization’s interests – their vision, mission, goals and methods they intend to use to achieve these goals
  • 7. Stakeholders – are the people or entities with which your organisation has contact Enterprise priorities: • Different classes of clients • Different services and product lines • New product/service launches • Market research • After sales service • Customer complaints
  • 8. KEY PERFORMANCE INDICATORS • Meet the knowledge requirements of your role • Keep product knowledge up-to-date at all times. • Be able to provide clients with information without error • Demonstrate the necessary skills to access and input data. • Operate the enterprise’s applications systems and software correctly and in a timely manner
  • 9. LEGISLATIONS • Equal Opportunity Act 1984 (SA and WA) • Anti-discriminating Act 1994 (Qld) • Racial Vilification Act 1996 (SA) • Telecommunications Act 1997 (Cth) • Privacy Act 1988 (Cth) • Workplace health and safety legislation • Consumer protection and sale of goods legislation
  • 10. “IT IS YOUR RESPONSIBILITY TO KNOW YOUR OBLIGATIONS UNDER LEGISLATION AND THE CONSEQUENCES, BOTH FOR YOUR ENTERPRISE, AND FOR YOURSELF, OF NON- COMPLIANCE” • Ethics – social responsibility • Information collection records and disclosure • Data quality and security
  • 11. The following is a brief summary of the conditions you must comply with when collecting , recording and disclosing information: • You must not collect information unless the information is necessary for one or more of the enterprise’s functions or activities. • You must collect information only by lawful and fair means- not in an unreasonably intrusive way. • Upon collecting information from an individual, ensure that the individual is of: – The identity of the organisation and how to contact it. – The fact that they are able to gain access to the information – The purposes for which the information is collected – The organisations or its types to which the information might be disclosed – Any law that requires the particular information to be collected – The main consequences (if any) for the individual if all or part of the information is not provided.
  • 12. • If it is reasonable and practicable to do so, an organisation must collect personal information about an individual only from that individual • If an organisation collects personal information about an individual from someone else, it must take reasonable steps to ensure that the individual is or has been made aware of this • The collection of sensitive information (health, beliefs, sexual preference, religion) must be directly and demonstrably related to the purpose of the collection.
  • 13. • Policies • Procedures • Codes of Conduct Document IT Policies and procedures and determine whether they are applied in practice
  • 14. Determine key players within the organisation and their role and importance
  • 15.
  • 16. SECTION 2: USE POSITIVE AND VARIED COMMUNICATION STRATEGIES WITH ICT CLIENTS
  • 17. Receive request and enquiries regarding the use of ICT equipment, operating systems and software from clients and colleagues in a polite manner Client enquires and request will be made via various communication mediums: • In person (face to face) • Over the phone • Email • Letter • fax
  • 18. When greeting the client always • Smile • Remember their name • Engage them in a friendly conversation First impression counts…
  • 19.
  • 20. ETHICAL BEHAVIOUR A Code of ethics benefits the organisation and the individual by • Reinforcing the organisation's standard of conduct • Identifying practices that are and are not permissible • Allowing leaders, managers and others to share experiences and ideas about what is and what is not an ethical position • Developing a shared culture based on ethics and accountability
  • 21. Responding appropriately to client and colleague requirements and identify options
  • 22. • Oral- Spoken words- conversation • Written- written form- memos- email- business letter Verbal Communication
  • 23. • Body language • Gestures Non-verbal Communication
  • 25.
  • 26. ACTIVE LISTENING IS SUPPORTED BY EFFECTIVE QUESTIONING.. Open Questions • How • What • When • Where • Why • Explain • Describe • Tell me Closed Questions • Do you • Are you • Can you • Will you • Would you