SlideShare a Scribd company logo
1 of 27
ICAICT202A - WORK AND
COMMUNICATE
EFFECTIVELY IN AN IT
ENVIRONMENT
• Introduction
• ICT Roles
• Policies and Procedures
• KPIs
• Legislations
• Positive Communication
Strategies
• Written and Oral Communication
Information technology (IT) is the application of
computers and telecommunications equipment to
store, retrieve, transmit and manipulate data, often
in the context of a business or other enterprise.
IT ROLES
• There are many roles in an IT
or ICT, but most
organizations do not need
someone to fill all the roles
• Roles can be combined
• It can be outsourced
• Name give to IT roles vary
from organization to
organization – “it is
important to understand
the role rather than the title
of the job”
IT ROLES
• IT Consultants and
planners
• IT Operations technicians
(network support)
• IT user support
technicians (help desk
support)
• Network/systems
designers and engineers
• Software designers and
engineers
• Web developers and
producers
POLICIES AND
PROCEDURES
• Policies are general guides to
decision making
• Procedures, on the other
hand, are more specific
statements e.g. SOPs
• You need to have a clear
understanding of any SOPs
relating to your role and
tasks.
• Both policies and procedures
convey to employees and to
other stakeholders the
organization’s interests –
their vision, mission, goals
and methods they intend to
use to achieve these goals
Stakeholders – are the people
or entities with which your
organisation has contact
Enterprise priorities:
• Different classes of clients
• Different services and product lines
• New product/service launches
• Market research
• After sales service
• Customer complaints
KEY
PERFORMANCE
INDICATORS
• Meet the knowledge
requirements of your role
• Keep product knowledge
up-to-date at all times.
• Be able to provide clients
with information without
error
• Demonstrate the necessary
skills to access and input
data.
• Operate the enterprise’s
applications systems and
software correctly and in a
timely manner
LEGISLATIONS
• Equal Opportunity Act 1984
(SA and WA)
• Anti-discriminating Act
1994 (Qld)
• Racial Vilification Act 1996
(SA)
• Telecommunications Act
1997 (Cth)
• Privacy Act 1988 (Cth)
• Workplace health and
safety legislation
• Consumer protection and
sale of goods legislation
“IT IS YOUR RESPONSIBILITY
TO KNOW YOUR OBLIGATIONS
UNDER LEGISLATION AND THE
CONSEQUENCES, BOTH FOR
YOUR ENTERPRISE, AND FOR
YOURSELF, OF NON-
COMPLIANCE”
• Ethics – social
responsibility
• Information
collection records
and disclosure
• Data quality and
security
The following is a brief summary of the conditions you must comply with
when collecting , recording and disclosing information:
• You must not collect information unless the information is necessary for
one or more of the enterprise’s functions or activities.
• You must collect information only by lawful and fair means- not in an
unreasonably intrusive way.
• Upon collecting information from an individual, ensure that the
individual is of:
– The identity of the organisation and how to contact it.
– The fact that they are able to gain access to the information
– The purposes for which the information is collected
– The organisations or its types to which the information might be disclosed
– Any law that requires the particular information to be collected
– The main consequences (if any) for the individual if all or part of the
information is not provided.
• If it is reasonable and practicable to do so, an organisation must collect
personal information about an individual only from that individual
• If an organisation collects personal information about an individual
from someone else, it must take reasonable steps to ensure that the
individual is or has been made aware of this
• The collection of sensitive information
(health, beliefs, sexual preference, religion)
must be directly and demonstrably
related to the purpose of the collection.
• Policies
• Procedures
• Codes of Conduct
Document IT Policies and procedures and determine
whether they are applied in practice
Determine key players within the organisation and their role and
importance
SECTION 2: USE POSITIVE AND
VARIED COMMUNICATION
STRATEGIES WITH ICT CLIENTS
Receive request and enquiries regarding the use of ICT
equipment, operating systems and software from clients and
colleagues in a polite manner
Client enquires and request will be made
via various communication mediums:
• In person (face to face)
• Over the phone
• Email
• Letter
• fax
When greeting the client
always
• Smile
• Remember their name
• Engage them in a friendly
conversation
First impression counts…
ETHICAL BEHAVIOUR
A Code of ethics benefits the organisation
and the individual by
• Reinforcing the organisation's
standard of conduct
• Identifying practices that are and are
not permissible
• Allowing leaders, managers and others
to share experiences and ideas about
what is and what is not an ethical
position
• Developing a shared culture based on
ethics and accountability
Responding appropriately to client and colleague requirements and
identify options
• Oral- Spoken words-
conversation
• Written- written form-
memos- email- business
letter
Verbal
Communication
• Body language
• Gestures
Non-verbal Communication
Listening….
3 Levels of Listening
ACTIVE LISTENING IS SUPPORTED
BY EFFECTIVE QUESTIONING..
Open Questions
• How
• What
• When
• Where
• Why
• Explain
• Describe
• Tell me
Closed Questions
• Do you
• Are you
• Can you
• Will you
• Would you
Icaict202 a   work and communicate effectively in an

More Related Content

What's hot

Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesInfinity Software Solutions
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - EdinburghRachel Aldighieri
 
Data protection compliance for tech startups
Data protection compliance for tech startupsData protection compliance for tech startups
Data protection compliance for tech startupsEkoInnovationCentre
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
Preparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillPreparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillSymptai Consulting Limited
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection updateRachel Aldighieri
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)wtidwell
 

What's hot (17)

Chapter 10_dp-pertemuan_15-16
 Chapter 10_dp-pertemuan_15-16 Chapter 10_dp-pertemuan_15-16
Chapter 10_dp-pertemuan_15-16
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - Edinburgh
 
Data protection compliance for tech startups
Data protection compliance for tech startupsData protection compliance for tech startups
Data protection compliance for tech startups
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Preparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillPreparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection Bill
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection update
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Insider Threat Experiences
Insider Threat ExperiencesInsider Threat Experiences
Insider Threat Experiences
 
Chapter 8_dp-pertemuan_12-13
 Chapter 8_dp-pertemuan_12-13 Chapter 8_dp-pertemuan_12-13
Chapter 8_dp-pertemuan_12-13
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
 

Viewers also liked

NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?
NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?
NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?NUS-ISS
 
Using Emails to Communicate Effectively
Using Emails to Communicate EffectivelyUsing Emails to Communicate Effectively
Using Emails to Communicate EffectivelyChinny Udechukwu
 
7 tips to effectively communicate with the next generation
7 tips to effectively communicate with the next generation7 tips to effectively communicate with the next generation
7 tips to effectively communicate with the next generationNick Skytland
 
People communicate effectively throughout the organisation
People communicate effectively throughout the organisationPeople communicate effectively throughout the organisation
People communicate effectively throughout the organisationpludoni GmbH
 
Slideshare presentation pc
Slideshare presentation pcSlideshare presentation pc
Slideshare presentation pcmcnamara0724
 
How to communicate effectively and get things done
How to communicate effectively and get things doneHow to communicate effectively and get things done
How to communicate effectively and get things doneSridhar laxman
 
Communicating in Today's Workplace
Communicating in Today's WorkplaceCommunicating in Today's Workplace
Communicating in Today's WorkplaceSteve Wise
 
communication in an Organization
communication in an Organizationcommunication in an Organization
communication in an OrganizationAmit Kumar
 

Viewers also liked (12)

Safety induction-june-11
Safety induction-june-11Safety induction-june-11
Safety induction-june-11
 
NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?
NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?
NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?
 
How to Communicate Effectively
How to Communicate EffectivelyHow to Communicate Effectively
How to Communicate Effectively
 
Using Emails to Communicate Effectively
Using Emails to Communicate EffectivelyUsing Emails to Communicate Effectively
Using Emails to Communicate Effectively
 
7 tips to effectively communicate with the next generation
7 tips to effectively communicate with the next generation7 tips to effectively communicate with the next generation
7 tips to effectively communicate with the next generation
 
People communicate effectively throughout the organisation
People communicate effectively throughout the organisationPeople communicate effectively throughout the organisation
People communicate effectively throughout the organisation
 
Slideshare presentation pc
Slideshare presentation pcSlideshare presentation pc
Slideshare presentation pc
 
How to communicate effectively and get things done
How to communicate effectively and get things doneHow to communicate effectively and get things done
How to communicate effectively and get things done
 
Communicating in Today's Workplace
Communicating in Today's WorkplaceCommunicating in Today's Workplace
Communicating in Today's Workplace
 
communication in an Organization
communication in an Organizationcommunication in an Organization
communication in an Organization
 
Communication Skills Ppt
Communication Skills PptCommunication Skills Ppt
Communication Skills Ppt
 
effective communication skills ppt
effective communication skills ppteffective communication skills ppt
effective communication skills ppt
 

Similar to Icaict202 a work and communicate effectively in an

3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptxJohnLagman3
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docxketurahhazelhurst
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docxjeremylockett77
 
Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”Bloomerang
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology Kathirvel Ayyaswamy
 
GDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedGDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedStewart Norriss
 
Chp 03 ethics and ethical analysis (shared) -
Chp 03   ethics and ethical analysis (shared) - Chp 03   ethics and ethical analysis (shared) -
Chp 03 ethics and ethical analysis (shared) - YUSRA FERNANDO
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and EnterpriseRaymond Gao
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible DataTom Walker
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issuesJagdeepSingh394
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxHillaryObomighie
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02stanbridge
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 

Similar to Icaict202 a work and communicate effectively in an (20)

Week 4.pptx
Week 4.pptxWeek 4.pptx
Week 4.pptx
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”
 
ethcpp02.ppt
ethcpp02.pptethcpp02.ppt
ethcpp02.ppt
 
2_updated.ppt
2_updated.ppt2_updated.ppt
2_updated.ppt
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
GDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedGDPR Practicalities - The Data Shed
GDPR Practicalities - The Data Shed
 
Chp 03 ethics and ethical analysis (shared) -
Chp 03   ethics and ethical analysis (shared) - Chp 03   ethics and ethical analysis (shared) -
Chp 03 ethics and ethical analysis (shared) -
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
Ppt
PptPpt
Ppt
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 

Recently uploaded

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Recently uploaded (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Icaict202 a work and communicate effectively in an

  • 1. ICAICT202A - WORK AND COMMUNICATE EFFECTIVELY IN AN IT ENVIRONMENT
  • 2. • Introduction • ICT Roles • Policies and Procedures • KPIs • Legislations • Positive Communication Strategies • Written and Oral Communication
  • 3. Information technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise.
  • 4. IT ROLES • There are many roles in an IT or ICT, but most organizations do not need someone to fill all the roles • Roles can be combined • It can be outsourced • Name give to IT roles vary from organization to organization – “it is important to understand the role rather than the title of the job”
  • 5. IT ROLES • IT Consultants and planners • IT Operations technicians (network support) • IT user support technicians (help desk support) • Network/systems designers and engineers • Software designers and engineers • Web developers and producers
  • 6. POLICIES AND PROCEDURES • Policies are general guides to decision making • Procedures, on the other hand, are more specific statements e.g. SOPs • You need to have a clear understanding of any SOPs relating to your role and tasks. • Both policies and procedures convey to employees and to other stakeholders the organization’s interests – their vision, mission, goals and methods they intend to use to achieve these goals
  • 7. Stakeholders – are the people or entities with which your organisation has contact Enterprise priorities: • Different classes of clients • Different services and product lines • New product/service launches • Market research • After sales service • Customer complaints
  • 8. KEY PERFORMANCE INDICATORS • Meet the knowledge requirements of your role • Keep product knowledge up-to-date at all times. • Be able to provide clients with information without error • Demonstrate the necessary skills to access and input data. • Operate the enterprise’s applications systems and software correctly and in a timely manner
  • 9. LEGISLATIONS • Equal Opportunity Act 1984 (SA and WA) • Anti-discriminating Act 1994 (Qld) • Racial Vilification Act 1996 (SA) • Telecommunications Act 1997 (Cth) • Privacy Act 1988 (Cth) • Workplace health and safety legislation • Consumer protection and sale of goods legislation
  • 10. “IT IS YOUR RESPONSIBILITY TO KNOW YOUR OBLIGATIONS UNDER LEGISLATION AND THE CONSEQUENCES, BOTH FOR YOUR ENTERPRISE, AND FOR YOURSELF, OF NON- COMPLIANCE” • Ethics – social responsibility • Information collection records and disclosure • Data quality and security
  • 11. The following is a brief summary of the conditions you must comply with when collecting , recording and disclosing information: • You must not collect information unless the information is necessary for one or more of the enterprise’s functions or activities. • You must collect information only by lawful and fair means- not in an unreasonably intrusive way. • Upon collecting information from an individual, ensure that the individual is of: – The identity of the organisation and how to contact it. – The fact that they are able to gain access to the information – The purposes for which the information is collected – The organisations or its types to which the information might be disclosed – Any law that requires the particular information to be collected – The main consequences (if any) for the individual if all or part of the information is not provided.
  • 12. • If it is reasonable and practicable to do so, an organisation must collect personal information about an individual only from that individual • If an organisation collects personal information about an individual from someone else, it must take reasonable steps to ensure that the individual is or has been made aware of this • The collection of sensitive information (health, beliefs, sexual preference, religion) must be directly and demonstrably related to the purpose of the collection.
  • 13. • Policies • Procedures • Codes of Conduct Document IT Policies and procedures and determine whether they are applied in practice
  • 14. Determine key players within the organisation and their role and importance
  • 15.
  • 16. SECTION 2: USE POSITIVE AND VARIED COMMUNICATION STRATEGIES WITH ICT CLIENTS
  • 17. Receive request and enquiries regarding the use of ICT equipment, operating systems and software from clients and colleagues in a polite manner Client enquires and request will be made via various communication mediums: • In person (face to face) • Over the phone • Email • Letter • fax
  • 18. When greeting the client always • Smile • Remember their name • Engage them in a friendly conversation First impression counts…
  • 19.
  • 20. ETHICAL BEHAVIOUR A Code of ethics benefits the organisation and the individual by • Reinforcing the organisation's standard of conduct • Identifying practices that are and are not permissible • Allowing leaders, managers and others to share experiences and ideas about what is and what is not an ethical position • Developing a shared culture based on ethics and accountability
  • 21. Responding appropriately to client and colleague requirements and identify options
  • 22. • Oral- Spoken words- conversation • Written- written form- memos- email- business letter Verbal Communication
  • 23. • Body language • Gestures Non-verbal Communication
  • 25.
  • 26. ACTIVE LISTENING IS SUPPORTED BY EFFECTIVE QUESTIONING.. Open Questions • How • What • When • Where • Why • Explain • Describe • Tell me Closed Questions • Do you • Are you • Can you • Will you • Would you