Friday, September 28, 2007

• relevant competency standards and assessment processes

What is the Australian Qualifications Framework?
The Australian Qualifications Framework (commonly known as the AQF) is a unified system of national qualifications in schools, vocational education and training (TAFEs and private providers) and the higher education sector (mainly universities).
The qualifications are:
Senior Secondary Certificate of Education;
Certificate I;
Certificate II;
Certificate III;
Certificate IV;
Diploma, Advanced Diploma;
Associate Degree;
Bachelor Degree;
Vocational Graduate Certificate;
Vocational Graduate Diploma;
Graduate Certificate;
Graduate Diploma;
Masters Degree;
Doctoral Degree.


1. Element

Identify own learning needs for skill development

Performance criteria
1.1
Personal learning needs and skill gaps are self assessed
1.2
Advice on learning needs is provided to relevant personnel
1.3
Opportunities for undertaking personal skill development activities are identified and planned in liaison with work groups and relevant personnel

2. Undertake personal skill development

Performance criteria
2.1
Appropriate opportunities provided by the workplace are identified
2.2
Opportunities are identified to use appropriate new skills in workplace activities
2.3
Coaching / mentoring advice is followed through in work activities

3. Monitor learning effectiveness

Performance criteria
3.1
Feedback from individuals or colleagues is used to identify future learning opportunities
3.2
Where a final assessment process is carried out, the outcomes are reviewed and further learning needs are identified.
3.3
Suggestions for improving learning opportunities and assessment processes are provided to appropriate personnel

organisation's training policies, plans and procedures

Train and support staff who implement HR processes

Overview
Support and training for the people who implement HR processes is critical - the best procedures are meaningless unless people have the knowledge, skills and commitment to implement them. That includes line managers, team leaders, external HR service providers and internal HR officers.
This resource outlines support and training needs you should consider as the HR General Manager, methods for identifying these needs, and methods and tools for providing training and support.

Key terms

Coaching
A form on on-the-job training, usually in a one-to-one situation; may be an action in an individual learning plan.

Mentoring
A form of coaching by role modelling; usually less structured than coaching and occurring over a longer period of time.


Performance gap
The difference between required performance and actual performance; may be further analysed by a knowledge gap analysis, or a skills gap analysis.

Performance management
A process for creating a shared understanding of what an individual is to achieve and managing and developing individuals to achieve in both the short and longer term.

Training needs analysis
TNA; a formal process of identifying training needs, usually in term of a group of people and/or for a process.

Friday, September 21, 2007

Business Legislation Notes

The relevant legislation from all levels of government that affects business operation:
In New South Wales there are some regulatory and legal requirements involved in establishing a business. These relate to identifying the business structure, registering the business and obtaining the relevant licences, as well as meeting your legal obligations with regard to commercial leases and employing staff.

Occupational Health and Safety
Safety and Workers' CompensationMinimum standards exist for physical working conditions to ensure occupational health and safety (OH&S). It is compulsory for all employers to insure for workers compensation liability. Anyone employing others must obtain an insurance policy that covers the full amount of the employer's liability under the Workplace Injury Management and Workers Compensation Act 1998 and the Workers Compensation Act 1987 in respect of all workers employed. For more information, refer to the NSW Workcover website at www.workcover.nsw.gov.au or ph 13 10 50 in NSW.

Workplace procedures and work instructions may include:
· procedures for hazard and risk identification and for avoiding or minimising environmental risks
· signs e.g. toxic or hazardous chemicals
· procedures to be followed if spills or accidents occur
· written or verbal procedures and instructions
· hazard and incident reporting procedures
· environmental reporting procedures where applicable
Environmental hazards or risks may include but are not restricted to:
· spills, leaks, pollution
· planned and unplanned emissions
· accidents

Environmental issues
Environmental issues may include:
· environmentally sustainable work practices
· reduction of waste
· minimisation of environmental risks and maximisation of opportunities to improve business environmental performance and to promote more efficient consumption of natural resources

Equal Employment opportunity
What is Equal Employment Opportunity?
Equal Employment Opportunity (EEO) is about:
ensuring a diverse and skilled workforce
making sure that workplaces have fair work practices and behaviours
improving employment access and participation by EEO groups
NSW Public Sector agencies and universities must ensure that policies and procedures are non-discriminatory and contribute to EEO outcomes. This means having workplace policies, practices ad behaviours that are fair and do not disadvantage people because they are attributed to particular groups.


Industrial relations and anti-discrimination
http://www.austlii.edu.au/au/legis/nsw/consol_act/ira1996242/s169.html

Australian Computer Society Code of Ethics

To uphold and advance the honour, dignity and effectiveness of the profession of information technology and in keeping with high standards of competence and ethical conduct, a member must:
(a) be honest, forthright and impartial
(b) loyally serve the community
(c) strive to increase the competence and prestige of the profession
(d) use special knowledge and skill for the advancement of human welfare.

Legal requirements

http://www.business.gov.au/Business+Entry+Point/How-to+guides/Starting+a+business/Starting+a+new+business/What+are+the+legal+requirements.htm


One of the first things you need to find out when you're starting out is what laws apply to your new business. You may wish to consult a legal professional to help you with all the legal requirements that you must comply with, such as licences and registrations, contracts and leases.
If you need legal advice on a business issue, then the online Small business legal issues guide may help. It covers problems you may encounter such as contracts, employment, fair trading, leases, insurance, credit and debt recovery, finance and tax.
More information...
Read the Small business legal issues guide.
Read the Privacy for Small Business publication.
Refer to the Working with contracts guide for assistance with writing up business contracts.

Stakeholder communication

Stakeholder Communication Example 1 GSK @http://www.gsk.com/investors/reps02/EHS02/GSKehs-27.htm

Stakeholder Communication Example 2 Toshiba @ http://www.toshiba.co.jp/csr/en/communication/index.htm

Project management

Project management software
Project Management @ http://management.about.com/cs/projectmanagement/a/PM101.htm

A successful Project Manager must simultaneously manage the four basic elements of a project: resources, time, money, and most importantly, scope. All these elements are interrelated. Each must be managed effectively. All must be managed together if the project, and the project manager, is to be a success.
ResourcesPeople, equipment, material
TimeTask durations, dependencies, critical path
MoneyCosts, contingencies, profit
ScopeProject size, goals, requirements

Storage Media security systems

Thoughts on the six commandments of ethical data management at http://www.cio.com/archive/070102/pledge.html. -paraphrased in Appendix 5

Storage Media security systems @ http://www.neoscale.com/English/Solutions/Whitepapers.html


Achieving PCI Compliance with Storage Security Solutions
Executive Summary
While hackers beating against the corporate firewall have captured the headlines, the breaches that are genuinely compromising business stability and consumer confidence are hitting data while in storage, known as data-at-rest.
Businesses have made significant strides in protecting their networks from external intrusion, but today's vulnerability is located in data storage. As banks, credit unions and companies strive to meet PCI compliance standards, they must tackle the complex issue of protecting data-at-rest through encryption, selecting solutions that are designed for the distributed, growing enterprise, provide the most efficient management of encryption keys, and introduce the least amount of operation disruption.
This white paper will examine the current security situation, outline the pros and cons of several storage security alternatives, and provide brief highlights of technical and operational best practices in addressing this security issue.


Privacy Compliance – Tape Media Protection and Data Privacy Issues
Executive Summary
Data privacy compliance generally has the following parameters:(i) only authorized user(s)/system(s) can access and modify only certain information that they are authorized and necessary to access, (ii) the privacy of the information is maintained, (iii) the integrity of the information is maintained, and (iv) auditable records are maintained which attests said access, privacy and integrity. When systems and storage resources have discrete access processes, organizations can more easily implement security measures which demonstrate compliance. Even so, organizations need to minimize operational risks. As resources, connections, access and media become more numerous and distributed, the complexity towards adhering to privacy guidelines becomes more challenging– this is especially true with distributed backup and business continuity functions. This paper explores the domestic HIPAA, GLBA, and SB-1386, EC Directives and Basel II privacy mandates in regards to the use of encryption as part of securing the archive process.

Server access security procedures

Server access security procedures @ http://www.thawte.com/


Secure a Web Server
Manage Multiple Certificates
Secure Your Code
Secure Your E-mail
Offer the Highest Possible Encryption

Federal and State privacy legislation

Federal and State privacy legislation @
http://www.privacy.gov.au/privacy_rights/laws/

New South Wales
The Privacy and Personal Information Protection Act 1998 (PPIP Act) deals with how all New South Wales public sector agencies manage personal information. It also sets out the role of the Office of the New South Wales Privacy Commissioner.
While the PPIP Act applies primarily to the New South Wale public sector, it gives the New South Wales Privacy Commissioner the power to investigate and conciliate privacy breaches by organisations and individuals who are not public sector agencies.
The Health Records and Information Privacy Act 2002 (HRIP Act) came into effect on 1 September 2004. It governs the handling of health information in the public sector, and it also seeks to regulate the handling of health information in the private sector in New South Wales. In December 2004 Privacy NSW developed four statutory guidelines under the HRIP Act. These guidelines are legally binding documents that define the scope of particular exemptions in the health privacy principles.
Relevant New South Wales laws include:
Privacy and Personal Information Protection Act 1998
Health Records and Information Privacy Act 2002
Freedom of Information Act 1989
State Records Act 1998
Criminal Records Act 1991 (Spent Convictions)
Listening Devices Act 1984
Workplace Surveillance Act 2005
Telecommunications (Interception and Access) (New South Wales) Act 1987
Access to Neighbouring Land Act 2000, esp. s.16 and s.26.
Crimes (Forensic Procedures) ACT 2000

Server operating systems

Server operating systems @ http://www.pcworld.idg.com.au/index.php/id;1327251104and http://www.osdata.com/

What is a server operating system?
Server OSes are designed from the ground up to provide platforms for multi-user, frequently business-critical, networked applications. As such, the focus of such operating systems tends to be security, stability and collaboration, rather than user interface.
Server OSes provide a platform for multi-user applications, and most come bundled with a batch of common server applications, such as Web servers, e-mail agents and terminal services.

This web site compares and contrasts operating systems. It originally started out on a small server in the engineering department of Ohio State University to answer a single question: “On technical considerations only, how does Rhapsody (also known as Mac OS X Server) stack up as a server operating system (especially in comparison to Windows NT)?” The web site now compares and contrasts server operating systems and will in the near future expand to compare other kinds of operating systems.

Information architecture

Creating site navigation;
http://toolboxes.flexiblelearning.net.au/demosites/series4/410/ia_nav/webdevmag/frameset_wdm.html

Designing effective instruction Reference: http://toolboxes.flexiblelearning.net.au/demosites/series4/410/ia_id/webdevmag/frameset_wdm.html


Building instructional materials;
http://toolboxes.flexiblelearning.net.au/demosites/series4/410/ia_id2/webdevmag/frameset_wdm.html

Measuring performance and usability;
http://toolboxes.flexiblelearning.net.au/demosites/series4/410/ia_perf/webdevmag/frameset_wdm.html

Building accessible websites:
http://toolboxes.flexiblelearning.net.au/demosites/series4/410/ia_access/webdevmag/frameset_wdm.html

reference ANTA TOOLBOX 410
http://toolboxes.flexiblelearning.net.au/demosites/series4/410/ia_access/webdevmag/frameset_wdm.html

Website architecture

website architecture: http://en.wikipedia.org/wiki/Website_architecture

Website architecture is an approach to the design and planning of websites which, like architecture itself involves technical, aesthetic and functional criteria. As in traditional architecture, the focus is properly on the user and on user requirements. This requires particular attention to web content, a business plan, usability, interaction design, information architecture and web design. For effective Search Engine Optimisation it is necessary to have an appreciation of how a single website relates to the World Wide Web.
Since web content planning, design and management come within the scope of design methods, the traditional Vitruvian aims of Commodity, Firmness and Delight can guide the architecture of websites, as they do physical architecture and other design disciplines. Website architecture is coming within the scope of Aesthetics and Critical Theory and this trend may accelerate with the advent of the Semantic Web and Web 2.0. Both ideas emphasise the structural aspects of information. Structuralism is an approach to knowledge which has influenced a number of academic disciplines including aesthetics, critical theory and postmodernism. Web 2.0, because it involves user-generated content, direct the website architect's attention to the structural aspects of information.
"Website architecture" has the potential to be a term used for the intellectual discipline of organizing website content. "Web design", by way of contrast, describes the practical tasks, part-graphic and part-technical, of designing and publishing a website. The distinction compares to that between the task of editing a newspaper or magazine and its graphic design and printing. But the link between editorial and production activities is much closer for web publications than for print publications.