Bussinestool - can be considered as any asset the help assist organization to achieve it's stated aims and objectives
Bussinestools
Each business will need to develop criteria so as to identify which tools are to be monitored and therefore controlled to ensure that time and effort devoted to managing the proper and important tools
EXAMPLES OF COMMON BUSINESS TOOLS
DIGITALCAMERA
MOBILETELEPHONE
PAGERS
NOTEBOOK
BATTERIES
DICTATIONMACHINES
MICE
KEYBOARDS
BROCHURES
INFORMATION
KNOWLEDGE
FACSIMILE
MANUAL
LANDLINETELEPHONE
SOFTWARE
E-MAIL
THEBUSINESSWEBSITE
Once indentified, the tools need to be considered as a group and it is logical to provide a name for the list that recognises the importance of the group. Possible names could be:
Portableandattractivetool
Portableandattractivetool
This stated that the items is portable and probably does not have fixed location. It also states they are attractive, meaning they could be a target for theft or excessive use.
SignificantSmallItems
This is very similar as the item is small so that can easily lost and they are significant to the business.
TheRegister
A register of the tools that are owned and available within the business
Theregister
Needs sufficient information to ensure the tools are locatable and identifiable
Ensures the correct tool is identified
Storingthedetails
1. Paper approach where all the details are recorded in a book - an asset register
2. Stored under the control of an officer of the business
TOOL - Each tool needs to be described and identified, and this is especially important where there are multiples of the same tools.
Rules can be established for the various types of assets, but the description could include one or more the following:
Brandormanufacturer
Modelorname
Purchasedatesupplier
Warrantyexpirydate
Purchaseprice
Department
Serialnumber
Assetsnumber
Calour
Warrantyresponsibility
Other non attached items that form tools such as:
Cables
Power supply
Lens
Memory
SerialNumber
These are generally unique so that no to serial number should be the same and they will indentify each other.
AssetsNumber
This advantage that the number can be created for each assets that has identification within the number
Barcodes
Can be easily scanned to maintain records. These advantages of certainty and the elimination of data entry error.
Radio frequency identification tags
These are electronic tags can be attached to items that will communicate with electronic scanning system that allow individual item to be identified while in the groups
Storagelocation
A desk drawer, cupboard storage locker and cabinet. The location needs to indentifiable so there can certainty as to the tools correct storage location.
Thebusinesswedsite
Is an online platform that represents a company organization on the internet. It serves as a digital storefront where potential customers can learn about business, browse product or services, and make purchases
Software
Is a set of instructions, data programs used to operate computers and execute specific task. It is opposite of hardware which describes that physical aspects of a computer.
Wiki
Is a web based collaborative platform that enables users to store, create and motify content in an organized manner
Socialnetworking
The practice of using social network such as Facebook or LinkedIn, to form connection and communicate with other online.
Landlinetelephone
A telephone that transmits signal s converted from audio data through physical Media, such as wire or fibre optic cable
Email
Is a digital communication method that uses electronic devices to deliver message
Obtain and maintain bussines tools required to support workplace activities
Roster
Damage
Roster
Allows users to plan for access and allow planning for events when the tool is being used by another.
Damage
The business will need to establish rules and responsibilities for tools that are damage as results of negligent behavior by the user.
Storage business tools in accordance with enterprise procedures and to reduce theft and fraudulent activity
Security tools
Swipecardaccess
System can record each person that accesses the storage area and also the users that take the tools from the storage location
Password
-Protection to restrict access
-When considering access knowledge or information users can have security access attached to log in profile.
Security camera
Can record handling and use of the tool in the area
Police check
Individual may apply or authorise other to perform a police check that have been made against a person
Employmentcontracts
Every employee is employed on the contract that sets out the term and condition of their employment including such terms as holiday, wages, hours of work.
Privacy
Determine the nurture of the information that an employee can publish about the business and the guest of the business.
Internet
Could include amount of time that is spend on private use such as personal emails, accessing non business related sites.
Lockableaccess
Can be used to prevent access and enhance the possibility of the tool being available got later use
Audit
Is the assessment of the processes that are in a place on how the business tools are monitored, controlled and use.
Stocktakes
Can be performed on consumable resources to ensure there sufficient resources to meet the operational needs.
Information
An important business tool in modern organization. Like other tools it needs protection from unauthorized use and access.
Legalimplications
Where information is disclosed various privacy acts and controls can impose penalties for the business and the individual for acts that breach the act.
Other methods of security include a selection of the following :