| Week 1 | T&L Activities:4.1 Legislation4.1.1 Understand the key points and implications to employers of the relevant health and safety legislation:Health and Safety at Work Act:The health and safety at work regulations that are currently in place within the UK is held in high regard globally as legislation, to the point that other countries use this legislation as a benchmark for their own. Created in 1974 the regulation was created as a result of a significant amount of harm and death related to employees undertaking their work roles and responsibilities. The government established a group of people chaired by Lord Robens to create a report on safety and health at work. Lord Robens was tasked to create legislation that fit all business types regardless of size, from self-employed to large organisations.
o key points: – provide a safe working environment – ensure staff are properly trained – adequate welfare provision – provide relevant information, instruction and supervision
You have been tasked with creating an engaging activity for 16-18 year olds on the Health and Safety at Work etc Act 1974, specifically linked to the digital support services sector. This activity should last 25-30 minutes and involve both a learning element and interactive participation. Below is an example of how this activity could be structured: Manual handling operations:o key points: – avoid hazardous manual handling operations as far as possible – assess any hazardous manual handling operations – provide information on load and centre of gravity – reduce the risk of injury so far as is reasonably practicable Work at height regulations:The regulations around "working at height 2005" play a very important part when linked to the installation of possible network infrastructure as placing equipment such as network access points (APs), Wi-Fi hubs and physical network cabling. These elements of a network can be located in ceilings and overhead gantries that require access to be done using ladders and in some situations scissor lifts called cherry pickers. As a result, the legislation is designed to ensure that employees are protected when undertaking any activities associated to accessing this equipment. The legislation requires that any employer ensure appropriate precautions are in place to reduce any possible injury, such as falling from height. The Legislation and regulation ensure that the employee understands their duty to protect its employees by; Ensuring that the equipment they are using or provided with is suitable for the job being undertaken, that it is strong enough for the task in hand, and that it is regularly checked for integrity and maintenance. Appropriate training has been provided to ensure that the employees don't act in a way that could lead to harm to them or others, such as overreaching. Provide the employees and potential members of the public with protection that reduces their being hit by falling materials. Identifying Work at Height Risks in a Digital Support Environment o key points: – make sure the work is properly planned, supervised and carried out by competent people – do as much work as possible from the ground – ensure workers can get safely to and from where they work at height – ensure equipment is suitable, stable and strong enough for the job – provide protection from falling objects – consider emergency evacuation rescue procedures
Display screen equipment:o implications to employers: – conduct a display screen equipment workstation assessment – reduce risks including making sure workers take breaks from display screen equipment work – provide an eye test if an employee asks for one – provide training and information for employees. Have you ever had neck pain after a long gaming session or after doing work on a computer, or, found that your eyes have gotten tired and sore after looking at screens all day? This is where the Health and Safety (Display Screen Equipment) Regulations 1992 come in. This regulation is designed to protect users who continually use display screens for a long period. Some of the key principles of the regulations to keep you safe when using computers, laptops, and tablets for extended periods are:
5-Minute Challenge: In Pairs assess your computer setup for 5 minutes. Here's what to check: Create a poster that uses terminology and images that a 16 year old might use to inform them of the DSE legislation of 1992. Using images in your poster will support your information and explainations, ensure that any images are referenced and attributed. 4.1.2 Understand the health and safety risks and preventative measures ofworking with digital systems: • possible risks: o using display screen equipment o working at heights o cable installation (ground level, onto walls) o manual handling o health and safety requirements • methods of mitigating risk: o adequate training o safe working environment o suitable provision of relevant safety equipment o safe working practices o suitable provision of relevant information, instruction and supervision. 4.1.3 Understand Data Security and Protection legislation, including their effect on organisations and individuals:• Data Protection Act/General Data Protection Regulations: o purpose of legislation o eight principles.
4.1.4 Understand Computer Misuse legislation:The computer Misuse act was introduced in 1990, however it was partially introduced in 1988 in response to a legal case titled "R v Gold & Schifreen (1988) where a journalist hacker broke into the then Duke of Edinburgh’s (Prince Phillip) email account. Once the general public were aware of the situation there was outcry that uncovered the fact that no law existed against computer hacking. As a result of this the legislation was created partially and released in 1988 followed 2 years later with the full release.
How easy is it to get caught out? Refelect on your own use of digital devices, have you experienced this?
• the principles of the Computer Misuse Act (CMA) 1990 Key aspects of the feature governing unauthorized access include: Prohibition of Unauthorised Access: The Act clearly defines unauthorised access as accessing computer systems, programs, or data without proper authorisation. This includes bypassing security measures or accessing areas of a computer system beyond one's authorised privileges.
Protection of Data: The legislation aims to protect the confidentiality, integrity, and availability of data by preventing unauthorised access. This helps safeguard sensitive information from being accessed, modified, or deleted without proper authorisation.Scope: The legislation applies to unauthorised access to any computer system, whether it's owned by individuals, businesses, or the government. It covers a wide range of devices and networks, including computers, servers, and online platforms. • consequences for company and employee Penalties: The Act establishes penalties for unauthorized access, including fines and imprisonment, depending on the severity of the offense. For example, accessing a computer system without authorisation with the intent to commit further offenses carries a maximum penalty of up to 2 years in prison and/or a fine. • employee awareness • types of crimes covered by legislation. Secure Your Digital Vault Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||
| Maths:
|
|||||||||||||||||||||||||||||
| Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||
| Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||
| → | → | → | → | → | → | ||||||||||||||||||||||||
| Week 2 | T&L Activities:4.1.5 Understand Equality legislation:• the nine protected characteristics • types of discrimination: o direct o indirect o harassment o victimisation • where individuals are protected • when to take action against discrimination o time limits for claims.
4.1.6 Understand Intellectual Property legislation:• unregistered designs • registered designs • patents.
4.1.7 Understand Electrical Waste legislation:
The WEEE regulations are a set of environmental regulations that are designed to ensure that any electrical equipment is recycled, reused, or disposed of in an ethical and non-environmentally impacting way. Within companies, any electrical material or devices are in most situations, disposed of in specialist bins that external contractors will take away and do the recycling of the materials if they cannot be reused again, however, in some situations, some of the electrical devices may need to be destroyed beyond any repair or reuse as these may store personal and sensitive information, and must be disposed of destructively. In small groups of 2-3 reflect on the disposal of electrical equipment, research and discuss the main minerals found in most electrical devices and the current issue of e-waste in the UK. o key features: governs the safe and environmentally responsible disposal of electrical equipment
• Waste Electrical and Electronic Equipment Regulations • safe disposal • environmentally responsible disposal.
4.1.8 Understand the interrelationships between digital support and securityand digital legislation, and make judgements about the impact on organisations, society and individuals.
4.1.9 Know that international law applies to some offences:• international law in cyberspace • international law and surveillance. Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||
| Maths:
|
|||||||||||||||||||||||||||||
| Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||
| Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||
| → | → | → | → | → | → | ||||||||||||||||||||||||
| Week 3 | T&L Activities:4.2 Guidelines4.2.1 Know the sources of codes of conduct:• organisations • professional: o British Computer Society (BCS) o The Institution of Analysts and Programmers (IAP) o Chartered Institute of Information Security (CIISec) • governmental.
4.2.2 Understand how guidelines in codes of conduct influence professionalbehaviour: • ensure individuals follow policies, procedures and legislation • ensure quality of work: o minimising risk to the public o acting with competence and integrity • meeting deadlines • effective communication • maintaining confidentiality and trust. Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||
| Maths:
|
|||||||||||||||||||||||||||||
| Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||
| Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||
| → | → | → | → | → | → | ||||||||||||||||||||||||
| Week 4 | T&L Activities:4.2.3 Know the sources of digital industry standards:• International Organization for Standardization (ISO) • Web Content Accessibility guidelines (WCAG) • World Wide Web Consortium (W3C®) • Internet Engineering Task Force (IETF) • Electronic Industries Alliance/Telecommunications Industry Association (EIA/TIA) • British Standard (BS) • Institute of Electrical and Electronics Engineers (IEEE) • Payment Card Industry Security Standards Council (PCI SSC).
4.2.4 Understand the purpose of acceptable use policies (AUP):• purpose of AUP • typical content: o permitted activities o prohibited activities o working practices including confidentiality o communication etiquette including projecting correct organisation image o sanctions/penalties. Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||
| Maths:
|
|||||||||||||||||||||||||||||
| Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||
| Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||
| → | → | → | → | → | → | ||||||||||||||||||||||||
| Week 5 | T&L Activities:4.2.5 Understand the importance of whistleblowing procedures.
4.2.6 Understand the interrelationships between digital support and security and guidelines, and make judgements about the impact on organisations, society and individuals
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||
| Maths:
|
|||||||||||||||||||||||||||||
| Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||
| Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||
| → | → | → | → | → | → |