Overview

Framework:
RQF
Level:
Level 3
Unit No:
R/617/6659
Credits:
3
Guided learning hours:
24 hours

Aim

The aim of this unit is to provide leaners with an understanding of the use of digital technology within an organisation where threats, risks and security are a key consideration.

Unit Learning Outcomes

1

Understand how digital technologies are being deployed by organisations.

  • Digital technologies;
    current
    Mobile technology; cloud storage; mobile communication; data analytics; robotics; computer aided design.

    emerging
    Artificial intelligence; augmented reality; machine learning; virtual reality; touch commerce; internet of things.
  • Benefits
    Improved productivity; improved efficiency; improve competitive advantage; improve agility; improved customer service.
  • Risks
    Loss of the human factor; technology is fast changing; insufficient cyber-security; skill gaps; business disruption.

Assessment Criteria

  • 1.1

    Explain how current digital technologies are being deployed by organisations.

  • 1.2

    Assess the risk and benefits to organisations of investing in digital technologies.


2

Know about threats associated with the deployment of digital technologies.


  • Threats;
    internal
    Unsafe practice; physical damage; accessing unauthorised information; loss of data; theft; intentional removal of data.

    external
    Malware; spyware; theft; hacking; phishing; viruses.

  • Methods
    Antivirus; security protocols; firewalls; user names and passwords; two step verification; security tokens; file access rights; encryption; secure rooms; fire detection systems.

Assessment Criteria

  • 2.1

    Describe the internal and external threats associated with deploying digital technologies.

  • 2.2

    Describe ways in which an organisation protects itself from threats associated with the deployment of digital technologies.


3

Understand how the deployment of digital technologies is controlled.

  • Legislation
    General Data Protection Requirements; Computer Misuse Act; Digital Economy Act; Freedom of Information Act; Privacy and Electronic Communications Act
  • Policies and procedures
    Disaster recovery; data protection; data back-up; use of email and the internet; use of password.

Assessment Criteria

  • 3.1

    Explain legislation which relates to the deployment of digital technologies.

  • 3.2

    Explain an organisation’s policies and procedures which relate to the deployment of digital technologies.