Premium Essay

Nt1330 1.3

Submitted By
Words 479
Pages 2
1. (4)Implemen

6)Implementing and monitoring organisational procedures and legal requirements for identifying hazards and assessing and controlling risks
• Identify the potential hazards in the organisation in accordance with WHS policies and procedures
According to WHS policies and procedure the potential harzards in the company are:
1. keyboard work for long periods without a break
2. activities that involve lifting or carrying materials or equipment
3. trip hazards like trailing cords, frayed carpet or boxes in walkways
4. using a hazardous substance for cleaning
5. noise generated by machinery
6. working with sharp instruments, e.g. broken can for recycle them
7. working with or close to machinery with moving parts
• Explain the steps that the organisation would take for the hazards and risks that have been reported
1) To identify the hazard- Involves finding things and …show more content…
(8) Implementing and monitoring organisational procedures for maintaining WHS records for the team
• Briefly describe the steps for accurately completing and maintaining WHS records of incidents of occupational injury and disease in work area in accordance with WHS legal requirements
The records will be presented to support enhancement initiatives, design and improve new policies and procedures, and act as proof that the organisation is safeguarding its responsibilities to employees and law. It also need to be available in the case of employee’s reward claim or as proof in a litigious action. Health and safety is integrated into organisational systems
• Explain the procedure for using aggregate information and data from work area records to identify hazards and monitor risk control procedures in work area
These records are additional use; that of provide you a database for determining unseen risks and hazards in your workplace. Not all hazards are obvious. Some may be hidden within particular tasks, and not be visible while your work place or work team is at

Similar Documents

Premium Essay

Nt1330 Unit 3 Assignment 1.3 Cookies

...Cookies policy 1 About treats 1.1 A treat is a document containing an identifier (a series of letters and numbers) that is sent by a web server to a web program and is put away by the program. The identifier is then sent back to the server every time the program asks for a page from the server. 1.2 Cookies might be either "determined" treats or "session" treats: a relentless treat will be put away by a web program and will stay legitimate until its set expiry date, unless erased by the client before the expiry date; a session treat, then again, will terminate toward the end of the client session, when the web program is shut. 1.3 Cookies don't ordinarily contain any data that by and by distinguishes a client, yet individual data that we...

Words: 1056 - Pages: 5

Premium Essay

Test

...Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10

Premium Essay

Nt 1210

...capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18