Professional Practices Term Of Reference TORs describe the
Professional Practices
Term Of Reference • TORs describe the purpose and structure of a project, committee, meeting, negotiation, or any similar collection of people who have agreed to work together to accomplish a shared goal. • The terms of reference of a project are often referred to as the project charter.
TOR…. • Each committee should have a Terms of Reference document (To. R) that, at a minimum, describes the purpose, scope and authority of the committee. • To. R’s present an overview of the requirements and expectations of the evaluation and are an explicit statement of the roles, resources, and responsibilities of the members.
BACKGROUND • Situate with reference to the overarching country programme, parallel or linked national programmers. • Situate the important stakeholders, including partners, implementing agencies/ organizations. • Describe other factors influencing timing and focus of the evaluation, for example in wider national context.
PREPARATION OF THE TOR • All the stakeholders involved in commissioning the evaluation should have ownership of the content of the TOR and agree from the onset to the terms. • Stakeholders may have conflicting priorities and unrealistic expectations, therefore the TOR should reflect what it is feasible for the members to accomplish.
THE TERMS OF THE COMMITTEE • Committee Name • Official name of the committee or group Type • Can be standing, ad hoc (special project) or advisory (related to another board, committee or project) • Purpose • Describe the purpose of the committee (what the committee will do, why it was created) • Scope • Clearly describe what is in and out of scope for the committee
THE TERMS OF THE COMMITTEE • Describe the decision making authority of the committee (decides, approves, recommends, etc. ) • Membership • Type and number of members, how members are appointed, how the chair and co-chair are appointed and a list of members (Name and functional role) • Meeting frequency and location, meeting procedures (if applicable), quorum, details about agendas and minutes (how these will be distributed, available online, who prepares them, etc. ), communication between meetings. • Reporting • Describe whom the committee will report to, in what format, how often
Code of Conduct CODE OF CONDUCT : A code of business conduct, sometimes called a code of ethics, is a management tool for setting out an organization’s values, responsibilities and ethical obligations. The code of conduct provides employees with guidance for handling difficult ethical situations related to the business
Businesses develop their own codes, based on their core values, and no two codes are the same. To be truly effective, the code of conduct must also be embedded in the business, so employees know how it applies to them
STEPS ON HOW TO CREATE CODE OF CONDUCT Review sample codes of ethics that companies in a similar business use. Review other documents related to your business, including the firm's mission statement and any specific policies new hires receive as part of their orientation.
STEPS ON HOW TO CREATE CODE OF CONDUCT Think about the ethical dilemmas that face not only your company, but also its competitors. These ethical issues vary by industry, and it is important to directly address them in the company's code of ethics Solicit input from employees when you create the code of ethics
STEPS ON HOW TO CREATE CODE OF CONDUCT Address potential workplace issues, such as office romances and nepotism, in your code of ethics Ask your lawyer to review the proposed code of ethics before putting it in force
STEPS ON HOW TO CREATE CODE OF CONDUCT HRs RESPONSIBILITIES IN COC : These professionals must adhere to the highest standards of personal and professional conduct to faithfully carry out their responsibilities, gain the respect of management and employees and ensure the company is in compliance with federal and state employment law. They should carry their responsibilities with Accountability, Fairness, Integrity & Professional Development
Misuse of computing Criminalize unauthorized access to computer systems. Deter serious criminals from using a computer in the commission of a criminal offence or seek to hinder or impair access to data stored in a computer.
Types of computer misuse Hacking Data misuse and unauthorised transfer or copying Copying and distributing copyrighted software, music and film Email and chat room abuses Extreme material Identity and financial abuses Fraud and theft Viruses
Hacking is where an unauthorised person uses a network, Internet or modem connection to gain access past security passwords or other security to see data stored on another computer. Hackers sometimes use software hacking tools and often target, for example, particular sites on the Internet.
Data misuse and unauthorised transfer or copying Copying and illegal transfer of data is very quick and easy using online computers and large storage devices such as hard disks, memory sticks and DVDs. Personal data, company research and written work, such as novels and textbooks, cannot be copied without the copyright holder's permission.
Copying and distributing copyrighted software, music and film • This includes copying music and movies with computer equipment and distributing it on the Internet without the copyright holder's permission. This is a widespread misuse of both computers and the Internet that breaks copyright regulations.
Email and chat room abuses Internet services such as chat rooms and email have been the subject of many well-publicised cases of impersonation and deception where people who are online pretend to have a different identity. Chat rooms have been used to spread rumours about well known personalities. A growing area of abuse of the Internet is email spam, where millions of emails are sent to advertise both legal and illegal products and services.
Identity and financial abuses This topic includes misuse of stolen or fictional credit card numbers to obtain goods or services on the Internet, and use of computers in financial frauds. These can range from complex well thought out deceptions to simple uses such as printing counterfeit money with colour printers.
Viruses are relatively simple programs written by people and designed to cause nuisance or damage to computers or their files.
Preventing misuse • The Data Protection Act This was introduced to regulate personal data. This helps to provide protection against the abuse of personal information. Find out more about the Data Protection Act.
Preventing misuse Copyright law • This provides protection to the owners of the copyright and covers the copying of written, musical, or film works using computers. FAST is the industry body which is against software theft. You can find out more about it in the Copyright section. • There have been cases where laws such as Copyright have been used to crack down on file sharing websites or individuals who store and illegally distribute copyrighted material, eg music. There is a massive problem with many people around the world obtaining copyrighted material illegally.
Close down chat rooms • Some chat rooms have been closed down due to abuses, especially where children are vulnerable. Some have moderators who help to prevent abuses. Advice about sensible use is important; especially to never give personal contact details or arrange meetings without extreme caution. Reduce email spamming • This may be reduced by: • never replying to anonymous emails • setting filters on email accounts • reporting spammers to ISPs, who are beginning to get together to blacklist email abusers • governments passing laws to punish persistent spammers with heavy fines Regular backups and security • Just making something illegal or setting up regulations does not stop it happening. Responsible computer users need to take reasonable steps to keep their data safe. This includes regular backups and sufficient security with passwords.
- Slides: 24