Skip to content

ITT2781 – Manage and Protect Computer Data (2781)

Print
Module code
ITT2781
Module title
Manage and Protect Computer Data (2781)
Prescription
People credited with this unit standard are able to: demonstrate file management; identify and describe common threats to data; demonstrate knowledge of data protection measures and ethical issues in relation to the management of data held on computer systems, for a personal computer system.
Programmes
  • EU7000
NZQA Level
Level 2
NZQA Credits
3
Delivery method
  • Not Web enabled
Learning hours
Directed hours
18
Self directed hours
12
Total learning hours
30
Resources required
Evidence of Achievement
Element 1
Demonstrate file management on a personal computer system.
Range includes but is not limited to . opening, copying, naming, renaming, moving,
deleting, administering access rights.
Performance criteria
1.1 Searching for and locating files on the personal computer system is
demonstrated according to organisational requirements.
Range includes but is not limited to . browsing through directory/tree,
accessing a Local Area Network, using a search mechanism.
1.2 The logical structuring of files and folders, the use of file names relevant to the
content, and the storage of files in a folder on a personal computer system are
demonstrated according to organisational requirements.
1.3 Files are managed in a computer system according to organisational
requirements.
Element 2
Identify and describe common threats to data stored on a personal computer system.
Performance criteria
2.1 Common threats to data stored in a personal computer system are identified
and described in terms of their impact on the data or system.
Range threats may include but are not limited to . unauthorised access,
internet and email risks, virus/trojan attack, spyware, power failure,
natural disaster, data corruption, peer-to-peer access.
Evidence of three threats is required..
Element 3
Demonstrate knowledge of data protection measures applied to data stored on a personal
computer system.
Performance criteria
3.1 Measures to ensure the integrity of data held in a personal computer system are
explained in terms of organisational practice.
Range measures may include but are not limited to . back-up techniques,
frequency of saving, virus protection facility, UPS or surge
protector.
Evidence of three measures is required.
3.2 Measures to secure the system from unauthorised access are explained
according to organisational practice.
Range security measures may include but are not limited to . passwords,
log-off, shutdown, physical security (locked room, locked
keyboards, and/or locked workstations), anti-virus/trojan software,
firewalls.
Evidence of three measures is required.
Element 4
Demonstrate knowledge of ethical issues in relation to the management of data held in
personal computer systems.
Range ethical issues may include but are not limited to . copyright, piracy, individual
privacy, organisation confidentiality.
Evidence of two issues is required.
Performance criteria
4.1 Ethical issues and principles related to managing information in the form of
computer data are described in terms of a code of ethics.
4.2 Good ethical practice related to managing information in the form of computer
data is described in terms of the identified issues.
Range two examples of good ethical practice, of which one must be the
management of objectionable material.

Wintec is part of Te Pūkenga - New Zealand Institute of Skills and Technology Learn More

Learn with purpose

Explore Te Pūkenga

Te Kāwanatanga o Aotearoa - New Zealand Government

Te Kāwanatanga o Aotearoa - New Zealand Government

Copyright © 2022 Wintec