Performance objective
You will demonstrate the skills and knowledge necessary to prepare for a meeting in accordance with organisational requirements.
Assessment description
For this assessment you are required to plan and prepare for a meeting to be conducted for a simulated workplace, the Adept Owl Games Company.
Note: The work completed for this assessment task provides the basis for completing Assessment Tasks 2 and 3. Ensure you keep an electronic and/or hard copy of this completed assessment for future use.
Procedure
As part of completing this template, ensure that you include identification and description of the following as they apply to your meeting:
Note: You will need to complete these activities in Assessment Task 2 before you can conduct your meeting.
Specifications
You must submit:
Your assessor will be looking for evidence of:
Meeting Invitation
Adept Owl Games Company
30th November 2019
Dear All,
I, Aban Rezek, IT officer, that would be defined to be called Ruth Crabbe (GM operations) along with the given Bae Ahn-Bartle (HR Manager), that would be based on the purpose of review along with forming the privacy policy aimed at the company. It would be defined concerning the meeting that could aim to identify, analyze and would be centric based on the evaluation of the current privacy policy. It is also the related venue based on the meeting commenced in the Meeting Room that would originate from the 4 pm till the end of 6.30 pm.
As an integral part of the organization, it also had a reasonable amount of time. It is also how the company would be able to attain success in delivering many projects. Need to have high client satisfaction rates and can be possible through the support and cooperation. It is important to attain a privacy policy with the given business. I need to follow the documents along with the legal review aimed at an updated policy. Based on attending the meeting.
To identify that would be based on the loophole that would be based on the privacy policy and aimed at the same. Meeting agenda would be -:
Tasks | Venue | Time |
Agenda | Meeting Room | 10 mins |
Welcome and introduction | Meeting Room | 15 mins |
Correspondence | Meeting Room | 20 mins |
Date of next meeting | Meeting Room | 30 mins |
Statement of the meeting's purpose | Meeting Room | 10 mins |
Reports | Meeting Room | 15 mins |
Minutes of the previous meeting | Meeting Room | 20 mins |
General business | Meeting Room | 30 mins |
Major agenda items | Meeting Room | 30 mins |
Ensure timely arrival and also be aware of the valid discussion on the effectiveness concerning the privacy policy. Need to ensure adherence to the necessary documents and manuals.
Meeting Agenda
Meeting Topic | Review the current privacy policy |
Chairman | XX YYY |
Date | 22 December 2019 |
Time | 4 pm |
Location | Meeting Room |
Tasks | Venue | Time |
Agenda | Introduction of policy | 10 mins |
Welcome and introduction | Orientation of participants | 15 mins |
Correspondence | Policy documents | 20 mins |
Date of next meeting | Next date and time | 30 mins |
Statement of the meeting's purpose | Topic to be discussed | 10 mins |
Reports | Findings and evaluation | 15 mins |
Minutes of the previous meeting | Major points | 20 mins |
General business | Discussion of the given business scenario | 30 mins |
Major agenda items | Learnings from previous outcomes and the related discussion | 30 mins |
Issue To Be Addressed
To ensure, how there would be multi-player participation along with the significant commanding a system of connections along with having the sense of the communications, organizations and includes the given private data from customers. There has to be a given sense of the records for the accounts inside gaming channels that could be related to the online networking sites (Banks, 2018).
Needs to ensure timely adherence to the pursuing high numbers along being able to deliver per the signature of maximum games, includes the secrecy concerns need to have a reconsideration. Ensure a web activity, includes how data is gathered, needs to abide by the distributed and utilized business aimed to be considered sincerely.
To relate with the private data that could identify the related infringement of the customer policies, information and there has to be a control over what can be considered and taken out.