SlideShare une entreprise Scribd logo
1  sur  27
ICAICT202A - WORK AND
COMMUNICATE
EFFECTIVELY IN AN IT
ENVIRONMENT
• Introduction
• ICT Roles
• Policies and Procedures
• KPIs
• Legislations
• Positive Communication
Strategies
• Written and Oral Communication
Information technology (IT) is the application of
computers and telecommunications equipment to
store, retrieve, transmit and manipulate data, often
in the context of a business or other enterprise.
IT ROLES
• There are many roles in an IT
or ICT, but most
organizations do not need
someone to fill all the roles
• Roles can be combined
• It can be outsourced
• Name give to IT roles vary
from organization to
organization – “it is
important to understand
the role rather than the title
of the job”
IT ROLES
• IT Consultants and
planners
• IT Operations technicians
(network support)
• IT user support
technicians (help desk
support)
• Network/systems
designers and engineers
• Software designers and
engineers
• Web developers and
producers
POLICIES AND
PROCEDURES
• Policies are general guides to
decision making
• Procedures, on the other
hand, are more specific
statements e.g. SOPs
• You need to have a clear
understanding of any SOPs
relating to your role and
tasks.
• Both policies and procedures
convey to employees and to
other stakeholders the
organization’s interests –
their vision, mission, goals
and methods they intend to
use to achieve these goals
Stakeholders – are the people
or entities with which your
organisation has contact
Enterprise priorities:
• Different classes of clients
• Different services and product lines
• New product/service launches
• Market research
• After sales service
• Customer complaints
KEY
PERFORMANCE
INDICATORS
• Meet the knowledge
requirements of your role
• Keep product knowledge
up-to-date at all times.
• Be able to provide clients
with information without
error
• Demonstrate the necessary
skills to access and input
data.
• Operate the enterprise’s
applications systems and
software correctly and in a
timely manner
LEGISLATIONS
• Equal Opportunity Act 1984
(SA and WA)
• Anti-discriminating Act
1994 (Qld)
• Racial Vilification Act 1996
(SA)
• Telecommunications Act
1997 (Cth)
• Privacy Act 1988 (Cth)
• Workplace health and
safety legislation
• Consumer protection and
sale of goods legislation
“IT IS YOUR RESPONSIBILITY
TO KNOW YOUR OBLIGATIONS
UNDER LEGISLATION AND THE
CONSEQUENCES, BOTH FOR
YOUR ENTERPRISE, AND FOR
YOURSELF, OF NON-
COMPLIANCE”
• Ethics – social
responsibility
• Information
collection records
and disclosure
• Data quality and
security
The following is a brief summary of the conditions you must comply with
when collecting , recording and disclosing information:
• You must not collect information unless the information is necessary for
one or more of the enterprise’s functions or activities.
• You must collect information only by lawful and fair means- not in an
unreasonably intrusive way.
• Upon collecting information from an individual, ensure that the
individual is of:
– The identity of the organisation and how to contact it.
– The fact that they are able to gain access to the information
– The purposes for which the information is collected
– The organisations or its types to which the information might be disclosed
– Any law that requires the particular information to be collected
– The main consequences (if any) for the individual if all or part of the
information is not provided.
• If it is reasonable and practicable to do so, an organisation must collect
personal information about an individual only from that individual
• If an organisation collects personal information about an individual
from someone else, it must take reasonable steps to ensure that the
individual is or has been made aware of this
• The collection of sensitive information
(health, beliefs, sexual preference, religion)
must be directly and demonstrably
related to the purpose of the collection.
• Policies
• Procedures
• Codes of Conduct
Document IT Policies and procedures and determine
whether they are applied in practice
Determine key players within the organisation and their role and
importance
SECTION 2: USE POSITIVE AND
VARIED COMMUNICATION
STRATEGIES WITH ICT CLIENTS
Receive request and enquiries regarding the use of ICT
equipment, operating systems and software from clients and
colleagues in a polite manner
Client enquires and request will be made
via various communication mediums:
• In person (face to face)
• Over the phone
• Email
• Letter
• fax
When greeting the client
always
• Smile
• Remember their name
• Engage them in a friendly
conversation
First impression counts…
ETHICAL BEHAVIOUR
A Code of ethics benefits the organisation
and the individual by
• Reinforcing the organisation's
standard of conduct
• Identifying practices that are and are
not permissible
• Allowing leaders, managers and others
to share experiences and ideas about
what is and what is not an ethical
position
• Developing a shared culture based on
ethics and accountability
Responding appropriately to client and colleague requirements and
identify options
• Oral- Spoken words-
conversation
• Written- written form-
memos- email- business
letter
Verbal
Communication
• Body language
• Gestures
Non-verbal Communication
Listening….
3 Levels of Listening
ACTIVE LISTENING IS SUPPORTED
BY EFFECTIVE QUESTIONING..
Open Questions
• How
• What
• When
• Where
• Why
• Explain
• Describe
• Tell me
Closed Questions
• Do you
• Are you
• Can you
• Will you
• Would you
Icaict202 a   work and communicate effectively in an

Contenu connexe

Tendances

Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
wtidwell
 

Tendances (17)

Chapter 10_dp-pertemuan_15-16
 Chapter 10_dp-pertemuan_15-16 Chapter 10_dp-pertemuan_15-16
Chapter 10_dp-pertemuan_15-16
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - Edinburgh
 
Data protection compliance for tech startups
Data protection compliance for tech startupsData protection compliance for tech startups
Data protection compliance for tech startups
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Preparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillPreparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection Bill
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection update
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Insider Threat Experiences
Insider Threat ExperiencesInsider Threat Experiences
Insider Threat Experiences
 
Chapter 8_dp-pertemuan_12-13
 Chapter 8_dp-pertemuan_12-13 Chapter 8_dp-pertemuan_12-13
Chapter 8_dp-pertemuan_12-13
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
 

En vedette

Slideshare presentation pc
Slideshare presentation pcSlideshare presentation pc
Slideshare presentation pc
mcnamara0724
 

En vedette (12)

Safety induction-june-11
Safety induction-june-11Safety induction-june-11
Safety induction-june-11
 
NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?
NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?
NUS-ISS Are You Able to Communicate Effectively with Your Senior Management?
 
How to Communicate Effectively
How to Communicate EffectivelyHow to Communicate Effectively
How to Communicate Effectively
 
Using Emails to Communicate Effectively
Using Emails to Communicate EffectivelyUsing Emails to Communicate Effectively
Using Emails to Communicate Effectively
 
7 tips to effectively communicate with the next generation
7 tips to effectively communicate with the next generation7 tips to effectively communicate with the next generation
7 tips to effectively communicate with the next generation
 
People communicate effectively throughout the organisation
People communicate effectively throughout the organisationPeople communicate effectively throughout the organisation
People communicate effectively throughout the organisation
 
Slideshare presentation pc
Slideshare presentation pcSlideshare presentation pc
Slideshare presentation pc
 
How to communicate effectively and get things done
How to communicate effectively and get things doneHow to communicate effectively and get things done
How to communicate effectively and get things done
 
Communicating in Today's Workplace
Communicating in Today's WorkplaceCommunicating in Today's Workplace
Communicating in Today's Workplace
 
communication in an Organization
communication in an Organizationcommunication in an Organization
communication in an Organization
 
Communication Skills Ppt
Communication Skills PptCommunication Skills Ppt
Communication Skills Ppt
 
effective communication skills ppt
effective communication skills ppteffective communication skills ppt
effective communication skills ppt
 

Similaire à Icaict202 a work and communicate effectively in an

1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
keturahhazelhurst
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
jeremylockett77
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
stanbridge
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 

Similaire à Icaict202 a work and communicate effectively in an (20)

Week 4.pptx
Week 4.pptxWeek 4.pptx
Week 4.pptx
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”Donors, Data Privacy & Security, and Doing What’s “Right”
Donors, Data Privacy & Security, and Doing What’s “Right”
 
ethcpp02.ppt
ethcpp02.pptethcpp02.ppt
ethcpp02.ppt
 
2_updated.ppt
2_updated.ppt2_updated.ppt
2_updated.ppt
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
GDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedGDPR Practicalities - The Data Shed
GDPR Practicalities - The Data Shed
 
Chp 03 ethics and ethical analysis (shared) -
Chp 03   ethics and ethical analysis (shared) - Chp 03   ethics and ethical analysis (shared) -
Chp 03 ethics and ethical analysis (shared) -
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
Ppt
PptPpt
Ppt
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Icaict202 a work and communicate effectively in an

  • 1. ICAICT202A - WORK AND COMMUNICATE EFFECTIVELY IN AN IT ENVIRONMENT
  • 2. • Introduction • ICT Roles • Policies and Procedures • KPIs • Legislations • Positive Communication Strategies • Written and Oral Communication
  • 3. Information technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise.
  • 4. IT ROLES • There are many roles in an IT or ICT, but most organizations do not need someone to fill all the roles • Roles can be combined • It can be outsourced • Name give to IT roles vary from organization to organization – “it is important to understand the role rather than the title of the job”
  • 5. IT ROLES • IT Consultants and planners • IT Operations technicians (network support) • IT user support technicians (help desk support) • Network/systems designers and engineers • Software designers and engineers • Web developers and producers
  • 6. POLICIES AND PROCEDURES • Policies are general guides to decision making • Procedures, on the other hand, are more specific statements e.g. SOPs • You need to have a clear understanding of any SOPs relating to your role and tasks. • Both policies and procedures convey to employees and to other stakeholders the organization’s interests – their vision, mission, goals and methods they intend to use to achieve these goals
  • 7. Stakeholders – are the people or entities with which your organisation has contact Enterprise priorities: • Different classes of clients • Different services and product lines • New product/service launches • Market research • After sales service • Customer complaints
  • 8. KEY PERFORMANCE INDICATORS • Meet the knowledge requirements of your role • Keep product knowledge up-to-date at all times. • Be able to provide clients with information without error • Demonstrate the necessary skills to access and input data. • Operate the enterprise’s applications systems and software correctly and in a timely manner
  • 9. LEGISLATIONS • Equal Opportunity Act 1984 (SA and WA) • Anti-discriminating Act 1994 (Qld) • Racial Vilification Act 1996 (SA) • Telecommunications Act 1997 (Cth) • Privacy Act 1988 (Cth) • Workplace health and safety legislation • Consumer protection and sale of goods legislation
  • 10. “IT IS YOUR RESPONSIBILITY TO KNOW YOUR OBLIGATIONS UNDER LEGISLATION AND THE CONSEQUENCES, BOTH FOR YOUR ENTERPRISE, AND FOR YOURSELF, OF NON- COMPLIANCE” • Ethics – social responsibility • Information collection records and disclosure • Data quality and security
  • 11. The following is a brief summary of the conditions you must comply with when collecting , recording and disclosing information: • You must not collect information unless the information is necessary for one or more of the enterprise’s functions or activities. • You must collect information only by lawful and fair means- not in an unreasonably intrusive way. • Upon collecting information from an individual, ensure that the individual is of: – The identity of the organisation and how to contact it. – The fact that they are able to gain access to the information – The purposes for which the information is collected – The organisations or its types to which the information might be disclosed – Any law that requires the particular information to be collected – The main consequences (if any) for the individual if all or part of the information is not provided.
  • 12. • If it is reasonable and practicable to do so, an organisation must collect personal information about an individual only from that individual • If an organisation collects personal information about an individual from someone else, it must take reasonable steps to ensure that the individual is or has been made aware of this • The collection of sensitive information (health, beliefs, sexual preference, religion) must be directly and demonstrably related to the purpose of the collection.
  • 13. • Policies • Procedures • Codes of Conduct Document IT Policies and procedures and determine whether they are applied in practice
  • 14. Determine key players within the organisation and their role and importance
  • 15.
  • 16. SECTION 2: USE POSITIVE AND VARIED COMMUNICATION STRATEGIES WITH ICT CLIENTS
  • 17. Receive request and enquiries regarding the use of ICT equipment, operating systems and software from clients and colleagues in a polite manner Client enquires and request will be made via various communication mediums: • In person (face to face) • Over the phone • Email • Letter • fax
  • 18. When greeting the client always • Smile • Remember their name • Engage them in a friendly conversation First impression counts…
  • 19.
  • 20. ETHICAL BEHAVIOUR A Code of ethics benefits the organisation and the individual by • Reinforcing the organisation's standard of conduct • Identifying practices that are and are not permissible • Allowing leaders, managers and others to share experiences and ideas about what is and what is not an ethical position • Developing a shared culture based on ethics and accountability
  • 21. Responding appropriately to client and colleague requirements and identify options
  • 22. • Oral- Spoken words- conversation • Written- written form- memos- email- business letter Verbal Communication
  • 23. • Body language • Gestures Non-verbal Communication
  • 25.
  • 26. ACTIVE LISTENING IS SUPPORTED BY EFFECTIVE QUESTIONING.. Open Questions • How • What • When • Where • Why • Explain • Describe • Tell me Closed Questions • Do you • Are you • Can you • Will you • Would you