Processing and calculations:
- VAT added
- 25% of price calculated
- 25% deducted from customers balance
Outputs:
- 3D image
- Parts required
- Costs
- Design
- Quote
ICT Systems used:
- Computers with LAN connection
- Laser printers (Colour and Black and White)
- SOP software
- High specification laptops
- Bedroom design software
- Barcode readers
- Stock database
ICT has allowed Bedrooms4U to operate much more efficiently instead of spending hours designing bedroom designs by hand it can not easily be done on computer. Changes and easily be made to this design on the computer and it is portable as done on a laptop. This can also be printed a number of time on printers and the scales are exact as created on the computer. It has allows Bedrooms4U to hold more secure customer databases and monitor stock levels more efficiently. Been able to monitor stock to the current level means they have always the correct amount and have as little idle assets as possible.
ICT has enabled the production line to be dominated by accurate 24hr operational robots. This means production is much more efficient and much more accurate. Forecasts for production can also be more accurate due to the reliability of these systems.
Legislation
As Bedrooms4U uses ICT on a daily basis there is a number of legal requirements they must adhere to. For instance as they store customer information on databases they must ensure all this information is protected and entry restricted in order to comply with the Data Protection Act. This act also states:
- Data may only be used for the specific purposes for which it was collected
- Data must not be disclosed to third parties without the consent of the individual whom the information relates to.
- People have a right of access to the information held about them, however Bedrooms4U could charge a slight fee for this legally.
- Personal information may be kept for no longer than is necessary and it must be kept up-to-date.
The Health and Safety at Work Act stipulates that health and safety assessments must be carried out, records of findings recorded, emergency procedures in place etc. It also states that:
- Regular assessments of the health and safety risks should be carried out.
- Arrangements should be made to implement health and safety measures.
- Health and safety policies should be drawn up.
- Competent people should be appointed to implement health and safety arrangements.
- Emergency procedures should be in place and practised at intervals.
- Employees must take reasonable care of their own health and safety and that of others.
- Employees must co-operate with the employer on the health and safety.
This legislation in place mainly to protect the employee but also to an extent the employer as it states employees have the legal right to follow the health and safety policy. If found to be in breach of this the employer can not be held responsible.
E.U. health and safety directives state that :
- Analyse workstations assessing and reducing risk. This includes equipment, furniture and environment.
- Employers must ensure workstations meet requirements. This includes the provision of adjustable chairs, suitable lights and tilt monitors.
- Employers must plan the employees’ work so that there are breaks and changes in activity. Not specified how long.
- Employers on request must arrange eye test for full time employees and provide spectacles if special ones required.
- Employers must provide health and safety training so employees can use workstations and equipment competently.
The Electronic Communications Act relates mainly to e-commerce. It states that all information collected during an e-commerce transactions should be encrypted and secure. It also confirms the legal status of electronic signatures.
The Computer Misuse Act mainly relates to hacking into databases with intent to steal information which you have no access to. The Computer Misuse Act makes it illegal to:
- Gain unauthorised access to computer material.
- Gain unauthorised access to computer material with intent to commit further offences.
- Carry out unauthorised modification of computer material (Mainly viruses)
Under this act people from other countries can be prosecuted.