Vous êtes sur la page 1sur 68

BAHAN PEMBELAJARAN

___________________________

LEVEL 2

M01 : COMMUNICATION APPLICATION

SUB MODULE 1
TWO WAY COMMUNICATION

JABATAN PEMBANGUNAN KEMAHIRAN


KEMENTERIAN SUMBER MANUSIA
ARAS 7 – 8, BLOK D4, KOMPLEKS D
PUSAT PENTADBIRAN KERAJAAN PERSEKUTUAN
62530 PUTRAJAYA

JANUARI 2017
Z–009-2:2015-M01 COMMUNICATION APPLICATION

KANDUNGAN MUKASURAT

1. COVER
AHLI JAWATANKUASA
WIM PEMBANGUNAN i

2. CARTA PROFIL KOMPETENSI ii

3. CURRICULUM of CORE ABILITY

Z-009-2:2015 (CoCA-Z-009-2:2015-CA01) iii

4. JADUAL PEMBAHAGIAN WIM

4.1 TEORI iv

4.2 AMALI v

5. SET WIM TEORI

5.1 Z-009-2:2015-M01/P(1/3) 1

5.2 Z-009-2:2015-M01/T(1/3) 9

6. SET WIM AMALI

6.1 Z-009-2:2015-M01/K(1/3) 13

7. JADUAL PEMBAHAGIAN PENILAIAN 16

8. LAMPIRAN

8.1 BORANG PENILAIAN PRESTASI (JPK/CA/01) 17

8.2 REKOD PENILAIAN KUMULATIF (RPK) 19


STANDARD CONTENT

CORE ABILITIES PROFILE CHART (CAPC)

SECTOR ALL SECTORS

SUB SECTOR ALL SUB SECTORS

JOB AREA ALL JOB AREAS

NCS TITLE CORE ABILITIES

JOB LEVEL TWO (2) JOB AREA CODE Z-009-2:2015

HEALTH, SAFETY
COMMUNICATION INTERPERSONAL WORK PLACE
CORE AND ENVIRONMENT
APPLICATION BEHAVIOUR CULTURE BEHAVIOUR
ADAPTION

Z-009-2:2015-CA01 Z-009-2:2015-CA02 Z-009-2:2015-CA03 Z-009-2:2015-CA04

CAPC bagi NOSS Z-009-2:2015 Core Abilities

ii
CURRICULUM of CORE ABILITIES (CoCA)

SECTOR ALL SECTORS


SUB SECTOR ALL SUB SECTORS
JOB AREA ALL JOB AREAS
NCS AREA CORE ABILITIES
ABILITY UNIT TITLE COMMUNICATION APPLICATION

The person who is competent in this CA shall be able to communicate in the working world effectively and
clearly.
Upon completion of this competency unit, trainees will be able to:-
LEARNING OUTCOME  Apply two way communication
 Disseminate information electronically
 Disseminate information manually
 Apply information confidentiality

ABILITY UNIT ID Z-009-2:2015-CA01 Level 2 Training Duration 10


Training Delivery
Ability Knowledge Performance Assessment Criteria
Hours Mode
1. Apply two way 1.1 Communication 1.1 Identify communication 2 Knowledge 1.1 Communication
communication protocols. procedures and protocols.  Lecture. procedures are identified.
1.2 Information objectives. 1.2 Establish Information  Classroom 1.2 Communication protocols
1.3 Types of information objectives. discussion. are identified.
 Information 1.3 Classify type of 1.3 Information objectives are
appropriateness. information. established.
 Accuracy of 1.4 Ensure Information 1.4 Types of information are
information. appropriateness. classified.
1.4 Communication ethics 1.5 Adhere to communication 1.5 Information
principal. ethics principal. appropriateness are
 Confidentiality. ensured.
 Security. 1.6 Communication ethics
principal are adhered.
CoCA bagi Z-009-2:2015-CA01 Communication Application

iii
JADUAL PEMBAHAGIAN WIM (TEORI)
Z-009-2:2015 CORE ABILITIES
M01 – COMMUNICATION APPLICATION

Lesson Plan Information Sheet Assignment Sheet


Ability

1. Apply Two Way *Z-009-2:2015-M01/P(1/3)PM Z-009-2:2015-M01/P(1/3) Z-009-2:2015-M01/T(1/3)


Communication Two Way Communication Two Way Communication Two Way Communication

2. Disseminate Information
Electronically
*Z-009-2:2015-M01/P(2/3)PM Z-009-2:2015-M01/P(2/3) Z-009-2:2015-M01/T(2/3)
Manual And Electronic Manual And Electronic Manual And Electronic
Information Dissemination Information Dissemination Information Dissemination
3. Disseminate Information
Manually

4. Apply Information *Z-009-2:2015-M01/P(3/3)PM Z-009-2:2015-M01/P(3/3) Z-009-2:2015-M01/T(3/3)


Confidentiality Information Confidentiality Information Confidentiality Information Confidentiality

* Dibangunkan oleh Pusat Bertauliah (PB)

iv
JADUAL PEMBAHAGIAN WIM (AMALI)
Z-009-2:2015 CORE ABILITIES
M01 – COMMUNICATION APPLICATION

Ability Lesson Plan Work Sheet

*Z-009-2:2015-M01/K(1/3)PM Z-009-2:2015-M01/K(1/3)
1. Apply Two Way Communication
Apply Two Way Communication Apply Two Way Communication

2. Disseminate Information
Electronically
*Z-009-2:2015-M01/K(2/3)PM Z-009-2:2015-M01/K(2/3)
Disseminate Information Disseminate Information
Manually And Electronically Manually And Electronically
3. Disseminate Information Manually

4. Apply Information Confidentiality *Z-009-2:2015-M01/K(3/3)PM Z-009-2:2015-M01/K(3/3)


Apply Information Confidentiality Apply Information Confidentiality

* Dibangunkan oleh Pusat Bertauliah (PB)

v
JABATAN PEMBANGUNAN KEMAHIRAN
KEMENTERIAN SUMBER MANUSIA
ARAS 7 & 8 BLOK D4, KOMPLEKS D
PUSAT PENTADBIRAN KERAJAAN PERSEKUTUAN
62530 PUTRAJAYA

KERTAS PENERANGAN
(INFORMATION SHEET)

KOD DAN NAMA


PROGRAM / Z-009-2:2015 CORE ABILITIES
PROGRAM’S CODE AND
NAME

TAHAP / LEVEL 2 (TWO)

NO. DAN TAJUK


KEBOLEHAN TERAS /
CA 01 COMMUNICATION APPLICATION
CORE ABILITY NO. AND
TITLE

01.01 APPLY TWO WAY COMMUNICATION


NO. DAN PENYATAAN
KEBOLEHAN / 01.02. DISSEMINATE INFORMATION ELECTRONICALLY
ABILITY NO. AND 01.03 DISSEMINATE INFORMATION MANUALLY
STATEMENT
01.04 APPLY INFORMATION CONFIDENTIALITY

Mukasurat / Page : 1
NO. KOD / CODE NO. Z-009-2:2015-M01/P(1/3)
Drpd / of : 8

TAJUK / TITLE : TWO WAY COMMUNICATION

TUJUAN / PURPOSE :

The Information Sheet is intended to describe communication application requirements


of two-way communication, effective delivery of information and establishes the concept
of confidentiality.
The person who is competent in this CA shall be able to communicate in the working
environment effectively and clearly

1
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/P(1/3)
Drpd / of :8

PENERANGAN / INFORMATION:

1. Two Way Communication

1.1 Communication can be defined as a process of transferring information from one


place to another through sender and receiver to produce a response and achieve
an objective.

1.2 Information can be delivered through the word of mouth, in written form or through
body language.

1.3 The number and types of methods increase as information technology systems
become ever more sophisticated. Successful communication is accomplished by
being able to make people believe in what is being said. To do this, the speaker
must be sincere and enthusiastic and have all the facts needed to back up the
message.

1.4 The main objective of communication is to convey a message or information, to


persuade and to solve the problem. So the communication is a life blood of an
organization. It helps in planning, in making and implementing decision and builds
relationships.

1.5 The process of communication involves the delivery of information from speaker
to recipient through a few steps via channel or media. There are sender, encoding,
receiver, decoding and feedback.

i) Encoding is the formulation of message.


ii) Decoding is the interpreting of the message for understanding.
iii) Feedback is reaction or response of the receiver that reaches the sender.
iv) Media is channel or source through which message is carried to the receiver.

1.6 Effective communication takes place only when the listener clearly understands
the message that the speaker intended to delivered.

2. Communication Procedures
2
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/P(1/3)
Drpd / of :8

2.1 Each organization often creates procedures which are designed to communicate
effectively and efficiently with their staff. When you enter a new workplace, one of
the first things you will need to get to know is what systems are used to help
people communicate and how do they relate to you and your job. Some
organizations will have informal rules. Some workplaces can be very strict, with
elaborate rules.

2.2 Procedures for communication are rules that are put in place by the organization to
ensure that everyone does their job properly. Procedures might relate to:

i) Specific tasks
ii) Following instructions
iii) Requests from colleagues
iv) Answering telephone calls
v) Use of voice mail
vi) Use of internet and email
vii) Formal and informal discussions

3. Types of Communication

3.1 Internal communication involves communicating inside the organization with our
colleagues and supervisors that is the people you work with. There are two (2)
types of communication that can be used at a workplace:-

i) Verbal communication.
ii) Non verbal communication.

3.2 Verbal communication is communication that uses words to get a message,


idea, thought, argument, or piece of information across. It can be oral or written.
Non-verbal communication is communication that uses a non-verbal to get an
information by using facial expressions, gestures, body language, signals and
symbols.

3
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/P(1/3)
Drpd / of :8

4. Information Objective

4.1 Analyzing information objective is collected throughout any proving and


improving process can range from very simply drawing conclusions based on
feedback to creating spreadsheets to hold information, so that user can look
across various responses from different people. It can be done by one person
and summarized in a report or it can do by a group of people as a basis for a
discussion. There are three (3) element of information objective:

i) Gather and organize information


ii) Research and analyze information
iii) Present information

a) Gather and Organize Information;


 Information is gathered and organized in a format suitable for analysis,
interpretation and dissemination in accordance with organizational
requirements
 Information held by the organization is accessed and assessed for
accuracy and relevance in line with established organizational
requirements
 Methods of collecting information are reliable and make efficient use of
resources in accordance with organizational requirements
 Business technology is used to access, organize and monitor information
in accordance with organizational requirements
 Information is updated, modified, maintained and stored in accordance
with organizational

b) Research and Analyze Information;


 Objectives of research are clearly defined and consistent with
organizational requirements
 Data used in research is valid and relevant to research purposes
 Research strategies are appropriate to the requirements of the research
and make efficient use of available resources
 Methods of data analysis are reliable and suitable to research purposes

4
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/P(1/3)
Drpd / of :8

 Assumptions used in analyses are clear, justified and consistent with


research objectives
 Conclusions are supported by evidence and contribute to the achievement
of business objectives

c) Present Information;
 Recommendations and issues are presented in an appropriate format,
style and structure using suitable business technology
 Structure and format of reports are clear and confirm to organizational
requirements
 Research findings are reported and distributed in accordance with
organizational requirements
 Feedback and comments on suitability and sufficiency of findings is
obtained in accordance

4.2 Type Of Information


Despite their simple organization, routine request deserve a tactful touch. In
many organizations, there are many form of information such as memo, letter and
reports like these are sent to hundred or even thousands employees,
customer, clients, and shareholders. So the potential for creating a positive
impression is second only to the risk of causing ill will through ambiguous wording
or a discourteous tone.

In the large part, reports are managerial tools. The goal when developing a report
is to make the information as clear and convenient as possible, because time is
precious, tell the readers what they need to know –no more, no less-and present
the information in a way that is geared to their needs. Some people like to use a
computer to compare the information from reports he receives, some manager
like to get their reports orally, face to face but many managers prefer the
convenience and permanence of written paper reports. The purposes of the report
are:-
i) To monitor and control operations
ii) To help implement policies and procedures
iii) To comply with the legal or regulatory requirement

5
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/P(1/3)
Drpd / of :8
iv) To obtain new business or funding
v) To document work performed for a client
vi) To guide decisions or particular issue

5. Communication Ethics Principles

5.1 Ethics in small groups refers to the moral aspects of group interaction. The ethical
communication enhances human worth and dignity by fostering truthfulness,
fairness, responsibility, personal integrity, and respect for self and other." Thus,
ethical communication in small groups takes into account caring and
responsibility for oneself and the other group members.

Generally in small group work our concern is focused on getting the job done
while still maintaining reasonable relationships among group members. Although
some ethical dilemmas are more easily solved than others, all involve making
evaluations and judgments about what is morally right and wrong, what is fair
and what is not fair, and what will cause harm and what will not cause harm.

5.2 Principle of Communication Ethics


i) Truthfulness, accuracy, honesty, and reason are essential to the integrity of
communication.
ii) Endorse freedom of expression, diversity of perspective, and tolerance of
dissent to achieve the informed and responsible decision making
fundamental to a civil society.
iii) Strive to understand and respect other communicators before evaluating
and responding to their messages.
iv) Access to communication resources and opportunities are necessary to
fulfill human potential and contribute to the well being of families,
communities and society.
v) Promote communication climates of caring and mutual understanding that
respect the unique needs and characteristics of individual communicators.
vi) Condemn communication that degrades individuals and humanity through
distortion, intolerance, intimidation, coercion, hatred and violence.
vii) Commit to the courageous expression of personal convictions in pursuit of
fairness and justice.

6
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/P(1/3)
Drpd / of :8

viii) Advocate sharing information, opinions, and feelings when facing significant
choices while also respecting privacy and confidentiality.
ix) Unethical communication threatens the quality of all communication and
consequently the well being of individuals and the society in which we live.
x) Accept responsibility for the short- and long-term consequences for our own
communication and expect the same of others.

These principles also apply to important aspects of effective small group


communication, such as teamwork, critical thinking, creativity, and diversity.
Thus, ethical communication in small groups means that group members respect
and encourage diverse opinions, do not tolerate communication that degrades
and harms others, balance the sharing of information with a respect for privacy,
and listen for understanding and empathy before evaluating and critiquing.

7
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/P(1/3)
Drpd / of :8

SOALAN / QUESTION :

1. What do you understand about communication?


2. Name types of communication?
3. Explain briefly, what do you understand about principle of communication
ethics?

RUJUKAN / REFERENCE :

1. National Communication Association (2000). Credo on Ethical Communication.


Available at: http://www.natcom.org/policies/External/EthnicalComm.htm
2. O'Brien Hallstein, D. (1999). A postmodern caring: Feminist standpoint theories,
revisioned caring, and communication ethics. Western Journal of
Communication, 63, 32-56.
3. Santa Clara University's Markkula Center for Applied Ethics (2000). The ethics
connection. Website available at: http://www.scu.edu/SCU/Centers/Ethics/
4. Scheinin, R. (2000, April 16). Value judgments. San José Mercury News Silicon
Valley Magazine, 8-16.
5. John V. Thill, Business Communication Today, a Division of the McGraw. Hill
Companies, Fourth Edition
6. http://ftmk.kutkm.edu.my/disclaimer.php
7. http://www.archives.sa.gov.u/files/training
8. http://www.skillsyouneed.com/general/what-is-communication.html

8
JABATAN PEMBANGUNAN KEMAHIRAN
KEMENTERIAN SUMBER MANUSIA
ARAS 7 & 8 BLOK D4, KOMPLEK D
PUSAT PENTADBIRAN KERAJAAN PERSEKUTUAN
62530 PUTRAJAYA

KERTAS KERJA
(WORKSHEET)

KOD DAN NAMA


PROGRAM /
Z-009-2:2015 CORE ABILITIES
PROGRAM’S CODE AND
NAME

TAHAP / LEVEL 2 (TWO)

NO. DAN TAJUK


KEBOLEHAN TERAS / CA01 COMMUNICATION APPLICATION
CORE ABILITY NO. AND
TITLE

01.01 APPLY TWO WAY COMMUNICATION


NO DAN PENYATAAN
KEBOLEHAN / 01.02 DISSEMINATE INFORMATION ELECTRONICALLY
ABILITY NO. AND 01.03 DISSEMINATE INFORMATION MANUALLY
STATEMENT
01.04 APPLY INFORMATION CONFIDENTIALITY

Mukasurat / Page: 1
NO. KOD / CODE NO. Z-009-2:2015-M01/K(1/3)
Drpd / Of : 3

TAJUK / TITLE : APPLY TWO WAY COMMUNICATION

TUJUAN PEMBELAJARAN / INSTRUCTIONAL AIMS


Trainee should be able to:-
1. Identify communication procedure and protocols.
2. Establish information objectives.
3. Classify type of information.
4. Ensure information appropriateness.
5. Adhere to communication ethics principle.

13
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/K(1/3)
Drpd / of : 3

ARAHAN / INSTRUCTION
Trainees are required to instil these core abilities into NOSS related CU according to
respective level.

LUKISAN, DATA DAN JADUAL / DRAWING, DATA AND TABLE :

Nil

PERALATAN, PERKAKASAN DAN BAHAN / TOOLS, EQUIPMENT AND MATERIAL

BIL BAHAN UKURAN KUANTITI


(Bahan : Calon)

Refer to TEM in related NOSS

LANGKAH KERJA / STEPS BUTIRAN KERJA / DETAILS

Refer to related NOSS worksheet

SOALAN / QUESTION

Nil

14
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/K(1/3)
Drpd / of : 3

SENARAI SEMAK PENUNJUK KEBOLEHAN TERAS /


CORE ABILITY INDICATORS CHECKLIST

Bil / Penunjuk Pencapaian / Patuh/ Tidak Patuh / Catatan /


No. Performance Indicators Complied Not Complied Remark

Ability 1.1

The purpose for information is


1
established.

The type of information needed is


2
identified

Information appropriateness is
3
determined.

Ethical principal are adhered to (e.g.


4
confidentiality etc.).

Conclusions/results/decisions are
5
shared with people involved.

.................................................. ....................................................

( Tandatangan dan Nama Pelatih ) ( Tandatangan dan Nama Pengajar )


Trainee’s Name and Signature Instructor’s Name and Signature

Tarikh/Date: ____________________ Tarikh/Date: ____________________

15
JABATAN PEMBANGUNAN KEMAHIRAN
KEMENTERIAN SUMBER MANUSIA
ARAS 7 & 8 BLOK D4, KOMPLEK D
PUSAT PENTADBIRAN KERAJAAN PERSEKUTUAN
62530 PUTRAJAYA

KERTAS TUGASAN
(ASSIGNMENT SHEET)

KOD DAN NAMA


PROGRAM /
Z-009-2:2015 CORE ABILITIES
PROGRAM’S CODE AND
NAME

TAHAP / LEVEL 2 (TWO)

NO. DAN TAJUK


KEBOLEHAN TERAS / CA 01 COMMUNICATION APPLICATION
CORE ABILITY NO. AND
TITLE

01.01 APPLY TWO WAY COMMUNICATION


NO. DAN PENYATAAN 01.02. DISSEMINATE INFORMATION
KEBOLEHAN / ELECTRONICALLY
ABILITY NO. AND
STATEMENT 01.03 DISSEMINATE INFORMATION MANUALLY
01.04 APPLY INFORMATION CONFIDENTIALITY

Mukasurat / Page : 1
NO. KOD / CODE NO. Z-009-2:2015-M01/T(1/3)
Drpd / of : 4

TAJUK / TITLE : TWO WAY COMMUNICATION

TUJUAN / PURPOSE :
This Assignment Sheet is intended to enhance knowledge and understanding of two
way communication.

ARAHAN / INSTRUCTION :
You are requiqterd to answer all the questions and allowed to refer on Infiormation
Sheet Z-009-2:2015-M01/P(1/3)
9
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/T(1/3)
Drpd / of : 4

SOALAN / QUESTION :

1. What must the presentation speaker have beside have all the facts needed to back
up the message?
A. Be sincere and enthusiatic.
B. Good non-verbal convincing movement.
C. Understand the information before do research.
D. Must be able to communicate different languages.
(1 mark)
2. Why organization create communication procedures?
A. To make sure messages delivered.
B. To effectively and efficiently with their staff.
C. To be able commitment staff work with long hours.
D. To absord new rules and regulations for new staff to understand.
(1 mark)
3. What is another protocol specification defines as, beside the operation of the
protocol?
A. Indentify small group to work.
B. Apply rules and regulations at woork place.
C. Suggest how the protocol should be implemented
D. Understand the needs and value organization instruction.
(1 mark)
4. How is the process work of protocols that usually implemented by writing a number of
programs which communicate with one another?
A. Through queues and by function calls
B. By walking new straight line as requested.
C. Making notes and identifies new clients to work with.
D. Looking at messages from new clients to built communication group.
(1 mark)

10
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/T(1/3)
Drpd / of : 4

5. Some people like to use a computer to compare the information from reports he
receives, some manager like to get their reports orally, face to face but many
managers prefer what?
A. So workers can communicate among themselves
B. the convenience and permanence of written paper reports.
C. Speed up work of administration and operation of organisation
D. Provide information for explanation and understanding before work
(1 mark)

6. Successful communication is accomplished by being able to make people _______ in


what is being said
(1 mark)

7. In communication transaction, a speaker transmits a message and must


__________ that the message is delivered clearly.
(1 mark)

8. Some workplaces can be very strict, with elaborate rules and procedures for
communication are rules that are put in place by the organization to ___________
that everyone does their job properly.
(1 mark)

9. A protocol specification defines the operation of the protocol and may also suggest
how the protocol should be _______________ for achievement.
(1 mark)

10. Some worker _________ by gathering data and use computer to compare the
information from reports he receives.
(1 mark)

11
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/T(1/3)
Drpd / of : 4

SKEMA JAWAPAN

1. A
2. B
3. C
4. A
5. B
6. Believe
7. Ensure
8. Ensure
9. Implemented
10. Aware.

12
JADUAL PEMBAHAGIAN PENILAIAN KERJA KURSUS
Z-009-2:2015 CORE ABILITIES
M01 – COMMUNICATION APPLICATION

Performance Indicator
Ability Knowledge Assessment
Compliance

1. Apply Two Way Z-009-2:2015-M01/K(1/3)


Communication

2. Disseminate Information
Electronically
Z-009-2:2015-M01/KA(1/3) Z-009-2:2015-M01/K(2/3)

3. Disseminate Information
Manually

4. Apply Information Z-009-2:2015-M01/K(3/3)


Confidentiality

16
BAHAN PEMBELAJARAN
___________________________

LEVEL 2

CA01 : COMMUNICATION APPLICATION

SUB MODULE 2
MANUAL AND ELECTRONIC
INFORMATION DISSEMINATION

JABATAN PEMBANGUNAN KEMAHIRAN


KEMENTERIAN SUMBER MANUSIA
ARAS 7 – 8, BLOK D4, KOMPLEKS D
PUSAT PENTADBIRAN KERAJAAN PERSEKUTUAN
62530 PUTRAJAYA

JANUARI 2017
Z–009-2:2015-M01 COMMUNICATION APPLICATION

KANDUNGAN MUKASURAT

1. AHLI
COVERJAWATANKUASA
WIM PEMBANGUNAN i

2. CARTA PROFIL KOMPETENSI ii

3. CURRICULUM of CORE ABILITY

Z-009-2:2015 (CoCA-Z-009-2:2015-CA01) iii

4. JADUAL PEMBAHAGIAN WIM

4.1 TEORI v

4.2 AMALI vi

5. SET WIM TEORI

5.1 Z-009-2:2015-M01/P(2/3) 1

5.2 Z-009-2:2015-M01/T(2/3) 7

6. SET WIM AMALI

6.1 Z-009-2:2015-M01/K(2/3) 12

7. JADUAL PEMBAHAGIAN PENILAIAN 16

8. LAMPIRAN

8.1 BORANG PENILAIAN PRESTASI (JPK/CA/01) 17

8.2 REKOD PENILAIAN KUMULATIF (RPK) 19


STANDARD CONTENT

CORE ABILITIES PROFILE CHART (CAPC)

SECTOR ALL SECTORS

SUB SECTOR ALL SUB SECTORS

JOB AREA ALL JOB AREAS

NCS TITLE CORE ABILITIES

JOB LEVEL TWO (2) JOB AREA CODE Z-009-2:2015

HEALTH, SAFETY
COMMUNICATION INTERPERSONAL WORK PLACE
CORE AND ENVIRONMENT
APPLICATION BEHAVIOUR CULTURE BEHAVIOUR
ADAPTION

Z-009-2:2015-CA01 Z-009-2:2015-CA02 Z-009-2:2015-CA03 Z-009-2:2015-CA04

CAPC bagi NOSS Z-009-2:2015 Core Abilities

ii
CURRICULUM of CORE ABILITIES (CoCA)

SECTOR ALL SECTORS


SUB SECTOR ALL SUB SECTORS
JOB AREA ALL JOB AREAS
NCS AREA CORE ABILITIES
ABILITY UNIT TITLE COMMUNICATION APPLICATION

The person who is competent in this CA shall be able to communicate in the working world effectively and
clearly.
Upon completion of this competency unit, trainees will be able to:-
LEARNING OUTCOME  Apply two way communication
 Disseminate information electronically
 Disseminate information manually
 Apply information confidentiality

ABILITY UNIT ID Z-009-2:2015-CA01 Level 2 Training Duration 10

Training Delivery
Ability Knowledge Performance Assessment Criteria
Hours Mode
2. Disseminate 2.1 Information dissemination 2.1 Identify Information 4 Knowledge 2.1 Information dissemination
information purpose. dissemination purpose.  Lecture purpose identified.
electronically 2.2 Information dissemination 2.2 Disseminate information  Classroom 2.2 Information dissemination
procedure and process. appropriately. discussion procedure recognized.
2.3 Application of 2.3 Determine information 2.3 Proper language applied.
English/National Language, procedure. 2.4 Writing skills applied.
etc. 2.4 Select applicable language. 2.5 Electronic information
2.4 Grammar 2.5 Ensure vocabulary and delivery process identified.
2.5 Vocabulary grammatical capability. 2.6 Method of information
2.6 Writing skills 2.6 Apply report writing skills. delivery is identified.
2.7 Usage of PC 2.7 Deliver electronic information. 2.7 Right information
2.8 e-mail knowledge disseminated
2.9 Electronic information electronically.
delivery process.
iii
Training Delivery
Ability Knowledge Performance Assessment Criteria
Hours Mode

3. Disseminate 3.1 Information dissemination 3.1 Determine information 2 Knowledge 3.1 Information dissemination
information purpose. dissemination purpose.  Lecture. purpose is identified.
manually 3.2 Information dissemination 3.2 Recognize information  Classroom 3.2 Information dissemination
procedures. dissemination procedure. discussion. procedure is identified.
3.3 Report writing skills. 3.3 Apply writing skills. 3.3 Writing skills is applied.
3.4 Communication skills. 3.4 Practice communication skill. 3.4 Communication skill is
3.5 Types of information for 3.5 Identify types of information applied.
manually dissemination. for manually dissemination. 3.5 Type of information for
manually dissemination
identified.

CoCA bagi Z-009-2:2015-CA01 Communication Application

iv
JADUAL PEMBAHAGIAN WIM (TEORI)
Z-009-2:2015 CORE ABILITIES
M01 – COMMUNICATION APPLICATION

Lesson Plan Information Sheet Assignment Sheet


Ability

1. Apply Two Way *Z-009-2:2015-M01/P(1/3)PM Z-009-2:2015-M01/P(1/3) Z-009-2:2015-M01/T(1/3)


Communication Two Way Communication Two Way Communication Two Way Communication

2. Disseminate Information
Electronically
*Z-009-2:2015-M01/P(2/3)PM Z-009-2:2015-M01/P(2/3) Z-009-2:2015-M01/T(2/3)
Manual And Electronic Manual And Electronic Manual And Electronic
Information Dissemination Information Dissemination Information Dissemination
3. Disseminate Information
Manually

4. Apply Information *Z-009-2:2015-M01/P(3/3)PM Z-009-2:2015-M01/P(3/3) Z-009-2:2015-M01/T(3/3)


Confidentiality Information Confidentiality Information Confidentiality Information Confidentiality

* Dibangunkan oleh Pusat Bertauliah (PB)

v
JADUAL PEMBAHAGIAN WIM (AMALI)
Z-009-2:2015 CORE ABILITIES
M01 – COMMUNICATION APPLICATION

Ability Lesson Plan Work Sheet

*Z-009-2:2015-M01/K(1/3)PM Z-009-2:2015-M01/K(1/3)
1. Apply Two Way Communication
Apply Two Way Communication Apply Two Way Communication

2. Disseminate Information
Electronically
*Z-009-2:2015-M01/K(2/3)PM Z-009-2:2015-M01/K(2/3)
Disseminate Information Disseminate Information
Manually And Electronically Manually And Electronically
3. Disseminate Information Manually

4. Apply Information Confidentiality *Z-009-2:2015-M01/K(3/3)PM Z-009-2:2015-M01/K(3/3)


Apply Information Confidentiality Apply Information Confidentiality

* Dibangunkan oleh Pusat Bertauliah (PB)

vi
JABATAN PEMBANGUNAN KEMAHIRAN
KEMENTERIAN SUMBER MANUSIA
ARAS 7-8, BLOK D4, KOMPLEK D
PUSAT PENTADBIRAN KERAJAAN PERSEKUTUAN
62530 PUTRAJAYA

KERTAS PENERANGAN
(INFORMATION SHEET)

KOD DAN NAMA


PROGRAM /
Z-009-2:2015 CORE ABILITIES
PROGRAM CODE AND
NAME

TAHAP / LEVEL 2 (TWO)

NO. DAN TAJUK


KEBOLEHAN TERAS / CA01 COMMUNICATION APPLICATION
CORE ABILITY NO. AND
TITLE

NO. DAN PENYATAAN 01.01. APPLY TWO WAY COMMUNICATION


KEBOLEHAN / 01.02. DISSEMINATE INFORMATION ELECTRONICALLY
ABILITY NO. AND
01.03. DISSEMINATE INFORMATION MANUALLY
STATEMENT
01.04. APPLY INFORMATION CONFIDENTIALITY
Mukasurat / Page : 1
NO. KOD / CODE NO. Z-009-2:2015-M01/P(2/3)
Drpd / of : 6

TAJUK/TITLE : MANUAL AND ELECTRONIC INFORMATION DISSEMINATION

TUJUAN/PURPOSE :

This Information Sheet describes the effective method to delivery of information in the
working environment.
The person who is competent in this CA shall be able to disseminate information
electronically and manually.

1
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2: 2015-M01/P(2/3)
Drpd / of : 6

PENERANGAN/INFORMATION :

1. Information Dissemination Procedure And Process

1.1 Disseminate information means to distribute information or knowledge to the public


so that it reaches people or organization without direct feedback.

1.2 Dissemination involves a sender and receiver. It is quite different from a traditional
communication. In communication, a sender sending information, and receiver
collecting the information, processing it and sending back to sender.

1.3 With dissemination, the information is sent out and received, but no reply is given.
The message carrier sends out information to an audience.

1.4 Dissemination of information should be done according to the procedure and


processed so that the recipient of such information could identify who the sender,
date, time and clear and accurate information, as to obtain reaction.

1.5 Information delivery through manual also performed under certain circumstances
so that the news came to the selected recipients or two-way interaction. It also can
be done through weekly meeting or personnel discussion.

1.6 The use of electronic for the dissemination of information can deliver information
faster. Nevertheless all process information dissemination activities must be done
in accordance with the SOP, the truth and the approval.

Figure 1. News communication.

2
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2: 2015-M01/P(2/3)
Drpd / of : 6

2. Application Of Language

2.1 The use of language in an organization needs to be adjusted so that the desired
work smoothly.

2.2 An organization will set a custom language such as in Malaysia, the use of
language is Bahasa Malaysia and English. Local and foreign workers can interact
with the language.

2.3 The use of English is often the case in the superior department in communicating
with foreign workers and retail relationships international standards. But, Bahasa
Malaysia as Malaysian National Language must be skilled and in practice in
correspondence with the Government of Malaysia, the official ceremony with the
Government and interaction with local majority workers.

Figure 2.1 Communication language with foreign workers.

i) Grammar
Grammar is the way in which words are put together to form proper sentences.
Well versed in grammar can produce a clear explanation as required. Grammar
can also measure skills of a person and integrity of an organization.

ii) Vocabulary
Mastery of vocabulary can enhance the presentation. A person's vocabulary is the
set of words within a language that are familiar to that person.
A vocabulary usually develops with age or experiences, and serves as a useful
and fundamental tool for communication and acquiring knowledge.

3
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2: 2015-M01/P(2/3)
Drpd / of : 6

a) Reading Vocabulary
A literate person's reading vocabulary is all the words he or she can recognize
when reading. This is generally the largest type of vocabulary simply because a
reader tends to be exposed to more words by reading than by listening.
b) Listening Vocabulary
A person's listening vocabulary is all the words he or she can recognize when
listening to speech. People may still understand words they were not exposed
to before using cues such as tone, gestures, the topic of discussion and the
social context of the conversation.

Figure 2.2 Good presentation make audience want to listen.

c) Speaking vocabulary
A person's speaking vocabulary is all the words he or she uses in speech. It
is likely to be a subset of the listening vocabulary. Due to the spontaneous
nature of speech, words are often misused. This misuse – though slight and
unintentional – may be compensated by facial expressions, tone of voice, or
hand gestures.
d) Writing Vocabulary
Words are used in various forms of writing from formal essays to Twitter
feeds. Many written words do not commonly appear in speech. Writers
generally use a limited set of words when communicating: for example
 If there are a number of synonyms, a writer will have his own
preference as to which of them to use.
 He is unlikely to use technical vocabulary relating to a subject in which
he has no knowledge or interest.

4
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2: 2015-M01/P(2/3)
Drpd / of : 6

3. Report Writing Skills

3.1 Report writing skills through either manual or electronic products must be
delivered with the exact and correct language so the message is easy to understand.
Write and convey information should be done in a way that is readable and
understandable.

3.2 The foundation in writing and presenting information in an organization, such as a


Department to another Department, usually brief but understood its meaning.
Note that there should be such as the name of the sender to the recipient, the date,
time, name of the Department (if necessary) and title information. Practice the
presentation usually two paragraphs which is the purpose of the information and the
second paragraph is the goal.

i) Usage of Personal Computer (PC)


Have knowledge of using computers is an asset because it is a communication
tool. Personal computers have become commodities and important not only for the
benefit of themselves and even jobs. In the Organization, knowledge and
understanding of operating data base software program such as windows,
scanner and many others can help speed up the work of administration,
operations and so on.

Figure 3. Personal Computer

5
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2: 2015-M01/P(2/3)
Drpd / of : 6

ii) E-mail Knowledge


Electronic mail, most commonly referred to as email or e-mail (since 1993), is a
method of exchanging digital messages from an author to one or more
recipients.
Modern email operates across the Internet or other computer networks. Some
early email systems required the author and the recipient to both be online at the
same time, in common with instant messaging.

 Electronic mail (E-mail) has several language spelling options.


 E-mail is the most common form used online and world wide.
 E-mail practice as official letter for certain organization communication and
acknowledgment.
 E-mail was the form used in the original Request For Comments (RFC). The
service is referred to as mail, and a single piece of electronic mail is called
a message

4. Electronic information delivery process

4.1 The process of the delivery of electronic information it deems necessary and
important because it collects and connects data and information required by the
department or a particular organization.

SOALAN/QUESTION :
1. Explain the different between manual and electronic information disseminate.
2. Why is Personal Computer (PC) an asset as communication tool?

RUJUKAN / REFERENCES:
1. http://www.innovations.ac.uk/btg/resources/publications/dissemination.pdf
2. http://www.unesco.org/education/aladin/paldin/pdf/course02/unit_05.pdf
3. http://www.gaelscoileanna.ie/en/about/scaipeachan-eolaisdissemination-of-information/
4. https://en.wikipedia.org/wiki/Dissemination

6
JABATAN PEMBANGUNAN KEMAHIRAN
KEMENTERIAN SUMBER MANUSIA
ARAS 7-8, BLOK D4, KOMPLEK D
PUSAT PENTADBIRAN KERAJAAN PERSEKUTUAN
62530 PUTRAJAYA

KERTAS TUGASAN
(ASSIGNMENT SHEET)

KOD DAN NAMA


PROGRAM / Z-009-2:2015 CORE ABILITIES
PROGRAM CODE AND
NAME

TAHAP / LEVEL 2 (TWO)

NO. DAN TAJUK


KEBOLEHAN TERAS / CA01 COMMUNICATION APPLICATION
CORE ABILITY NO.
AND TITLE

01.01. APPLY TWO WAY COMMUNICATION


NO. DAN PENYATAAN
KEBOLEHAN / 01.02. DISSEMINATE INFORMATION ELECTRONICALLY
ABILITY NO. AND 01.03. DISSEMINATE INFORMATION MANUALLY
STATEMENT
01.04. APPLY INFORMATION CONFIDENTIALITY

Mukasurat / Page: 1
NO. KOD / CODE NO. Z-009-2:2015-M01/T(2/3)
Drpd / Of : 5

TAJUK / TITLE : MANUAL AND ELECTRONIC INFORMATION DISSEMINATION

TUJUAN / PURPOSE :
This Assignment Sheet is intended to enhance knowledge and understanding of
manual and electronic information disseminate.

ARAHAN / INSTRUCTION :
You are requiqterd to answer all the questions and allowed to refer on Infiormation
Sheet Z-009-2:2015-M01/P(2/3)

7
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/T(2/3)
Drpd / of : 5

SOALAN / QUESTION :

1. What is the key to effective dissemination?


A. Learning the language before used
B. Message is to identify and inform to superior
C. Understand the information before distribute it.
D. Match the means to the message and needs of the audience.

2. What is the objective of the Dissemination Plan in order to promote the commercial
exploitation of the project’s results and the widest dissemination of knowledge from
the project.
A. Message is to identify and inform to superior
B. Understand the information before distribute it
C. Knowing the message before forward to individu
D. Identify and organise the activities to be performed.

3. Why is the purpose of the use of language in an organization needs to be adjusted?


A. So that the desired work smoothly
B. So that simple information is provided
C. So that relationship among workers is obtained
D. So that discussion can be apply frequently at work

8
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/T(2/3)
Drpd / of : 5

4. Why language vocabulary is serves as a useful and fundamental tool?


A. For communication and acquiring knowledge
B. For understanding relationship work knowledge
C. For making work progress and perform relationship
D. For solving language working communication among worker

5. Why knowledge and understanding of operating data base software program such as
windows and scanner important?
A. So workers can communicate among themselves
B. Maintain good and effective comunication among workers
C. Speed up work of administration and operation of organisation
D. Provide information for explanation and understanding before work

6. All information dissemination must be usually reached by simple and clear so that the
recipient can understand and ______________ if it material instructions.
(1 mark)

7. New employees need to be given an early description in relation to a defined and


comply with regulations in understanding language ____________ and equipment
regulations to avoid material damage.
(1 mark)

8. In the beginning occupation part of communication, employees need to first


understand the task work, ____________ and want to learn before the given work
requires responsibility.
(1 mark)

9
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/T(2/3)
Drpd / of : 5

9. Having ____________and use of e-mail is very useful in the organization because it


can deliver a variety of pictures and data in one delivery.
(1 mark)

10. Grammar is useful in communication for making a language sound correct and easy
to __________________ at work.
(1 mark)

10
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/T(2/3)
Drpd / of : 5

SKEMA JAWAPAN

1. D
2. D
3. A
4. A
5. C
6. Comply
7. Instruction
8. Open-minded
9. Knowledge
10. Understand

11
JABATAN PEMBANGUNAN KEMAHIRAN
KEMENTERIAN SUMBER MANUSIA
ARAS 7-8, BLOK D4, KOMPLEK D
PUSAT PENTADBIRAN KERAJAAN PERSEKUTUAN
62530 PUTRAJAYA

KERTAS KERJA
(WORKSHEET)

KOD DAN NAMA


PROGRAM /
Z-009-2:2015 CORE ABILITIES
PROGRAM’S CODE AND
NAME

TAHAP / LEVEL 2 (TWO)

NO DAN TAJUK
KEBOLEHAN TERAS / CA01 COMMUNICATION APPLICATION
CORE ABILITY NO AND
TITLE

01.01. APPLY TWO WAY COMMUNICATION


NO DAN PENYATAAN 01.02. DISSEMINATE INFORMATION
KEBOLEHAN /
ELECTRONICALLY
ABILITY NO AND
STATEMENT 01.03. DISSEMINATE INFORMATION MANUALLY
01.04. APPLY INFORMATION CONFIDENTIALITY

Mukasurat / Page: 1
NO KOD / CODE NO Z-009-2:2015-M01/K(2/3)
Drpd / Of : 4

TAJUK / TITLE : DISSEMINATE INFORMATION

TUJUAN PEMBELAJARAN / INSTRUCTIONAL AIMS


Trainee should be able to:-
1. Identify Information dissemination purpose.
2. Disseminate information appropriately.
3. Determine information procedure.
4. Select applicable language.
5. Ensure vocabulary and grammatical capability.

12
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/K(2/3)
Drpd / of : 4

6. Apply report writing skills.

7. Deliver electronic information.


8. Determine information dissemination purpose.
9. Recognize information dissemination procedure.
10. Practice communication skill
11. Identify types of information for manually dissemination.

ARAHAN / INSTRUCTION
Trainees are required to instil these core abilities into NOSS related CU according to
respective level.

LUKISAN, DATA DAN JADUAL / DRAWING, DATA AND TABLE :

Nil

PERALATAN, PERKAKASAN DAN BAHAN / TOOLS, EQUIPMENT AND MATERIAL

BIL BAHAN UKURAN KUANTITI


(Bahan : Calon)

Refer to TEM in related NOSS

LANGKAH KERJA / STEPS BUTIRAN KERJA / DETAILS

Refer to related NOSS worksheet

SOALAN / QUESTION
Nil

13
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/K(2/3)
Drpd / of : 4

SENARAI SEMAK PENUNJUK KEBOLEHAN TERAS /


CORE ABILITY INDICATORS CHECKLIST

Bil / Penunjuk Pencapaian / Patuh/ Tidak Patuh / Catatan /


No. Performance Indicators Complied Not Complied Remark

Ability 1.2

Information dissemination purpose is


1
identified.

Information dissemination procedure is


2
recognized.

3 Proper language applied.

4 Writing skills are applied.

Ability 1.3

5 Electronic information delivery


Process is identified.

6 Method of information delivery is


identified.

7 Right information is disseminated


electronically.

8 Information dissemination purpose


is identified.

9 Information dissemination procedure


is identified.

10 Communication skill is applied.

11 Type of information for manually


dissemination is identified.

14
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/K(2/3)
Drpd / of : 4

................................................. ....................................................

( Tandatangan dan Nama Pelatih ) ( Tandatangan dan Nama Pengajar )


Trainee’s Name and Signature Instructor’s Name and Signature

Tarikh/Date: ____________________ Tarikh/Date: ____________________

15
JADUAL PEMBAHAGIAN PENILAIAN KERJA KURSUS
Z-009-2:2015 CORE ABILITIES
M01 – COMMUNICATION APPLICATION

Performance Indicator
Ability Knowledge Assessment
Compliance

1. Apply Two Way Z-009-2:2015-M01/K(1/3)


Communication

2. Disseminate Information
Electronically
Z-009-2:2015-M01/KA(1/3) Z-009-2:2015-M01/K(2/3)

3. Disseminate Information
Manually

4. Apply Information Z-009-2:2015-M01/K(3/3)


Confidentiality

16
BAHAN PEMBELAJARAN
___________________________

LEVEL 2

M01 : COMMUNICATION APPLICATION

SUB MODULE 3
INFORMATION CONFIDENTIALITY

JABATAN PEMBANGUNAN KEMAHIRAN


KEMENTERIAN SUMBER MANUSIA
ARAS 7 – 8, BLOK D4, KOMPLEKS D
PUSAT PENTADBIRAN KERAJAAN PERSEKUTUAN
62530 PUTRAJAYA

JANUARI 2017
Z–009-2:2015-M01 COMMUNICATION APPLICATION

KANDUNGAN MUKASURAT

1. AHLI
COVERJAWATANKUASA
WIM PEMBANGUNAN i

2. CARTA PROFIL KOMPETENSI ii

3. CURRICULUM of CORE ABILITY

Z-009-2:2015 (CoCA-Z-009-2:2015-CA01) iii

4. JADUAL PEMBAHAGIAN WIM

4.1 TEORI iv

4.2 AMALI v

5. SET WIM TEORI

5.1 Z-009-2:2015-M01/P(3/3) 1

5.2 Z-009-2:2015-M01/T(3/3) 10

6. SET WIM AMALI

6.1 Z-009-2:2015-M01/K(3/3) 14

7. JADUAL PEMBAHAGIAN PENILAIAN 17

8. LAMPIRAN

8.1 BORANG PENILAIAN PRESTASI (JPK/CA/01) 18

8.2 REKOD PENILAIAN KUMULATIF (RPK) 20


STANDARD CONTENT

CORE ABILITIES PROFILE CHART (CAPC)

SECTOR ALL SECTORS

SUB SECTOR ALL SUB SECTORS

JOB AREA ALL JOB AREAS

NCS TITLE CORE ABILITIES

JOB LEVEL TWO (2) JOB AREA CODE Z-009-2:2015

HEALTH, SAFETY
COMMUNICATION INTERPERSONAL WORK PLACE
CORE AND ENVIRONMENT
APPLICATION BEHAVIOUR CULTURE BEHAVIOUR
ADAPTION

Z-009-2:2015-CA01 Z-009-2:2015-CA02 Z-009-2:2015-CA03 Z-009-2:2015-CA04

CAPC bagi NOSS Z-009-2:2015 Core Abilities

ii
CURRICULUM of CORE ABILITIES (CoCA)

SECTOR ALL SECTORS


SUB SECTOR ALL SUB SECTORS
JOB AREA ALL JOB AREAS
NCS AREA CORE ABILITIES
ABILITY UNIT TITLE COMMUNICATION APPLICATION

The person who is competent in this CA shall be able to communicate in the working world effectively and
clearly.
Upon completion of this competency unit, trainees will be able to:-
LEARNING OUTCOME  Apply two way communication
 Disseminate information electronically
 Disseminate information manually
 Apply information confidentiality

ABILITY UNIT ID Z-009-2:2015-CA01 Level 2 Training Duration 10

Training Delivery
Ability Knowledge Performance Assessment Criteria
Hours Mode
4. Apply 4.1 Concept of 4.1 Identify concept of 2 Knowledge 4.1 Concept of confidentiality
information confidentiality. confidentiality.  Lecture. identified.
confidentiality 4.2 Confidentiality scope. 4.2 Identify confidentiality scope.  Classroom 4.2 Confidentiality scope
4.3 Confidentiality 4.3 Monitor confidentiality discussion. determined.
procedure. procedure. 4.3 Confidentiality procedure
4.4 Honesty and Integrity 4.4 Identify honesty and integrity identified.
level. level. 4.4 Honesty and integrity level
4.5 Codes of confidentiality. 4.5 Apply codes of confidentiality identified.
practice. 4.5 Codes of confidentiality
practice applied.

CoCA bagi Z-009-2:2015-CA01 Communication Application


iii
JADUAL PEMBAHAGIAN WIM (TEORI)
Z-009-2:2015 CORE ABILITIES
M01 – COMMUNICATION APPLICATION

Lesson Plan Information Sheet Assignment Sheet


Ability

1. Apply Two Way *Z-009-2:2015-M01/P(1/3)PM Z-009-2:2015-M01/P(1/3) Z-009-2:2015-M01/T(1/3)


Communication Two Way Communication Two Way Communication Two Way Communication

2. Disseminate Information
Electronically
*Z-009-2:2015-M01/P(2/3)PM Z-009-2:2015-M01/P(2/3) Z-009-2:2015-M01/T(2/3)
Manual And Electronic Manual And Electronic Manual And Electronic
Information Dissemination Information Dissemination Information Dissemination
3. Disseminate Information
Manually

4. Apply Information *Z-009-2:2015-M01/P(3/3)PM Z-009-2:2015-M01/P(3/3) Z-009-2:2015-M01/T(3/3)


Confidentiality Information Confidentiality Information Confidentiality Information Confidentiality

* Dibangunkan oleh Pusat Bertauliah (PB)

iv
JADUAL PEMBAHAGIAN WIM (AMALI)
Z-009-2:2015 CORE ABILITIES
M01 – COMMUNICATION APPLICATION

Ability Lesson Plan Work Sheet

*Z-009-2:2015-M01/K(1/3)PM Z-009-2:2015-M01/K(1/3)
1. Apply Two Way Communication
Apply Two Way Communication Apply Two Way Communication

2. Disseminate Information
Electronically
*Z-009-2:2015-M01/K(2/3)PM Z-009-2:2015-M01/K(2/3)
Disseminate Information Disseminate Information
Manually And Electronically Manually And Electronically
3. Disseminate Information Manually

4. Apply Information Confidentiality *Z-009-2:2015-M01/K(3/3)PM Z-009-2:2015-M01/K(3/3)


Apply Information Confidentiality Apply Information Confidentiality

* Dibangunkan oleh Pusat Bertauliah (PB)

v
JABATAN PEMBANGUNAN KEMAHIRAN
KEMENTERIAN SUMBER MANUSIA
ARAS 7-8, BLOK D4, KOMPLEK D
PUSAT PENTADBIRAN KERAJAAN PERSEKUTUAN
62530 PUTRAJAYA

KERTAS PENERANGAN
(INFORMATION SHEET)

KOD DAN NAMA


PROGRAM /
Z-009-2: 2015 CORE ABILITIES
PROGRAM CODE AND
NAME

TAHAP / LEVEL 2 (TWO)

NO. DAN TAJUK


KEBOLEHAN TERAS / CA01 : COMMUNICATION APPLICATION
CORE ABILITY NO. AND
TITLE

01.01. APPLY TWO WAY COMMUNICATION


NO DAN PENYATAAN
KEBOLEHAN / 01.02. DISSEMINATE INFORMATION ELECTRICALLY
ABILITY NO. AND 01.03. DISSEMINATE INFORMATION MANUALLY
STATEMENT
01.04. APPLY INFORMATION CONFIDENTIALITY
Mukasurat / Page : 1
NO. KOD / CODE NO. Z-009-2:2015 M01/P(3/3)
Drpd / of : 9

TAJUK/TITLE : INFORMATION CONFIDENTIALITY

TUJUAN/PURPOSE :
This information sheet describes the requirements to establish the concept of information
confidentiality. The person who is competent in this CA shall be able to apply information
confidentiality in the working environment effectively and clearly.

1
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2: 2015 M01/P(3/3)
Drpd / of : 9

PENERANGAN/INFORMATION :

1. Concept of confidentiality.

1.1 Confidentiality is roughly equivalent to privacy. Measures undertaken to ensure


confidentiality are designed to prevent sensitive information from reaching the wrong
people, while making sure that the right people can in fact get it: Access must be
restricted to those authorized to view the data in question.

It is common, as well, for data to be categorized according to the amount and type of
damage that could be done should it fall into unintended hands. More or less stringent
measures can then be implemented according to those categories.

Sometimes safeguarding data confidentiality may involve special training for those
privies to such documents. Such training would typically include security risks that
could threaten this information. Training can help familiarize authorized people with
risk factors and how to guard against them. Further aspects of training can include
strong passwords and password-related best practices and information about social
engineering methods, to prevent them from bending data-handling rules with good
intentions and potentially disastrous results.

Figure 1. Top Secret sign


A good example of methods used to ensure confidentiality is an account number or
routing number when banking online. Data encryption is a common method of
ensuring confidentiality.

User IDs and passwords constitute a standard procedure; two-factor authentication is


becoming the norm. Other options include biometric verification and security tokens,
2
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2: 2015 M01/P(3/3)
Drpd / of : 9

key fobs or soft tokens. In addition, users can take precautions to minimize the
number of places where the information appears and the number of times it is actually
transmitted to complete a required transaction.

Extra measures might be taken in the case of extremely sensitive documents,


precautions such as storing only on air gapped computers, disconnected storage
devices or, for highly sensitive information, in hard copy form only.

2. Confidentiality Scope And Procedure

2.1 Information need to be known as confidentiality and must be respected privacy


rights of organization. The information confidentiality needs to recognize such as;
i) Information Must Be Confidential
The information must be kept safe and not be readily accessible to persons that
normally deal with that kind of information. Information which is already in the
public domain is generally not protectable. However, where it is a defendant's
breach of confidence itself that has resulted in the information becoming publicly
available, the defendant remains liable for loss and damage suffered by the
plaintiff arising from such disclosure.

Figure 2 - Top Secret on envelope.

2.2. Disclosed In Circumstances Importing Confidentiality.


The information must have been imparted in circumstances which give rise to an
obligation of confidentiality. The recipient of confidential information will only be bound
if a reasonable man standing in the shoes of the recipient of the information would
realize on reasonable grounds that the information was being given to him in
confidence. The clearest case is of course where one person gives information on

3
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2: 2015 M01/P(3/3)
Drpd / of : 9

express condition that he keep it a secret. However, the obligation of confidentiality


may also arise by implication having regard to the surrounding circumstances.
One of the relationships in which this duty of confidentiality normally arises is that
of employer and employee. Generally, during the currency of his or her
employment, an employee must observe a "duty of fidelity" to his or her employer,
to act in the employer's best interests.

Figure 3 - Working environment.

This includes protecting the trade secrets that the employee is exposed to in the
course of his or her work. Once an employee leaves employ, he or she is still obliged
to keep confidential the trade secrets of his or her former employer. Thus, for
example, an employer is entitled to prevent an ex-employee from making use of a list
of customers which the employee deliberately memorized or copied for this purpose.
Such protection however does not extend to general skill and knowledge in the
employee's head which the employee would necessarily have acquired during the
course of his employment.

2.3: Actual or Anticipated Unauthorized Use Or Disclosure


Thirdly, there must be an actual or anticipated unauthorized use or disclosure of the
information in question. No action may be brought if no unauthorized breach of
confidence is threatened or has occurred.

Where the unauthorized disclosure or use is anticipated, the Courts will in the
appropriate circumstances grant an interlocutory injunction to prevent such use
or disclosure. The Courts may also award damages for any loss or damage
suffered by reason of a breach of confidence, or in certain circumstances, for
future injuries in lieu of an injunction.

4
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2: 2015 M01/P(3/3)
Drpd / of : 9

2.4: Protecting Confidential Information


There is no system of registration for confidential information. Protection is
available only by keeping the information secret, because once made public the
information cannot subsequently be made secret again. Even if the owner of the
misappropriated information takes legal action and obtains payment for the
damage suffered, this may never be as good as having the information kept
confidential in the first place. An important aspect of maintaining protection is
adequate management control by businesses. Access to confidential information
by staff should be restricted by management on a "need-to-know" basis, since
the commonest cause of loss of confidential information from a company is staff
moving to another firm in the same field of business. Appropriate clauses should
be included in employment contracts and contracts with third parties such as
suppliers, sub-contractors and the like.

2.5: Non-Disclosure Agreement (NDA)


It happens regularly in business that one company needs to disclose its confidential
information to another. For example, a manufacturer may need to submit its new
product to a test laboratory for technical assessment and approval prior to the product
being launched on the market. It is often also necessary to share secrets when some
form of cooperation is contemplated between two companies.

In these circumstances, it is strongly advisable for a Non-Disclosure Agreement


(NDA) to be drafted and signed by the parties that sets out their obligations to one
another in terms of any confidential information that needs to change hands. An NDA
provides the advantage that in the event legal action does become necessary due to a
breach of confidence, the matter can be handled in much the same way as
enforcement of any other business contract.

Figure 4. Test Laboratory.


2.6: Protection Of Undisclosed Information Under International Agreements Article 39
5
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2: 2015 M01/P(3/3)
Drpd / of : 9

of the TRIPs Agreement (Trade-Related Aspects of Intellectual Property Rights),


which is binding on member countries of the World Trade Organisation, requires
the protection of undisclosed information of commercial value and of certain data
submitted to governments or government agencies, in the course of such
countries ensuring effective protection against unfair competition.

3. Honesty And Integrity

3.1 Confidentiality, integrity and availability, also known as the CIA triad, is a model
design to guide policies for information security within an organization. The model
is also sometimes referred to as the AIC triad (availability, integrity and
confidentiality). The elements of the triad are considered the three most crucial
components of security.

Honesty with included sincerity is need in employee to preserve organization


information confidentiality. In this context, confidentiality is a set of rules that limits
access to information, integrity is the assurance that the information is trustworthy
and accurate, and availability is a guarantee of reliable access to the information by
authorized people.

i). Confidentiality:
Confidentiality is roughly equivalent to privacy. Measures undertaken to ensure
confidentiality are designed to prevent sensitive information from reaching the
wrong people, while making sure that the right people can in fact get it: Access
must be restricted to those authorized to view the data in question. It is common, as
well, for data to be categorized according to the amount and type of damage that
could be done should it fall into unintended hands. More or less stringent measures
can then be implemented according to those categories. Sometimes safeguarding
data confidentiality may involve special training for those privies to such documents.

Such training would typically include security risks that could threaten this
information. Training can help familiarize authorized people with risk factors and how
to guard against them.

6
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2: 2015 M01/P(3/3)
Drpd / of : 9

Figure 5. Data should be encrypted.

3.2 Integrity:
Integrity involves maintaining the consistency, accuracy, and trustworthiness of
data over its entire life cycle. Data must not be changed in transit, and steps
must be taken to ensure that data cannot be altered by unauthorized people (for
example, in a breach of confidentiality).

These measures include file permissions and user access controls. Version
control maybe used to prevent erroneous changes or accidental deletion by
authorized users becoming a problem.
In addition, some means must be in place to detect any changes in data that
might occur as a result of non-human-caused events such as an electromagnetic
pulse (EMP) or server crash. Some data might include checksums,
even cryptographic checksums, for verification of integrity. Backups or
redundancies must be available to restore the affected data to its correct state.

3.3 Availability:
Availability is best ensured by rigorously maintaining all hardware, performing
hardware repairs immediately when needed and maintaining a correctly
functioning operating system environment that is free of software conflicts. It’s
also important to keep current with all necessary system upgrades.

Providing adequate communication bandwidth and preventing the occurrence


of bottlenecks are equally important. Redundancy, failover, RAID even high
availability clusters can mitigate serious consequences when hardware issues do
occur.
7
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2: 2015 M01/P(3/3)
Drpd / of : 9

Fast and adaptive disaster recovery is essential for the worst case scenarios;
that capacity is reliant on the existence of a comprehensive disaster recovery
plan (DRP). Safeguards against data loss or interruptions in connections must
include unpredictable events such as natural disasters and fire.

To prevent data loss from such occurrences, a backup copy may be stored in a
geographically-isolated location, perhaps even in a fireproof, waterproof safe.
Extra security equipment or software such as firewalls and proxy servers can
guard against downtime and unreachable data due to malicious actions such as
denial-of-service (DoS) attacks and network intrusions.

4. Codes Of Confidentiality.

4.1 Employee shall safeguard information entrusted to them and not misuse or
wrongfully disclose it. The ethical duty of confidentiality must, at times, be
balanced against competing ethical considerations or legal or professional
requirements that call for disclosure of information obtained or created in a
research context.

For example, in exceptional and compelling circumstances, workers or


researchers may be subject to obligations to report information to authorities to
protect the health, life or safety of a participant or a third party. Researchers are
expected to be aware of ethical codes (such as professional codes of conduct) or
laws (e.g., those requiring the reporting of children in need of protection) that may
require disclosure of information they obtain in a research context. In other
situations, a third party may seek access to information obtained and/or created
in confidence in a research context.

Researchers shall also inform participants and seek their consent if their personal
information may be shared with government departments or agencies, community
partners in the research, personnel from an agency that monitors the research, a
research sponsor (such as a pharmaceutical company), the REB or a regulatory
agency.

8
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2: 2015 M01/P(3/3)
Drpd / of : 9

Figure 6. Researchers in laboratory.

Researchers may, however, provide administrative bodies with aggregated data


that cannot be linked to individuals for purposes such as policy-making or
program evaluation. When seeking consent, researchers shall advise prospective
participants if aggregated data from a project may be disclosed, particularly
where such disclosure may pose a risk to the participants. For example,
aggregate data provided to authorities about research on illicit drug use in a
penitentiary may pose risks of reprisal to the prisoners, even though they are not
identified individually.

When planning a study, researchers should incorporate any applicable statute-


based or other legal principles that may afford protection for the privacy of
participants and the confidentiality of research information.

SOALAN/QUESTION :

1. Describe how to ensure information confidentiality is safe?


2. Why code of confidentiality is needed?

RUJUKAN/REFERENCES:
1. http://www.unesco.org/education/aladin/paldin/pdf/course02/unit_05.pdf
2. https://en.wikipedia.org/wiki/Dissemination
3. http://www.gaelscoileanna.ie/en/about/scaipeachan-eolaisdissemination-of
information/
4. http://www.ehow.com/info_7832517_tools-disseminating-workplace information.html
9
JABATAN PEMBANGUNAN KEMAHIRAN
KEMENTERIAN SUMBER MANUSIA
ARAS 7-8, BLOK D4, KOMPLEK D
PUSAT PENTADBIRAN KERAJAAN PERSEKUTUAN
62530 PUTRAJAYA

KERTAS TUGASAN
(ASSIGNMENT SHEET)

KOD DAN NAMA


PROGRAM /
Z-009-2: 2015 CORE ABILITIES
PROGRAM’S CODE AND
NAME

TAHAP / LEVEL 2 (TWO)

NO. DAN TAJUK


KEBOLEHAN TERAS / CA01 - COMMUNICATION APPLICATION
CORE ABILITY UNIT NO
AND TITLE
1.
2. 01.01 APPLY TWO WAY COMMUNICATION
NO. DAN PENYATAAN 3. 01.02 DISSEMINATE INFORMATION
KEBOLEHAN /
ABILITY NO AND 4. ELECTRONICALLY
STATEMENT 5. 01.03 DISSEMINATE INFORMATION MANUALLY
01.04 APPLY INFORMATION CONFIDENTIALITY

Mukasurat / Page: 1
NO. KOD / CODE NO. Z-009-2:2015-M01/T(3/3) Drpd / Of : 4

TAJUK / TITLE : INFORMATION CONFIDENTIALITY

TUJUAN / PURPOSE :
This Assignment Sheet is intended to enhance knowledge and understanding of
information confidentiality.

ARAHAN / INSTRUCTION :

10
Muka / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/T(3/3)
Drpd/of : 4

You are requiqterd to answer all the questions and allowed to refer on Infiormation
Sheet Z-009-2:2015-M01/P(3/3)
SOALAN / QUESTION :

1. Why measures undertaken to ensure confidentiality is designed to prevent


sensitive information?
A. So people can continue learning
B. To make sure data can be seen.
C. From reaching the wrong people.
D. Learning new language and sign
(1 mark)

2. Why safeguarding data confidentiality may involve special training?


A. So can see data information.
B. Looking for right words and meaning.
C. Understanding the workplace procedure.
D. Help familiarize authorized people with risk factors.
(1 mark)

3. What is the easiest way to identify the information in the envelope that secret
Act?
A. Acknowledge being a secret agent.
B. Label clearly with red colour “Top Secret”
C. Just write ”Do Not Open” on the envelope.
D. Acknowledge being a secret penghantar surat rasmi
(1 mark)

4. Why any secret information of the agreement need to be respected by clients?


A. Can occur leaking information on both sides
B. Other organisation can betting for the contract
C. Relationship and collaboration both organisation occurs
D. Parties interested can still negotiate to know agreement information
(1 mark)

11
Muka / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/T(3/3)
Drpd/of : 4

5. Among the best way to avoid worker reveil secrets.


A. Don’t give right information
B. Let the worker choose right information
C. Employees need the signatures of undertaking and understood roles and
responsibilities
D. Have a good memory and be able to carry out work the way alone
(1 mark)

6. Special positions and employees identified have the attitude of __________ and
__________ should be given the responsibility to take care of the safety of the
ingredients secret organization.
(2 mark)

7. Recruitment or job for the task of keeping the secret organizations is through the
process of ______________ areas of the academy, the involvement of social
and occupational activity of previous experience.
(1 mark)

8. The holder of the secret material must ensure that the content protected and
controlled, and its clients _________ with stringent rules so that in violation of the
agreement will be brought to justice.
(1 mark)

9. In work that requires disclosure of the secret ingredients in testing materials, only
workers who screened and qualified be present to ensure _______________
(1 mark)

10. To prevent data loss, ________________ worker must aware a need of


backup copy may be stored in more safety rules included fire-proof.
12
Muka / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/T(3/3)
Drpd/of : 4

(1 mark)

SKEMA JAWAPAN

1. C

2. D

3. B

4. C

5. C

6. Honesty, trust

7. Identifying

8. Comply

9. The safety of the secret

10. Responsible

13
JABATAN PEMBANGUNAN KEMAHIRAN
KEMENTERIAN SUMBER MANUSIA
ARAS 7-8, BLOK D4, KOMPLEK D
PUSAT PENTADBIRAN KERAJAAN PERSEKUTUAN
62530 PUTRAJAYA

KERTAS KERJA
(WORKSHEET)

KOD DAN NAMA


PROGRAM /
Z-009-2:2015 CORE ABILITIES
PROGRAM’S CODE AND
NAME

TAHAP / LEVEL 2 (TWO)

NO. DAN TAJUK


KEBOLEHAN TERAS / CA01 COMMUNICATION APPLICATION
CORE ABILITY NO. AND
TITLE

01.01 APPLY TWO WAY COMMUNICATION


NO. DAN PENYATAAN
KEBOLEHAN / 01.02 DISSEMINATE INFORMATION ELECTRONICALLY
ABILITY NO. AND 01.03 DISSEMINATE INFORMATION MANUALLY
STATEMENT
01.04. APPLY INFORMATION CONFIDENTIALITY

Mukasurat / Page: 1
NO. KOD / CODE NO. Z-009-2:2015-M01/K(3/3)
Drpd / Of : 3

TAJUK / TITLE : APPLY INFORMATION CONFIDENTIALITY

TUJUAN PEMBELAJARAN / INSTRUCTIONAL AIMS


Trainee should be able to:-
1. Identify concept of confidentiality.
2. Identify confidentiality scope.
3. Monitor confidentiality procedure.
4. Identify honesty and integrity level.
5. Apply codes of confidentiality practice.

14
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/K(3/3)
Drpd / of : 3

ARAHAN / INSTRUCTION
Trainees are required to instil these core abilities into NOSS related CU according to
respective level.

LUKISAN, DATA DAN JADUAL / DRAWING, DATA AND TABLE :

Nil

PERALATAN, PERKAKASAN DAN BAHAN / TOOLS, EQUIPMENT AND MATERIAL

BIL BAHAN UKURAN KUANTITI


(Bahan : Calon)

Refer to TEM in related NOSS

LANGKAH KERJA / STEPS BUTIRAN KERJA / DETAILS

Refer to related NOSS worksheet

SOALAN / QUESTION

NIL

15
Mukasurat / Page :
NO. KOD / CODE NO. Z-009-2:2015-M01/K(3/3)
Drpd / of : 3

SENARAI SEMAK PENUNJUK KEBOLEHAN TERAS /


CORE ABILITY INDICATORS CHECKLIST

Bil / Penunjuk Pencapaian / Patuh/ Tidak Patuh / Catatan /


No. Performance Indicators Complied Not Complied Remark

Ability 1.4

The concept of confidentiality is


1
established

2 Confidentiality scope is identified

The level of honesty and integrity is


3
monitored

Commitments to work, peers and


4
superiors are demonstrated.

Established standards and codes of


5
confidentiality practices are adhered.

.................................................. ....................................................

( Tandatangan dan Nama Pelatih ) ( Tandatangan dan Nama Pengajar )


Trainee’s Name and Signature Instructor’s Name and Signature

Tarikh/Date: ____________________ Tarikh/Date: ____________________

16
JADUAL PEMBAHAGIAN PENILAIAN KERJA KURSUS
Z-009-2:2015 CORE ABILITIES
M01 – COMMUNICATION APPLICATION

Performance Indicator
Ability Knowledge Assessment
Compliance

1. Apply Two Way Z-009-2:2015-M01/K(1/3)


Communication

2. Disseminate Information
Electronically
Z-009-2:2015-M01/KA(1/3) Z-009-2:2015-M01/K(2/3)

3. Disseminate Information
Manually

4. Apply Information Z-009-2:2015-M01/K(3/3)


Confidentiality

17

Vous aimerez peut-être aussi