Professional Documents
Culture Documents
EDC 3-24-SBL-JUNE 2021-NCCP-Answer Plan
EDC 3-24-SBL-JUNE 2021-NCCP-Answer Plan
Date:
External stakeholders
Donors
They are those who are currently not related and involved
with NCCP. Recent coverage means…..need to keep them
informed.
1b. Critically assess Evaluation Competitive advantage sees NCCP able to meet and fulfil
NCCP’s sources of the needs of its target market more effectively and
skills
competitive efficiently than other charitable organisations.
advantage.
( in assessing Objective of NCCP to make education affordable to those
NCCP’s most who would not otherwise have this opportunity ( high
important unemployment )
sources of
competitive Sources of competitive advantage
advantage )
1.pricing – but failed to differentiate between those who
can and cannot afford
Conclusion
Ceeville Council
CEO to persuade the
board
30% of NCCP’s funding or income is from the Council.
Any request made by the Council, executive board
should be wise to comply as internal controls may arise
as part of its compliance conditions.
Donors
Course participants
Local community
4a. Explain the need for Commercial Project Draft sections of a report
cybersecurity at NCCP management
acumen
and recommend actions
the board should take to skills Turnbull The need for cybersecurity
meet its cybersecurity Report Cybersecurity is the promotion of individual and
responsibilities organisation’s technology and data from
( highlighting FINTECH
key benefits to unauthorised access or attack. NCCP relies on
NCCP of technology to operate, it could face these risks.
cybersecurity,
and recommend IC systems will be able to highlight cyber attacks
practical actions and risks and the impacts od these risks are
the board should damaging …..for example ….
take )
Any organisation which has weak cybersecurity
controls likely to be attractive target to the hacker. In
addition, NCCP may be targeted by a disgruntled
staff or participant.
Steps:
1. Cybersecurity a priority – include in the agenda
of board meetings
2. Seek expert advice where necessary
3. Establish and communicate a clear cyber
security policy
4. Contingency plans
5. Regular review of cybersecurity risks