Creating process documentation

Process documentation

The knowledgebase is our area for how to guides, policies, procedures etc. It covers information about how to deliver the work for our clients. Knowledge creation is an ongoing task, everyone needs to create and use process documentation. Process documentation is created using the following process:

  1. create a policy
  2. create a procedure
  3. send the procedure for approval
  4. publish the procedure
  5. Review, update and continuously improve.

 

The goal of writing process documentation is that anyone, regardless of their level of experience or understanding, should be able to follow the step by step process and achieve the desired task or outcome. Use video, screenshots and dot points to convey information quickly and simply. Keep it short, sharp and to the point.

Short term knowledge - contained in chat, forums and email

Medium term knowledge - contained in documents and presentations

Long term knowledge - contained in Manuals and Procedure Guides.

The knowledgebase is also a place for harvesting ideas and feedback and everyone is encouraged to submit ideas and feedback through the support desk so that we build a habit of accessing the information but also so that it remains fresh and current so that we can continue to grow the body of knowledge.

    • Related Articles

    • Typical Buyer Decision Process

      The buyer decision process is outlined below to help you understand if you are targeting each stage effectively. Problem recognition - The first part is identifying whether they have a problem. This problem may not be causing them any trouble because ...
    • Workplace Health and Safety Policy

      Purpose Relevate is committed to ensuring, as far as is reasonably practicable, the health, safety and welfare of the working environment for its staff, volunteers, contractors and visitors to its premises. Scope This policy applies to: All staff ...
    • Textblaze for text expansion

      Why would I want to use Text Blaze? Text Blaze is a ‘text expander’ which is much more efficient than ‘copy and paste’. Instead of using Text Blaze, you could do the same thing by copying and pasting from a document where you have this message ...
    • Zero Tolerance Domestic and Family Violence Policy

      This policy outlines our approach to Domestic and Family Violence and Procedures for dealing with abusers and the abused. We take a Zero Tolerance approach to domestic and family violence. The purpose of this policy is to: Promote safety Identify ...
    • Information Security Incident Management

      Introduction This policy covers incident management of Information Security Breaches. Preparation This policy covers the outline of requirements to ensure that we are ready to respond to incidents rapidly and minimise the impact of any issues or ...
    • Popular Articles

    • Email deliverability

      If emails are not arriving in your inbox from your bulk email platform you need to consider making a few changes. Over the years email has become a widely used marketing tool. It has one of the lowest costs of all marketing channels. Unfortunately, ...
    • Migrating from Chrome to Edge

      You might be in a situation where you'd just like to have all of you favorites or auto-fills moved over from one browser to another. Some reasons may be that you're more interested in using Edge now because of that handy little AI that all the cool ...
    • Tag your Zoho Partner

      To allow us to provide you with support we need to add your account to our partner portal. This allows us to complete support requests on your behalf. No matter what zoho program you have you can tag us by clicking on the Tag Your Partner link below ...
    • Relevate People Recruitment FAQs

      Welcome to Relevate People, This article will guide you through some common questions about working with us: FAQs Am I working for Relevate People? Relevate People is a Technical Virtual Staffing organisation. We provide the facilities for our ...
    • Information Security Incident Management

      Introduction This policy covers incident management of Information Security Breaches. Preparation This policy covers the outline of requirements to ensure that we are ready to respond to incidents rapidly and minimise the impact of any issues or ...