1. Information must be fair and lawfully processed 2. Data must be processed for a limited purpose 3. Data must be adequate, relevant and not excessive 4. Data must be kept up to date 5.
UNIT 209 UNDERSTANDING HOW TO HANDLE INFORMATION IN SOCIAL CARE SETTINGS. OUTCOME 1: Understand the need for secure handling of information in social care settings. 1.1) Identify the legislation that relates to recording, storage and sharing of information in social care. Data protection Act 1998: The information that is supplied by individual is used, this covers eight principles under which personal data must be protect and collect. Data protection Act demands that all data collected can only be accessed with the client consent, also the client has the right to know what information you have collect has well, they also have the right to ask if there is any information that you have collect, that they don’t already know this the freedom of information Act 2000, Explain why it is so important to have secure systems for recording and storing information in a social care setting.
Manual and electronic information storage systems are used so to ensure confidently these actions can be used, locking cupboards/ drawers, have passwords protected files and only allowing access to those who need it. 3. Helping to support others to handle information is also important others can include colleagues, social workers, GP, any third party’s, nurses, pharmacist's and occupational therapists are to name a few. Helping to
Assignment 209 Ai. Identify two laws or pieces of legislation that relate to the recording, storage and sharing of information in an adult social care setting. The Data Protection Act 1998 The Freedom of Information Act 2000 Aii. Explain why it is important to have secure systems for recording and storing information in a social care setting. All information is to be kept up to date and accurate and stored securely in a locked cupboard or computer with passwords so only certified people can access it.
2.1- manual- at work all written documentation is stored alphabetically in locked offices. Our care plans have an ‘access to resident file’ form in the front which residents or their families fill in letting everybody know who is allowed to access the information. Electronic- documents stored electronically e.g. on a computer are protected by fire walls and anti-virus software as well as passwords which are changed on a regular basis and only authorised personnel have access to. 2.3- it is important that the records we have are kept up to date, complete, accurate, and legible to ensure that people are receiving the care and support that they need as their needs may change.
Be relevant to the purpose for which it was processed, 5. Data needs to be accurate and up-to-date, 6. Be kept only for the timeframe needed, 7. Be accessible to the individual the information is regarding, and 8. Be properly secure.
Unit 9 UNDERSTAND HOW TO HANDLE INFORMATION IN SOCIAL CARE SETTINGS. 1. Understand the need for secure handling of information in social care settings 2.1 Identify the legislation that relates to the recording, storage and sharing of information in social care The Data Protection Act 1998 is a United Kingdom Act of Parliament which defines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs the protection of personal data in the UK. Although the Act itself does not mention privacy, it was enacted to bring UK law into line with the European Directive of 1995 which required Member States to protect peoples fundamental rights and freedoms and in particular their right to privacy with respect to the processing of personal data.
Management will make use of a formal process to review each account to ensure each user has only minimum access needed to perform his/her job function. The company will make use of (third party or proprietary) software (see number 3) that will automatically log and notify administrators and/or management when any users’ privileges and/or rights are changed and/or elevated. Users’ access rights and privileges must be routinely reviewed to maintain effective control over networks, data and systems. This policy would have helped management and/or administrators to detect the unauthorized accounts and their subsequent privilege elevation. It is important to point out that this particular policy alone may not necessarily prevent attacks, but when implemented will help to build another layer of security.
AC 1.1 &1.2 Know the statutory responsibilities and rights of employees and employers within our area of work Data Protection Act 1998 This act commenced on the 1st March 2000, it protects the rights and privacy of individuals, ensuring data is not processed without persons consent or knowledge. The data is held in an electronic format as well as formal data. SOAS ensures data is obtained fairly, persons that own the data are notified of who holds their data; who is using it and for the duration period and if any third party can obtain the data. Data can only be obtained by if the data subject gives permission, this could be employment reasons, court and jury or any legal obligation. SOAS ensures data is only used for the specified purpose and no other reason, unless the consent is given by the subject.
Be aware of the circumstances under which information must be disclosed. Report any suspected breach of confidentiality to the line manager and make sure that records held on the people who use the services are only accessed by staff who have a need to view that information and to maintain personal information in a way that complies with the principles of the Data Protection Act 1998. In my work place I work in line with the organizational Confidentially and Disclosure of Information policy which outlines how I use information management systems in line with legal and ethical requirements in the following ways: Requests from third parties should usually be in writing and on the organization’s headed paper where this applies Where a request is made by phone the caller must be known or their identity verified, prior to any information being provided. Staff must exercise caution when leaving answer phone messages of a confidential nature. When sending confidential information by post it must state that the contents are not to be disclosed to any other party, other than those requesting the information.