At the time of recording the information all clarifications can be made for accuracy.The records should be signed, dated and legible for other users to access easily. 2.2 Describe practices that ensure security when storing and accessing information. The practices that ensure security when storing and accessing
* The General Social Care Council (GSCC) ‘Codes of Practice’ – 1.2 Summarise the main points of legal requirements and codes of practice for handling information in health and social care. The 8 priciples of Data Protection Act 1998 states the personal must be: Fairly and lawfully processed Processed for limited purposes Adequate, relevant and not excessive for the purpose Accurate and kept up to date Not kept for longer than necessary Processed in accordance with the data subjects rights Kept secure Not transferred to countries without adequate protection 2. Be able to implement good practice in handling
Legal requirements and codes of practice can be used to inform handling information these are GSCC, ISO, local or internal codes of practice, 2. Records must be kept up to date, complete, accurate and legible. These can be maintained in a number of ways eg, writing must be clear and accurate, using a black pen, including time,date,and names, if any mistakes occur putting a line though it and initialling the error, recording any information straight away or when the time is practicable. Security, storing and accessing information must be done properly this can be done by returning records to the correct storage place, making sure on-one can hear any confidentail information, keeping records within the workplace, signing out records and appropriate disposal are some of the ways. Manual and electronic information storage systems are used so to ensure confidently these actions can be used, locking cupboards/ drawers, have passwords protected files and only allowing access to those who need it.
The relationships that must be considered are: • Objects – This can be files, printers, computers, and other resources. • Access Tokens – the access token is used to verify access to the ACE for the object. Access Tokens are recreated at each log-on. • Access Control List (ACL) /Access Control Entries (ACE) – ACL is a table that indicates the access rights a user has access to as it relates to a particular object. ACE are each input of the ACL.
Access to private information will be limited to authorized persons whose job responsibilities require it, as determined by an appropriate approval process, and to those authorized to have access by state or federal law. Access is given through the establishment of a unique account in accordance with account request procedures. Users are expected to become familiar with and abide by Bloom policies, standards and guidelines for appropriate and acceptable usage of the networks and systems. All users will have access to expectations, knowledge, and skills related to information security. Every user must maintain the confidentiality of information assets even if technical security mechanisms fail or are absent.
The holding authority must explain why they have withheld information. Sectors covered by this Act are: government departments, local assemblies, councils, local authorities, health care trusts, hospitals, doctors surgeries, police, colleges and universities, non-department public bodies, commitees and advisory bodies. The Care Quality Commission (CQC) monitors the guidance about compliance, it explains all essential and expected standards of quality and safety. It is a guide to help providers of Health and social care to comply with the Health and social care Act 2008. In outcome 21 it explains how records should be kept securely and can be located promptly when required.
Unit 4222-307 Legislation and codes of practice relating to handling information are the data protection act 1998 and also the freedom of information act 2000. In accordance with legislation data stored must be kept secure and only kept for as long as necessary. It has to be accurate and relevant and not excessive. It also cannot be moved to somewhere without adequate protection. 2.1- manual- at work all written documentation is stored alphabetically in locked offices.
This Act has eight legally enforceable ‘data protection principles’: • Information must be processed fairly and lawfully • It must be used for limited and declared purposes • It must be accurate, up to date and relevant • Information must be held no longer than necessary • It must be kept secure • May not be transferred overseas unless safeguards are in place • Individuals have a legal right to see any personal information you have stored about them Confidentiality is a central trust between a service user and a health and social care setting to enable an open, beneficial and honest relationship. At . The circumstances under which confidentiality will be breached are: • Where a child is suspected of being at risk or harm • When a service user or another person is at risk of harm • Where a worker is summoned by a court to give evidence • If a service user discloses information about criminal offences, including being in possession of offensive weapons, or potentially pending criminal activity • If a service user is found to be discussing the sale or purchase of illegal drugs, or found to be in possession of these whilst on service premises • Where information may be related to the Terrorism Act Good practices in handling information which is stored
3) Engineering and isolating controls - The provision or mechanical aides, barriers, machine guarding, ventilation or insulation to isolate a hazard from workers. For example: Using antiglare screens on computers. 4) Establishing policies, procedures and work practices - Designed to reduce a workers exposure to a risk can also include the provision of specific training & supervision. For example: Increasing job variety and introducing job rotation. 5) Personal Protective Equipment (PPE) - PPE must be provided and maintained by the employer and the employer must also provide training for workers required to use it.
Responsible for the recruitment and selection of employees. Deal with any discipline and grievance issues in accordance with set HR policies and procedures. 5. To maintain a working knowledge of Health and Safety at Work Act and associated legal requirements and regulations and ensure full compliance within the working environment. 6.