The reports should be only about the person concerned and should be signed and dated. Every care should be made to ensure that client records are stored securely and remain confidential. The Data Protection Act of 1998 has set a code of practice that all Social Care establishments must comply with. Within a client’s home environment records should ideally be kept in a secure, locked cupboard, out of sight from casual visitors. Establishments that have a number of clients should ensure that records are up-to-date and are kept in a locked filing cabinet, preferably in a secure office.
There is also the Caldicott Standards which govern the sharing of information, based on The Data Protection Act (1998). The Freedom of Information Act (2000) provides a general right of access to information held by Public Authorities. Anyone can request information from Public Authorities and has the right to be told if the Public Authority holds the information and if it does, be provided with that information. 1.2 Summarise the main points of legal requirements and code of practice for handling information in health and social care Data Protection Act (1998) Sets out 8 principles governing the use of personal information. These are:- • Personal data should be processed fairly and lawfully.
They must make sure the information is: * used fairly and lawfully * used for limited, specifically stated purposes * used in a way that is adequate, relevant and not excessive * accurate * kept for no longer than is absolutely necessary * handled according to people’s data protection rights * kept safe and secure * not transferred outside the UK without adequate protection http://www.rac.co.uk/privacy-policy The RAC follows the rules laid out in the Data Protection Act 1998 by only using the data submitted to them by customers for the purpose that is was submitted for, for example health data for your registration under the Motability Scheme. The Computer Misuse Act is another legal issue that businesses must take into account. This Act was introduced in attempt to prevent and protect businesses from viruses, hackers, copyright infringements and fraud on their computer systems. The Computer Misuse Act has made it illegal to: * gain unauthorised access to a computer’s data for the purpose of blackmailing * commit software piracy by copying programs illegally * hack into and gain unauthorised access to a computer’s data * gain access to a computer’s data without permission with the purpose of altering or deleting it or to plant a virus There are also ethical issues that a business must follow as to how it is run, including the use of its information. Ethics are a set of principles that a business should follow in
1.1. Identify legislation and codes pf practice that relate to handling information in social care setting There is a legislation Act called the data protection Act 1995, this gives an individual the right to see all the information recorded about them, this includes the individual seeing their own medical records or social services files. The information Act 2000 amended January 2005 has provided an individual to access general information held by public authorities, including local authorities and the National Health Service. Confidentiality Health and Social Care Act 2000, this is so an individual’s information is kept confidential, unless in some circumstances information is past on. For example if a individual is at risk or if they have been given new medication etc., any other information on a individual should be kept confidential, some locked away just for managers.
1.1 Identify the legislation that relates to the recording, storage and sharing of information in health and social care One such legislation is the Data Protection Act formed in 1998 which states that individuals have a right to see data collected that relates to them and that no individual can see anyone else's personal information. Another legislation is the Health and Social Care Act 2008 which states that information should be gather to monitor infection rates and to assess the risk of infection at any time. The Freedom of Information Act 2000 tells us that the public has the right to access information from public authorities. These are a few examples which again show the importance of accessing information; telling us who can see what information. 1.2 Explain why it is important to have secure systems for recording and storing information in a health and social care setting There are many reasons why the recording and storage of information is important.
In outcome 21 it explains how records should be kept securely and can be located promptly when required. It expresses that important accurate record keeping is a must. The general Social care council (GSCC) codes of practice Also explains how to maintain clear and accurate records as required by procedures established for your work. It also explains about respecting confidential information and clearly explaining agency policies about confidentiality to service users and carers. As well as the
The Freedom of Information Act 2000 gives individuals the right to ask organisations about all the information they have about them. 1.2 Q: Explain why it is important to have secure systems for recording and storing information in a health and social care setting. A: It is important to have secure systems for recording and storing information so that individuals and staff's private information will be protected from unauthorised viewing. It is to comply with legislation and it is the right of individuals and staff to have their private information protected. It is important to ensure information is accessible to those who need to know it.
Unit 4222-226 Gain access to the homes of individuals, deal with emergencies and ensure security on departure 1.1 Access information about general requirements for entering and leaving individuals’ homes It is important to know the information about accessing a client’s home. For instance do we ring the bell or are there a key safe or any risks when entering the property. More important is that we keep this information safe so that the house is not accessible for strangers. Always keep a client safe so make sure when leaving the property the house is secure. 1.2.
1.2 Special requirements and individual preferences for entering and leaving an individual’s home could include how to access keys (such as using a key safe), how to use an entry system and have access to any necessary codes or passwords, to present clear and up to date identification, to phone the individual prior to arrival, and to arrive at an agreed time. Company policies and procedures should be followed at all times, all risks should have been identified at a previous risk assessment and provisions out in place as necessary, and the security arrangements should be double checked with the individual on leaving the property (for example if it is acceptable to leave an upstairs window open during the day in the summer time). Special requirements may also include how the individual wishes to be greeted on arrival, particularly if they are sensory impaired. 2.1 Any visits to an individual should be planned
The 1998 Act covers information or data stored on a computer or an organised paper filing system about living people. The really basic way it works is by: 1. setting up rules that people have to follow 2. having an Information Commissioner to enforce the rules It does not stop companies storing information about people. It just makes them follow rules. The Eight Principles of Data Protection –The Rules to be followed For the personal data that controllers store and process: 1. It must be collected and used fairly and inside the law.