Trusted by 2+ million users, 1000+ happy students everyday
Showing pages 1 to 3 of 9 pages
Level 3Diploma in Health care Support (QCFHandling of informationUNIT 8 WORKBOOKAuthenticity Statement:I confirm that the evidence in this workbook is my own.Full NameSignatureDate of completionAssessor SignatureIV Signature
INTRODUCTIONInformation is an asset. Our data, documentation and intellectual property hassignificant financial value and needs to be protected just as carefully as we protect ourphysical assets. For protecting essential data, concept of handling of information come intopicture. Information handling can be simply defined as management and controlling ofoverall data. All users of information systems should manage the creation, storage,amendment, copying, back-ups, deletion or destruction of information in a manner whichprotects the confidentiality, integrity and availability of such information (Hsu, C. C., HTCCorp, 2013). The present report is explaining various legislations that is obeyed or used inhealth and social care setting in order to manage the important data.1.1.List 4 legislation that relate to handling information in health and social care.The key four legislations that relate to handling information in health and social care arestated below :1. Data Protection act 19982. Freedom of information act 20003. Disability discrimination act 19984. Carer of practice set out by the CQC and the general social care councilSummarise 2 codes of practice that relate to handling information in health and social care. 1.Under the data protection act, we must make sure the information we handle is: used fairly and lawfullyused for limited, specifically stated purposesused in a way that is adequate, relevant and not excessiveaccuratekept for no longer than is absolutely necessaryhandled according to people’s data protection rightskept safe and securenot transferred outside the UK without adequate protection (Guo, Innovative Sonic Ltd, 2012).
Recorded information includes printed documents, computer files, letters, emails, photographs, and sound or video recordings. The Act does not give people access to their own personal data. This is where the Freedom of information act comes into play.2. The CQC provides us with codes of practice that support us with running the business in lawful manner by using information confidentially and appropriately. Confidential information is likely to include information about a persons:Physical or mental health.Social or family circumstances.Financial standing and financial details.Education, training and employment experience.Religious beliefs.Racial or ethnic origin.Sexuality.Criminal convictions.The information could contain sensitive information about their past, condition or illness, team information etc. (Katz, P. and et. al., 2011). It is a criminal act if we don not follow these codes of practice.1.2Briefly describe the main points of each the legislations that you have listed above.The main points are, to keep any information on a need to know basis, to hold anyinformation shared to you as private and confidential, unless the service user tells peoplehimself, or says otherwise. Do not discuss anything in earshot of other people, keepeverything under lock and key. There are 8 enforceable principles and they are: Fairly andlawfully processed, processed for limited purposes, adequate and relevant and notexcessive, accurate, not kept longer than necessary, processed in accordance with the datasubject’s rights, kept secure and finally, not transferred to countries without adequateprotection. Description of each legislations mentioned above are following :1. The Data Protection Act : The Data Protection Act (1998) makes provision for theregulation of the processing of information relating to individuals, including the obtaining,holding, use or disclosure of such information (Meyer, M. and et, al., 2014). This rule is alsoknown as the DPA, regulates the use and protection of personal data. It supersedes theData Protection Act 1984 and Access to Personal Files Act 1987.It was amended in 2003 to give individuals more control over digital marketingcommunications they receive, meaning they must opt-in to receive emails, SMS textmessages etc from an organisation if they've never had contact with it before.
Found this document preview useful?
You are reading a preview Upload your documents to download or Become a Desklib member to get accesss