Preview

Dealing with Confidential Information

Satisfactory Essays
Open Document
Open Document
335 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Dealing with Confidential Information
Business and Administration
Unit three // Session 2 Dealing with confidential information
An example of a procedure for dealing with confidential paper-based information 1. Confidential paper-based information must be stored in red folders. These will be marked clearly with the word CONFIDENTIAL. 2. The red files are stored in red cabinets. The cabinets are always locked. For each cabinet there will be an authorised keyholder (or keyholders). 3. The files may only be accessed with the consent of the authorised keyholder. This consent may be withheld. 4. Confidential files should be kept up to date by an authorised senior administrator. 5. Confidential files that have passed their retention date or that are no longer required should be deleted / destroyed by cross shredding. 6. Confidential files should not be taken from their office base without permission. An example of a procedure for dealing with confidential electronicbased information The protection of electronic systems is often done through the use of access levels. These specify who can (and who cannot) access a certain type of document. The access levels may include: 1. No access allowed – this means highly confidential documents cannot be found or read by all but a few people. The document will not show up when internal organisation searches are made. 2. Read-only access – this means a member of staff can read the document. 3. Read and edit access – a member of staff can access the document and change it. 4. Enter and index access – the member of staff can scan in new documents, index them and save them in a designated folder. 5. Distribution access – the member of staff is authorised to distribute documents. 6. System administration access – this senior member of staff has the authority to change access levels / change how things are stored and filed / make decisions on archiving and deleting files.

Key point! The aim is to ensure that the organisation identifies the level of sensitivity of a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The organisational requirements are as follows; Consider the purpose or purposes you hold the information for in deciding whether (and for how long) to retain it, securely delete information that is no longer needed for this purpose or these purposes, update, archive or securely delete information if it goes out of date, review the length of time you keep personal data.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The different information systems include filing cabinets where hard copies are stores or electronically where saved changes can be made and they can be made safe with a password. The information in the filing cabinets is generally a paper based file, containing any original documents and copies of documents that have been used in a case. The paper based file can hold private and confidential information including personal…

    • 798 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Task B 307

    • 338 Words
    • 1 Page

    To make sure all records are properly secured you should have passwords on all computers and locks on all filing cabinets, making sure after every use you put paper files away and you lock your computer if you need to leave it. If you were to have visitors in the office were you secure document you should make sure you have put all away and not leave anything on show. When you have locked the cupboards you should keep the key with authorised person.…

    • 338 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Hrm/531 Week 1

    • 2047 Words
    • 9 Pages

    The administration at St. John’s Hospital takes pride in their sound policies and procedures for the protection of confidential client information. In fact, they serve as a model for other institutions in the area. However, printouts discarded in the restricted-access IS department are not shredded. On numerous occasions, personnel working late observed the cleaning staff reading discarded printouts. What actions, if any, should these…

    • 2047 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Mandatory Unit 4223 011

    • 806 Words
    • 3 Pages

    It is important to maintain confidentiality, sensitive personal data about a patient is recorded during a patients stay in the hospital setting and this information could cause embarrassment to the patient if it was divulged to people who did not need to know, for example, friends or family. In the Intensive Care Unit where I work, we are endeavouring to make our patient notes more secure by purchasing storage desks at each patient's bedside that have a lockable drawer for the notes, and the patients obs chart has a cover over the top, so that only those that need to see it can access it easily. We need to keep our patient records safe as they are a permanent record of the patients medical history. It is advisable to keep patient notes in a metal cabinet in order to preserve them if there was a fire. The hospital also scans notes electronically so there is a copy on a hard disc and archives the notes outside of the hospital environment in a safe storage unit. The computer systems are secured with passwords and firewalls to prevent unauthorised access to the system. We need to keep our notes secure in this way in order to retain public confidence that we are treating their…

    • 806 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Legal requirements give you guidance and support when storing and handling personal and confidential information about an individual, it will enable you to store information correctly and safely.…

    • 307 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When ensuring the security of information, records should be stored correctly, any confidential calls or meetings should be private and take place where nobody can accidentally overhear the conversation, all records should be returned to the correct storage place. And any lost, stolen or destroyed records should be reported immediately, you should ensure the proper disposal of any information or records that are no longer needed or are damaged.…

    • 532 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    CU2470

    • 1201 Words
    • 4 Pages

    2.1 Describe how in your work setting you can access guidance, information and advice about handling information…

    • 1201 Words
    • 4 Pages
    Good Essays
  • Good Essays

    CASE STUDY NUMBER: 7 1. The Ethical Dilemma: “As professionals in the field of education, we sometimes tend to forget that the children we work with have the right to privacy and their reports are deemed confidential. How can you politely tell another professional that to discuss a child's record without the family consent is not appropriate?” (Bailey & Burch, 2016, p. 338) 2. Ethical principle(s) (the Code) addressed in this Case: 2.06…

    • 1519 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    3.5 Question Describe the Principles and Boundaries of Confidentiality and when to share Information. Confidentiality is essential in Schools and in a Child Care Settings, however, what I have been told about a Child or Young Person is highly sensitive information and should be kept confidential and not to be discussed or be disclosed with anyone whether it be about their health or other particular needs. As a Support Worker, some Parents may approach me and tell me some personal or sensitive information about their Child or Young Person. Even though they confide in me, I will have to let them know that I will need to share what they had shared with me to my settings Manager.…

    • 281 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    * Accurate but concise, containing only facts not assumptions, of the person making an entry.…

    • 604 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Course Work

    • 510 Words
    • 3 Pages

    3a) For your own organisation (or one you know well), describe the procedures that need to be followed when archiving, retrieving and deleting information. Your answer should cover procedures for both electronic and paper-based information.…

    • 510 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Patients routinely communicate personal information with health care providers. On the off chance that the classifications of this information were not secured, trust in the doctor or health care provider relationship would be reduced. Patients would be less inclined to share sensitive information, which could adversely affect their care. Confidentiality is integral to the improvement of trust amongst specialists and patients. Patients must have the capacity to expect that information about their wellbeing is kept private unless there is a convincing reason that it ought not to be. There is additionally a solid open enthusiasm for secrecy as people who need treatment will be urged to look for treatment and…

    • 304 Words
    • 2 Pages
    Satisfactory Essays