Preview

Handling Information

Satisfactory Essays
Open Document
Open Document
269 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Handling Information
Handling Information Guidelines

How to maintain up to date, complete, accurate and legible records. Record events as they happen or shortly afterwards to get the most complete and accurate account of what has happened. Ensure and entry is made every day Only record facts not hearsay or personal opinion. Check care information on a regular basis and update records to reflect this only write in black pen have entries for medication or diagnosis double checked and signed.

How to ensure the records are stored securely.

Make sure that there is a designated area for the records to be stored and ensure that everybody knows to put them back immediately after use.

How to ensure security when reading or making entires Only read the files in the secure office so they are not visible to people walking by Again only make entries whilst in the secure office so they are not visible to passers by

When storing the records in the office ensure that they are put back in the cupboards and the locks are working securely, in the office we have magnetic locks on the doors with no visible handles or locks.

List of key legislation

 Sex Discrimination Act 1975, Amendment 1982, 1999
 Equal Pay Act 1976
 Race Relations Act 1976, Amendment 2000. Amendment Regulations 2003
 Employment Rights Act 1996 and the Employment Relations Act 1999
Disability Discrimination Act 1995, Amendment in force from October 2004
 Protection from Harassment Act 1997
 Human Rights Act 1998
 European Race and Employment Directives 2000
 Disability Rights Commission Act 2000
 Employment Equality (Sexual Orientation) Regulations 2003
 Employment Equality (Religion or Belief) Regulations

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lock the servers into their own room with keycard or fingerprint access only. Only authorized IT staff shall have access. Management, vendors and all other authorized guest shall be escorted by an authorized IT staff member. Video surveillance should be maintained and monitored at all access…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    As with any other system, all data needs to be kept secure. Employee confidentiality is of paramount importance, particularly in a system that hold and utilizes potentially sensitive personal employee information. Moreover, seemingly innocuous information such as standards and procedures within the company also need to be kept secure. Any secure, sensitive, or proprietary information should be encrypted and password…

    • 793 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 8 Assignment

    • 380 Words
    • 2 Pages

    Security breaches being conducted by the employees at the Banana Tree Travel Agency consist of the way they keep their passwords written down on a piece of paper or a little sticky note to remember what it is. By doing this, they create a security breach, allowing other employees to view what their user name and password may be to their computer. Vital and important information are now at risk and in harm’s way by exposing your password to everyone within your environment. In some cases, customers come back to the work stations accompanied by other employees and if a dishonest customer see your information, the network could be accessed.…

    • 380 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In my setting we use an online learning journal, each parent/carer has a unique password. No parent/carer can view any other child’s online learning journal. Some children that do not have access to the internet have a folder journal, this is kept locked away in the staff room, only the key worker has access to this and it will be shown to the parent/carer regularly, the parent is allowed to take this out of the setting. All registration forms are locked away in the office and are kept secure by the manager. All nappy forms, medication forms and all about me forms are locked away in the staff room. No parent is able to see any other child’s personal information. Existing injuries and the accident book is kept in the staff room, all members of staff have access to this if/when it is needed. These books are never removed from the setting. All pictures that are taken in the setting are never shared with any other parent/carer, all pictures are deleted once they have been added to the child’s online journal or folder journal.…

    • 504 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The information is stored in locked filing cabinets as the information can hold company details and account numbers this is only accessible by the Administration staff and each file is signed out on a register.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    ERR task B

    • 933 Words
    • 3 Pages

    Data protection: never give out personal information about colleagues or service users to unauthorised people or organisations. Never disclose commercial information about company’s activities to unauthorised people or organisations. Keep all data secure and use my own log in and not share passwords. Any papers, CD’s, portable USB devices should be locked away whenever possible, cabinets and draws that contain sensitive…

    • 933 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    In preparing your work area, you should make sure you have adequate space for your computer, printer, fax, and storage. For security reasons, your working area should be off limits to your family and friends.…

    • 253 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Tda 3.6

    • 671 Words
    • 3 Pages

    1.2 Ways in which we can promote equality and diversity throughout the school setting is to:…

    • 671 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    After dealing it, spend time on more specific issues by asking question:  Does an appropriate records retention schedule for the records exist?  Is the information in the records available at another location or format?  Are you compliance with the Minnesota Government Data Practices Act?…

    • 822 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    - Security: By law I must only use internet connections that are DSL; and not wireless. I must have all offices locked with access ability controlled to those in positions of authority; a paper shredder & all files with client confident materials such as bank account numbers stowed with lock and key.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    legal assesment

    • 3454 Words
    • 14 Pages

    DAVID Jones has been hit with a $35 million lawsuit from former publicity co-ordinator Kristy Fraser-Kirk, whose sexual harassment claims led to the shock resignation of boss Mark McInnes.…

    • 3454 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    LIBRARY SYSTEM THESIS

    • 928 Words
    • 4 Pages

    Since the amount of student/borrower and books is increasing, it is necessary to prepare s space to store them. After a long time, the record book will be stockpiled. It needs well organized and it is hard to find the record in short time because they need to find it one by one. This will cost extra time and is not efficient at all .…

    • 928 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Mis Case Ntuc

    • 1209 Words
    • 5 Pages

    Despite having to throw away all paper records, scan and store on “trusted” storage device, currently about 500 office staff and 3,400 insurance advisor could access the information and system anytime, anywhere.…

    • 1209 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Key Management process

    • 313 Words
    • 2 Pages

    Temporary staff, Housekeeping staff or Security staff will not to responsible for handling the office key(s).…

    • 313 Words
    • 2 Pages
    Satisfactory Essays