Preview

Task B 307

Satisfactory Essays
Open Document
Open Document
338 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Task B 307
Explain how to maintain records so that they are up to date, complete, accurate and legible.

A good way of maintaining records is on a computer or in a file that can be kept confidential and kept up to date. Records should be updated each time the individual is seen, either at home or in a clinical setting, you need to update the files with all medical information, opponents and outcome of any test they may have had. If information is not recorded on that individual then it is not legible. You should record, when you arrive and when leaving, what you do while there, if you need to do anything outside of their care plan and the outcome of the visit.

Describe how to ensure records are stored securely.
To make sure all records are properly secured you should have passwords on all computers and locks on all filing cabinets, making sure after every use you put paper files away and you lock your computer if you need to leave it. If you were to have visitors in the office were you secure document you should make sure you have put all away and not leave anything on show. When you have locked the cupboards you should keep the key with authorised person.

Describe how to ensure security when reading or making entries into records.
When you have to make alterations to a person file you should make sure that only the authorised persons are in the room and if there is unauthorised people in the office then you should wait till they have left before getting the file out or accessing there information on the computer.

Describe any special feature of different storage systems that help to ensure security
To ensure security you would have you computer network encrypted, and multiple passwords for computers you should never use the same password they should always be different, when using filing cupboards you would should have locks on them and different locks with different keys for each cupboard..

You May Also Find These Documents Helpful

  • Powerful Essays

    LIT1 Task 310

    • 3249 Words
    • 10 Pages

    SOLE PROPRIETORSHIP: A sole proprietorship is the easiest of all the business types to start and take the least amount of start-up capital. This is also the most common form of doing business in the United States. With a sole proprietorship, the business and the owner are one in the same and it is not possible to bring someone into the business.…

    • 3249 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Lock the servers into their own room with keycard or fingerprint access only. Only authorized IT staff shall have access. Management, vendors and all other authorized guest shall be escorted by an authorized IT staff member. Video surveillance should be maintained and monitored at all access…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    LIT1 Task 310

    • 695 Words
    • 4 Pages

    Facts of Situation A as it pertains to the Family and Medical Leave Act of 1993 (FMLA).…

    • 695 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    LIT 1 Task 310

    • 3134 Words
    • 10 Pages

    When a business forms, the owner or owners must decide how to classify it. The type of classification will ultimately determine the rules under which the business will operate. Six general types of business entities exist with multiple variations thereof. Each type of business entity has advantages and disadvantages and there is no one type of entity that’s better than another. Business owners must decide how their business should be classified based on their individual and unique needs. Several factors will influence the business owner’s decision. These factors include liability, taxes, longevity, control, profit retention, location, and burden.…

    • 3134 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    EGT1 Task 309

    • 2915 Words
    • 9 Pages

    We have all heard the phrase, “Stretch your dollar”, but have you ever stopped to consider what all goes on behind the scenes in order to make this stretch occur? What rules of economics and finance play into making your hard-earned dollar stretch to its maximum value? While the topic of stretching your money spans across all areas of business, finance, and economics, I will focus on the fundamental principle of economic stretch; elasticity.…

    • 2915 Words
    • 9 Pages
    Better Essays
  • Better Essays

    INT1 Task 3

    • 1389 Words
    • 6 Pages

    2. Leave bags of popcorn in freezer 24 hours to insure they are thoroughly frozen.…

    • 1389 Words
    • 6 Pages
    Better Essays
  • Good Essays

    BA L2 Unit 14

    • 449 Words
    • 2 Pages

    1.4 Confidential business information should be properly secured. If it isn't, data can potentially be misused. For instance, making sure the files you are using have a password put in place to…

    • 449 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Int Task 3

    • 2010 Words
    • 9 Pages

    The purpose of this project is to determine the fastest computer operating system for solving mathematical equations. Which operating system, Windows 7 or Ubuntu Linux, performs the best when it comes to pure number crunching? In order to test this question, the researcher ran a Java based application that benchmarks the ability of each operating system to perform a mathematical operation across three different data types and a second, more complex, mathematical operation. The Java based application, Java Micro Benchmark, performs each mathematical operation eight times per test and the researcher ran the test five times for each operating system. The mathematical operations testsed by Java Micro Benchmark are integer arithmetic, long integer arithmetic, double-precision floating point arithmetic and trigonometric arithmetic. This method gave the researcher data for forty tests per mathematical operation for each operating system. The resulting data is then compared to determine which operating system is able to process mathematical operations the fastest.…

    • 2010 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    221 - Use office equipment

    • 2807 Words
    • 12 Pages

    The computers have lots of important features. A lot of confidential information and documents are kept safe in protected electronic files on the computer such as PAS (patient attendance system). We also have intranet, which I mostly use to access…

    • 2807 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    1.3 – Explain the purpose of legal and organisational requirements for the security and confidentiality of information.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Access Control Simulation

    • 698 Words
    • 3 Pages

    Cubicle 2-1 had a pre-approved offsite equipment request posted This should be secured to prevent an unauthorized person from stealing equipment. Both cubicle 2-1 and 2-2 had fingerprint scanners. Cubicle 2-3 had a locked file drawer and the computer was password protected as it locked after four attempts. Cubicle 2-4 did have a UPS but there was a flashdrive on the desk as well as login information on a post it note. Flashdrives should be encrypted and increased controls surrounding password/login information should be enforced. Password/login…

    • 698 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    303 Task C

    • 354 Words
    • 1 Page

    I work in the care industry and have clients and honour other people’s religion or non religion that I look after that have had a totally different upbringing that myself. Some of these clients have dementia, I was raised in a different country with different beliefs. I had a traumatic upbringing but I cannot ever let my clients know about what my beliefs and life experiences are about. I through my experience with working in this environment have learnt that I have had to research other religions and beliefs and have learnt to respect all people and their beliefs. Prayers are a daily thing for me even though this was not taught to me in my earlier years. Religion affects people in many different ways mainly because we all come from different backgrounds and were all taught differently. It is therefore very important to respect and honour their personal beliefs. Some want to go to church on Sundays and others do not want to speak about church at all and I must respect the fact that they do not want to speak about anything about the Church. It is part of the work that I do to make sure my clients are happy and therefore am conscious at all times that they feel comfortable about anything they want to talk to me about.…

    • 354 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Kahuna Cleaning Supply

    • 914 Words
    • 5 Pages

    use passwords to protect your files and ensure that others are unable to access your work.…

    • 914 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Ethics in E-Commerce

    • 685 Words
    • 2 Pages

    Security is another area of concern. In home based e-businesses computers and files need to be properly stored and locked. In the event of any home burglary or ethically-challenged house guests, mechanisms need to be in place to guard and protect electronically stored information and files.…

    • 685 Words
    • 2 Pages
    Good Essays