Use this form to record details of activities (tick as appropriate) QCF Diploma Level: …………………………………………………………..
Observed by your Assessor
Seen by expert Witness or Witness
Observed by L20 Observer
Learner account
Learner Name: … ……………………………………………………
QCF Unit(s)
Learning
Outcome(s)
Assessment Criteria
Evidence
Date of Activity:
4222-307
1. Identify legislation and codes of practice that relate to handling information in health and social care
The Data Protection Act 1998 is mandatory. All organisations that hold or process personal MUST comply.
The Data Protection Act 1998 (DPA 1998) is an act of the United Kingdom Parliament defining the ways in which information about living …show more content…
people may be legally used and handled. The main intent is to protect individuals against misuse or abuse of information about it.
The Data Protection Act covers everything we do with the information about others, including how it is obtained, created, stored, retained, disposed of, used, who it is/isn’t disclosed to and how the information is shared. Any breach of the Data Protection act can cost up to £500,00.00.
The Freedom of Information Act 2000 and Environmental Information Regulations 2004 relate to the official information about the local authorities business and its activities. It gives individuals the right to see certain official information held by the council. In order for the council to be able to respond to requests for information, it is important to know what information we hold and where it is stored, as a failure to respond will lead to a breach of the act
The Wales Accord on the Sharing or Personal Information or “WASPI” as it is more commonly known is a Welsh Government initiative. It provides a framework for organisations in Wales that ensures any personal information shared is done so in a safe and legal way. If personal information is shared with an outside organisation on a regular basis we need to ensure that we have a WASPI Information Sharing Protocol in situ first. During every assessment I undertake the service user is always given the opportunity to declare any outside organisations or persons they do not wish to have their information shared with.
The Computer Misuse Act 1990 makes it illegal for someone to gain unauthorised access to your computer. There are three separate offences under the Act and some may carry a custodial sentence. They are as follows;
a. Unauthorised access to information that’s held on a computer
b.
Unauthorised access with intention of using the information to commit a crime
c. Unauthorised modification of information that’s held on a computer.
There are a number of internal key information and security policies that staff must follow as an employee of Rhondda Cynon Taff County Borough Council. All of these policies can be found on the internal intranet system: Inform, and any suspected breach should be reported to the ICT Helpdesk immediately.
The Information Security Policy creates a framework to protect the Council’s information, whether electronic or paper based from any form of threat, including both internal, and external, deliberate or accidental. It ensures that any data or information held is protected from unauthorised access and that its integrity and confidentiality is maintained.
The Retention and Disposal Policy provides a corporate framework and guideline for the data and how it is stored, how long it is stored for and how it is safely and securely disposed of.
The Internet and Email Acceptable Use Policy provides all staff with access to email and internet a framework and set of rules and regulations to follow, to ensure that they know what they can and cannot enter or send
electronically.
2. Summarise the main points of legal requirements and codes of practice for handling information in health and social care
Protect the rights and promote the interests of service users by sticking to the rules set out within the Data Protection Act 1998 and all other legislative Acts
Use data Fairly, and lawfully process it lawfully
Use data for limited and correct purposes
All information and data must be kept secure at all times, and any information kept on computers should be password protected
All information should be processed, taking into account the individuals rights
Ensure that all data is not excessive, but adequate and relevant
Data is not to be kept for longer than necessary
Data must be accurate but concise, containing only facts not assumptions, of the person making an entry
Not transferred to another country that can not maintain the confidentiality of the information.
Assessor Signature: …………………………… Date: ………………………….
Witness Signature: ........................................ Date: ………………………….
Role of Witness ………………………….
Learner Signature: …………………………… Date: ………………………….