• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Within the adult branch of nursing the information system that is predominantly used within ward settings is P.A.S., (Patient Administration System). This system holds details about patients such as their name and address, their age, their GP,

Extracts from this document...

Introduction

Confidentiality and Security Within the adult branch of nursing the information system that is predominantly used within ward settings is P.A.S., (Patient Administration System). This system holds details about patients such as their name and address, their age, their GP, their next of kin and contact details for them, and if the patient is currently in hospital it provides staff with information about which ward they are admitted onto, this is what is referred to as 'sensitive personal data' in part 1 of the Data Protection Act (1998). The system is also useful because it contains ward information and provides bed managers with information about which patients are where. Finally this is also the system that you need to access to print off patient addressographs. The three aspects of security that this assignment will discuss, with regards to PAS are confidentiality/data security, integrity and availability. Confidentiality is a fundamental part of the nurse-patient relationship (Kenworthy, Snowley and Gilling (1996)) and by law any information given to a nurse should not be passed on to a third party without consent (part 2 of the Data Protection Act (1998)), this states that the data controller (who is in this case the nurse) ...read more.

Middle

When looking at Martin's, (1973), definition of privacy, which states it is the right of individuals and organisations to determine for themselves when, how and to what extent information about them is transmitted to others it can be seen that PAS is floored because all of the patients vital information is in one place, which makes it accessible to all who are able to access the system. This could be a problem because the patient might be happy for the doctors and nurses who are directly caring for them to see the information but not wish technical staff to see all of it, or they might be happy for the doctors to see information about the condition that they are treating but not see any information that is stored for other doctors. An example of this would be a psychiatric patient not wishing the medical doctors or GP to have access to information about their mental illness. Moving on to confidentiality, which Martin (1973) defines as the trust placed in individuals to whom information is disclosed that the privacy of the information will be respected and the information will be used only for the purpose for which it was collected. ...read more.

Conclusion

Ways of ensuring integrity of data involve asking patients to inform us of any change to address or personal information and finally by checking that the information is still correct on each admission to hospital. Reference List � Ball, M, Hannah, K. (1985) Using Computers in Nursing. Reston Publishing Company, Inc. Virginia. � Government. (1998). Data Protection Act, Chapter 29. Internet WWW page at (Accessed 19.08.02) � Kenworthy, N. Snowley, G. Gilling, C. (1996) Common Foundation Studies in Nursing. 2nd Ed. Churchill Livingstone. London. � Martin, I, (1973). Design of Man Computer Dialogues. Englewood Cliffs. New Jersey. Cited in Ball, M., Hannah, K. (1985) Using Computers in Nursing. Reston Publishing Company, Inc. Virginia. � United Kingdom Central Council for Nursing, Midwifery and Health Visiting. (1992) The Code of Professional Conduct for Nurses, Midwives and Health Visitors. UKCC. London. � Waite, M., (Ed) (1998) Oxford Colour Dictionary. Oxford University Press. Oxford. � Westin, A. (1976). Computers, Health Records, and Citizen Rights. Government Printing Office. Washington DC. Cited in Ball, M., Hannah, K. (1985) Using Computers in Nursing. Reston Publishing Company, Inc. Virginia. Whieldon, D. (1979). 'How much does privacy cost?' Computer Decisions (August): 54-56. Cited in Ball, M., Hannah, K. (1985) Using Computers in Nursing. Reston Publishing Company, Inc. Virginia. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. UNIT4: PRESENTING BUSINESS INFORMATION

    Quantitative research are secondary data, this kind of data has to do with numbers and figure like accounts, but not letter or words this kind of data is that has already been gathered and this could be the number of people who are to turn up for the interview.

  2. Explain the functions of the central nervous system (CNS), peripheral nervous system (PNS) (including ...

    (Hill, 2001, pg257). The neurotransmitters pass across the synaptic gap and travel to specialised receptor sites on the post-synaptic membrane. Once here the chemicals trigger off an electric impulse, which has an excitatory effect on the next neurone. However, some synaptic connections have an inhibitory effect whereby 'the neurotransmitters taken up by the target neurone will prevent it from firing.'

  1. AN UNDERSTANDING OF THE NERVOUS SYSTEM

    The Nervous System 7 (3) Multipolar cells, which are pyramidal or stellate in shape, and characterized by their large size and by the numerous processes which issue from them. The processes are of two kinds: one of them is termed the axis-cylinder process or axon because it becomes the axis-cylinder of a nerve fiber.

  2. Management information system (MIS).

    We can see that only information technology makes it possible for proper management. Scope of an MIS Although an MIS may not be able to provide all the information used management, however it should be sufficiently flexible enable management to incorporate, informal or unstructured information in to decision making process.

  1. Free essay

    Managing information

    The products can include other healthier ingredients and reduce its contents of sugar and fats. Threats- The rise in obesity and health risks worries people and they may stop buying Chocolate cakes and other products that fire and rocks sell which means sales of cakes will reduce.

  2. The Entourage System: A Feasibility Study

    which is non editable so all actions of all user are recorded. * Both agents and casting directors will have their own personal file organizer which no other users can see. They can save any information in these files they desire * The system, through the personal log in system,

  1. Aim of this Report is to discuss Soft System Methodology in detail and apply ...

    there is no clear view as to what constitute the problem, or what action should be taken to overcome difficulties. According to Check land SSM is an organized way of tackling messy situations in the real world based on system thinking, which enables it to be highly defined and described, but it is flexible in use and broad in scope.

  2. The purpose of this document is to define the Context of Cain Motors Information ...

    If the aim of the project if achieved it will make the business more efficient, it will cut down on lost time, because everything should be on the computerised system, which means the company will on lost man hours. 3.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work