• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Analyse the skills required by health and social care workers to use and manage information and communication technology.

Extracts from this document...

Introduction

´╗┐There are numerous technologies that are used on day to day bases in the health and social care sector. It ranges from homecare technologies where you may not need as much skill such as thermometers; to secondary care technologies such as MRI scans where there are more specialized skills are used. Information Communication Technology (ICT) is used for numerous different reasons in the health and social care sector but in order for these technologies to be efficiently used the service providers must have the skill and knowledge to use them. Often there have been cases where a service provider may not of had the knowledge to access data and this has cost someone?s life, for example, Baby Ps paediatrician could not access any of his records so could not see that he was a vulnerable child. This meant that she could not see that the bruises on Baby P should have raised alarm (Mail Online, 2010). Some technologies are easier to use so that care in the community can be achieved. Without care in the community hospitals would be overrun so it is essential that these technologies require less skill such as a glucometer. Service users being able to use such technology saves them the time of going in and out to the doctor and that they can collect data on themselves ensuring they keep their blood sugar regulated. ...read more.

Middle

Data Protection Act 1998, the Common Law Duty of Confidentiality also ensures the confidentiality of your personal information. There have been numerous cases where the data shared was not filtered to ensure that no sensitive information was on it. The Trust’s website was fined £174,000 for publishing sensitive information of 1,000 service users (Hooper,2012). Accessing data is vital in all areas of the health and social care sector. Some service users may come to a different hospital with a recurrent illness and this needs to be seen by the service provider as this may suggest a long term illness such as a service user complaining about a pain in their abdomen. This may be colon cancer or other chronic illnesses (MSD Manual Professional Edition, 2015) and because the data was easy to access by a member of staff this was noted and a further investigation can start to take place. The service provider must be able to access this information and it won’t be as simple as it is accessing a word document. The service provider must be discreet in accessing the information as it could be sensitive. They must not access it in a public area where members of the public in a waiting room could easily see it. ...read more.

Conclusion

This means that service providers such as GPs must ensure that they know how this operates in case the service user wishes to edit their summary record. Saving data correctly ensures that it can be accessed by all service providers if necessary e.g if a service user came in unconscious the doctors would be able to see on his/her records if he/she had any allergies. If the records weren?t there then the service provider may not know the service user is highly allergic to penicillin. Although technology grows quite rapidly it is also important to realise the impact it has on an individual or organisation if data is not handled with care at all times. I have shown numerous examples in this piece and there is many more. Data has been found to be leaked on apps on service user?s phones. One of the apps being NHS England's Health Apps Library. (BBC news 2015) The makers of this app had not encrypted it properly. It is so easy to get carried away with technology and forget the consequences of not securing it properly. It is important to remember that it is a person?s life and not just another number. They have a family, they have friends and data leaked potentially could lead to them ending their lives. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Information Age

    3 star(s)

    Source Information * You tube http://en.wikipedia.org/wiki/YouTube * This page was last modified on 2 October 2008, at 08:06. * ITV.com You tube is a video sharing website where users can upload, view and share video clips. Un registered users can watch mostly all of the videos on the site whereas registered users can upload un limited number of videos.

  2. Feasibility Report

    It is generally not targeted to the mass market, but usually created for companies, business entities, and organizations. Basically COTS is software that can be customized to suit the requirements of the Perfect Pie Company. The piece of customized off the shelf software that I am going to use, is an integrated package called Microsoft Office.

  1. Threats to Data

    It filters out any traffic which it doesn't like. Generally it will allow access from sources it knows but if it doesn't recognise a source, like a hacker, it will ask whether to want to block it or not. This will apply to traffic going out of your system as well so it provides some protection against spy ware.

  2. A2 ICT CouseWork

    We will also test our news application on the site and follow the same method of testing the contact us form. We may use a table for this. Adding News The News Admin Page works by using two language's Php and Html, each language is different and has its own purpose within the process.

  1. Unit 5 - Communications Technology

    If the channel is sensed as "busy" the station has to defer its transmission. This is the essence of the "collision avoidance" part of the protocol. After waiting for a sufficient time for all stations to receive the jam signal, the data station transmits a frame, and while transmitting, if

  2. The Impact of Mobile Phones on social Interaction

    Finally, mobile phone technology continues to grow with the introduction of Wireless Application Protocol (WAP) following the recent sale of third generation (3G) licensing. WAP is defined (9) as a protocol that allows wireless devices such as phones, pagers and PDA's to retrieve information from the Internet and display it on a wireless browser.

  1. Theory of data communication

    which explains the techniques that can be used to reduce data transmission errors. TASK 2 AND GRADING CRITERIA COVERED Task 2 P3 Describe communication protocols used and explain why they are important D1 Critically compare the OSI seven layer model and the TCP/IP model Write section 3 (entitled 'Communication protocols'),

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    Flexibility- This is when an employer expects something extra from their employees; the employees must be able to work without any problems. The employee must be able to adapt to the changing environments. All employers expect their employees to become flexible as they may ask them to stay back and

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work