• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Analyse the skills required by health and social care workers to use and manage information and communication technology.

Extracts from this document...

Introduction

´╗┐There are numerous technologies that are used on day to day bases in the health and social care sector. It ranges from homecare technologies where you may not need as much skill such as thermometers; to secondary care technologies such as MRI scans where there are more specialized skills are used. Information Communication Technology (ICT) is used for numerous different reasons in the health and social care sector but in order for these technologies to be efficiently used the service providers must have the skill and knowledge to use them. Often there have been cases where a service provider may not of had the knowledge to access data and this has cost someone?s life, for example, Baby Ps paediatrician could not access any of his records so could not see that he was a vulnerable child. This meant that she could not see that the bruises on Baby P should have raised alarm (Mail Online, 2010). Some technologies are easier to use so that care in the community can be achieved. Without care in the community hospitals would be overrun so it is essential that these technologies require less skill such as a glucometer. Service users being able to use such technology saves them the time of going in and out to the doctor and that they can collect data on themselves ensuring they keep their blood sugar regulated. ...read more.

Middle

Data Protection Act 1998, the Common Law Duty of Confidentiality also ensures the confidentiality of your personal information. There have been numerous cases where the data shared was not filtered to ensure that no sensitive information was on it. The Trust’s website was fined £174,000 for publishing sensitive information of 1,000 service users (Hooper,2012). Accessing data is vital in all areas of the health and social care sector. Some service users may come to a different hospital with a recurrent illness and this needs to be seen by the service provider as this may suggest a long term illness such as a service user complaining about a pain in their abdomen. This may be colon cancer or other chronic illnesses (MSD Manual Professional Edition, 2015) and because the data was easy to access by a member of staff this was noted and a further investigation can start to take place. The service provider must be able to access this information and it won’t be as simple as it is accessing a word document. The service provider must be discreet in accessing the information as it could be sensitive. They must not access it in a public area where members of the public in a waiting room could easily see it. ...read more.

Conclusion

This means that service providers such as GPs must ensure that they know how this operates in case the service user wishes to edit their summary record. Saving data correctly ensures that it can be accessed by all service providers if necessary e.g if a service user came in unconscious the doctors would be able to see on his/her records if he/she had any allergies. If the records weren?t there then the service provider may not know the service user is highly allergic to penicillin. Although technology grows quite rapidly it is also important to realise the impact it has on an individual or organisation if data is not handled with care at all times. I have shown numerous examples in this piece and there is many more. Data has been found to be leaked on apps on service user?s phones. One of the apps being NHS England's Health Apps Library. (BBC news 2015) The makers of this app had not encrypted it properly. It is so easy to get carried away with technology and forget the consequences of not securing it properly. It is important to remember that it is a person?s life and not just another number. They have a family, they have friends and data leaked potentially could lead to them ending their lives. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. The Impact of Mobile Phones on social Interaction

    method which allowed me to divide up the population into sub-populations (groups / strata). I divided this strata into age groups with a sample size of 8 taken from each age group between the ages of 13 - 18. I emailed the questionnaire (see appendix 8.2)

  2. Threats to Data

    Virus checkers can be scheduled to run automatically such as once a week and can be set to automatically check removable media and incoming e-mails. It has a database of known viruses which tells it how to recognise them and once it finds them it can either delete or repair the files concerned if it can.

  1. Communications Technology - Assignment 1

    This could be if the internet is slow in the area where the company is, or even if there is no internet in that area. A satellite connection can supply up to a 1 Gigabit per second connection. If this is the case, a coaxial cable would be used to link the satellite to the satellite receiver.

  2. A2 ICT CouseWork

    "I typed in the company's name and what service's their provide in the search engine, I saw that workload appeared near top of the list(3rd) , I also typed in "Building Establishment's " and workload appeared on the 2nd page" I probably wouldn't of went on both links."

  1. How information is communicated

    Disadvantages * Not everyone will understand graphical information. * Would have to know how to use programs that make graphical information. Video Video information is shown by moving images. It is a series of frames put together to simulate motion and interactivity. It, not unlike graphical information, will put across a more direct point and is easy for people to understand and remember.

  2. Free essay

    The following report will outline how a business communicates effectively and efficiently within their ...

    The disadvantages of using emails to communicate is that viruses can be spread round the organisation, companies will need to keep up to date with anti-virus software etc or this will have a negative effect on the company. Spam mail can also be sent via emails and this can have

  1. Unit 5 - Communications Technology

    Network Access Control (NAC) is a method by which access to enterprise network resources is granted based upon authentication of the user and device as well as verification of the device's compliance to policy. NAC aims to do exactly what the name implies: control access to a network.

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    This will also help you make decisions. You many need to pick up pieces of information and put them together in order to solve these problems. Creativity- creating and applying new ideas and solutions. So when you?re working you don?t just do normal work but add creativity to it and make the work better.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work