• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Analyse the skills required by health and social care workers to use and manage information and communication technology.

Extracts from this document...

Introduction

´╗┐There are numerous technologies that are used on day to day bases in the health and social care sector. It ranges from homecare technologies where you may not need as much skill such as thermometers; to secondary care technologies such as MRI scans where there are more specialized skills are used. Information Communication Technology (ICT) is used for numerous different reasons in the health and social care sector but in order for these technologies to be efficiently used the service providers must have the skill and knowledge to use them. Often there have been cases where a service provider may not of had the knowledge to access data and this has cost someone?s life, for example, Baby Ps paediatrician could not access any of his records so could not see that he was a vulnerable child. This meant that she could not see that the bruises on Baby P should have raised alarm (Mail Online, 2010). Some technologies are easier to use so that care in the community can be achieved. Without care in the community hospitals would be overrun so it is essential that these technologies require less skill such as a glucometer. Service users being able to use such technology saves them the time of going in and out to the doctor and that they can collect data on themselves ensuring they keep their blood sugar regulated. ...read more.

Middle

Data Protection Act 1998, the Common Law Duty of Confidentiality also ensures the confidentiality of your personal information. There have been numerous cases where the data shared was not filtered to ensure that no sensitive information was on it. The Trust’s website was fined £174,000 for publishing sensitive information of 1,000 service users (Hooper,2012). Accessing data is vital in all areas of the health and social care sector. Some service users may come to a different hospital with a recurrent illness and this needs to be seen by the service provider as this may suggest a long term illness such as a service user complaining about a pain in their abdomen. This may be colon cancer or other chronic illnesses (MSD Manual Professional Edition, 2015) and because the data was easy to access by a member of staff this was noted and a further investigation can start to take place. The service provider must be able to access this information and it won’t be as simple as it is accessing a word document. The service provider must be discreet in accessing the information as it could be sensitive. They must not access it in a public area where members of the public in a waiting room could easily see it. ...read more.

Conclusion

This means that service providers such as GPs must ensure that they know how this operates in case the service user wishes to edit their summary record. Saving data correctly ensures that it can be accessed by all service providers if necessary e.g if a service user came in unconscious the doctors would be able to see on his/her records if he/she had any allergies. If the records weren?t there then the service provider may not know the service user is highly allergic to penicillin. Although technology grows quite rapidly it is also important to realise the impact it has on an individual or organisation if data is not handled with care at all times. I have shown numerous examples in this piece and there is many more. Data has been found to be leaked on apps on service user?s phones. One of the apps being NHS England's Health Apps Library. (BBC news 2015) The makers of this app had not encrypted it properly. It is so easy to get carried away with technology and forget the consequences of not securing it properly. It is important to remember that it is a person?s life and not just another number. They have a family, they have friends and data leaked potentially could lead to them ending their lives. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Feasibility Report

    most of the new system; this will put a strain on the financial budget. Another major risk is that there is only a timeline of 20 weeks for introducing the new system for the Perfect Pie Company; this might not be long enough to ensure that the system is fully

  2. The aim of this task is to produce a report for the managing director ...

    Therefore, when you press the screen, contact is made between the plastic and glass layers so then an electrical circuit is created and a signal is sent to the computer. Advantages of touch screens are that they don't take up too much space and are not easily damaged.

  1. Computers in Hospitals. Computers can be used in Hospitals for two main purposes ...

    Also, drug bills can be expensive. This means it is difficult for departments to stay under the allowance of their budget until the end of the year. The second obvious use of Computers in Hospitals is for patient care. Computers are used in a wide array of tasks that you probably didn't know they did!

  2. Information: G061 - Systems and Communication

    to be proofread to ensure that all others are correct - the data source can be used for many different mal merge processes - the standard letter/template can be saved a reused c) Users can format attributes of a document including: - page size, settings and orientation - text position,

  1. A2 ICT CouseWork

    you can clearly see any minor visual difference, which can later be changed . Process Testing- The Process testing involves testing the parts of my website which associate themselves with server based language's and can be either interactive for the user or the customer, an example of this In my

  2. Threats to Data

    It is a form of vandalism. This could be a serious problem for a transactional website as the server the website is uploaded onto can be badly damaged stopping all traffic to the site, if the location of customers' data is also damaged by these type of hackers, customers details

  1. Communications Technology - Assignment 1

    up you will get 255 (in binary this would be shown as "11111111" because it contains every number). I will show how numbers 1 - 7 are converted into binary below: 128 64 32 16 8 4 2 1 0 1 = 0 0 0 0 0 0 0 1

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    Gathering Information- asking questing and being broad if you don?t understand something and to make sure that you get what the task is about. To summarise the work and the task this is basically showing that you care and understand about the work.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work