• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Analyse the skills required by health and social care workers to use and manage information and communication technology.

Extracts from this document...

Introduction

There are numerous technologies that are used on day to day bases in the health and social care sector. It ranges from homecare technologies where you may not need as much skill such as thermometers; to secondary care technologies such as MRI scans where there are more specialized skills are used. Information Communication Technology (ICT) is used for numerous different reasons in the health and social care sector but in order for these technologies to be efficiently used the service providers must have the skill and knowledge to use them. Often there have been cases where a service provider may not of had the knowledge to access data and this has cost someone?s life, for example, Baby Ps paediatrician could not access any of his records so could not see that he was a vulnerable child. This meant that she could not see that the bruises on Baby P should have raised alarm (Mail Online, 2010). Some technologies are easier to use so that care in the community can be achieved. Without care in the community hospitals would be overrun so it is essential that these technologies require less skill such as a glucometer. Service users being able to use such technology saves them the time of going in and out to the doctor and that they can collect data on themselves ensuring they keep their blood sugar regulated. ...read more.

Middle

Data Protection Act 1998, the Common Law Duty of Confidentiality also ensures the confidentiality of your personal information. There have been numerous cases where the data shared was not filtered to ensure that no sensitive information was on it. The Trust’s website was fined £174,000 for publishing sensitive information of 1,000 service users (Hooper,2012). Accessing data is vital in all areas of the health and social care sector. Some service users may come to a different hospital with a recurrent illness and this needs to be seen by the service provider as this may suggest a long term illness such as a service user complaining about a pain in their abdomen. This may be colon cancer or other chronic illnesses (MSD Manual Professional Edition, 2015) and because the data was easy to access by a member of staff this was noted and a further investigation can start to take place. The service provider must be able to access this information and it won’t be as simple as it is accessing a word document. The service provider must be discreet in accessing the information as it could be sensitive. They must not access it in a public area where members of the public in a waiting room could easily see it. ...read more.

Conclusion

This means that service providers such as GPs must ensure that they know how this operates in case the service user wishes to edit their summary record. Saving data correctly ensures that it can be accessed by all service providers if necessary e.g if a service user came in unconscious the doctors would be able to see on his/her records if he/she had any allergies. If the records weren?t there then the service provider may not know the service user is highly allergic to penicillin. Although technology grows quite rapidly it is also important to realise the impact it has on an individual or organisation if data is not handled with care at all times. I have shown numerous examples in this piece and there is many more. Data has been found to be leaked on apps on service user?s phones. One of the apps being NHS England's Health Apps Library. (BBC news 2015) The makers of this app had not encrypted it properly. It is so easy to get carried away with technology and forget the consequences of not securing it properly. It is important to remember that it is a person?s life and not just another number. They have a family, they have friends and data leaked potentially could lead to them ending their lives. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    As this service is not available on latestdvd9.com, it means that people that can not read the text because of eye problems will less likely to be the customers of this business. If visually impaired people wanted to use the website and be able to read the text easily, they

  2. Marked by a teacher

    Information Age

    3 star(s)

    * The computer may stop to function properly. Sources: http://www.dooyoo.co.uk/multimedia/tunes/1017588/ Thursday "What Europe's download services offer" By Darren Waters BBC News Online entertainment staff Tuesday, 15 June 2004, Question 4: Are the examples seen seem to be fit for purpose?

  1. Threats to Data

    Virus checkers can be scheduled to run automatically such as once a week and can be set to automatically check removable media and incoming e-mails. It has a database of known viruses which tells it how to recognise them and once it finds them it can either delete or repair the files concerned if it can.

  2. Feasibility Report

    Although this software is a fast and less expensive method, and it will come in under the budget of �20,000, I don't think off the shelf software is not very suitable and will not fulfil the requirements within the Perfect Pie Company, for example, generate reports for sales of each

  1. A2 ICT CouseWork

    To write my client requirements I have used information from my client interview which I actually completed before I started creating my website, the purpose of writing my client requirements was to give me a general idea in how to create my website and could also be frequently used during the creation of my website.

  2. The Impact of Mobile Phones on social Interaction

    Finally, mobile phone technology continues to grow with the introduction of Wireless Application Protocol (WAP) following the recent sale of third generation (3G) licensing. WAP is defined (9) as a protocol that allows wireless devices such as phones, pagers and PDA's to retrieve information from the Internet and display it on a wireless browser.

  1. Unit 5 - Communications Technology

    Data transmission is complex by collisions that happen within a network when two or more signals are sent out at the same time. There are few ways to overcome this difficulty. There are two ways of data flow control; Collision Avoidance (CSMA)

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    task so that they don?t give up and to work long hours without complaint. Enthusiastic- This is when the employee shows that he cares about his job and shows genuine interest in the job. An enthusiastic person is a person that is willing to share their knowledge with others and is willing to help.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work