• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Analyse the skills required by health and social care workers to use and manage information and communication technology.

Extracts from this document...

Introduction

´╗┐There are numerous technologies that are used on day to day bases in the health and social care sector. It ranges from homecare technologies where you may not need as much skill such as thermometers; to secondary care technologies such as MRI scans where there are more specialized skills are used. Information Communication Technology (ICT) is used for numerous different reasons in the health and social care sector but in order for these technologies to be efficiently used the service providers must have the skill and knowledge to use them. Often there have been cases where a service provider may not of had the knowledge to access data and this has cost someone?s life, for example, Baby Ps paediatrician could not access any of his records so could not see that he was a vulnerable child. This meant that she could not see that the bruises on Baby P should have raised alarm (Mail Online, 2010). Some technologies are easier to use so that care in the community can be achieved. Without care in the community hospitals would be overrun so it is essential that these technologies require less skill such as a glucometer. Service users being able to use such technology saves them the time of going in and out to the doctor and that they can collect data on themselves ensuring they keep their blood sugar regulated. ...read more.

Middle

Data Protection Act 1998, the Common Law Duty of Confidentiality also ensures the confidentiality of your personal information. There have been numerous cases where the data shared was not filtered to ensure that no sensitive information was on it. The Trust’s website was fined £174,000 for publishing sensitive information of 1,000 service users (Hooper,2012). Accessing data is vital in all areas of the health and social care sector. Some service users may come to a different hospital with a recurrent illness and this needs to be seen by the service provider as this may suggest a long term illness such as a service user complaining about a pain in their abdomen. This may be colon cancer or other chronic illnesses (MSD Manual Professional Edition, 2015) and because the data was easy to access by a member of staff this was noted and a further investigation can start to take place. The service provider must be able to access this information and it won’t be as simple as it is accessing a word document. The service provider must be discreet in accessing the information as it could be sensitive. They must not access it in a public area where members of the public in a waiting room could easily see it. ...read more.

Conclusion

This means that service providers such as GPs must ensure that they know how this operates in case the service user wishes to edit their summary record. Saving data correctly ensures that it can be accessed by all service providers if necessary e.g if a service user came in unconscious the doctors would be able to see on his/her records if he/she had any allergies. If the records weren?t there then the service provider may not know the service user is highly allergic to penicillin. Although technology grows quite rapidly it is also important to realise the impact it has on an individual or organisation if data is not handled with care at all times. I have shown numerous examples in this piece and there is many more. Data has been found to be leaked on apps on service user?s phones. One of the apps being NHS England's Health Apps Library. (BBC news 2015) The makers of this app had not encrypted it properly. It is so easy to get carried away with technology and forget the consequences of not securing it properly. It is important to remember that it is a person?s life and not just another number. They have a family, they have friends and data leaked potentially could lead to them ending their lives. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. A2 ICT CouseWork

    What is it easy ordering our services from our website? 8) Will you use our services again? Validation Testing The testing of our form's validation on our website: Validation: Validation is the restriction of users and customers' in an ICT system, but in our case, validation is used in our website forms.

  2. Threats to Data

    Well known firewalls like Norton are extremely good at identifying unfriendly access and provide a great deal of protection. It will recognise dangerous threats but it sometimes depends on you to set what is friendly and what is unfriendly. It is possible to allow access to something dangerous because you don't know what it is.

  1. The aim of this task is to produce a report for the managing director ...

    This means that people who own a mobile phone can now be contacted almost anywhere. An advantage of using a telephone is that you can ring, and talk to, people without actually having to meet them. This is good because it also means that people can be communicate with each from long distances, as well as short.

  2. Computers in Hospitals. Computers can be used in Hospitals for two main purposes ...

    The installation and set up of a ledger system can be very expensive. You'd need to purchase licensing for the software, and may need to upgrade the current computers as they're not powerful enough to process tasks. Also, drug bills can be expensive.

  1. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    * To edit/delete a record select the option, 'Edit/Delete Product' in the next window. * This will then take you into a current form that you can either amend or delete a product record. * To add a new record select the next option in window, 'Add a Product' *

  2. Information: G061 - Systems and Communication

    Third normal form (3NF) - must be in 2NF - no functional dependency between non-key items (no non-key dependencies) d) Advantages and disadvantages of normalisation include: Advantages Disadvantages - removes redundancy - increases consistency - increases integrity - easier maintenance - flexibility for future expansion - reduced database performance - problems with historical calculations e)

  1. Communications Technology - Assignment 1

    To convert denary (standard number form) to binary you have to think of it as being similar to ones, tenths, hundredths and thousands (denary), but with 1 to 128 - doubling each time. You can have a number up to 255 because if you add all of the 8 numbers

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    Career Minded- Employees who are career minded care about the work that they do and give their full ability to learn about the work and improve their current skills. They present a strong image about their company. Career Minded fall under this: * Personal Impact/Confidence- This is about an employee

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work