Best Practice in Handling Information Guidelines

Only available on StudyMode
  • Download(s) : 729
  • Published : October 4, 2012
Open Document
Text Preview
Best practice in Handling Information Guidelines
When maintaining records information should be written to adhere to the settings standards in order to be effective, accurate and safe which may include: •The presentation is clear and legible (if hand writing) and that the information is written in a way that others can understand, this makes it easy for other people to read and comprehend, and data is passed in a clear and logical way. •Records must be made as soon as possible after the events to which they relate this provides current information of the service user. •Records must be an accurate and evidence based record of what took place, ensuring that it is documented the difference between your opinion, the facts, the evaluation and the plans, so it is easy to follow the details and be clear of the event. •Record the time and date that the event, making sure your name, signature and designation is clearly documented in the content of the entry, so that there is no doubt exactly when the event being documented occurred and to identify who has documented the information. •Only relevant information is to be documented, ensuring that information is passed on a need to know basis. Storage of information

It is important that we keep personal information stored securely, ensuring that confidential information is not unlawfully or inappropriately assessed. This means that we must not leave information hanging around where it may be seen by others and we must use used the lockable cabinets provided by your setting to store information safely; these cabinets should be kept behind a lockable door which should be kept locked whist not in use. We should ensure that our computers have secure passwords which are changed regularly and that and that any IT portable storage and emails are encrypted. Make sure that passwords are not shared and that you log off before letting someone else use the computer Keeping information safe whist in use

Ensuring information is...
tracking img