THE HISTORY OF CONFIDENTIALITY IN HEALTH AND SOCIAL CARE.
One of the oldest documents we can find about confidentiality is the Hippocratic Oath what was written in the 4th century BC.
We all know that nurses are not taking this oath, but we are bound to the same confidentiality regulations as doctors and other health professionals including social workers. Untrained or ancillary workers should not have access to patient's records and there is no need for them to know certain confidential information.
A famous author in social work, (Biestek, 1957) has written a classic book and writes about confidentiality. He states that "confidentiality is an essential principle in a helping relationship …..and crucial to develop a trusting …show more content…
Police and criminal evidence Act, 1984
The Caldecott Report according to the Department of Health website:
"Following the production of The Protection and Use of Patient Information in 1996, the Chief Medical Officer of England commissioned the Caldicott Committee to review the transfer of patient-identifiable information from NHS organisations to other NHS and non-NHS organisations." (DoH, 1997)
This report is to help guide health professionals to maintain maximum security of keeping, storing, using, patient's confidential information and personal data. It contains sixteen recommendations about the way of handling information safely and correctly. It recommends also that Caldecott Guardians must be set up in health care settings whose responsibility will be to make sure all health care staff understand and follow the recommendations. A Caldecott Guardian is usually a senior health care professional.
CONFIDENTIALITY AND …show more content…
There are attempts in the NHS to use a Cryptography Strategy where certain information will be encrypted. This can be accessed at the Department of Health website:" The 'Strategy for Cryptographic Support Services in the NHS', published in January 2001, set out aspirations and targets for the identification and implementation of appropriate technical, operational and management arrangements. These included requirements for both central infrastructure and national services, and the necessary functionality to enable data encryption, digital signing, authentication and non-repudiation services."