Preview

Handling Information

Satisfactory Essays
Open Document
Open Document
269 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Handling Information
Handling Information Guidelines

How to maintain up to date, complete, accurate and legible records. Record events as they happen or shortly afterwards to get the most complete and accurate account of what has happened. Ensure and entry is made every day Only record facts not hearsay or personal opinion. Check care information on a regular basis and update records to reflect this only write in black pen have entries for medication or diagnosis double checked and signed.

How to ensure the records are stored securely.

Make sure that there is a designated area for the records to be stored and ensure that everybody knows to put them back immediately after use.

How to ensure security when reading or making entires Only read the files in the secure office so they are not visible to people walking by Again only make entries whilst in the secure office so they are not visible to passers by

When storing the records in the office ensure that they are put back in the cupboards and the locks are working securely, in the office we have magnetic locks on the doors with no visible handles or locks.

List of key legislation

 Sex Discrimination Act 1975, Amendment 1982, 1999
 Equal Pay Act 1976
 Race Relations Act 1976, Amendment 2000. Amendment Regulations 2003
 Employment Rights Act 1996 and the Employment Relations Act 1999
Disability Discrimination Act 1995, Amendment in force from October 2004
 Protection from Harassment Act 1997
 Human Rights Act 1998
 European Race and Employment Directives 2000
 Disability Rights Commission Act 2000
 Employment Equality (Sexual Orientation) Regulations 2003
 Employment Equality (Religion or Belief) Regulations

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lock the servers into their own room with keycard or fingerprint access only. Only authorized IT staff shall have access. Management, vendors and all other authorized guest shall be escorted by an authorized IT staff member. Video surveillance should be maintained and monitored at all access…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    As with any other system, all data needs to be kept secure. Employee confidentiality is of paramount importance, particularly in a system that hold and utilizes potentially sensitive personal employee information. Moreover, seemingly innocuous information such as standards and procedures within the company also need to be kept secure. Any secure, sensitive, or proprietary information should be encrypted and password…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Access Control Simulation

    • 698 Words
    • 3 Pages

    Cubicle 2-1 had a pre-approved offsite equipment request posted This should be secured to prevent an unauthorized person from stealing equipment. Both cubicle 2-1 and 2-2 had fingerprint scanners. Cubicle 2-3 had a locked file drawer and the computer was password protected as it locked after four attempts. Cubicle 2-4 did have a UPS but there was a flashdrive on the desk as well as login information on a post it note. Flashdrives should be encrypted and increased controls surrounding password/login information should be enforced. Password/login…

    • 698 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The information is stored in locked filing cabinets as the information can hold company details and account numbers this is only accessible by the Administration staff and each file is signed out on a register.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    ERR task B

    • 933 Words
    • 3 Pages

    Data protection: never give out personal information about colleagues or service users to unauthorised people or organisations. Never disclose commercial information about company’s activities to unauthorised people or organisations. Keep all data secure and use my own log in and not share passwords. Any papers, CD’s, portable USB devices should be locked away whenever possible, cabinets and draws that contain sensitive…

    • 933 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    After dealing it, spend time on more specific issues by asking question:  Does an appropriate records retention schedule for the records exist?  Is the information in the records available at another location or format?  Are you compliance with the Minnesota Government Data Practices Act?…

    • 822 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In preparing your work area, you should make sure you have adequate space for your computer, printer, fax, and storage. For security reasons, your working area should be off limits to your family and friends.…

    • 253 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Tda 3.6

    • 671 Words
    • 3 Pages

    1.2 Ways in which we can promote equality and diversity throughout the school setting is to:…

    • 671 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    - Security: By law I must only use internet connections that are DSL; and not wireless. I must have all offices locked with access ability controlled to those in positions of authority; a paper shredder & all files with client confident materials such as bank account numbers stowed with lock and key.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Confidentiality Poster

    • 251 Words
    • 1 Page

    Storage: Keep all written documents and notes in a safe place, shred what is not needed and any paper work that is kept should be filed in a locked cabinet or an a data protected computer.…

    • 251 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    legal assesment

    • 3454 Words
    • 14 Pages

    DAVID Jones has been hit with a $35 million lawsuit from former publicity co-ordinator Kristy Fraser-Kirk, whose sexual harassment claims led to the shock resignation of boss Mark McInnes.…

    • 3454 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    □ Secure a location- (see additional information as to how in step two of this toolkit)…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mis Case Ntuc

    • 1209 Words
    • 5 Pages

    Despite having to throw away all paper records, scan and store on “trusted” storage device, currently about 500 office staff and 3,400 insurance advisor could access the information and system anytime, anywhere.…

    • 1209 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Key Management process

    • 313 Words
    • 2 Pages

    Temporary staff, Housekeeping staff or Security staff will not to responsible for handling the office key(s).…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    LIBRARY SYSTEM THESIS

    • 928 Words
    • 4 Pages

    Since the amount of student/borrower and books is increasing, it is necessary to prepare s space to store them. After a long time, the record book will be stockpiled. It needs well organized and it is hard to find the record in short time because they need to find it one by one. This will cost extra time and is not efficient at all .…

    • 928 Words
    • 4 Pages
    Satisfactory Essays