Consider the role of a learning support professional in a school. Outline the considerations for someone in that role when dealing with confidential information.
All information held on pupils comes under data protection guild lines. It can include our address, phone number, birth date, employment history or other personal information. It may also include information about our past or present health and development. Individuals have the right to keep information of this type private.
Personal data- This includes names and addresses, medical or health records, dates of birth, etc. It needs to be kept secure.
Confidential information- This consists of any professional recommendations or reports that should be shared only between parents or carers and professionals working with the pupil.
Sensitive personal data- This may be to do with issues such as suspected child abuse or cases that may be going to court.
The main legal framework relating to the protection of personal information is
Set out in:
• The Human Rights Act 1998, which incorporates Article 8 of the European
Convention on Human Rights (ECHR), including the right to a private and
Family life.
• The common law duty of confidentiality
• The Data Protection Act 1998: covering protection of personal information.
Article 8 of the European Convention on Human Rights was incorporated into UK law by the Human Rights Act 1998 and recognises a right to respect private and family life:
Parents can be asked for relevant information about their children to be kept on the school records, for example medical or health information or records regarding special educational needs. All information such as this is confidential and must only be used for the purpose it was obtained for. If the information needs to be passed on to another person, parental consent must be obtained first. The school has a Confidentiality Policy, which all staff need to be aware of, which sets out the school’s aims and objectives relating confidentiality and gives guidelines on how to handle confidential information. The Data Protection Act 1998 states that any organisation holding confidential information should be registered with the Data Protection Commission. The Act gives eight principles of practice that govern the use of personal information. Such information must be:-
Processed fairly and lawfully only used for the purpose for which is gathered
Adequate, relevant and not excessive
Accurate and kept up to date where necessary Kept for no longer than necessary
Processed in line with the individual’s rights Kept secure
Not transferred outside the European Union without adequate protection.
Any staff who obtain information about any children they are working with should ensure these principles are followed, and that any information obtained is only shared with people who have a right to the information, for example the class teacher or SENCo.
As teaching assistant we always use the approach of whether or not it is something that is necessary for that person to know. For example, we wouldn’t give a parent other families' addresses for something like sending out birthday invitations and we are always careful when discussing a student's behaviour or abilities. While the teacher and student's parent obviously need this information, another parent nearby would not so we are always aware of the surroundings when discussing personal information. Sometimes in our setting teachers and any staff who work with that student need to know in detail information about them for example if there was a food allergy concern then the staff who prepare the meals would need this information, as would any staff who might interact with them. But when informing other parents that a student has a food allergy, the parents do not need to know the child’s name.
When sharing personal information, we must ensure the recipient of the information understands: the purpose for which the information is being shared; and any limits to consent given, i.e., what information may or may not be shared and the circumstances under which it may or may not be shared with other agencies; and the need to ensure that any further handling of the information is fair and secure.
Sharing personal information securely by telephone
Verify the name, job title, department and organisation of the person requesting the information and the reason for the request.
Take a contact telephone number, preferably a main switchboard number. Try to avoid a direct line or mobile telephone number wherever possible. If you are in any doubt, confirm the requestor’s identity with their organisation.
Consider whether the information requested can be provided in response to a telephone request and in a telephone conversation. If in doubt, tell the enquirer you will call them back later.
Ensure that your conversation cannot be overheard by anyone who should not hear it.
Provide information only to the person who has requested it (do not leave information as a message or share with another).
Transporting personal information securely by hand (only where completely necessary)
Only where completely necessary, should personal information be taken off site by hand.
Record when you are taking any personal information off site, the reason(s) for doing so and the date when the information was returned, if appropriate.
Paper based information should be transported in a sealed file or envelope.
Electronic information must be protected by appropriate security measures (see section below on using removable electronic devices).
Information should be kept safe and close to hand. Never leave information unattended unless properly secured.
When transferring information by car, ensure it is placed in the boot and is kept locked.
Return the information to your site as soon as possible and file or dispose of it securely.
Sharing personal information securely by post
Confirm the name, department and address of the recipient.
Seal the information in a double envelope, ensuring the packaging is sufficient to protect the contents during transit.
Mark the inner envelope ‘Private and Confidential – To be opened by Addressee only’.
Recording the information sharing
No matter how we share the information, we must ensure that we record the date and time, the reason for sharing, what type of information we shared, if appropriate who authorised it, how we shared the information and the recipient’s name, job title, organisation and telephone number..
You May Also Find These Documents Helpful
-
• The Human Rights Act 1998 - ‘It is unlawful for a public authority to act in a way which is incompatible with a convention right’.…
- 2235 Words
- 9 Pages
Powerful Essays -
The main points of legislation and procedures covering confidentiality are that only the appropriate people should have access to confidential records except where a pupil is potentially at risk. Information should not be given to other adults or agencies unless previously agreed. Where it has been agreed that confidential information can be shared it should be given in an agreed format. The school’s policies and procedures should always be followed regarding confidentiality and the sharing of information. You should also be aware of any legal requirements with regard to record keeping and accessing information in your school.…
- 313 Words
- 2 Pages
Satisfactory Essays -
If this is the case then you should be open and honest from the outset in all discussions with the child or young adult, or their family where appropriate, about why, what, how and with whom the information will or could be shared. Their agreement for the information to be shared should be sought unless it is unsafe or inappropriate to do so. If you are in any doubt you should seek advice from senior staff if appropriate and where possible…
- 555 Words
- 3 Pages
Good Essays -
This act is a law that requires schools to use information as it is needed and to ensure all information is locked away securely. All information whether relevant or not is to be treated as confidential. Parental consent must be gained before disclosure of information.…
- 290 Words
- 2 Pages
Satisfactory Essays -
• To liase with and, where necessary, to seek advice from professionals with due regard to confidentiality, including Preschool Leader, schoolteachers, Health Visitor.…
- 586 Words
- 3 Pages
Good Essays -
Privacy is something we value and may take for granted; however, there are occasions when an invasion of privacy may be justified. If privacy is to be breached, there must be compelling evidentially based reasons (legal, moral or prudential) for doing so. For example – parents have a vested interest in their children’s education, and in how they are performing. Information shared by the school with the parents regarding how their child is performing can assist parents to best support their child’s educational development. This is a clear, but very justified, breach of the child’s privacy. Another justifiable breach of privacy is when there is a clear palpable health risk to others, such as students being exposed to contagious diseases. Breach of privacy in this instance means that parents and the community can take the appropriate steps to contain and eliminate the problem.…
- 637 Words
- 3 Pages
Good Essays -
The same rules of confidentiality apply whether you are employed by the school or you are working as a volunteer. You may have been told sensitive information about a child because it helps you to carry out your role, for example, about their health or particular needs. This is sensitive information and should never be a topic for discussion in the staff room or with other parents.…
- 488 Words
- 2 Pages
Satisfactory Essays -
Linked to the 1950 European Convention on Human Rights. Under this Act individuals in the UK have particular rights and freedoms however these have to balance against the rights and freedoms of others. Some articles which have a direct link to education/schools are:…
- 999 Words
- 4 Pages
Better Essays -
The Human Right Act 1998 - The policies and procedures of this act will help safeguard the…
- 859 Words
- 4 Pages
Good Essays -
I have a duty to protect any personal information and records on children including personal details of parents with the exception of safeguarding issues and Ofsted visits. (3.67, 3.68, 3.69 and 3.70)…
- 1088 Words
- 5 Pages
Good Essays -
When assessing a child you must be careful to take into account confidentiality before carrying out an observation you must have parents and the settings permission and not to leave confidential material lying around they must be secured in a locked cabinet. Only talk to authorized personal about confidential material. This confidentially can only be broken when a child is at real risk.…
- 1797 Words
- 8 Pages
Powerful Essays -
Any organisation that holds information on individuals needs to be registered with the Information Commissioner. This is designed to ensure that confidential information cannot be passed onto others without the individual’s consent, or the parents or guardians consent with regard to children. Individuals also have the right to access personal data held on file about themselves, or in the case of children, the parent or guardian could exercise this right.…
- 1000 Words
- 4 Pages
Good Essays -
Young people/ children may share with school staff what they don't with their families, the limits of confidentiality and the fact if they are in danger you cannot keep it to yourself should be made clear from the outset. There should be a confidentiality policy within schools that can be shown to parents or children who need reassurance or understanding. when people know their rights it empowers them so also improving positive relationships. In areas where the child may be in danger the school have a legal duty to disclose information, so making promises of confidentiality to children or adults cannot be done. When information is shared the child or adult must be informed to who it was shared with and what the reason for this was.…
- 218 Words
- 1 Page
Satisfactory Essays -
Different strategies of working in partnership in parents are very important in child care and education settings. The chosen setting is in a family setting. This essay covers recognition of valuing parents/carers and analysis of the factors that contribute to good communication.…
- 2765 Words
- 12 Pages
Powerful Essays -
Sensitive information could be compromised in a number of ways, including unauthorized access by employees or computer hackers.…
- 997 Words
- 4 Pages
Good Essays