RECEIVE AND TRANSMIT INFORMATION. . All information received must be accurately recorded, and be current, relevant, legible and complete All information.

Slides:



Advertisements
Similar presentations
Mail Handling Unit 2D. Mail Handling The way in which mail is dealt with depends on the: –Size of the organisation –Number of staff involved –Type of.
Advertisements

Telephone Skills.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Privacy and Information Security Training ( ) VUMC Privacy Website
System Security & Patient Confidentiality General Lesson 1.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Confidentiality & Records Management. What is Information Governance? What is Records Management?
TELEPHONE PROCEDURES AND SCHEDULING
ADMINISTRATION REVISION - BLOCK 4 HANDLING THE MAIL.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
How to Find Your Way Around… SEPT - MANDATORY TRAINING 1. You can play the PowerPoint, and find the Test here EXAMPLE COURSE.
ANIMAL NURSING PRACTICE ADMISSION, DISCHARGE AND MEDICAL RECORDS.
Human Resources. To understand what are meant by effective communication and feedback Analyse the advantages and disadvantages of different communication.
Unit 22 Business and Accounting Skills. Copyright © 2004 by Thomson Delmar Learning. ALL RIGHTS RESERVED.2 22:1 Filing Records  Filing is the systematic.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
The Mail Room Unit 2d. Click to return to Sum up page MAIL HANDLING Internal Mail – communication between people within an organisation Internal Mail.
Handling information 14 Standard.
Health & Social Care Apprenticeships & Diploma
HIPAA PRIVACY AND SECURITY AWARENESS.
Unit 4 Introducing the business letter.  Printed stationery  Presentation: fully blocked layout  Other parts of a business letter  Open punctuation.
How to Find Your Way Around… 1. You can play the PowerPoint, and find the Test here EXAMPLE COURSE.
Area Of Study 2 Information And Communications Technology(ICT)
BTEC Unit 03: Lesson 4 Information Flow Diagrams Mr C Johnston ICT Teacher
PROMOTE HEALTH AND SAFETY IN THE WORKPLACE Written and devised by John Eaton.
MO-260 Medical Office Applications
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Business and Accounting Skills
MO 260-Seminar Three. Agenda O Review Unit 2 O Week 3 Deliverables O Appointment Scheduling O New Patients O Established Patients O Verbal and Written.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Unit 304 Preparing the Patient for Retinopathy Screening By Jenny Gaffney & Jean Macpherson.
Accounting & Financial Analysis 111 Lecture 8 Source Documents, Day accounts/Specialised Journals, Debtors & Creditors Subsidiary Ledgers.
Your health record How the local NHS uses and protects the information held about you Other ways that your records may be used Your local NHS services.
Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Chapter 9 Telephone Communication.
PO :Physical Therapy Administration. Learning Objectives The physical therapy technician will participate as a member of the physical therapy administration.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
Records & Record Keeping. NMC Guidelines & Publications.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
Telephone Telephone  Identify yourself, your location, and position  Ask – “May I help you?”  Be prepared to write down and take messages  Write.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Computer Security Sample security policy Dr Alexei Vernitski.
Register of electors – canvasser briefing Lyn McDaid Elections Manager July 2015 canterbury.gov.uk.
Scientific data storage: How are computers involved in the following?
Use this to send your letters from one computer to another.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Good Documentation Practices
8 – Protecting Data and Security
Handout 2: Office equipment
Processing Mail and Telecommunications
Medical Insurance Claims Lesson 3: The CMS-1500
New Coordinator CRU Orientation
PNDBF – Incoming Mail (B)
Incident Management: Recording New Incidents User Guide
Data Protection Act.
Patient Medical Records
Security of People, Property and Information
Disability Services Agencies Briefing On HIPAA
The new data protection rules
What is a "Public Record" under the Local Records Act?
D3 Confidentiality.
How to find your way around …
Health Insurance Portability and Accountability Act
The Health Insurance Portability and Accountability Act
Handling Information Securely
Handling information 14 Standard.
TRACE INITIATIVE: Confidentiality, Data Security, and Procedures for Protocol Violation or Adverse Event.
Presentation transcript:

RECEIVE AND TRANSMIT INFORMATION

. All information received must be accurately recorded, and be current, relevant, legible and complete All information received must be accurately recorded, and be current, relevant, legible and complete

Transmission of information can also mean verbal and / or non-verbal information. This can include diagrams and pictures, coded messages, signals as well as written text. Transmission of information can also mean verbal and / or non-verbal information. This can include diagrams and pictures, coded messages, signals as well as written text.

The telephone should be answered within six rings; there is a telephone message book to record messages for individuals who are not available, and a telephone system that can access other workstations. The telephone should be answered within six rings; there is a telephone message book to record messages for individuals who are not available, and a telephone system that can access other workstations.

There is a fax machine and address where messages may be sent. Any message should be sent to the appropriate person as soon as possible. Urgent messages may mean the need to telephone someone off duty and at home There is a fax machine and address where messages may be sent. Any message should be sent to the appropriate person as soon as possible. Urgent messages may mean the need to telephone someone off duty and at home

Information required should be firstly being checked to see if there is a confidentiality issue, either for the client, employee, the Home or other party. Information required should be firstly being checked to see if there is a confidentiality issue, either for the client, employee, the Home or other party.

Once that is checked, the information is either in the public domain and can be posted, faxed, ed or manually give to an outside party, or if confidential, have ‘Private and Confidential’ written on the envelope and documents sent. Once that is checked, the information is either in the public domain and can be posted, faxed, ed or manually give to an outside party, or if confidential, have ‘Private and Confidential’ written on the envelope and documents sent.

Some documentation may be taped with sellotape or masking tape, or have string around the outside to prevent unauthorised access, or have a label ‘Fragile’ on it to ensure its safe passage. In specific cases it can be sent by parcel post and / or by recorded delivery. Some documentation may be taped with sellotape or masking tape, or have string around the outside to prevent unauthorised access, or have a label ‘Fragile’ on it to ensure its safe passage. In specific cases it can be sent by parcel post and / or by recorded delivery.

The speed of delivery for outside agencies and others will reflect the urgency of the documents being moved. In most cases it is as soon as possible or practical, others it will be an agreed time scale. The speed of delivery for outside agencies and others will reflect the urgency of the documents being moved. In most cases it is as soon as possible or practical, others it will be an agreed time scale.

Confidential information should not be sent out or given out unless the person receiving the information is authorised to have such information. Confidential information should not be sent out or given out unless the person receiving the information is authorised to have such information.

An example would be for a GP to have access to clients medication records stored in the Home, to enable them to prescribe new medication or increase existing medication. An example would be for a GP to have access to clients medication records stored in the Home, to enable them to prescribe new medication or increase existing medication.

The same access would be denied to a medical sales representative who has no right to see client confidential information, but could see a blank medication record. The same access would be denied to a medical sales representative who has no right to see client confidential information, but could see a blank medication record.

When a confidential document, letter or parcel does not arrive on time, a check should be done to make sure it has not been placed in an obvious or not obvious place. It should be reported immediately to the sender and to anyone else who may be involved. When a confidential document, letter or parcel does not arrive on time, a check should be done to make sure it has not been placed in an obvious or not obvious place. It should be reported immediately to the sender and to anyone else who may be involved.

A time period may be agreed for action, as there is always a possibility that it may be delayed in the post. If a fax or , the document should carry a disclaimer that the information is private and confidential and should be sent back to the sender. A time period may be agreed for action, as there is always a possibility that it may be delayed in the post. If a fax or , the document should carry a disclaimer that the information is private and confidential and should be sent back to the sender.

The sender may wish to send a non confidential piece of paper to confirm fax address and then resend the document. The sender may wish to send a non confidential piece of paper to confirm fax address and then resend the document.

CD-ROM’s, other computer software, videotape and / or Cassette Tape may be insured for loss or damage. Many documents have to be signed by an appropriate person, dated to confirm that they have been received CD-ROM’s, other computer software, videotape and / or Cassette Tape may be insured for loss or damage. Many documents have to be signed by an appropriate person, dated to confirm that they have been received

All records, employee, client, suppliers, the Homes Policies and Procedures and other information should be identified as to what they are, i.e. Care notes with the clients name and details on. All records, employee, client, suppliers, the Homes Policies and Procedures and other information should be identified as to what they are, i.e. Care notes with the clients name and details on.

STORE AND RETRIEVE RECORDS Care Plans that are taken to outpatient appointments with a client must be related to the client having the Out Patient Appointment, and no one else. Care Plans that are taken to outpatient appointments with a client must be related to the client having the Out Patient Appointment, and no one else.

The Care Plans and the client must get to the outpatient appointment at the notified time of appointment. The Care Plans and the client must get to the outpatient appointment at the notified time of appointment.

CD-ROM’s, other computer software, videotape and / or Cassette Tape may be insured for loss or damage. CD-ROM’s, other computer software, videotape and / or Cassette Tape may be insured for loss or damage.

Many documents have to be signed by an appropriate person, dated to confirm that they have been received Many documents have to be signed by an appropriate person, dated to confirm that they have been received

Any written comment in those records must reflect accurately the situation and at each stage of inputting information and should be legible, signed and dated. Any written comment in those records must reflect accurately the situation and at each stage of inputting information and should be legible, signed and dated.

Some bloods and medications need monitoring by the local hospital, often bloods are taken and have to be with the hospital by a specific time, otherwise the test done are inaccurate, it is very important to send bloods to get to the hospital on time. Some bloods and medications need monitoring by the local hospital, often bloods are taken and have to be with the hospital by a specific time, otherwise the test done are inaccurate, it is very important to send bloods to get to the hospital on time.

All documents are stored according to legal, organisational and ethical standards. Some information, i.e. Menus, can be stored and displayed in a kitchen or dining area. All documents are stored according to legal, organisational and ethical standards. Some information, i.e. Menus, can be stored and displayed in a kitchen or dining area.

Any individual accidental or deliberate leaving of confidential information in an uncontrolled area will be reported to the Person in Charge and may be subjected to the Homes Disciplinary Policy or legal sanction. Any individual accidental or deliberate leaving of confidential information in an uncontrolled area will be reported to the Person in Charge and may be subjected to the Homes Disciplinary Policy or legal sanction.

Documentation, such as care plans, medication sheets, employee files need to be stored in locked cupboards in locked rooms to deny access to those who have no right to the information. Documentation, such as care plans, medication sheets, employee files need to be stored in locked cupboards in locked rooms to deny access to those who have no right to the information.