The Mental Health Care Patient Management System (Mentcare)

Size: px
Start display at page:

Download "The Mental Health Care Patient Management System (Mentcare)"

Transcription

1 The Mental Health Care Patient Management System (Mentcare)

2 The Mentcare system ² This system (not its real name but a real system) is a generic medical information system that is configured for use in different regional health trusts ² It supports the management of patients suffering from mental health problems and provides information on their treatment to health service managers

3 System goals ² To provide management information that allows health service managers to assess performance against local and government targets ² To provide medical staff with timely information to facilitate the treatment of patients

4 Mental health care ² Patients do not always attend the same clinic but may attend in different hospitals and local health centres ² Patients may be confused and disorganised, miss appointments, deliberately or accidentally lose medication, forget instructions and make unreasonable demands on staff ² Mental health care is safety-critical as a small number of patients may be a danger to themselves and others

5 Concerns ² Are issues that an organisation must pay attention to and that are systemic ie they apply to the system as a whole ² They are cross-cutting issues that may affect all system stakeholders ² Help bridge the gap between organisational goals and system requirements ² May exist at a number of levels so may be decomposed into more specific sub-concerns

6 Concerns Software and hardware Operators The organisation Society Security Cost Safety

7 Concerns in the MHCPMS ² We have identified the principal concerns in the Mentcare system as: Safety - the system should help reduce the number of occasions where patients cause harm to themselves and others Privacy - patient privacy must be maintained according to the provisions of the Data Protection Act and local ethical guidelines Information quality - the information maintained by the system must be accurate and up-to date Operational costs - the operational costs of the system must be reasonable

8 Concern decomposition ² Concerns are decomposed into sub-concerns: Information integrity Information quality Information accuracy Information timeliness

9 The safety concern Accidental self-harm Safety Patient safety Staff safety Public safety Deliberate self-harm Incorrect treatment Adverse reaction to medication Mental Health Act

10 From concerns to questions ² A problem that I find with hazard analysis is the requirements gap. You identify the hazards and possible root causes but there is no method for going from there to requirements ² To address this, we proposed that, after sub-concerns are identified, you should then explicitly identify questions and sub-questions associated with each concern ² Answers to these questions come from system stakeholders and help generate system requirements

11 Generic questions ² What information relates to the sub-concern being considered? ² Who requires the information and when do they require it? ² How is the information delivered? ² What constraints does the (sub) concern impose? ² What are the consequences of failing to deliver this information?

12 Deliberate self-harm sub-concern ² Information about previous history of self-harm or threats of self-harm ² Medical staff during consultations. Relatives and carers ² Can be delivered to medical staff directly through the system. Delivered to relatives and carers through a message from the clinic ² No obvious constraints imposed ² Failing to deliver may mean an incident of preventable self-harm occurs

13 Concern-cross checking ² A generic problem in complex systems is requirements conflicts where different system requirements are mutually contradictory ² In my view, separating safety analysis in the RE process increases the likelihood of conflict and the costs of resolving that conflict ² Concerns partially address this problem as it allows cross-checking at a higher level of abstraction than the requirements themselves

14 Concern comparison ² Concerns should be compared in pairs to assess the likelihood of of potential conflicts ² Safety and information quality Conflicts only likely if the requirements allow erroneous or out of date information to be maintained in the system ² Safety and privacy Privacy may impose limits on what information can be shared and who can access that information. Requirements on information sharing and access should be checked ² Safety and operational costs Operational processes that require extensive staff time may be problematic

15 Requirements derivation ² Requirements are derived from the answers to the questions associated with concerns. ² However, there is not a simple 1:1 relationship between answers and requirements ² By using answers to questions, the problem of stakeholders suggesting requirements that are too specific is reduced

16 Mentcare requirements ² The system shall provide fields in each patient record that allow details of incidents or threats of deliberate selfharm to be maintained ² The records of patients with a record of deliberate selfharm shall be highlighted to bring them to the attention of clinical system users ² The system shall only permit the transmission of personal patient information to accredited staff and to the patient themselves

431 SUPPORT INDIVIDUALS WHERE ABUSE HAS BEEN DISCLOSED

431 SUPPORT INDIVIDUALS WHERE ABUSE HAS BEEN DISCLOSED Unit overview Elements of competence 431a 431b Support individuals who disclose abuse Support individuals who have been abused About this unit For this unit you will need to support individuals who have

More information

Consultation Paper: Standards for Effectively Managing Mental Health Complaints

Consultation Paper: Standards for Effectively Managing Mental Health Complaints What is the purpose of this paper? The purpose of this paper is to encourage discussion and feedback from people who access, or work in, Western Australia s mental health sector. The paper proposes a draft

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

Incident Reporting Procedure

Incident Reporting Procedure Number 1. Purpose This outlines the process for reporting and investigating incidents that occur in the West Coast District Health Board (WCDHB) Services with a view to preventing recurrence. 2. Application

More information

H5VV 04 (SCDHSC0042) Lead Practice for Health and Safety in the Work Setting 1

H5VV 04 (SCDHSC0042) Lead Practice for Health and Safety in the Work Setting 1 H5VV 04 (SCDHSC0042) Lead Practice for Health and Safety in the Work Setting Overview This standard identifies the requirements when leading practice for health and safety in settings where children, young

More information

System Specification. Objectives

System Specification. Objectives System Specification cmsc435-1 Objectives To explain how dependability requirements may be identified by analyzing the risks faced by critical systems To explain how safety requirements are generated from

More information

SECURITY MANAGEMENT Produce security risk assessments

SECURITY MANAGEMENT Produce security risk assessments 1 of 6 level: 6 credit: 20 planned review date: March 2007 sub-field: purpose: Security This unit standard is for people who work, or intend to work, as security managers or security consultants, and who

More information

GUIDELINE NO. 22 REGULATORY AUDITS OF ENERGY BUSINESSES

GUIDELINE NO. 22 REGULATORY AUDITS OF ENERGY BUSINESSES Level 37, 2 Lonsdale Street Melbourne 3000, Australia Telephone.+61 3 9302 1300 +61 1300 664 969 Facsimile +61 3 9302 1303 GUIDELINE NO. 22 REGULATORY AUDITS OF ENERGY BUSINESSES ENERGY INDUSTRIES JANUARY

More information

CORK INSTITUTE OF TECHNOLOGY

CORK INSTITUTE OF TECHNOLOGY CORK INSTITUTE OF TECHNOLOGY DATA PROTECTION POLICY APPROVED BY GOVERNING BODY ON 30 APRIL 2009 INTRODUCTION Cork Institute of Technology is committed to a policy of protecting the rights and privacy of

More information

Exhibit E - Support & Service Definitions. v1.11 / 2015-07-03

Exhibit E - Support & Service Definitions. v1.11 / 2015-07-03 Exhibit E - Support & Service Definitions v1.11 / 2015-07-03 Introduction - Support Services Table of Contents 1 Introduction... 4 2 General Definitions... 5 2.1 Support Services... 5 2.2 2.3 License or

More information

IS INFORMATION SECURITY POLICY

IS INFORMATION SECURITY POLICY IS INFORMATION SECURITY POLICY Version: Version 1.0 Ratified by: Trust Executive Committee Approved by responsible committee(s) IS Business Continuity and Security Group Name/title of originator/policy

More information

SECURITY RISK MANAGEMENT

SECURITY RISK MANAGEMENT SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W

More information

32 PROMOTE, MONITOR AND MAINTAIN HEALTH, SAFETY AND SECURITY IN THE WORKING ENVIRONMENT

32 PROMOTE, MONITOR AND MAINTAIN HEALTH, SAFETY AND SECURITY IN THE WORKING ENVIRONMENT Unit overview Elements of competence 32a 32b 32c Monitor and maintain the safety and security of the working environment Promote health and safety in the working environment Minimise risks arising from

More information

SCDHSC0437 Promote your organisation and its services to stakeholders

SCDHSC0437 Promote your organisation and its services to stakeholders Promote your organisation and its services to stakeholders Overview This standard identifies the requirements when promoting your organisation and the services it provides to a range of stakeholders. The

More information

Information Security Guideline for NSW Government Part 1 Information Security Risk Management

Information Security Guideline for NSW Government Part 1 Information Security Risk Management Department of Commerce Guidelines Information Security Guideline for NSW Government Part 1 Information Security Risk Management Issue No: 3.2 First Published: Sept 1997 Current Version: Jun 2003 Table

More information

SCDHSC0393 Promote participation in agreed therapeutic group activities

SCDHSC0393 Promote participation in agreed therapeutic group activities Promote participation in agreed therapeutic group activities Overview This standard identifies the requirements when you promote participation in agreed therapeutic group activities. This includes planning

More information

Part 1 Overview of clinical governance 1-1 1 Clinical governance the concept 1-3

Part 1 Overview of clinical governance 1-1 1 Clinical governance the concept 1-3 Page Part 1 Overview of clinical governance 1-1 1 Clinical governance the concept 1-3 Purposes 1-3 Why clinical governance 1-3 The evolution to accountability for patient care quality and safety 1-4 The

More information

CPP40707 Certificate IV in Security and Risk Management

CPP40707 Certificate IV in Security and Risk Management CPP40707 Certificate IV in Security and Risk Management Qualification requirements Packaging Rules To achieve recognition at the Certificate IV level, the candidate must demonstrate competency in the eleven

More information

UoB Risk Assessment Methodology

UoB Risk Assessment Methodology [Type here] UoB Risk Assessment Methodology The Risk Assessment Methodology describes how information security risk will be managed, including guidance for assessing, scoring, choosing acceptance or treatment

More information

Coping with a major business disruption. Some practical advice

Coping with a major business disruption. Some practical advice Coping with a major business disruption Some practical advice Coping with a major business disruption What is business continuity? Business continuity planning (BCP) is a management process that helps

More information

1 The key purpose identified for those working in health and social care settings is to provide an integrated, ethical

1 The key purpose identified for those working in health and social care settings is to provide an integrated, ethical HSC223 Contribute to moving and handling individuals (Level 2) Elements of Competence HSC223a Prepare individuals, environments and equipment for moving and handling HSC223b Enable individuals to move

More information

H5PJ 04 (SCDHSC0045) Lead practice That Promotes the Safeguarding of Individuals

H5PJ 04 (SCDHSC0045) Lead practice That Promotes the Safeguarding of Individuals H5PJ 04 (SCDHSC0045) Lead practice That Promotes the Safeguarding of Individuals Overview This standard identifies the requirements associated with safeguarding which must permeate all your work with individuals.

More information

Chapter 1- Introduction. Lecture 1

Chapter 1- Introduction. Lecture 1 Chapter 1- Introduction Lecture 1 Topics covered Professional software development What is meant by software engineering. Software engineering ethics A brief introduction to ethical issues that affect

More information

INTERNATIONAL NETWORK FOR QUALITY ASSURANCE AGENCIES IN HIGHER EDUCATION

INTERNATIONAL NETWORK FOR QUALITY ASSURANCE AGENCIES IN HIGHER EDUCATION INTERNATIONAL NETWORK FOR QUALITY ASSURANCE AGENCIES IN HIGHER EDUCATION INQAAHE IN QUALITY ASSURANCE Preface The Guidelines of Good Practice are the work of quality assurance agencies from over 65 countries

More information

Guide for Clinical Audit Leads

Guide for Clinical Audit Leads Guide for Clinical Audit Leads Nancy Dixon and Mary Pearce Healthcare Quality Quest March 2011 Clinical audit tool to promote quality for better health services Contents 1 Introduction 1 1.1 Who this

More information

H5RE 04 (SCDHSC0437) Promote Your Organisation and Its Services to Stakeholders

H5RE 04 (SCDHSC0437) Promote Your Organisation and Its Services to Stakeholders H5RE 04 (SCDHSC0437) Promote Your Organisation and Its Services to Stakeholders Overview This standard identifies the requirements when promoting your organisation and the services it provides to a range

More information

Hazard Identification, Risk Assessment and Management Procedure. Documentation Control

Hazard Identification, Risk Assessment and Management Procedure. Documentation Control Hazard Identification, Risk Assessment and Management Procedure Reference: Date approved: Approving Body: Implementation Date: Version: 3 Documentation Control GG/CM/007 Trust Board Supersedes: Version

More information

XXX000YY Certificate IV in Government Security

XXX000YY Certificate IV in Government Security XXX000YY Certificate IV in Government Security XXX000YY Certificate IV in Government Security Description This qualification allows for the attainment of generalist competencies in Security and also specialist

More information

Standard 5. Patient Identification and Procedure Matching. Safety and Quality Improvement Guide

Standard 5. Patient Identification and Procedure Matching. Safety and Quality Improvement Guide Standard 5 Patient Identification and Procedure Matching Safety and Quality Improvement Guide 5 5 5October 5 2012 ISBN: Print: 978-1-921983-35-1 Electronic: 978-1-921983-36-8 Suggested citation: Australian

More information

Business Continuity Planning

Business Continuity Planning Business Continuity Planning Public Entities Risk Management Forum 5 th July 2012 Presented by Mark Penberthy FBCI Overcoming Practical Challenges Business Continuity Management (BCM) AGENDA 1. What is

More information

2011 School-assessed Coursework Report. Information Technology Applications (2011 2014): Units 3 and 4 UNIT 3 GENERAL COMMENTS

2011 School-assessed Coursework Report. Information Technology Applications (2011 2014): Units 3 and 4 UNIT 3 GENERAL COMMENTS 2011 School-assessed Coursework Report Information Technology Applications (2011 2014): Units 3 and 4 This report is provided for the first year of implementation of this study and is based on the coursework

More information

Applying the Principle of Least Privilege to Windows 7

Applying the Principle of Least Privilege to Windows 7 1 Applying the Principle of Least Privilege to Windows 7 2 Copyright Notice The information contained in this document ( the Material ) is believed to be accurate at the time of printing, but no representation

More information

Third Party Security Requirements Policy

Third Party Security Requirements Policy Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,

More information

Release: 1. CHCCM703A Apply effective case management practice

Release: 1. CHCCM703A Apply effective case management practice Release: 1 CHCCM703A Apply effective case management practice CHCCM703A Apply effective case management practice Modification History Not Applicable Unit Descriptor Descriptor This unit describes the knowledge

More information

Health and Safety Management in Healthcare

Health and Safety Management in Healthcare Health and Safety Management in Healthcare Information Sheet Nov 2010 This information sheet gives guidance on the key elements of health and safety management in healthcare. It is intended for small employers

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

ASTH416 Develop practices which promote choice, well-being and protection of all individuals

ASTH416 Develop practices which promote choice, well-being and protection of all individuals Develop practices which promote choice, well-being and protection of Overview For this unit you will need to develop, maintain and evaluate systems, and support others to promote the rights, responsibilities,

More information

Code of Practice for Social Service Workers. and. Code of Practice for Employers of Social Service Workers

Code of Practice for Social Service Workers. and. Code of Practice for Employers of Social Service Workers Code of Practice for Social Service Workers and Code of Practice for Employers of Social Service Workers 1 Code of Practice for Social Service Workers Introduction This document contains agreed codes of

More information

The IP3 accreditation process. Bob Hart Chief Assessor September 2008

The IP3 accreditation process. Bob Hart Chief Assessor September 2008 Pr The IP3 accreditation process Bob Hart Chief Assessor September 2008 Stages of assessment 1. Association responds to the guidelines in the form of a self evaluation 2. Consultation on Panel membership

More information

CRITICAL/NON CRITICAL INCIDENT MANAGEMENT AND REPORTING PROCEDURE

CRITICAL/NON CRITICAL INCIDENT MANAGEMENT AND REPORTING PROCEDURE CRITICAL/NON CRITICAL INCIDENT MANAGEMENT AND REPORTING PROCEDURE This procedure must be read in conjunction and interpreted in line with the Critical/Non Critical Incident Management and Reporting policy.

More information

Information Governance and Management Standards for the Health Identifiers Operator in Ireland

Information Governance and Management Standards for the Health Identifiers Operator in Ireland Information Governance and Management Standards for the Health Identifiers Operator in Ireland 30 July 2015 About the The (the Authority or HIQA) is the independent Authority established to drive high

More information

in the Northern Territory

in the Northern Territory 23 JUNE 2011 WORKERS COMPENSATION BEST PRACTICE GUIDELINES for APPROVED INSURERS and SELF INSURERS in the Northern Territory Workers Compensation NT WorkSafe is the administrative arm of the Work Health

More information

The potential legal consequences of a personal data breach

The potential legal consequences of a personal data breach The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.

More information

When should this tool be used?

When should this tool be used? Protecting adults at risk: The London Multi-agency policy and procedures to safeguard adults from abuse. Practice Guidance: Safeguarding Adults Risk Assessment & Risk Rating Tool Why do we need this tool?

More information

How to investigate an Accident and Incident.

How to investigate an Accident and Incident. . Introduction July 2011 Accident investigation is an important part of any safety management system. Without a detailed and thorough investigation, management has no true knowledge of the reasons why

More information

Complaints Standard. for Suppliers. Categorised as Basic (B or F)

Complaints Standard. for Suppliers. Categorised as Basic (B or F) Complaints Standard for Suppliers Categorised as Basic (B or F) (UK version) Contents Introduction 3 Definitions 3 1. Process, Procedures and Controls 5 2. Regulatory Standards 7 3. Employees 7 4. Publicising

More information

Tier 3/4 Social Work Services

Tier 3/4 Social Work Services Children s Services key guidelines 2010 Information from Southampton City Council The threshold criteria for accessing Tier 3/4 Social Work Services Introduction Information sharing is as important as

More information

Principles for the assessment and management of complaints and notifications

Principles for the assessment and management of complaints and notifications July 2014 Principles for the assessment and management of complaints and notifications Introduction The Council s functions, powers and responsibilities as a regulator are specified in the Health Practitioners

More information

Quality Management Plan 1

Quality Management Plan 1 BIGHORN VALLEY HEALTH CENTER PRINCIPLES OF PRACTICE Category: Quality Title: C3 Quality Management Plan Quality Management Plan 1 I. STRUCTURE OF THE QUALITY MANAGEMENT PROGRAM A. Definition of Quality

More information

Technology Delivery Co Ordinator

Technology Delivery Co Ordinator Technology Delivery Co Ordinator Information Package Full Time Technology Delivery Co Ordinator (IT Project & Service Desk Co Ordinator) The Sydney Anglican Schools Corporation caters for the academic,

More information

Clinical Incident Management Policy

Clinical Incident Management Policy Clinical Management Policy Policy Name: Clinical Management Document Number: 1 Page 1 of 13 Policy Portfolio Owner: Manager, Quality and Clinical Governance/General Managers Policy Contact Person: Manager,

More information

Statutory duty of candour with criminal sanctions Briefing paper on existing accountability mechanisms

Statutory duty of candour with criminal sanctions Briefing paper on existing accountability mechanisms Statutory duty of candour with criminal sanctions Briefing paper on existing accountability mechanisms Background In calling for the culture of the NHS to become more open and honest, Robert Francis QC,

More information

STRESS POLICY. Stress Policy. Head of Valuation Services. Review History

STRESS POLICY. Stress Policy. Head of Valuation Services. Review History STRESS POLICY Title Who should use this Author Stress Policy All Staff SAC Approved by Management Team Approved by Joint Board Reviewer Head of Valuation Services Review Date 2018 REVIEW NO. DETAILS Review

More information

Introduction to Information Technology Course Number 10009

Introduction to Information Technology Course Number 10009 Course Name Introduction to Information Technology Course Number 10009 IT1.0 Understand the need for digital technologies within their life IT1.0 Understand the need and impact of technology IT1.1 Define

More information

NOS for Network Support (903)

NOS for Network Support (903) NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure

More information

SCDHSC0233 Develop effective relationships with individuals

SCDHSC0233 Develop effective relationships with individuals Overview This standard identifies the requirements when you develop effective relationships with individuals. This includes identifying individuals' preferences and needs regarding your relationship with

More information

Online participation: Guidance for school governors

Online participation: Guidance for school governors Online participation: Guidance for school governors Introduction The way people communicate is starting to change, with use of the internet increasing throughout society. Easy to use tools such as social

More information

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security

More information

DGD14-006. ACT Health Data Quality Framework

DGD14-006. ACT Health Data Quality Framework ACT Health Data Quality Framework Version: 1.0 Date : 18 December 2013 Table of Contents Table of Contents... 2 Acknowledgements... 3 Document Control... 3 Document Endorsement... 3 Glossary... 4 1 Introduction...

More information

A Guide to Accident Investigations

A Guide to Accident Investigations A Guide to Accident Investigations Introduction The Health and Safety Executive (HSE) report that in 2010/2011 171 workers were killed at work. A further 121,430 other injuries to employees were reported

More information

Point of View. Competition and choice in the audit market

Point of View. Competition and choice in the audit market Point of View Competition and choice in the audit market Key messages Large global accounting networks have emerged in response to the demands of multinational companies which require their auditors to

More information

H5T9 04 (SCDHSC0393) Promote Participation in Agreed Therapeutic Group Activities

H5T9 04 (SCDHSC0393) Promote Participation in Agreed Therapeutic Group Activities H5T9 04 (SCDHSC0393) Promote Participation in Agreed Therapeutic Group Activities Overview This standard identifies the requirements when you promote participation in agreed therapeutic group activities.

More information

BUSINESS CONTINUITY PLANNING

BUSINESS CONTINUITY PLANNING Policy 8.3.2 Business Responsible Party: President s Office BUSINESS CONTINUITY PLANNING Overview The UT Health Science Center at San Antonio (Health Science Center) is committed to its employees, students,

More information

Sustainable Development, Climate Change, and Renewable Energy in Rural Central America. Dr. Debora Ley

Sustainable Development, Climate Change, and Renewable Energy in Rural Central America. Dr. Debora Ley Sustainable Development, Climate Change, and Renewable Energy in Rural Central America Dr. Debora Ley 2nd International Conference on Evaluating Climate Change and Development Evaluating Linkages Between

More information

PRIVACY BREACH POLICY

PRIVACY BREACH POLICY Approved By Last Reviewed Responsible Role Responsible Department Executive Management Team March 20, 2014 (next review to be done within two years) Chief Privacy Officer Quality & Customer Service SECTION

More information

Lecture 2. Anis Koubaa

Lecture 2. Anis Koubaa Chapter 1- Introduction Lecture 2 Anis Koubaa Slides from textbook Software Engineering, Ninth Edition by Sommerville (c) Pearson Education 1 - Addison-Wesley, 2011 22-Jun-12 Software engineering ethics

More information

Subject: Establishment of a Safety Management System (SMS)

Subject: Establishment of a Safety Management System (SMS) GOVERNMENT OF INDIA OFFICE OF THE DIRECTOR GENERAL OF CIVIL AVIATION TECHNICAL CENTRE, OPPOSITE SAFDARJUNG AIRPORT, NEW DELHI 11 0 003 CIVIL AVIATION REQUIREMENTS SERIES 'C' PART I 20 TH JULY 2010 EFFECTIVE:

More information

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services / BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE By Melbourne IT Enterprise Services CHECKLIST: PCI/ISO COMPLIANCE If your business handles credit card transactions then you ve probably heard of the Payment

More information

Dutch Accreditation Council (RvA) Policy rule Nonconformities. Corrective action

Dutch Accreditation Council (RvA) Policy rule Nonconformities. Corrective action Dutch Accreditation Council (RvA) Policy rule Nonconformities and Corrective action Document code: RvA-BR004-UK Version 2, 23-1-2015 RvA policy guidelines describe the RvA rules and the policy on specific

More information

F36D 04 (LMC B1) Lead and manage provision of care services that respects, protects and

F36D 04 (LMC B1) Lead and manage provision of care services that respects, protects and Elements of competence LMC B1.1 LMC B1.2 LMC B1.3 Lead and manage provision that complies with legislation, registration, regulation and inspection requirements Lead and manage provision that promotes

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Security Management of Government Buildings

Security Management of Government Buildings GUIDELINE Security Management of Government Buildings The Queensland Government has a responsibility to ensure its services are resilient to all foreseeable risks. In the context of security management,

More information

D 1. Working with people Develop productive working relationships with colleagues. Unit Summary. effective performance.

D 1. Working with people Develop productive working relationships with colleagues. Unit Summary. effective performance. 1 Develop productive working relationships with colleagues Unit Summary What is the unit about? This unit is about developing working relationships with colleagues, within your own organisation and within

More information

INTERNATIONAL AC CREDITATION STANDARDS FOR HEALTHCARE EXTERNAL EVALUATION ORGANISATIONS

INTERNATIONAL AC CREDITATION STANDARDS FOR HEALTHCARE EXTERNAL EVALUATION ORGANISATIONS INTERNATIONAL AC CREDITATION STANDARDS FOR HEALTHCARE EXTERNAL EVALUATION ORGANISATIONS Third Edition Published by The International Society for Quality in Health Care December 2007 3rd Floor, Joyce House,

More information

Managing Special Authorities. for PCI Compliance. on the. System i

Managing Special Authorities. for PCI Compliance. on the. System i Managing Special Authorities for PCI Compliance on the System i Introduction What is a Powerful User? On IBM s System i platform, it is someone who can change objects, files and/or data, they can access

More information

Manchester City Council Role Profile. Service Manager (Database Analysis), Grade 9

Manchester City Council Role Profile. Service Manager (Database Analysis), Grade 9 Manchester City Council Role Profile Service Manager (Database Analysis), Grade 9 ICT Service, Corporate Core Directorate Reports to: Service Delivery Manager (IT Operations) Key Role Descriptors: Job

More information

Release: 1. ICAPMG601A Establish IT project governance

Release: 1. ICAPMG601A Establish IT project governance Release: 1 ICAPMG601A Establish IT project governance ICAPMG601A Establish IT project governance Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications

More information

Youth Allowance or ABSTUDY

Youth Allowance or ABSTUDY Youth Allowance or ABSTUDY Unreasonable to live at home Statement by Independent Third Party Return this form to one of our Service Centres by at the following address Name of young person claiming Unreasonable

More information

Incident Reporting Policy

Incident Reporting Policy Document Name: Incident Reporting Policy Issue Date: 11/12/2012 Adventist Aged Care Incident Reporting Policy 1. Introduction 2. Purpose 3. Scope 4. Legislative Obligations 5. Procedure 6. Documentation

More information

FACS Community Complaints Guidelines for Ageing and Disability Direct Services

FACS Community Complaints Guidelines for Ageing and Disability Direct Services FACS Community Complaints Guidelines for Ageing and Disability Direct Services Summary: This is designed to guide FACS staff when handling community complaints and is an extension of the FACS Community

More information

Information security risk management using ISO/IEC 27005:2008

Information security risk management using ISO/IEC 27005:2008 Information security risk management using ISO/IEC 27005:2008 Hervé Cholez / Sébastien Pineau Centre de Recherche Public Henri Tudor [email protected] [email protected] March, 29 th 2011 1

More information

35 PROMOTE CHOICE, WELL-BEING AND THE PROTECTION OF ALL INDIVIDUALS

35 PROMOTE CHOICE, WELL-BEING AND THE PROTECTION OF ALL INDIVIDUALS Unit overview Elements of competence 35a 35b 35c Develop supportive relationships that promote choice and independence Respect the diversity and difference of individuals and key people Contribute to the

More information

Nuclear Safety Council Instruction number IS-19, of October 22 nd 2008, on the requirements of the nuclear facilities management system

Nuclear Safety Council Instruction number IS-19, of October 22 nd 2008, on the requirements of the nuclear facilities management system Nuclear Safety Council Instruction number IS-19, of October 22 nd 2008, on the requirements of the nuclear facilities management system Published in the Official State Gazette (BOE) number 270 of November

More information

Code of Ethics & Practice

Code of Ethics & Practice PSYCHOTHERAPY Irish Institute of Cognitive & Humanistic Psychotherapy Code of Ethics & Practice Valid from 4 th April, 2012 IICHP 6 Nutley Lane Dublin 4 PSYCHOTHERAPY IICHP CODE OF ETHICS & PRACTICE For

More information

Chapter 1- Introduction. Lecture 1

Chapter 1- Introduction. Lecture 1 Chapter 1- Introduction Lecture 1 Topics covered Professional software development What is meant by software engineering. Software engineering ethics A brief introduction to ethical issues that affect

More information

Code of Ethics and Professional Responsibilities for Healthcare Ethics Consultants

Code of Ethics and Professional Responsibilities for Healthcare Ethics Consultants Code of Ethics and Professional Responsibilities for Healthcare Ethics Consultants Preface The statements in this code set out the core ethical responsibilities of individuals performing healthcare ethics

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Stellenbosch University. Information Security Regulations

Stellenbosch University. Information Security Regulations Stellenbosch University Information Security Regulations 1. Preamble 1.1. Information Security is a component of the Risk structure and procedures of the University. 1.2. Stellenbosch University has an

More information

Work-related stress can be caused by psychological hazards such as work design, organisation and management, and issues like bullying and violence.

Work-related stress can be caused by psychological hazards such as work design, organisation and management, and issues like bullying and violence. Work-related Stress Work-related stress is a very significant occupational health and safety problem for teachers which can lead to conditions such as depression, anxiety, nervousness, fatigue and heart

More information

(a) the kind of data and the harm that could result if any of those things should occur;

(a) the kind of data and the harm that could result if any of those things should occur; Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data

More information

INDEX 1.0 HEALTH, SAFETY & ENVIRONMENT 1.1 INTRODUCTION 1.2 OBJECTIVES 1.3 HEALTH, SAFETY & ENVIRONMENT STATEMENT 1.4 ENVIRONMENTAL STATEMENT

INDEX 1.0 HEALTH, SAFETY & ENVIRONMENT 1.1 INTRODUCTION 1.2 OBJECTIVES 1.3 HEALTH, SAFETY & ENVIRONMENT STATEMENT 1.4 ENVIRONMENTAL STATEMENT INDEX 1.0 HEALTH, SAFETY & ENVIRONMENT 1.1 INTRODUCTION 1.2 OBJECTIVES 1.3 HEALTH, SAFETY & ENVIRONMENT STATEMENT 1.4 ENVIRONMENTAL STATEMENT 2.0 HEALTH, SAFETY & ENVIRONMENT MANUAL 2.1 HAZARD MANAGEMENT

More information

Hospital pharmacy technician role / service definition grid

Hospital pharmacy technician role / service definition grid Hospital pharmacy technician role / service definition grid To be a competent hospital pharmacy technician, you must be able to complete the required task to the defined standard and to do this on every

More information

Electronic business conditions of use

Electronic business conditions of use Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users

More information