ipl-logo

Outline The Purpose And Benefits Of Maintaining Security And Confidentiality At Work

472 Words2 Pages

Outcome 2
Understand how to maintain security and confidentiality at work and deal with concerns

2.1 Outline the purpose and benefits of maintaining security and confidentiality at work

In dealing with confidential information, such as names, addresses, national insurance numbers and bank details, the organisation is being trusted with that information. If any of that information got out or wasn’t correctly disposed of, i.e. shredded, then the organisation would come under a serious investigation and would probably see some kind of court action against them.
If anyone gets hold of a person’s bank details, dependant on their intentions, they could easily get access to the person’s money and basically go on a spending spree; identity theft …show more content…

If people are entrusting you and your organisation with their sensitive information, then it is only right to treat that with respect. Storing information securely and safely whether it is paper or electronically is mandatory and this information should never be given to third parties unless there are criminal investigations and the courts require it. Leaking information would be a breach of the Data Protection Act 1998 and would probably see you prosecuted in court, probably even fined. Security and confidentiality is an essential part of any organisation.
2.3 Outline legal requirements for security and confidentiality, as required

There are quite a few pieces of legislation that covers confidentiality and security, a couple of examples are:
• The Data Protection Act 1998 - An Act defining the way in which information about people can be legally used and handled. Its main purpose is to prevent is to protect people against misuse or abuse of information about them.
• The Copyright, Design and Patent Act 1988 – It gives creators of music, writers, artists, etc., full control over how their material is used. Someone would have to either request permission to use it, or display the original owner’s copyright information on the work if being used elsewhere.
2.4 Describe procedures for dealing with concerns about security and confidentiality in an

Open Document