In: Nursing
1.describe how the organisation reviews and updates
the support recipients current goals and needs.
2. explain how the workplace systems protect and store the
information of the support recipients .how have you stored
information according to the organisation policy and protocols?
1. Here organisation reviews and updates support the recipients widly because it is very important in meeting their goals and needs of present that includes many that is when organisation goes through large changes it's good idea to review relevant policies.Policies should line up with the company;s mission, vision and even the values.So if you have a change in strategic direction or a reorganisation.Its important to review policies especially to make sure they align with the changes that will help the reciepient widely and on updating it helps in meeting with certain new ideas and and reveals and gives much more important information which is needed by us and thus we know technology is having a great importance in nowa days and we use many softwares too for maintaining certain informatio in the organisation and its all about revisions, and thus updation helps in repairing security holes that have been discovered and fixing or removing computer bugs updates can add new features to our devices and remove outdated ones which is helping the recipient in many ways and preventing from many other problems and this has a great influence in building their goals and meeting their needs.
2.The most effective ways to help or store the information or protect employees personal information is through the use of Human Resource information System. This is tailored to meet our specific HR document and record keeping needs provides you with the level of protection that ensures your employees we have done all we can innorder to safegaurd their personal information
Acording to organistion policies and protocols information is stored in certain manner according to their rules.This include ensuring information assets value to the organisation is fully realised.Information assets is shared to the maximum extent possible in accordance with security requirements.Information asset quality is in line with business needs, and also few technologies allow people to make marks on paper that are easily read by machine.