Paper+2+Question+Practice

Y13 P2 Practice
Group Sue Group Nat Group Sneha

Part (d) answer
//Teacher comments in italics//

Two ethical policies which must be implemented regarding the storage of patients medical information would be:

The patient should/has the right to view their own personal data so that the patient can make sure that the data stored about this is accurate //(states a policy).// If the data is not allowed to be viewed by the patients then there could be high risk of the patient getting the wrong treatment done hence both (social issue raised); patients should be allowed to view their own data in order for accurate data storing and minimising risks involved.(//social issue expanded).// However if patients are allowed to view their own data then there would be a cost factor that should be added as patients will want to make changes to their information as updates throughout the system will need to be made hence time consuming this also minimises the risk of a third person trying to change data as there is cost involved. //(provides and briefly discusses a **solution** to the possible impact of the issue - feasible?) (Technical knowledge not clear about databases - “updates throughout the system” implies flat file database or badly organised relational database.) (Also what information can a patient be able to change and what information would a patient have difficulties with?)//

Secondly, personal data should not be shared with anyone unless permission has been asked from the patient that the information is about. //(second policy stated)// This policy is important in order to protect the patients privacy rights. //(expansion)// Therefore information shouldn’t be shared with third parties or anyone else part of the medical institution. //(another perspective).//

In conclusion, I think that security is one of the biggest issues that will arise if data is not secured. (this sentence has no meaning). Patients permission should be taken first before to avoid discrimination of an individual. //(an example here would be good).// Secondly if an individual has the rights to see and modify their personal data they can provide the hospital with accurate information and benefit themselves in the long run. E.g. in emergencies. If the patient has updated their information then the treatment can be done quickly and accurately. //(continues to expand upon first policy and the social effect).// However if there are costs involved then the customer may not be encouraged to regularly update their information and therefore causing problems. //(Discussion about first policy).// Overall both policies need to be used in order for accurate and safe data storage and access. //(No value to this sentence).//

Further commentary
· Two policies have been given. One has been discussed more than the other. How can this answer be improved? · The social impact of the second is lacking – why is the policy required? · What are the possible implications? Where are the examples? · What about the IT theory – can this be expanded upon? How can the student show knowledge in this question? Policy 1 could discuss verification and validation methods, relational databases and the advantages in updating records. Policy 2 could discuss methods of ensuring data cannot be sold/shown off to third parties without permission – could this mean a method of logging usage and/or permissions of access? Could there be limitations to access (a relational database would certainly help with this here). · Once these each of these policies have been fully explained and with a BALANCED discussion/evaluation: on one hand...however....advantages are ....disadvantages are......a solution would be.... · Then is it possible to make an overall judgement/appraisal of the two....which potential is the best, what are the long term impacts/short term impacts...evaluation of suggested solutions.....

Marking Rubric
//Very limited knowledge of IT theory// //Very little or no reference to social issues// //Significant errors and omissions of important information// || //Some knowledge of basic IT theory// //Some reference to social issues// //Some relevant terms explained// //Some understanding of the ways facts or ideas may be related at the top of the band// || //A coherent and logically structured answer// //A sound knowledge of IT theory// //Appropriate reference to **social issues**// //An attempt to show underlying assumptions and important relationships// || //A detailed, coherent and logically structured answer// //Good knowledge of IT theory// //Appropriate reference to social issues// //Where appropriate, examples have been used// //Evidence of appropriate evaluation, although it may be unbalanced at the lower end of the band// //An appraisal is made at the top end of the band// //No major errors// ||
 * Level 0 ||
 * //0 marks// ||
 * //Inappropriate answer// ||
 * Level 1 ||
 * //1-2 marks// ||
 * //A brief and general answer//
 * //A brief and general answer//
 * Level 2 ||
 * //3-5 marks// ||
 * //A limited, descriptive answer//
 * //A limited, descriptive answer//
 * Level 3 ||
 * //6-7 marks// ||
 * //An understanding of the specific demands of the question//
 * //An understanding of the specific demands of the question//
 * Level 4 ||
 * //8-10 marks// ||
 * //Clear understanding of the specific demands of the question//
 * //Clear understanding of the specific demands of the question//