Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 140

COMPETENCY BASED LEARNING MATERIAL

Performing Data Recording


and Reporting

Sector:
HUMAN HEALTH / HEALTH CARE
Qualification:
CONTACT TRACING LEVEL II NC II
Unit of Competency:
PERFORM DATA RECORDING AND REPORTING

TECHNICAL EDUCATION AND SKILLS


DEVELOPMENT AUTHORITY
Provincial Training Center, Epark, Apokon Tagum City Davao del Norte
TABLE OF CONTENTS

HOW TO USE THIS COMPETENCY-BASED LEARNING MATERIAL..............................12


LIST OF COMPETENCIES.....................................................................................................9
MODULE CONTENT.............................................................................................................10
LEARNING OUTCOME 1: DEMONSTRATE COMPUTER LITERACY AND DATA/RECORDS
MANAGEMENT.............................................................................................................................12
LEARNING EXPERIENCES.........................................................................................................13
INFORMATION SHEET 5.1-1 Microsoft Office Application.......................................14
SELF-CHECK 5.1-1............................................................................................................... 23
ANSWER KEY 5.1-1......................................................................................................................24
TASK SHEET 5.1-1........................................................................................................................25
PERFORMANCE CRITERIA CHECKLIST.............................................................................26
INFORMATION SHEET 5.1-2 WPS Office...........................................................................27
SELF-CHECK 5.1-2............................................................................................................... 29
ANSWER KEY 5.1-2......................................................................................................................30
INFORMATION SHEET 5.1-3 Email System......................................................................31
SELF-CHECK 5.1-3............................................................................................................... 36
ANSWER KEY 5.1-3......................................................................................................................37
INFORMATION SHEET 5.1-4 Usage of Search Engine and Web Browser...........38
SELF-CHECK 5.1-4............................................................................................................... 44
ANSWER KEY 5.1-4......................................................................................................................45
INFORMATION SHEET 5.1-5 Records Management....................................................46
LEARNING OUTCOME 2. COLLATE RECORDS..............................................................................52
LEARNING EXPERIENCES.........................................................................................................53
INFORMATION SHEET 5.2-1 TYPES OF RECORDS......................................................54
SELF-CHECK 5.2.1............................................................................................................... 60
ANSWER KEY 5.2-1......................................................................................................................61
TASK SHEET 5.2-1 Types of Records..................................................................................62
PERFORMANCE CRITERIA CHECKLIST 5.2-1.................................................................63
INFORMATION SHEET 5.2-2 Documentation and Recording Procedures..........64
SELF-CHECK 5.2-2............................................................................................................... 68
ANSWER KEY 5.2-2......................................................................................................................69
INFORMATION SHEET 5.2-3 Standard Forms...............................................................70
SELF-CHECK 5.2-3............................................................................................................... 82
ANSWER KEY 5.2-3......................................................................................................................83
LEARNING OUTCOME 3. PREPARE REPORTS BASED ON WORKPLACE SYSTEM...............84
Learning Experiences..................................................................................................................85
INFORMATION SHEET 5.3.1 DATA PRIVACY ACT OF 2012....................................86
SELF-CHECK 5.3.1............................................................................................................... 88
ANSWER KEY 5.3.1......................................................................................................................89
INFORMATION SHEET 5.3.2 HOW TO WRITE A REPORT.......................................90
SELF-CHECK 5.3.2............................................................................................................... 95
ANSWER KEY 5.3.2......................................................................................................................96
INFORMATION SHEET 5.3.3 Report Flow.......................................................................97
SELF-CHECK 5.3.3............................................................................................................ 106
ANSWER KEY 5.3.3....................................................................................................................107
TASK SHEET 5.3.3............................................................................................................ 108
PERFORMANCE CRITERIA CHECKLIST 5.3.3...............................................................109
INFORMATION SHEET 5.3.4 BACKING UP YOUR FILES DIGITALLY...............110
SELF-CHECK 5.3.4............................................................................................................ 115
ANSWER KEY 5.3.4....................................................................................................................116
JOB SHEET 5.3.4................................................................................................................ 117
PERFORMANCE CRITERIA CHECKLIST 5.3.4...............................................................119
REFERENCES....................................................................................................................120
How to Use this Competency-Based Learning Material

Welcome to the Module: Performing Data Recording and Reporting. This


Module contains training materials and activities for you to complete.

The unit of competency Perform Data Recording and Reporting contains the
knowledge, skills and attitudes required for Contact Tracing Level II. It is one of
the Core Modules at National Certificate Level II (NC II).

You are required to go through a series of learning activities in order to complete


each learning outcome of the module. In each learning outcome there are
Information Sheets, Resource Sheets and References Materials for further reading
to help you better understand the required activities. Follow these activities on
your own and answer the self-check at the end of each learning outcome. Get the
answer key from your instructor and check your work honestly. If you have
questions, please don’t hesitate to ask your facilitator for assistance.

Recognition of Prior Learning (RPL)


You may already have some or most of the knowledge and skills covered in this
module because you have:
 Been working for sometime
 Already completed training in this area
If you can demonstrate to your trainer that you are competent in a particular skill
or skills, talk to him/her about having them formally recognized so you won’t
have to do the same training again. If you have qualifications or Certificates of
Competency from previous trainings, show them to your trainer. If the skills you
acquired are still relevant to this module, they may become part of the evidence
you can present for RPL.
At the end of this learning material is a Learner’s Diary, use this diary to record
important dates, jobs undertaken and other workplace events that will assist you
in providing further details to your trainer or assessors. A Record of Achievement
is also provided for your trainer to complete once you completed the module.
This learning material is designed to guide you in learning at your own pace. To
start with, talk with your trainer and agree on how you will both organize the
training for this module. Most probably your trainer will also be your supervisor
or manager. He/she is there to support you and guide you the correct way to do
things. From time to time you will be required to practice and demonstrate the
skills that you’ve learned from this module and you will be requiring some
assistance from your trainer (as instructed in the learning material).
If you have questions, don’t hesitate to ask your instructors for assistance. Your
instructor will always be available to assist you during the training.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t Page |
Prepared By: Romally 00
Reporting Antonette B. Tagnipez
4
Contents of this Competency-Based Learning Material:
Inside this Competency-Based Learning Material are several “Learning Activities”.
Each Learning Activity guides the learner to achieve one learning outcome.
You must follow the “Learning Experiences” page. This will guide you through
different “Instruction Sheets” that will assist you in performing different learning
activities towards the attainment of a particular learning outcome.
 Information Sheet - This will provide you with information (concepts,
principles and other relevant information) needed in performing certain
activities.
 Operation Sheet - This will guide you in performing single task, operation
or process in a job.
 Job Sheet - This is designed to guide you on how to do the job that will
contribute to the attainment of the learning outcome.
 Assignment Sheet - The assignment sheet is a guide used to enhance
(follow-up) what you have learned in the information sheet, operation
sheet or job sheet.
 Worksheet - Worksheets are the different forms that you need to fill-up in
certain activities that you performed.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t Page |
Prepared By: Romally 00
Reporting Antonette B. Tagnipez
5
This module is prepared to help you achieve the required competency in Performing
Data Recording and Reporting. This will be the source of information that will enable
you to acquire the knowledge and skills in this particular qualification independently
at your own pace or with minimum supervision or help from your instructor or
facilitator.
Talk to your trainer and agree on how you will both organize the training of this
unit. Read through this learning guide carefully. It is divided into sections which
cover all the skills and knowledge you need to successfully complete this module.
Work through all the information and complete the activities in each section and
complete the self-check. Suggested references are included to supplement the
materials provided in this module.
Most probably your trainer will also be your supervisor or manager. He/she is
there to support you and show you the correct way to do things. Ask for help.
Your trainer will tell you about the important things you need to consider when
you are completing activities and it is important that you listen and take notes.
Talk to more experienced work mates and ask for their guidance.
Use the self-check questions at the end of each section to test your own progress.
When you are ready, ask your trainer to watch you perform the activities outlined
in the learning guide.
As you work through the activities, ask for written feedback of your progress from
your trainer. After completing each element, ask your trainer to mark on the
report that you are ready for assessment.
When you have completed this module (or several modules) and feel confident
that you have had sufficient practice your trainer will arrange an appointment
with you to asses you. The result of your assessment will be recorded in your
Competency Achievement Record.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t Page |
Prepared By: Romally 00
Reporting Antonette B. Tagnipez
6
CONTACT TRACING LEVEL II

COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No. Unit of Competency Module Title Code

Conduct case Conducting case


1. investigation and investigation and HHC532301
contact identification contact identification

Conduct profiling of Conducting profiling


2. HHC532302
contacts and follow-up of contacts and follow-
up
Conduct referral to health Conducting referral to
facility, quarantine facility health facility, quarantine
3. and other relevant facility and other HHC532303
agencies relevant agencies

Conduct health education Conducting health


4. HHC532304
programs education programs

Perform data recording Performing data


5. HHC532305
and reporting recording and reporting

Conduct monitoring and Conducting monitoring and


6. HHC532306
surveillance surveillance

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t Page |
Prepared By: Romally 00
Reporting Antonette B. Tagnipez
7
MODULE CONTENT

UNIT OF COMPETENCY : PERFORM DATA RECORDING AND REPORTING

MODULE TITLE : PERFORMING DATA RECORDING AND


REPORTING

MODULE DESCRIPTOR : This module covers the knowledge, skills and


attitude required in contact tracing to record and
report relevant information. The unit involves the
documentation of information on the activities
involving the patient.

ENTRY REQUIREMENTS : Trainee/Student must have completed at least 10


years basic education or holder of Alternative
Learning System (ALS) certificate of completion with
grade 10 equivalent.

NOMINAL DURATION : 12 Hrs.

QUALIFICATION LEVEL: LEVEL II

PREREQUISITES : NONE

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t Page |
Prepared By: Romally 00
Reporting 8
Antonette B. Tagnipez
SUMMARY OF Upon the completion of this module, the trainees/ students
LEARNING must be able to:
OUTCOMES
 Demonstrate computer literacy and data/records
management
 Collate records
 Prepare reports based on workplace records system

ASSESSMENT  Basic Microsoft Office applications are navigated/operated


CRITERIA in accordance with established standards and procedures.
 E-mail system is used in accordance with established
standards and procedures.
 Basic functions of www-browser to search for necessary
information are conducted in accordance with established
standards and procedures.
 Data or files are stored, maintained, stored, and easily
retrieved data in a hard drive in an organized manner.
 Protocol and confidentiality of records and data are
followed at all times.
 Client’s information is updated in accordance with
workplace records system requirements and criteria.
 Documents and records data followed a set of standards.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t Page |
Prepared By: Romally 00
Reporting Antonette B. Tagnipez
10
Client’s information is summarized based on the workplace records
system.
Protocolandconfidentialityofrecordsanddataare followed at all times.

 Reports are prepared in accordance with standard forms.


 Reports are submitted to immediate supervisorin
accordance with established standards and processes.
 Protocolandconfidentiality ofrecordsanddataare
followed at all times.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 11
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
LEARNING OUTOME SUMMARY

Learning Outcome 1: DEMONSTRATE COMPUTER LITERACY AND


DATA/RECORDS MANAGEMENT

CONTENTS:
 Basic MS Office Application
 Email System
 Search Engines and Web Browsing
 Data/Records management

ASSESSMENT CRITERIA:
 Basic Microsoft Office applications are navigated/operated in accordance
with established standards and procedures
 E-mail system is used in accordance with established standards and
procedures
 Basic functions of www-browser to search for necessary information are
conducted in accordance with established standards and procedures
 Data or files are stored, maintained, stored, and easily retrieved data in a
hard drive in an organized manner
 Protocol and confidentiality of records and data are followed at all times

CONDITION:
The following resources should be provided
 Computer
 Microsoft Office applications, i.e. Microsoft Word, Microsoft Excel,
Microsoft PowerPoint
 Internet Connection
 Storage Device i.e. Internal/External Hard drive, Floppy Drive, SD Cards
 Records and Reports
 Standard Forms

ASSESSMENT METHODS:
 Oral questioning/interview
 Written Test
 Return demonstration
 Direct observation of candidate

METHODOLOGIES:
 Individual/Modular/ Self-paced Learning
 Distance Learning
 Individual home assignment
 Focus Group Discussion
 Face-to-face lecture/ discussion
 Role-playing

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 12
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
LEARNING EXPERIENCES

Learning Outcome 1:
DEMONSTRATE COMPUTER LITERACY AND DATA/RECORDS MANAGEMENT

Learning Activities Special Instructions


1. Read Information Sheet No. 5.1-1 Watch Videos:
MICROSOFT OFFICE APPLICATION  Basic Microsoft Office Application
 Basic Microsoft Word Tutorial
 Basic Microsoft Excel Tutorial
 Basic Microsoft PowerPoint
Tutorial
2. Answer Self-check Check answers
with answer key 5.1-1
3. Perform Task Sheet on How to Use Performance Criteria Checklist
Start a new document and save in
Microsoft Word
4. Read Information Sheet No. 5.1-2 Read information sheet. After reading
WPS OFFICE the learner is encourage to answer self-
check.
5. Answer Self-check Check answers
with answer key 5.1-2
6. Read Information Sheet No. 5.1-3 Watch Videos:
EMAIL SYSTEM  Creating Gmail Account
 Gmail: Sending Email
7. Answer Self-check Check answers
with answer key 5.1-3
8. Read Information Sheet No. 1.1-4 Read information sheet. After reading
Usage of Search Engine and Web the learner is encourage to answer the
Browser self-check.
9. Answer Self-check Check answers
with answer key 1.1-4
10. Read Information Sheet No. 5.1-5 Read information sheet. After reading
RECORDS MANAGEMENT the learner may proceed to next
learning outcome

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 13
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
INFORMATION SHEET 5.1-1
Microsoft Office Application

Learning Objective:

After reading this information sheet, you must be able to:


 Familiarize the different types of MS Application; and
 Navigate/Operate the MS Application according to standard procedures.

Microsoft Office
Microsoft Office is a set of vital applications primarily known as Office Suite
which has been designed by Microsoft to carry out different office tasks smoothly
and with ease. Bill Gates, the Chairman of Microsoft Corporation first launched it
on August 1 1988at COMDEX in Las Vegas US. Four years ago, the users of MS
Office had already crossed over one billion worldwide and are steadfastly growing
with time. Whenever you buy a new desktop computer or a laptop you will find
that the MS Office is already preinstalled in it most of the time. Recently, Microsoft
launched its newest desktop version Office 2016 for Windows and OS X on
September 22, and July 9, 2015.

Microsoft Office Word

Out of all the different components, the Microsoft Word Processor is the most
common and widely used application all throughout the world. You can easily open
the application on both Windows and Mac Operating Systems. Microsoft Office
Word first came into existence in 1983 initially for the MS-DOS OS. That was when
the mouse was added to the keyword, although there was no need for it. People
could buy Word 1.0 with a bundled mouse. The word for MAC OS was introduced a
couple of years later in 1985. Previously, the Word Processor was in the Doc format
but when the 2007 version was released the format changed to Office Open XML.
This was the time when the Portable Document Format (PDF) and Open Document
Format were first introduced in the 2007 version.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 14
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Top 10 professional and personal uses of Microsoft Word
Written By: Vijay Sharma Published On February 24, 2017

1. Business and workplace use of Microsoft Word: –


You can create all types of official documents in Microsoft Word. You can use
the template function in Microsoft to download letterhead samples, bills, and
cash memos, joining letters, receipts, letterheads, and all various types of
accounts management related work.

You can send an email by using a mail merge that helps you to send one
document to thousands of people with name and address. The use of Microsoft
Word in official works is really easy and productive other than any other word
processing software. After installing and working on MS word you don’t need to
find anything on the search engine. It’s because if you don’t know something,
you can even search inside Microsoft Word when it’s connected to the internet.

2. MS word uses in Education: –


Microsoft Word is the best teaching tool for teachers. You can create a lecture
script by using text, word art, shapes, colors, and images. That will explore
creativity in students. They will watch a slide or printed document more
interestingly.

Other than that, you can type and edit question papers in Microsoft Word. You
can write an application, a letter that is helpful in a certain situation. Microsoft
Word is used to create various educational materials. It’s helpful to create
error-free documents.

3. Home-based users of Microsoft Word: –


You can create a birthday card, invitation card in Microsoft Word by using pre-
defined templates or using insert menu and format menus functions. You can
also type a letter to the municipal party on MS-Word.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 14
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Microsoft Word is like a diary for personal use, in which you can write your day
to day activities. Such as you can type and print the shopping list in the paper.

4. Microsoft Word helps you to get a job: –


Microsoft Office’s basic knowledge can play a big role to get you a job. As you
learned above business and commercial uses of Microsoft Word. It means the
basic and advanced knowledge of MS Word can help you to get a job. And its
great skills that you can highlight in your resume.

5. Help to create resumes, notes, and assignments: –


You can create notes and assignments on MS-word. It’s easy to write and
format text in Microsoft Word by using various text formatting options such as
paragraphs, fonts, styles, etc. You can insert a cover page; you can insert
watermarks and tables in your assignment according to your choice.

6. You can create books, articles, and newsletters: –


Microsoft Word has been used by millions of people around the world for
document writing since its launch. And writing a book on Microsoft Word is
really easy. There are lots of features and functionality that can help you to
create and print a book.

A book needs a cover page, content, head and footers, image adjustments, text
alignment, and text highlighter, etc. All these features are available in Microsoft
Word.

Also, you can create e-books or pdf documents by just saving your document in
.pdf. This is an option you can find in the file menu after that change the save
type from .docx to .pdf and it will create an eBook or notes files for you. But
save an original copy of Word file in .docx, before saving in .pdf format.

7. Used to create edit, transcribe, and convert PDF documents: –


You can create and edit PDF documents in Microsoft Word. You can also
transcribe the video into a word file. You can copy and edit pre-written books.

Microsoft Word is used by data entry operators, assistants and typists more
often to enter and format text in a word file. You can also use Microsoft Word to
translate a document from English to Hindi and Italian to English. But to type
in Hindi, you need Hindi fonts such as Kundli, Agra, etc.

8. You can start an offline/online business after learning the Microsoft word:

Now you know that there are so many uses of Microsoft Word and Office in our
daily life. So, you can use Microsoft Word to start the business. You can start
your business online and offline. You need to create documents for official
works. It’s like a data entry business. You can start freelancing to get Microsoft
Word related works. You can sell documents on your own website. You can

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 14
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
even buy a printer and provide notes for school students. Like a home-based
cybercafé .

9. Collaborate with team members anytime and from anywhere: –


You can use Microsoft Word to collaborate with your team while working on the
same project and document. For that, you need to use Microsoft Word online.
Microsoft Word is now updated to a cloud base application in which the cost of
official work is reduced.

10. You can use Microsoft Word to teach student: –


Microsoft’s word commercial uses are more than our thinking. But after
learning and practicing Microsoft Office or Microsoft applications you can teach
other people.

You can teach your own kids how to download images and align text with
images for notes. How to create resumes. If you have minimum knowledge of
official works then you can even start teaching people online by creating a video
tutorial that you can upload on YouTube. After that, you can monetize your
video and website content with Google AdSense.

Microsoft Office Excel

When Microsoft Office Excel was initially introduced by Microsoft, it had to face a
stiff competition from Lotus 1-2-3 but outclassed it eventually. It is an application
which is based on a spreadsheet and available on both Windows as well as OS X.
The Microsoft Office programs were launched for Mac OS in the same year as the
MS Word. However, the first Windows version came in November 1987. It was
much better than the earlier offering more functions.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 17
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
10 Best Uses of Microsoft Excel
BY HARSHITA SRIVASTAVA ON JANUARY 25, 2018

1. Uses of Microsoft Excel: Analyzing and storing data


One of the best uses of MS Excel is that you can analyze larger amounts of data
to discover trends. With the help of graphs and charts, you can summarize the
data and store it in an organized way so that whenever you want to see that
data then you can easily see it. It becomes easier for you to store data and it
will definitely save a lot of time for you.

Once the data is stored in a systematic way, it can be used easily for multiple
purposes. MS Excel makes it easier to implement various operations on the
data through various tools that it possesses.

2. Uses of Microsoft Excel: Excel tools make your work easier


There are so many tools of MS Excel that make your work extremely easy and
save your time as well. There are wonderful tools for sorting, filtering and
searching which all the more make you work easy. If you will combine these
tools with tables, pivot tables etc. then you will be able to finish your work in
much less time. Multiple elements can be searched easily from large amounts
of data to help solve a lot of problems and questions.

3. Uses of Microsoft Excel: Data recovery and spreadsheets


Another best use of MS Excel is that if your data gets lost then you can recover
it without much inconvenience. Suppose, there is a businessman who has
stored his important data in MS Excel and somehow it gets lost or the file gets
damaged then he must not worry as with the new MS Excel XML format one
can restore the lost or damaged file data.

The next important use is that there are spreadsheets in MS Excel which also
makes your work easy and with the help of new Microsoft MS Excel XML format
you can reduce the size of the spreadsheet and make things compact easily.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 18
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
4. Uses of Microsoft Excel: Mathematical formulas of MS Excel make things
easier
Next best use of MS Excel is that it makes it easy for you to solve complex
mathematical problems in a much simpler way without much manual effort.
There are so many formulas in MS Excel and by using these formulas you can
implement lots of operations like finding sum, average, etc. on a large amount
of data all at once. Therefore, people use MS Excel whenever they have to solve
complex mathematical problems or they need to apply simple mathematical
functions on tables containing larger data.

5. Uses of Microsoft Excel: Security


The chief use of MS Excel is that it provides security for excel files so people
can keep their files safe. All the files of MS Excel can be kept password-
protected through visual basic programming or directly within the excel file.
People store their important data in the MS Excel so that they can keep their
data in an organized way and save their time as well. Almost every person
wants his files to be password protected so that no one is able to see them or
ruin them so here MS Excel solves this problem very efficiently.

6. Uses of Microsoft Excel: Add sophistication to data presentations


Next use of MS Excel is that it helps you in adding more sophistication to your
data presentations which means that you can improve the data bars, you can
highlight any specific items that you want to highlight and make your data
much more presentable easily.

Suppose you have stored data in MS Excel and you want to highlight
something that is important so then you can do that through the various
features of data presentations available in MS Excel. You can even make the
spreadsheets more attractive on which you have stored data.

7. Uses of Microsoft Excel: Online access

Another use of MS Excel is that it can be accessed online from anywhere and
everywhere which means that you can access it from any device and from any
location whenever you want. It provides the facility of working conveniently
which means that if you don’t have laptops then you can use mobile and do
your work easily without any problem. Therefore, due to the large amount of
flexibility that MS Excel provides, people like to work on MS Excel so that they
can comfortably work without worrying about their device or location.

8. Uses of Microsoft Excel: Keeps data combined at one location

Another interesting use of MS Excel is that you can keep all your data at one
location. This will help you in saving your data from getting lost. It will keep all
your data in one place and then you will not have to waste your time in

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 19
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
searching for the files. So it will save your time and whenever need be, you can
look up the categorized and sorted data easily.

9. Uses of Microsoft Excel: Helps businessmen in developing future strategy


You can represent data in the form of charts and graphs so it can help in
identifying different trends. With the help of MS Excel, trend lines can be
extended beyond graph and therefore, it helps one in analyzing the trends and
patterns much easier. In business, it is very important to analyze the
popularity of goods or the selling pattern that they follow to maximize sales. MS
Excel simplifies this task and helps businessmen grow and maximize profits
through the same.

10. Uses of Microsoft Excel: Manage expenses


MS Excel helps in managing expenses. Suppose if a doctor is earning around
50,000 per month then he will make some expenses as well and if he wants to
know how much he is exactly spending per month then he can do it with the
help of MS Excel easily. He can write his monthly income as well as expenses in
the excel tables and then he can get to know how much he is spending and he
can thus control his expenses accordingly.

There are a lot of benefits of using MS Excel, which is why it is used worldwide
by people for performing so many tasks. It not only saves time but also it
makes the work easier. It can almost perform every type of task. For example,
you can do mathematical calculations and you can also make graphs as well as
charts for storing the data. It becomes easy for the businessman to calculate
things and store data in it.

You can store a large amount of data in the MS Excel and analyze it as well. It
helps in keeping the data combined in one place so that data does not get lost
and one does not waste time in finding a particular data. Due to these factors,
it has become such a popular software and we have become habitual of using
it.

Microsoft Office PowerPoint

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 20
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
The introduction of Microsoft Office PowerPoint has made the work of
presentations very simple. Thus, it is known as a presentation of Microsoft Office
programs. With the help of Microsoft Office Application, you can design creative and
engaging slides by not only adding the texts but also adding graphics and other files
such as images and videos. You can decorate the slides and make them colorful
and just put up a nice presentation in front of a client to showcase your portfolio or
sample.

TOP 5 USES OF MS POWERPOINT IN OUR DAILY LIVES


By: Keith Heirn Posted On July 17, 2019

1. PowerPoint in education
Teachers can use PowerPoint to teach subjects lessons and chapters of any
book. They can create or delegate to produce a complete presentation of a book.
It gives the opportunity to the teacher to cover a topic in the different t slides.
And in each slide, they can manage, highlight, mention and teach important
points which are essential to cover in that topic. On the contrary, students can
create their own presentation for self-learning or can create for teachers to
show them. Students can create it for various schools’ programs and speech.

2. PowerPoint in business
Business is all about creating a plan, marketing strategies, execution and
making methods to follow and integrate. PowerPoint helps people in business
to create a plan, structure related to the business or organization. In the case of
the training team, you create and showcase the methods with the help of
diagrams, images, and circles. PowerPoint also provides the facility of
exceptional animation effects so you don’t have to buy special animation
software.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 21
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
3. PowerPoint for house-wives
Housewives can easily invest their time in learning PowerPoint presentations.
They can create slideshows in which they can generate numbers, calculation,
alphabets or all kinds of lessons they want to teach their kids in slideshows.
Moreover, they can create a photo album and presentation in which they can
showcase their precious moments.

4. PowerPoint in governance and citizen services


As we know that PowerPoint presents effective visualization for complex data
and information. It’s very tough to follow directions and systems in a
government office. If the process of anything can present insides or any screen
then it will become very helpful to the people. PowerPoint documents can be
printed so whenever the citizen visits any government sector they can easily
find or access government services through the file or document.

5. PowerPoint for job seekers


Through PowerPoint, job seekers can create digital resumes or multimedia
resumes and it will become a unique way of presenting skills and knowledge in
front of interviewers.

Click/Copy the link provided for Video Presentation


Microsoft Office Basics
https://www.youtube.com/watch?v=yCVy5Kw0l8s

Beginner's Guide to Microsoft Word


https://www.youtube.com/watch?v=S-nHYzK-BVg

The Beginner's Guide to Excel - Excel Basics Tutorial


https://www.youtube.com/watch?v=rwbho0CgEAE

The Beginner's Guide to Microsoft PowerPoint


https://www.youtube.com/watch?v=XF34-Wu6qWU

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 22
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
SELF-CHECK 5.1-1

Read the question carefully and encircle the letter for your answer.

1. Who is the Chairman of Microsoft Corporation?


a. Bill Joe
b. Bill Gates
c. Billy Crowford
d. Bill John

2. What are the three commonly used applications in Microsoft Office?


a. Microsoft Word, Microsoft Excel, Microsoft PowerPoint
b. Microsoft Word, Microsoft Installer, Microsoft PowerPoint
c. Microsoft PowerPoint, Microsoft Word, Microsoft Chips
d. Microsoft Excel, Microsoft PowerPoint, Microsoft Letter

3. It is the most common and widely used application all throughout the world.
a. Microsoft Excel
b. Microsoft Word
c. Microsoft PowerPoint
d. None of the above

4. It is an application which is based on a spreadsheet and available on both


Windows as well as OS X.
a. Microsoft Excel
b. Microsoft Word
c. Microsoft PowerPoint
d. None of the above

5. It is known as a presentation of Microsoft Office programs.


a. Microsoft Excel
b. Microsoft Word
c. Microsoft PowerPoint
d. None of the above

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 23
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
ANSWER KEY 5.1-1
1. b

2. a

3. b

4. a

5. c

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 24
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
TASK SHEET 5.1-1
Title:
Start a new document and save in Microsoft Word
Performance Objective:
Provided with a Microsoft Word application, you will be able to create a new
document and save it in your computer.
Supplies:
Microsoft Office Word Application
Equipment:
Computer
Steps/ Procedures:
Step 1: From the desktop or from your ‘Start’ menu, open Microsoft Word. If the
MS Word icon does not appear you can search for it, using the 'Search
programs and files' box in the picture above.
Step 2: Microsoft Word will open up and present you with an option to select a
document template, or a blank document.
Step 3: If you don't want to use any of the templates on display, click on the
blank document.
Step 4: A new blank document will open up ready for you to start typing.
Step 5: Type in the blank document your Name, Age, Address
Step 5: Click File in the top left-hand corner of the screen.
Step 6: From the menu, choose Save.
Step 7: Type “My output” on File Name box.
Step 8: Click Save Button

Assessment Method:
Performance Criteria Checklist

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 24
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
PERFORMANCE CRITERIA CHECKLIST

Trainee’s Name: Date:

Please tick (√) the column that best describes your evaluation of each identified
evidence.

CRITERIA YES NO

Were you able to?

1. Open the Microsoft Office Word?

2. Type your Name, Age, Address in the blank document?

3. Rename the File Name of your file?

4. Save the new document on your computer?

For satisfactory achievement, all items should receive a YES response.

Comment:

Name of Trainer

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 24
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
INFORMATION SHEET 5.1-2
WPS Office

Learning Objective:

After reading this information sheet, you will be able to operate and create a
new file document using the WPS office.

https://logos-download.com/wp-content/uploads/2020/06/WPS_Office_Logo_full.png

WPS Office
(an acronym for Writer, Presentation and Spreadsheets, previously known as
Kingsoft Office) is an office suite for Microsoft Windows, macOS, Linux, iOS and
Android, developed by Zhuhai-based Chinese software developer Kingsoft. WPS
Office is made up of three primary components: WPS Writer, WPS Presentation,
and WPS Spreadsheet.

The personal basic version is free to use. A fully featured professional-grade


version is also available for a subscription fee. WPS Office 2016 was released in
2016.As of 2019, the Linux version is developed and supported by a volunteer
community rather than Kingsoft itself.
By 2019 WPS Office reached a number of more than 310 million monthly active
users.

The product has had a long history of development in China under the name
"WPS" and "WPS Office". For a time, Kingsoft branded the suite as "KSOffice" in an
attempt to gain an international market foothold, but later returned to "WPS
Office". Since WPS Office 2005 the user interface is similar to that of Microsoft
Office products, and supports Microsoft document formats besides native Kingsoft
formats.

Create a New Document in Writer 2016


1. Click the Application Menu icon to open the drop-down list. Choose
the New tab and you can see four options listed in the New Document section,
shown as below:

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 27
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
New Blank Document: select this option to create a new blank document.
New from Online Templates: select this option to open the Templates dialogue
box and choose the templates that you prefer.
New from Other Templates: select this option to open the Templates dialogue
box, shown as below:

You can choose preferred templates from the General, Business, Daily Life,
Education, Letters and Faxes, and Personal tabs. Click the OK button to create a
new document by the chosen template.
New from Default Templates: select this option to create a new document by the
default template (a blank document here).

2. Click the plus icon besides the document name to


create a new document.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 27
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
SELF-CHECK 5.1-2

ENUMERATION

1-3 Three Primary Components of WPS Office

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 29
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
ANSWER KEY 5.1-2

1. Writer

2. Presentation

3. Spreadsheet

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 30
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
INFORMATION SHEET 5.1-3
Email System

Learning Objective:

After reading this information sheet, you must be able to:


 Identify the components of Email System; and
 Send email to the receiver.

E-mail System

by Mike Brogan | Jul 27, 2015


https://www.day10.co.uk/2015/07/27/email-systems-explained/

E-mail system comprises of the following three components:


 Mailer
 Mail Server
 Mailbox

Mailer

It is also called mail program, mail application or mail client. It allows us to


manage, read and compose e-mail.

Mail Server

The function of a mail server is to receive, store and deliver the email. It is
necessary for mail servers to be Running all the time because if it crashes or is
down, email can be lost.

Mailboxes

Mailbox is generally a folder that contains emails and information about them.

Working of E-mail

Email working follows the client server approach. In this client is the mailer i.e.
the mail application or mail program and server is a device that manages emails.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 31
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Following example will take you through the basic steps involved in sending and
receiving emails and will give you a better understanding of working of email
system:

Suppose person A wants to send an email message to person B.

Person A composes the messages using a mailer program i.e. mail client and then
select
Send option.

The message is routed to Simple Mail Transfer Protocol to person B’s mail
server.

The mail server stores the email message on disk in an area designated for person
B.

The disk space area on the mail server is called mail spool.

Now, suppose person B is running a POP client and knows how to communicate
with B’s mail server.

It will periodically poll the POP server to check if any new email has arrived for
B.As in this case, person B has sent an email for person B, so email is forwarded
over the network to B’s PC. This message is now stored on person B’s PC.

The following diagram gives pictorial representation of the steps discussed above:

Creating Email Account

There are various email service providers available such as Gmail, Hotmail,

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 32
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
ymail, rediff mail etc. Here we will learn how to create an account using Gmail.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 33
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Open gmail.com and click create an account.

Now a form will appear. Fill your details here and click Next Step.

This step allows you to add your picture. If you don’t want to upload now, you can
do it later. Click Next Step.

Now a welcome window appears. Click Continue to Gmail.

Wow!! You are done with creating your email account with Gmail. It’s that easy.
Isn’t it?

Now you will see your Gmail account as shown in the following image:

Key Points:
Gmail manages the mail into three categories namely Primary,
Social and Promotions.

Compose option is given at the right to compose an email message.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 34
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Inbox, Starred, Sent mail, Drafts options are available on the left pane which
allows you to keep track of your emails.

Composing and Sending Email

Before sending an email, we need to compose a message. When we are composing


an email message, we specify the following things:

 Sender’s address in To field


 Cc (if required)
 Bcc (if required)
 Subject of email message
 Text
 Signature

You should specify the correct email address; otherwise it will send an error back
to the sender.

Once you have specified all the above parameters, It’s time to send the email. The
mailer program provides a Send button to send email, when you click Send, it is
sent to the mail server and a message sent successfully is shown at the above.

Reading Email

Every email program offers you an interface to access email messages. Like in
Gmail, emails are stored under different tabs such as primary, social, and
promotion. When you click one of the tabs, it displays a list of emails under that
tab.

In order to read an email, you just have to click on that email. Once you click a
particular email, it gets opened.

The opened email may have some file attached with it. The attachments are shown
at the bottom of the opened email with an option called download attachment.

Replying Email

After reading an email, you may have to reply to that email. To reply to an email,
click the Reply option shown at the bottom of the opened email.

Once you click on Reply, it will automatically copy the sender’s address into the To
field. Below the To field, there is a text box where you can type the message.

Once you are done with entering the message, click the Send button. It’s that
easy. Your email is sent.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 35
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Forwarding Email

It is also possible to send a copy of the message that you have received along with
your own comments if you want. This can be done using the forward button
available in mail client software.

The difference between replying and forwarding an email is that when you reply a
message to a person who has sent the mail but while forwarding you can send it to
anyone.

When you receive a forwarded message, the message is marked with a > character
in front of each line and the Subject: field is prefixed with Fw.

Deleting Email
If you don’t want to keep email into your inbox, you can delete it by simply selecting the message
from the message list and clicking delete or pressing the appropriate command.

Watch Videos

Creating Gmail Account


https://www.youtube.com/watch?v=NXOCa9kzQsk

Gmail:Sending Email
https://www.youtube.com/watch?v=2eH0JbEE-6k

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 36
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
SELF-CHECK 5.1-3

Read the question carefully and encircle the letter for your answer.

1. Components of the Email System, except?


a. Mailer
b. Mail Server
c. Mailbox
d. None of the above

2. Its function is to receive, store and deliver the email. It is necessary for mail servers to be
Running all the time because if it crashes or is down, email can be lost.
a. Mailer
b. Mail Server
c. Mailbox
d. None of the above

3. Is generally a folder that contains emails and information about them.


a. Mailer
b. Mail Server
c. Mailbox
d. None of the above

4. It is also called mail program, mail application or mail client. It allows us to


manage, read and compose e-mail.
a. Mailer
b. Mail Server
c. Mailbox
d. None of the above

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 37
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
ANSWER KEY 5.1-3

1. d

2. b

3. c

4. a

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 38
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
INFORMATION SHEET 5.1-4
Usage of Search Engine and Web Browser

Learning Objective:

After reading this information sheet, you must be able to:


 Define what is search engine and web browser;
 Enumerate the usage of web browser; and
 Differentiate search engine and web browser

http://ai-europe.com/index.php/author/admin-ai/

Search Engine
A search engine is a kind of website through which users can search the content
available on the Internet. For this purpose, users enter the desired keywords into
the search field. Then the search engine looks through its index for relevant web
pages and displays them in the form of a list. The Internet is a huge source of
information & resources and to access the resource from the Internet there are
some kinds of software, this software is known as Search Engine. Some of the
popular ones are: Google, Bing, Yahoo, Duck duck go, Baidu, etc.

There are three main components of the Search engine:


Crawler: Crawlers are software programs sometimes referred to the bots. It
regularly scans the websites automatically for URLs, keywords, and links in order
to discover the new updates. The crawler can follow the links present on some
other webpage.

Index: As we know, the Crawler continuously scans the websites, it develops an


index of URLs, links and keywords to make the search results more effective.
Search Algorithm: The search algorithm is the complete mechanism behind the
whole searching process. It is working by searching for the index and finding for
the most suitable webpages by matching keywords that are searched by the users.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 39
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Web Browser:

https://networkencyclopedia.com/web-browser/

The web browser is an example of application software that is developed to


retrieve and view the information from web pages or HTML files present on the
web servers. The first web browser was invented by Sir Tim Berners-Lee in 1990
and the very first graphical web browser was developed in 1993 which is named
the mosaic. After that, various web browsers were developed. Some of them are
navigator which is developed by Netscape communication, Microsoft’s internet
explorer, Google Chrome, Mozilla Firefox, Opera and Apple safari.

The main characteristics of Web Browser are:


1. It consists of Graphical User Interface.
2. It contains the search box where the user can type the address or URL.
3. Page style can be static or dynamic. It depends upon the interactivity and
the formatting.
4. TCP/IP and HTTP protocols are used by the web browsers.

Difference between Search Engine and Web Browser:


SEARCH ENGINE WEB BROWSER
A search engine is used to find the Web Browser uses the search engine to
information in the World Wide Web retrieve and view the information from
and displays the results at one place. web pages present on the web servers.
Search engines are intended to gather Web Browsers are intended to Display
Information regarding several URL’s the webpage of the current URL
and to maintain it. available at the server.
A search engine contains its own No database is required in the Web
database browser. It contains only cache memory
to store cookies.
Examples of famous search engines Some of the widely used web
are: Google, Yahoo, Bing, browsers are: Mozilla Firefox, Netscape
DuckDuckgo, Baidu Internet Explorer. Navigator, and Google Chrome.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 40
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Web Searching

The most productive way to conduct a search on the internet is through a search
engine. A web search engine is a software system designed to search for
information on the World Wide Web. The search results are generally presented in
a line of results often referred to as search engine results pages (SEROs). The
information may be a mix of web pages, images, and other types of files. Some
search engines also mine data available in databases or open directories.

There are a number of various search engines available and some of them may
seem familiar to you. The top web search engines are Google, Bing, Yahoo,
Ask.com, and AOL.com. For the purpose of this course, we will be searching using
the Google Chrome web browser, and search first with the Google search engine
and then Microsoft’s Bing search engine.

Searching on Chrome

The first step is to open a Chrome browser by clicking on the desktop icon or the
icon on the computer desktop’s taskbar. Once the browser window is open, type
www.google.com into the address bar on the top of the browser window and press
the Enter (or Return) key on the keyboard.

The browser now displays the large Google search bar. As you begin to enter the
phrase most popular toys of 2017 into the search bar, notice how the search bar
moves to the top of the screen as the words are typed. This movement is normal;
continue to type the phrase.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 41
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
As the words are typed, the search engine will display a dropdown list of suggested
search options. At this point either continue typing the phrase or select the option
of most popular toys 2017. Selecting a suggestion option is done in two ways;
either by using the mouse to click on the desired option, or by using the down
arrow key on the keyboard to select an option, then pushing the Enter (or Return)
key.

The search is now entered and the webpage displays the results of your search.
Notice how the results are displayed. Box #1 is the first page of the search results.
Box #2 is an advertisement targeted to be relevant to the search. The search
results in the list are titled by hyperlinks in a larger font and in a blue color. These
links direct you to a website with information about the search. The
advertisements on the right side are linked to something to buy. When conducting
a search for information, the primary focus is on the list of search results, not the
advertisements.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 42
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Read through the search results title and select the one most closely matching the
information you are searching. Click on the results which seem most relevant to
the search.

Microsoft Bing Search


Now search in a different search engine—Bing.
The first step is to open a Chrome browser by clicking on the desktop icon or the
icon on the computer desktop’s taskbar. With the browser window now open, type
www.bing.com in the browser’s address bar and press the Enter (or Return) key.
Notice that with Bing, the main web page is always a photograph or picture.

Now that the Bing search page is open, type in your key words, retail customer
service improvement, into the search bar. You see suggestions begin to appear, but
none of them are what you are searching for so keep typing.

Now that you have typed in your full search phrase, push the Enter (or Return)
button or click on the blue magnifying glass to the right of the search box. The
search results will look like this:

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 43
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
This search displays similarity to the Google search display, with one difference.
To the right on the page are suggestions for related searches which you can click
on to search with similar yet different keywords and phrases. Like the Google
search, the first few search results are ads for companies or software related to
your search. These are indicated by the “Ad” label placed before the web address.
In order to discover more results, pull the scroll bar down the page.

If you select the top result it links to an article from Inc. Magazine about
improving the customer service experience. Reading through this article will give
you information and ideas which you can research further and present to your
boss. Scan through the other results on this page. There are many additional
articles, ideas, and search results to discover as you continue to research more
ideas.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 44
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
SELF-CHECK 5.1-4

Read the question carefully and encircle the letter for your answer.

1. A kind of website through which users can search the content available on
the Internet?
a. Web browser
b. Search engine
c. Internet Explorer

2. Are software programs sometimes referred to the bots. It regularly scans the
websites automatically for URLs, keywords, and links in order to discover
the new updates.
a. Crawler
b. Index
c. Search Algorithm

3. An example of application software that is developed to retrieve and view the


information from web pages or HTML files present on the web servers.
a. Web browser
b. Search engine
c. Internet Explorer

4. The following are examples of search engines, except?


a. Google Chrome
b. Google
c. Internet Explorer

5. The following are examples of web browsers, except?


a. Google Chrome
b. Mozilla Firefox
c. Internet Explorer

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 45
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
ANSWER KEY 5.1-4

1. b

2. a

3. a

4. c

5. c

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 46
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
INFORMATION SHEET 5.1-5
Records Management

Learning Objective:

After reading this information sheet, you must be able to value the
importance of Records Management

Managing official records as a basis for accountability and transparency is a


systemic issue rather than an issue relating to any particular type of records. A
reliable and accessible evidence base is vital for all aspects of open government,
particularly the right to information and open data, which are dependent upon the
ability to access reliable records. Records management will not in itself achieve
openness, but without it, openness is not possible.

Every public sector policy maker, auditor, court official and fraud investigator
knows the importance of being able to find, use and trust official records as
evidence of policies, actions, transactions, expenditure, precedents, rights and
entitlements. Most citizens know how important it is to have proof of their rights,
for instance land rights or rights in court. And yet, in many countries, public
sector records are difficult to locate and to trust.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 47
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Records, as defined in international standards, are any ‘information created,
received, and maintained as evidence and as an asset by an organization or
person, in pursuit of legal obligations or in the transaction of business. They may
be in any medium, form, or format’ (ISO, 2011). It is increasingly important to link
together all of the official information required as records, whether it is entered
directly in a database, maintained as a digital record or kept on a paper file.

Well-managed records provide clear and durable evidence of what the government
has promised, what it has done, what services it has provided and how it has
spent public funds. Weak records controls result in an ad hoc, potentially
misleading national evidence base that opens opportunities for manipulation,
corruption and fraud; weakens citizens’ ability to claim fair rights and
entitlements; undermines the ability to plan and monitor policies and services;
and makes it difficult to open information effectively. The quality of the records,
especially new forms of digital records, depends on the strength of the control
regime, including laws, policies, practices, structures, and skills as developed
through international professional collaboration and defined in international
records management standards.

As digital information systems replace paper-based systems, it is essential that


records in digital form are capable of providing the evidence upon which
governments and citizens depend. Unfortunately, digital records created and held
in ICT systems are highly vulnerable, and unless protected, their value as evidence
diminishes rapidly from the point that they are created. In particular, if
computerized systems do not systematically capture structured metadata (data
describing the context, content, structure and management of the records) the
information will lack legal value, simply because it will not be possible to
demonstrate that it is authentic and reliable. It also is fundamental that digital
records and their metadata should be transferred as early as possible to
specialized preservation facilities for safe and secure storage through time and
technological change.

Records management principles also support data management. Data are often
extracted or aggregated from records, for instance from land records, personnel
records or hospital records. Inaccurate or incomplete source records result in
misleading data that can reduce trust in the government. Moreover, when data
and its associated metadata is not protected and preserved systematically, it can
easily be lost entirely, lose its value as evidence or hinder exchange between
information systems. As databases are used, changed and updated over a period
of years, especially when several authorities maintain them jointly, it is essential
to document the context of how they are created and altered to support future
sharing, access and long-term management. Records management have been
developed internationally to support systematic control through time.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 48
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
While many countries are still operating in a paper-based environment, the move
toward digital governance is a reality worldwide. Many governments do not yet
realize that digital records and data must be managed consistently if they are to
provide a basis for openness. Even as it remains essential to build sound systems
for managing paper records, all countries need to begin to invest in digital records
management.

In developing records management commitments, countries should clearly state


how records management will serve to make government more open. Introducing
a records control regime or upgrading systems to streamline procedures without
actually making information available to the public does not make governments
more open.

5 Essential Records Management Procedures

A compliant records and information management program, also known as (RIM),


is imperative for all organizations to manage their physical and electronic records
throughout their life-cycle. As volumes of information rise in today’s ever-changing
regulatory environment, it’s become a necessity for companies to implement
consistent and accountable records management procedures.

By creating a well-structured records management plan, your organization will


meet regulatory compliance, improve workflow, and limit itself to exposed risk.
Here we’ve provided an overview of records management procedures that will set
your RIM program up for success:

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 49
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
5 Steps to an Effective Records Management Program

Step 1: Set-up a Records Retention Schedule

Today’s increasingly digital environment is fast-paced, creating information


quickly and in various formats. Many companies still rely on a “save all” approach
when it comes to protecting data. Not only does this waste time and money, but it
puts an organization at risk for noncompliance.

Establishing how long to retain records involves the implementation of an


accountable records retention policy. A records retention schedule outlines how
long records should be kept from an operational and legal standpoint, and that
outdated records are disposed of in a timely, systematic manner.

When determining the retention period for your records, it’s important to:
 Perform a record inventory of all physical and electronic records
 Establish a standardized record classification system
 Conduct research on all federal, state, and local requirements

By setting a records retention schedule, your organization will benefit from the
management of information assets, control storage costs, improve records
retrieval, and eliminate legal risks.

Step 2: Policies and Procedures

Your records management program should support policies and procedures both
legally and operationally. Policies and procedures set the standard for a compliant
records management system. They should include the management of all records
and media types, including email. Your company may have separate policies for
records retention, active files, unused files, emails, and several other areas of
information management.

The records management policies and practices should be communicated clearly


and applied consistently throughout your organization. Uniformity and
consistency are key drivers to set the foundation for a successful records
management practice. When delivered in a proper, well-strategized manner, your
policies and procedures will work simultaneously with your business continuity
plan and disaster recovery program.

Step 3: Accessibility, Indexing, and Storage

A contributing factor of a successful records management program is the ability to


access your information when it’s needed. Companies need to obtain information
quickly for everyday business operations and compliance requirements.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 50
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Indexing parameters, including date, subject matter, creators, and location of the
record, are essential to retrieving information promptly and efficiently. Depending
on the information type – whether electronic or physical – storage locations may
vary.

Electronic records can be stored and retrieved from an online document


management system, also known as DMS. For archived documents that are
required by law to be kept in physical form, offsite records storage facilities protect
information in climate-controlled environments, freeing up office space. By finding
a provider that offers scan-on-demand services for records stored offsite, you can
quickly retrieve documents anytime, anywhere.

Step 4: Compliance Auditing

The successful outcome of an enterprise records management system will never be


achieved if employees are not complying with a company’s records management
policies and procedures. To ensure compliance by employees, your records
management program should receive regular audits.

Components of a records management audit should include:


 Retention schedule complies with up-to-date laws and regulations
 Indexing accuracy and accessibility of documents
 Training and communication among staff and departments
 Protection and preservation of records
 Timely and consistent destruction of inactive files

A thorough audit of records management procedures will ensure that historical


records are routinely maintained and destroyed in a compliant, well-enforced
manner throughout your organization.

Step 5: Disposal of Obsolete Records

Once you’ve organized your files and determined the right retention policy, it’s
time to dispose of unneeded documents. Businesses can encounter trouble when
it retains documents for longer than required, including data breaches and hefty
penalties. Why chance the risk and keep confidential documents past their legal
requirements? Finalize your records retention policy by using shredding services
with chain-of-custody procedures and NAID certification to destroy backlog files in
a compliant manner.

When considering a records management and shredding company, it’s


essential to:
 Determine the type of shredding program suitable for your media or paper
records
 Choose a company that is NAID-certified

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 51
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
 Ensure all access personnel are background screened at the local, state and
national level
 Provide a certificate-of-destruction for chain-of-custody documentation

Incorporating the timely destruction of records that have reached the end of their life-
cycle into your records management plan will reduce the likelihood of a potential
audit, legal risks, and storage costs.

Reference:

10 best uses Microsoft excel


https://magoosh.com/excel/10-best-uses-microsoft-excel/
10 most powerful uses of Microsoft word
https://www.klientsolutech.com/top-10-most-powerful-uses-of-microsoft-word/
Difference between search engine and web browser
https://www.geeksforgeeks.org/difference-between-search-engine-and-web-
browser/
Email System
https://www.tutorialspoint.com/internet_technologies/e_mail_working.htm
How to create a new document in WPS http://help.wps.com/articles/how-to-
create-a-new-document
Microsoft Office Application https://www.educba.com/microsoft-office-application/
Records Management https://www.opengovguide.com/topics/records-
management/
Records Management Procedures https://vitalrecordscontrol.com/records-
management-procedures/
Top 5 uses PowerPoint
https://finepoint-design.com/top-5-uses-powerpoint
Web Searching https://courses.lumenlearning.com/suny-wm-
compapp/chapter/web-searching/
WPS Office https://en.wikipedia.org/wiki/WPS_Office

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 52
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
LEARNING OUTCOME SUMMARY

Learning Outcome 2. COLLATE RECORDS

ASSESSMENT CRITERIA:

 Client’s information is updated in accordance with workplace records


system requirements and criteria
 Documents and records data followed a set of standards
 Client’s information is summarized based on the workplace records
system
 Protocol and confidentiality of records and data are followed at all times
CONTENTS:

 Types of Records
 Documentation and Recording Procedure
 Standard Forms in records system
 Basic Statistics
CONDITIONS:

The following resources should be provided:


 Computer
 Microsoft Office applications, i.e. Microsoft Word, Microsoft Excel,
Microsoft PowerPoint
 Internet connection
 Storage device i.e. Internal/External Hard drive, Floppy Drive, SD Cards
 Records and reports
 Standard Forms
ASSESSMENT METHODS:

 Oral questioning/interview
 Written Test
 Return demonstration
 Direct observation of candidate
METHODOLOGIES:

 Individual/Modular/Self-paced Learning
 Distance Learning
 Individual home assignment
 Focus Group Discussion
 Face-to-face lecture/discussion

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 53
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
LEARNING EXPERIENCES

Learning Outcome 2: COLLATE RECORDS

Learning Activities Special Instructions

1. Read Information Sheet No. 5.2-1 PowerPoint presentation:


Types of Records Types of Records

2. Answer Self-check Check answers with answer key 5.2-1

3. Perform Task Sheet Use Performance Criteria Checklist 5.2-1

4. Read Information Sheet No. 5.2-2 PowerPoint presentation:


Documentation and Recording Documentation and
procedures Recording procedures

5. Answer Self-check Check answers with answer key 5.2-2

6. Read Information Sheet No. 5.2-3 PowerPoint presentation:


Standard Forms in records system Standard Forms in records system

7. Answer Self-check Check answers with answer key 5.2-3

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 54
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
INFORMATION SHEET 5.2-1
TYPES OF RECORDS

Learning Objective:

After reading this information sheet, you must be able to:


 Familiarize the different types of records and their uses.

Record is the memory of the internal and external transactions of an organization.


Records contain a written evidence of the activities of an organization in the form
of letters, circulars, reports, contracts, invoices, vouchers, minutes of meeting,
books of account etc.

It is a written communication that permanently documents information relevant to


a client’s health care management. It is a continuing account of the client’s health
care needs

Different Types of Records:


 Patient’s clinical record
 Individual staff records
 Ward records
 Administrative records with educational value

 Patients Clinical Records


It is the knowledge of events in the patient illness, progress in his or her
recovery and the type of care given by the hospital personnel.
o
Scientific and legal
o
Evidence to the patient’s case is intelligently managed.
o
Avoids duplication of work.
o
Information for medical and legal nursing research.
o
Aids in the promotion of health and care.
o
Legal protection to the hospital doctor and the nurse

Individual Staff Records


A separate set of record is needed for staff, giving details of their sickness
and absences, their carrier and development activities and a personnel note

Ward Records
o
Reducing or increase in beds

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 55
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
o
Change in medical staff and non-nursing personnel for the ward
o
The introduction and pattern of support

Administrative Records with Educational Value


o
Treatments
o
Admissions
o
Equipment’s losses and replacements

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 56
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
o
Personnel performance
o
Other administrative records

Types of Records in the Department of Public Health


 Cumulative or continuing records
 Family records
 Registers Reports

Principles of Maintaining Records


 Specific purpose which should be clearly understood.
 Items on forms and in registers should be conveniently grouped so as to
make their completion as easy as possible.
 The wording should be easily understood, and where doubt is likely to arise,
instructions to facilitate interpretation should be included.
 Records should permit some freedom of expression. Records which are
required by the teaching staff should be easily accessible to them. Person
responsible for maintaining records should be aware of their particular
responsibility and every effort should be made to keep records up to date
and accurate.
 Provision for periodic review of all records to ensure that they keep pace
with the changing needs of the program.
 Adequate supply of stationery to permit records to be maintained on the
proper forms and in the proper registers at all times.
 Sufficient number of filing cabinets and appropriate equipment to operate a
filing system which is simple and safe and requires the minimum possible
time.
 Adequate, safe, fireproof storage arrangements.

Characteristics of good recording and reporting


 Accuracy
 Consciousness
 Thoroughness
 Up to date
 Organization
 Confidentiality
 Objectivity

Purpose of Keeping Records


 Communication
 Aids to diagnosis
 Education
 Documentation of continuity
 Research
 Legal documentation
 Individual case study

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 56
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Uses of Records
 Show the health conditions as it is and as the patient and family accepts it.
goals towards which means are to be directed. prevents duplication of
services and helps follow up services effectively. Helps the nurses to
evaluate the care and the teaching Organization of work
 Serves as a guide for diagnosis treatment and evaluation of services indicate
progress Used in research. The health assets and needs of the village area

Filing and Arranging of Record


 Alphabetically
 Numerically
 Geographically
 With index cards

Alphabetically
 Dictionary order
 Encyclopedic order

Advantages and disadvantages of alphabetically arrangement system

Advantages Disadvantages
 Most people are familiar  System does not work well with very
 Staff should be able to learn and large filing systems
become comfortable with the  Color coding is more difficult since
system in a timely manner you need to have 26 colors or
 The need to shift the records after combination of colors to designate all
purging records is reduced the letters of the alphabet
 Cross reference may be avoided  Confidentiality is an issue
 Some of the rules of alpha filing can
be very confusing

Numerically
 Serial number
 Digit filing

Geographically
 Information is arranged alphabetically by geographical of place name.

With Index Cards


 An index card consists of heavy paper cut to a standard size, used for
recording and storing small amounts of discrete data.

Example: - forms, case records and registers. Diaries- diary of M & F Return –
monthly report of HW (M& F)

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 56
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
In addition, each organization should maintain
 Cumulative records
 Family records

Record Keeping System


 Source records
 Problem oriented
 Nursing kardex
 Computerized information system

Computerized information system

Three major categories:


 Clinical system
 Management information system
 Educational system

GUIDELINES FOR DOCUMENTATION AND RECORD KEEPING

The Nursing and Midwifery Council (NMC 2002) has said that patient and client
records should:
 be based on fact, correct and consistent
 be written as soon as possible after an event has happened
 be written clearly and in such a way that the text cannot be erased
 be written in such a way that any alterations or additions are dated, timed
and signed, so that the original entry is still clear
 be accurately dated, timed and signed, with the signature printed alongside
the first entry
 not include abbreviations, jargon meaningless phrases, irrelevant
speculation and offensive subjective statements
 be readable on any photocopies

IMPORTANCE OF RECORDS IN HOSPITAL OR HEALTH CENTERS:

 individual and family


 for the doctor for
 the nurse
 for authorities

Report
A report containing information against in a narrative graphic or tabular form,
prepared on periodic, receiving, regular or as a required basis. Reports may refer
to specific periods, events, occurrence, or subject and may be communicated or
presented in oral or written form.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 56
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Reports are oral or written exchanges of information shared between care givers of
workers in a number of ways. A report summarizes the service of the personnel
and of the agency.

Purposes
 Report is an essential tool to communication
 To show the kind and amount of services rendered over a specific period
 To illustrate the progress in teaching goals.
 As an aid in studying health condition.
 As an aid in planning.
 To interpret the services to the public and to the other interested agencies

Criteria for a Good Report


 made promptly
 clear, concise, and complete
 If it is written all pertinent, identifying data are included-the date and time,
the people concerned, the situation, the signature of the person making the
report.
 It is clearly stated and well organized
 Important points are emphasized
 In case of oral reports they are clearly expressed and presented in an
interesting manner.

Types of Reports
 24 hours reports
 Census report
 Anecdotal report Birth and
 Death report
 Incidental report

Classification of Reports Based on types


 Oral reports
 Written reports

Reports used in the Hospital Setting


 Change-of-Shirt
 Transfer Reports
 Incident reports
 Legal reports

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 56
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Advantages and Disadvantages of Reports

Advantages Disadvantages
 Monitoring operations  It is time consuming
 Controlling  Expensive
 Guide decision  can be biased
 Employee motivation  Sometimes implementations of the
 Performance evaluation recommendations of a report become
unrealistic
 Technical reports are not easily
understandable

Record Keeping and Reporting

Records and reports must be functional accurate, complete, current organized and
confidential
 facts
 accuracy
 completeness
 currentness
 organization
 confidentiality

Common Problems that Occur during Report writing


 Content and organization
 Problem - No section headings
 Problem - missing items related to the format
 Problem - lack of numbering
 Grammar, vocabulary, sentence and tone.

Other problems
 Incomplete sentences
 Confusing and unclear sentences
 Miscommunication
 Too general
 Confidentiality.
 Missing information and facts
 Wordiness

Reference:

 https://www.slideshare.net/anuannie1/records-and-reports-1

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 56
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
SELF-CHECK 5.2.1

Types of Records

Answer the following:

Types of records
1.
2.
3.
4.

Purpose of keeping records


5.
6.
7.
8.
9.
10.
11.

Filling and arranging of record


12.
13.
14.
15.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 62
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
ANSWER KEY 5.2-1

Types of Records

Types of records
1. Patient’s clinical record
2. Individual staff records
3. Ward records
4. Administrative records with educational value

Purpose of keeping records


5. Communication
6. Aids to diagnosis
7. Education
8. Documentation of continuity
9. Research
10. Legal documentation
11. Individual case study

Filling & arranging of record


12. Alphabetically
13. Numerically
14. Geographically
15. With index cards

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 63
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
TASK SHEET 5.2-1
Types of Records

Title:
Filling and arranging of records

Performance Objective:
Given the materials and list of patient’s names, you should able to file and
arrange records alphabetically.

Supplies:
Pencil or pen, paper, list of patient’s names, eraser

Steps/ Procedures:
1. Gather the records of patients.
2. Arrange the patients name alphabetically.
3. Records the patient’s name.
4. File the patient record in the records rooms.

Assessment Method:
 Performance Criteria Checklist

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 64
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
PERFORMANCE CRITERIA CHECKLIST 5.2-1

Trainee’s Name: Date:

CRITERIA YES NO

Were you able to?

1. Gather the records of patients.

2. Arrange the patients name alphabetically.

3. Records the patient’s name.

4. File the patient record in the records rooms

Please tick (√) the column that best describes your evaluation of each identified
evidences.

For satisfactory achievement, all items should receive a YES response.

Comment:

Name of Trainer

Reference:

https://www.slideshare.net/anuannie1/records-and-reports-1

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 65
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
INFORMATION SHEET 5.2-2
Documentation and Recording Procedures

Learning Objective:

After reading this information sheet, you must be able to:


 Tell the difference between a document and a record;
 Explain the rationale for following documents and keeping records; and
 Follow the procedures as prescribed in SOPs.

Documents and Records is an essential component of the Quality System. As a


matter of fact, it is the backbone of the quality system.

Documents communicate the policies and procedures that should be followed at


each test site. This is important for assuring consistency and accuracy at the test
site.

Documents are written policies, process


descriptions, and procedures used to
communicate information. They provide written
instructions for HOW TO do a specific task. Blank
forms are also considered documents. Forms are
used to capture data or information from
performing a procedure.

Records are generated when written instructions


are followed. In other words, after data,
information, or results are recorded onto a form,
label, etc., then it becomes a record. Documents
and records may be paper or electronic.

Examples of documents include:


 country testing algorithm,
 safety manual,
 standard operation procedures (SOPs) for an approved HIV rapid test,
 manufacturer test kit inserts,
 temperature log (blank form),
 and quality control record (blank form).

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 66
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Examples of records include:
 client test results,
 summary of findings form on-site evaluation visit,
 report of corrective actions, daily maintenance log (completed),
 stock cards and stock book (completed),
 EQA specimen transfer log (completed).

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 67
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Verbal instructions often are not heard, misunderstood, quickly forgotten, and
ignored. Policies, standards, processes, and procedures must be written down,
approved, and communicated to all concerned.

Standard Operating Procedures (SOPs) are Documents

Standard Operating Procedures (SOPs) are documents that describe how to


perform various operations in a testing site. They provide step-by-step
instructions and assure consistency, accuracy, and quality. SOPs are one type of
document. Using SOPs results in reliable and consistent results

SOPs Are Controlled Documents


Controlled documents are Version and documents must be approved for use in-
country, have document control features, and be kept up to-date. Key features of
SOPs include:
 Cover page
 Descriptive Title
 SOP Number
 Date when SOP become effective
 Signature of person responsible for writing the SOP
 Signature of person authorizing the SOP

SOPs Should You Keep at a Test Site


Each test site should have on hand current/approved SOPs. Typical SOPs kept at
a test site include:
 Daily routine schedule
 Country policies and algorithm
 Safety manuals (for example,
 safety precautions,
 preparation of 10% (vol / vol) bleach solution,
 and postHIV exposure prophylaxis management and treatment guidelines)
Blood collection (for example, finger prick, venipuncture, and DBS)

Test procedures
 EQA (for example, submission of EQA specimens to reference lab and
internal assessments)
 Reordering of supplies and kits
 Equipment use and maintenance

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 68
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
SOPs must be followed. Not following safety precautions poses unnecessary risk to
yourself, client and the environment.

Manufacturer product inserts do not provide specific information for test


sites. Examples include:
 Materials required, but not in kit
 Specific safety requirements

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 69
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
 Sequence of tests in country algorithm
 External quality control requirements

Proper Record Keeping Makes Quality Management Possible


Record-keeping allows a test site to:
 Communicate accurately and effectively - Record keeping enables sites to be
timely in reporting to program managers and site supervisors • Minimize
error - All records must be written.
 Monitor quality system - Records allow for periodic review of testing
operations. Only through the review of records can improvements be
identified.
 Assist management in developing policy & plans and monitoring and
evaluating programs

Records Should You Keep at a Test Site


It is recommended that you keep these records at your test site:
 Specimen transfer logs
 HIV request / client test result
 Lab / Test register
 Temperature logs
 Equipment maintenance logs
 Inventory records

Tips for Good Record Keeping


 Understand the information to be collected. Before you record any
information, make sure that you understand what is to be collected
 Record the information every time. Record on the appropriate form each
time you perform a procedure.
 Record all the information. Make sure you have provided all the information
requested on a form.
 Record the information the same way every time. Be consistent in how you
record information.

Client Test Records


Types of information captured on test records include:
 Client/Patient ID #
 Date of test Results from Test 1, Test 2, and Test 3
 Repeat results
 HIV status
 Kit Name & Lot #

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 70
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
 Person performing test

Retain Client Records


Records must be maintained secure storage for all records. The length of time you
will need to store test site records will depend or your country national policies,
and the availability of secure storage space at your test site.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 71
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Logbooks Are Cumulative Records of Test Site Operations

These photos of logbooks are common. Storage of logbooks and records should be
kept in a manner that will minimize deterioration. Although many sites uses paper-
based logbooks and records, they should be indexed so to allow for easy.

Records should be Permanent, Secure, Traceable

Facilities where records are kept should be secure to maintain patient/client


confidentiality. Procedures and mechanisms should prevent unauthorized access.

Records should be permanent, secure, and traceable. Examples of keeping records


permanent include: keep books bound, number pages, use permanent ink, and
control storage. To keep records secure, you need to maintain confidentiality, limit
access, and protect them from environmental hazards. To keep records traceable,
make sure every record is signed and dated.

Information Recorded will feed into Monitoring and Evaluation Systems


Records must be kept permanent, secure, and traceable because they will be used
for reporting and monitoring purposes. Monitoring is the routine tracking of
program information. Accurate facility records provide essential information for
providing quality health care and monitoring PMTCT programs It is recommended
that you analyze on a monthly basis the number of clients served and summarize
the test results.

Reference:

https://www.who.int/diagnostics_laboratory/documents/guidance/pm_module15
.pdf?ua=1

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 72
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
SELF-CHECK 5.2-2

Documentation and Recording procedures

1-5. What is the difference between a document and a record?

6-10 What are some examples of documents and records?

11-14. What are some tips for good record-keeping?

15-18. Name examples of information not found in a manufacturer product insert.

19-24. What are some key features of SOPs?

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 73
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
ANSWER KEY 5.2-2

Documentation and Recording procedures

1-5
1. Documents are written policies, process descriptions, and procedures used
to communicate information.
2. They provide written instructions for HOW TO do a specific task.
3. Blank forms are also considered documents.
4. Forms are used to capture data or information from performing a
procedure.
5. Records are generated when written instructions are followed. In other
words, after data, information, or results are recorded onto a form, label,
etc., then it becomes a record. Documents and records may be paper or
electronic.

6-10
6. country testing algorithm,
7. safety manual,
8. standard operation procedures (SOPs) for an approved HIV rapid test,
9. manufacturer test kit inserts,
10. temperature log (blank form),

11-14
11. Understand the information to be collected. Before you record any
information, make sure that you understand what is to be collected
12. Record the information every time. Record on the appropriate form each
time you perform a procedure.
13. Record all the information. Make sure you have provided all the
information requested on a form.
14. Record the information the same way every time. Be consistent in how you
record information.

15-18
15. Materials required, but not in kit
16. Specific safety requirements
17. Sequence of tests in country algorithm
18. External quality control requirements

19-24
19. Cover page
20. Descriptive Title
21. SOP number
22. Date when SOP become effective
23. Signature of person responsible for writing the SOP
24. Signature of person authorizing the SOP

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 74
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
INFORMATION SHEET 5.2-3
Standard Forms

Learning Objective:

After reading this information sheet, you must be able to:


 Familiarize of different Standard Forms for Case Investigation; and
 Utilization of different Standard Forms for Case Investigation

Standard forms for Case Investigation used by the Contact Tracer during their
collecting data from the patient. By using of standard form from DOH is helpful to
be easier to collecting and investigate the case of the patient and also can identify
the needs of patient to be addressed it. Here the standard forms using by the
contact tracer.

 Case Investigation Form


 WHO Case Report Form
 Travel History, Places Visited and Events Attached form
 Close Contact Line List Form
 Close Contact Profile Form
 Contact Tracing signs and Symptoms Log Form
 Health Workers Risk Assessment Form

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 75
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Case Investigation Form

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 76
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
WHO Case Report Form

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 77
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Travel History, Places Visited and Events Attached form

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 78
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Close Contact Line List Form

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 79
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Close Contact Profile Form

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 80
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Contact Tracing signs and Symptoms Log Form

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 81
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Health Workers Risk Assessment Form

Used by health care facilities that have either cared for or admitted COVID-19
patients.

This form is to be completed for all health workers who have been exposed to a
confirmed COVID-19 patient in a health care facility.
Protecting HCWs is of paramount importance.

The data that will be captured using this data collection form and risk assessment
tool can be used to identify IPC breaches and define policy to mitigate health
worker and nosocomial infection

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 82
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Date Developed: Document No.
Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 83
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Date Developed: Document No.
Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 84
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Date Developed: Document No.
Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 85
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Date Developed: Document No.
Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 86
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
SELF-CHECK 5.2-3

Standard forms

Enumerate the standard forms for case investigation

1.
2.
3.
4.
5.
6.
7.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 87
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
ANSWER KEY 5.2-3

Standard forms

Enumerate the standard forms for case investigation

1. Case Investigation Form


2. WHO Case Report Form
3. Travel History, Places Visited and Events Attached form
4. Close Contact Line List Form
5. Close Contact Profile Form
6. Contact Tracing signs and Symptoms Log Form
7. Health Workers Risk Assessment Form

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 88
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
LEARNING OUTCOME SUMMARY

Learning Outcome 3.
PREPARE REPORTS BASED ON WORKPLACE SYSTEM

ASSESSMENT  Reports are prepared in accordance with standard


CRITERIA forms.
 Reports are submitted to immediate supervisor in
accordance with established standards and processes.
 Protocol and confidentiality of records and data are
followed at all times.
CONDITIONS Students/trainees must be provided with the following:
 Computer
 Microsoft Office applications i.e. Microsoft Word,
Microsoft Excel, Microsoft PowerPoint
 Internet connection
 Storage Device i.e. internal/external hard drive, floppy
drive, SD cards
 Records and Reports
 Standard Forms
CONTENT  Data Privacy Act of 2012
 How to Write a Report
 Reporting Flow
 Backing-up Your Files
METHODOLOGIES  Individual/Modular/Self-paced learning
 Distance learning
 Individual home assignment
 Focus group discussion
 Face-face lecture discussion
 Role Play

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 89
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
ASSESSMENT  Oral questioning/Interview
METHODS
 Written test
 Return demonstration
 Direct observation of candidate

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 90
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Learning Experiences

Learning Outcome 3.
PREPARE REPORTS BASED ON WORKPLACE SYSTEM

Learning Activities Special Instructions


1. Read information sheet 5.3.1 on
Data Privacy Act of 2012.
You are required to get all the answers
2. Answer self-check 5.3.1 on Data
correct. If not, read the Information Sheet
Privacy Act of 2012.
again to answer all questions correctly.
3. Read information sheet 5.3.2 on
report preparation.
You are required to get all the answers
4. Answer self-check 5.3.2 on report
correct. If not, read the Information Sheet
preparation. again to answer all questions correctly.
5. Read information sheet 5.3.3 on
report flow.
You are required to get all the answers
6. Answer self-check 5.3.3 on report
correct. If not, read the Information Sheet
flow.
again to answer all questions correctly.
Your performance will be evaluated
7. Read and perform task sheet
through the Performance Criteria
5.3.3.
Checklist 5.3.3.
8. Read information sheet 5.3.4 on
backing-up your files.
You are required to get all the answers
9. Answer self-check 5.3.4
correct. If not, read the Information Sheet
on backing-up your
again to answer all questions correctly.
files.
Your performance will be evaluated
10. Read and perform job sheet 5.3.4. through the Performance Criteria
Checklist 5.3.4.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 91
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
INFORMATION SHEET 5.3.1
DATA PRIVACY ACT OF 2012

(www.hldataprotection.com)

Learning Objectives:

After reading this Information Sheet, you must be able to:


1. Determine what is and the scope of Data Privacy Act of 2012;
2. Define what processing is in relation to the data management; and
3. Classify what sensitive personal information is.

Data Privacy Act of 2012

When it comes to handling information coming from your client, it always good to
have a nodding understanding of what data privacy and the law which covers it.

Data privacy is the right of the individual not to have private information about
himself disclosed and to live freely from surveillance and intrusion.
(https://www.privacy.gov.ph/)

Republic Act 10173 (RA 10173) is also known as the Data Privacy Act of 2012 is
an act protecting individual personal information in information and
communication systems in the government and the private sector, creating for this
purpose a national privacy commission, and for other purposes.

It is the policy of the State to protect the fundamental human right of privacy, of
communication while ensuring free flow of information to promote innovation and
growth. The State recognizes the vital role of information and communications
technology in nation-building and its inherent obligation to ensure that personal
information in information and communications systems in the government and in

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 92
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
the private sector are secured and protected.

This Act applies to the processing of all types of personal information and to any
natural and juridical person involved in personal information processing including
those personal information controllers and processors who, although not found or
established in the Philippines, use equipment that are located in the Philippines,
or those who maintain an office, branch or agency in the Philippines.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 93
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Processing refers to any operation or any set of operations performed upon
personal information including, but not limited to, the collection, recording,
organization, storage, updating or modification, retrieval, consultation, use,
consolidation, blocking, erasure or destruction of data.

Sensitive personal information refers to personal information:

About an individual’s race, ethnic origin, marital status, age, color, and
religious, philosophical or political affiliations;
About an individual’s health, education, genetic or sexual life of a person, or
to any proceeding for any offense committed or alleged to have been
committed by such person, the disposal of such proceedings, or the
sentence of any court in such proceedings;
Issued by government agencies peculiar to an individual which includes, but
not limited to, social security numbers, previous or cm-rent health records,
licenses or its denials, suspension or revocation, and tax returns; and
Specifically established by an executive order or an act of Congress to be
kept classified.

This law also is the basis of the creation of an independent body named the
National Privacy Commission. Its main function is to administer and implement
the provisions of this Act, and to monitor and ensure compliance of the country
with international standards set for data protection.
(https://www.privacy.gov.ph/wp-content/uploads/DPA-of-2012.pdf)

https://www.privacy.gov.ph/wp-content/themes/npcbootstrap/img/Lockups-01.png

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 94
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
SELF-CHECK 5.3.1

Direction: Modified True or False. Write true if the statement is correct.


If it is not true, write the word/words that make the statement false.

1. The Data Privacy Act of 2012 is also known as Republic Act 10175.

2. All of the following are examples of sensitive personal information:


individual’s race, ethnic origin, genetic or sexual life of a person,
social security numbers, and previous or cm-rent health records.

3. The commission created to monitor and ensure compliance of the


country with international standards set for data protection is the
National Electoral Commission.

4. Processing refers to any operation or any set of operations


performed upon personal information.

5. Data privacy is the right of the individual not to have private


information about himself disclosed and to live freely from
surveillance and intrusion.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 95
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
ANSWER KEY 5.3.1

FALSE – REPUBLIC ACT 10175

TRUE

FALSE – NATIONAL PRIVACY COMMISSION

TRUE

TRUE

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 96
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
INFORMATION SHEET 5.3.2
HOW TO WRITE A REPORT

(https://d1whtlypfis84e.cloudfront.net)

Learning Objective:

After reading this Information Sheet, you must be able to:


 Enumerate the general steps in making a report.

Reports generally involve presenting your investigation and analysis of


information or an issue, recommending actions and making proposals.
(openpolytechnic.ac.nz)

There are many different types of reports, including business, scientific and
research reports, but the basic steps for writing them are the same. These are
outlined below.

Date Developed: t No.


Documen Contact Tracing
September, 2020 :
Level II Date Revised: Issued Page | 97
by #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Step 1: Decide on the 'Terms of reference'

To decide on the terms of reference for your report, read your instructions and any
other information you've been given about the report, and think about the purpose
of the report:
 What is it about?
 What exactly is needed?
 Why is it needed?
 When do I need to do it?
 Who is it for, or who is it aimed at?
This will help you draft your Terms of reference.

Step 2: Decide on the procedure

This means planning your investigation or research, and how you'll write the
report. Ask yourself:
 What information do I need?
 Do I need to do any background reading?
 What articles or documents do I need?
 Do I need to contact the library for assistance?
 Do I need to interview or observe people?
 Do I have to record data?
 How will I go about this?
Answering these questions will help you draft the procedure section of your report,
which outlines the steps you've taken to carry out the investigation.

Step 3: Find the information

The next step is to find the information you need for your report. To do this
you may need to read written material, observe people or activities, and/or talk to
people. Make sure the information you find is relevant and appropriate. Check the
assessment requirements and guidelines and the marking schedule to make sure
you're on the right track. If you're not sure how the marks will be assigned contact
your lecturer.

What you find out will form the basis, or main body, of your report – the
findings.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 98
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Step 4: Decide on the structure

Reports generally have a similar structure, but some details may differ. How they
differ usually depends on:

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 99
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
 The type of report – if it is a research report, laboratory report, business
report, investigative report, etc.
 How formal the report has to be.
 The length of the report.

Depending on the type of report, the structure can include:


 A title page.
 Executive summary.
 Contents.
 An introduction.
 Terms of reference.
 Procedure.
 Findings.
 Conclusions.
 Recommendations.
 References/Bibliography.
 Appendices.

The sections, of a report usually have headings and subheadings, which are
usually numbered

Step 5: Draft the first part of your report

Once you have your structure, write down the headings and start to fill these in
with the information you have gathered so far. By now you should be able to draft
the terms of reference, procedure and findings, and start to work out what will go
in the report’s appendix.

Findings

The findings are result of your reading, observations, interviews and


investigation. They form the basis of your report. Depending on the type of report
you are writing, you may also wish to include photos, tables or graphs to make
your report more readable and/or easier to follow.

Appendices

As you are writing your draft decide what information will go in the

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 100
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
appendix. These are used for information that:
 is too long to include in the body of the report, or
 supplements or complements the information in the report. For example,
brochures, spreadsheets or large tables.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 101
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Step 6: Analyze your findings and draw conclusions

The conclusion is where you analyze your findings and interpret what you
have found. To do this, read through your findings and ask yourself:
 What have I found?
 What's significant or important about my findings?
 What do my findings suggest?

For example, your conclusion may describe how the information you collected
explains why the situation occurred, what this means for the organization, and
what will happen if the situation continues (or doesn't continue).

Don’t include any new information in the conclusion.

Step 7: Make recommendations

Recommendations are what you think the solution to the problem is and/or what
you think should happen next. To help you decide what to recommend:
 Reread your findings and conclusions.
 Think about what you want the person who asked for the report should to
do or not do; what actions should they carry out?
 Check that your recommendations are practical and are based logically on
your conclusions.
 Ensure you include enough detail for the reader to know what needs to be
done and who should do it.

Your recommendations should be written as a numbered list, and ordered from


most to least important.

Step 8: Draft the executive summary and table of contents

Some reports require an executive summary and/or list of contents. Even though
these two sections come near the beginning of the report you won't be able to do
them until you have finished it, and have your structure and recommendations
finalized.

An executive summary is usually about 100 words long. It tells the readers what

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 102
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
the report is about, and summarize the recommendations.

Step 9: Compile a reference list


This is a list of all the sources you've referred to in the report and uses APA
referencing.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 103
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Step 10: Revise your draft report

It is always important to revise your work. Things you need to check include:
 If you have done what you were asked to do. Check the assignment
question, the instructions/guidelines and the marking schedule to make
sure.
 That the required sections are included, and are in the correct order.
 That your information is accurate, with no gaps.
 If your argument is logical. Does the information you present support your
conclusions and recommendations?
 That all terms, symbols and abbreviations used have been explained.
 That any diagrams, tables, graphs and illustrations are numbered and
labelled.
 That the formatting is correct, including your numbering, headings, are
consistent throughout the report.
 That the report reads well, and your writing is as clear and effective as
possible.

You might need to prepare several drafts before you are satisfied. If possible, get
someone else to check your report.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 104
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
SELF-CHECK 5.3.2

Directions: Answer the question below.

 What are the general steps in report making? Enumerate them.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 105
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
ANSWER KEY 5.3.2

Step 1: Decide on the 'Terms of reference'

Step 2: Decide on the procedure

Step 3: Find the information

Step 4: Decide on the structure

Step 5: Draft the first part of your report

Step 6: Analyze your findings and draw conclusions

Step 7: Make recommendations

Step 8: Draft the executive summary and table of contents

Step 9: Compile a reference list

Step 10: Revise your draft report

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 106
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
INFORMATION SHEET 5.3.3
Report Flow

(https://www.acronis.com)

Learning Objectives:

After reading this Information Sheet, you must be able to:


 Differentiate common forms used in reporting.
 Identify the hierarchy of data reporting.

In the course of management of COVID-19 cases, the speed is essential.


How fast the information from the grassroots levels will be reported to the proper
authorities will ensure immediate management, making it less possible for the
disease to spread.

The reporting tools that are basically used in contact tracing for non-health
workers and health workers as presented by Dr. Montejo (2020) in her lecture
were

 Timeline
 Close Contact Line List Form
 Signs and Symptoms Form
 HCW Risk Assessment Tools (for health care workers).

Last April 17, 2020, the Department of Health (DOH) released its
Department Memorandum No. 2020-0189 that has a subject of Updated
Guidelines on Contact Tracing of Close Contacts of Confirmed Coronavirus
Disease (COVID-19) Cases. It identified the necessary forms that will be used by
the contact tracer when s/he is performing the contact tracing.

Timeline

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 107
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
The timeline form basically enumerates the activity in the past 14 days of a
confirmed case. It helps the contact tracer understand who were the people the
confirmed case came into contact with, where did the go and what activities has
he done.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 108
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
It has the following demographic data:

 Patient Code
 Barangay
 Name
 Primary Address
 Secondary Address
 Profession/Occupation
 Company Name
 Office Address
 Age
 Birthdate
 Onset of Illness
 Cellphone No.

Once the contact tracer has identified these demographics, s/he will then
proceed to inquire for the case’s past activities before the onset of illness or the
date of the swab test.

(Montejo, 2020, slide 9: cropped)

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 109
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Here you will inquire about the date, time, activity, place, close contact/s,
and details of the close contact such as relationship with the confirmed case, age,
work and symptoms felt.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 110
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Close Contact Line List Form

This form presents more detailed information of the close contacts identified
at the timeline form. Its main purpose is to discover and monitor the close
contact’s exposure with the coronavirus disease.

(Montejo, 2020, slide 10: cropped)

Here’s an example that is filled up.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 111
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
(Montejo, 2020, slide 12: cropped)

Data presented in this form will include the nature of the contacts whether
it is in the household (HH), work station (WS), sea vessel (S), accommodation (A),
health care worker (HCW) or others.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 112
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
It also shows whether the close contact show signs and symptoms, is being
monitored and his test results.

Close Contact Profile

With this form, it shows a more detailed picture who is the close contact. It
is a two-paged form which supports the data on the close contact line list.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 113
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
(DOH Scanned Document, page 14-15: cropped)

It has several
sections:
 Demographic Profile – shows the personal information of the close contact
 Health Profile – shows the known medical condition and history
 Nature of Exposure – shows the list of possible nature exposure including
the date, addresses, work category, etc.
 Symptoms – shows the date of the onset of the illness, where was the last
activity.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 114
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Signs and Symptoms Form

This form is used by the monitoring team at the barangay level. It will be
done twice a day to assess the condition whether the signs and symptoms are
worsening of or is it is asymptomatic.

(DOH Scanned Document, page 25: cropped)

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 115
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
HCW Risk Assessment Tools

This form is used specifically for the health care workers who performs their
duty at the hospital setting or isolation facilities. The World Health Organization
(WHO) created this risk tool assessment last March 2020 as part of the health
protocols for managing incidence at health care facilities that handles COVID-19
cases.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 116
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
(DOH Scanned Document, page 16: cropped)

Its objectives are

 to determine the risk categorization of each health care worker (HCW) after
exposure to a COVID-19 patient; and
 to inform the management of the exposed HCWs based on risk.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 117
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Prepared By: Romally 00
Reporting
Antonette B. Tagnipez
Reporting Flow

After the data collection of the contact tracer, it will now be encoded and
reported to the appropriate unit with their specific timelines.

(Montejo, 2020, slide 53: cropped)

This image shows that the consolidation of the signs and symptoms log
forms of the Barangay Health Emergency Response Team (BHERT) will be on the
next day and has to be reported by 8 o’clock in the morning to the
municipal/city/provincial epidemiology surveillance unit (MESU/CESU/PESU).

Later at around 9 in the morning, it will then be reported to the Regional


Epidemiology Surveillance Unit (RESU) and later on by 5 in the afternoon to the
Epidemiology Bureau (EB).

As for the other forms, consolidated reports of the confirmed case timeline,
close contact profile, close contact line list form, HCW exposure risk assessment
will be submitted by 2 in the afternoon at the MESU/CESU/PESU. By 3 in the
afternoon, it will be submitted to the RESU and by 5:00 pm, it will be submitted to
the EB.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 118
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
(Montejo, 2020, slide 54: cropped)

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 119
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
SELF-CHECK 5.3.3

Directions: Identify what is described by the sentence. Write your answers before
the number.

1. It is the form used for listing the activities of a confirmed case 14 days
before the onset of illness or disease confirmation.

2. Time for the consolidated data collected by BHERT to the M/C/PESU.

3. It is the form used to show more detailed information of the close contacts
identified at the timeline form.

4. It is the form used by managers of a health care facility admitting COVID-19


cases to assess the risk of its health care worker’s exposure.

5. Used by the monitoring team at the barangay level. It monitors the signs
and symptoms of a close contact every day for 14 days.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 120
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
ANSWER KEY 5.3.3

1. Timeline

2. 8:00 am next day

3. Close Contact Line List Form

4. HCW Exposure Risk Assessment

5. Signs and Symptoms Form

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 121
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
TASK SHEET 5.3.3

Title: Creating a Summary of Close Contact Line List Form Using Google Sheet

Performance Objective : Based on the information provided and using the close
contact list form, you must be able to create a google sheet for summarizing the
data of sample cases close contact list

Supplies/Materials: Close Contact List Form

Equipment: Computer, Internet Connection

Steps/Procedure :
1. Review and familiarize the close contact list form found in page 24.
2. Access your Gmail account. If you do not have a Gmail account yet, follow the
steps:
3. In any browser (Internet Explorer, Mozilla Firefox, Google Chrome, etc.), type
www.gmail.com.
4. Click Create Account.
5. The sign-in form will appear. Follow the directions by entering the required
information. Click Next.
6. Enter your phone number to verify your account. Google uses a two-step
verification process for your security. Click next.
7. You will receive a text message from Google with a verification code. Enter the
code to complete the account verification. Click verify.
8. Next, you will see a form to enter some of your personal information, like your
name and birthday. Click next.
9. Review Google’s Terms of Service and Privacy Policy, then click I Agree.
10. Your account will be created.
11. In your Gmail, look the icon in the upper right side. Click.

12. Click Google Sheet.

13. In your google sheet, select a new blank sheet. Create a Close Contact Line

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 122
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
List Summary Sheet showing the same data found in the Close Contact Line
List Form. This is already saved in your Google Drive.

14. Print the form and submit it to your trainer.

Assessment Method : Portfolio Assessment, Performance Criteria Checklist

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 123
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
PERFORMANCE CRITERIA CHECKLIST 5.3.3

Name of Trainee: Date:

During the performance of the activity, did the trainee perform according to the
required criteria?

Criteria Yes No

Did the trainee access his/her Gmail account?

If the trainee has no Gmail account, did he create one?

Did s/he access the Google Sheet?

Did s/he create a close contact line list summary sheet?

For satisfactory achievement, all items should receive a yes response.

Comment/s:

Name and Signature of Trainer

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 124
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
INFORMATION SHEET 5.3.4
BACKING UP YOUR FILES DIGITALLY

(https://cdn.whatismyipaddress.com/)

Learning Objective:

After reading this Information Sheet, you must be able to:


 Enumerate ways backing up your files as a safety precaution.

Imagine this – you were immersed encoding the reports you have to submit for
your 3:00 pm deadline. After pages and pages, the electricity was suddenly cut off.
You then realize that you haven’t saved your work. Another one – your computer
got corrupted and all files in it can’t be retrieved or worst, you accidentally clicked
a link then it was a ransomware, locking all of our year and years of files.

Painful isn’t it. However, these are some of the scenarios you may encounter
in the digital age of information.

To lessen the frustration and safe keep your digital files,


whatismyipaddress.com wrote an article It's Easy to Back Up Your Files and Stay
Safe as a guide to backing up your files in several format.
Start small, with the important files. You don't have to back up everything
all at once. For instance:
You may want to start with photos, videos, music, etc.
If you do company work on your computer, you may want to copy work files first.
Medical information or other personal documents are items you want to back up.

Based on what you decide; you can pick any or all of these very doable
approaches. (https://whatismyipaddress.com/backup-files)

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 125
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Simple approach #1: A flash (thumb) drive.

(https://ae01.alicdn.com/)

Any office supply store sells inexpensive flash/thumb drives that you can
store data on. They are about the size of your finger and plug right into a USB
port. The amount of storage space varies by the size of the flash drive—4GB, 8GB,
16GB, etc. With the simple "drag and drop" coping process, you can make copies
of entire folders in seconds. This a great way to get started.

Any drawbacks? Flash drives can get lost easily or left in a pocket and run
through the wash! You need to handle them wisely and safely. Still, this is the
simplest, fastest and cheapest way to start store copies of some of your data.

Some flash drives offer tremendous storage space. Question is, would you
want risk putting that much data on a small, lose-able flash drives? You can
spend as little as a few dollars for one flash drive with a few gigs of storage, or $50
and up for higher storage capacity or multipacks.

Simple approach #2: "Burn" copies to a disc or SD card.

(images-na.ssl-images-amazon.com and www.officemax.co.nz)

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 126
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Most PCs and Macs have CD and DVD drives and you can "burn" copies of
anything on your computer onto a CD, then store it in a safe place. CDs hold a
decent amount of data, about 750 megabytes, and the process for making
backups is quick and painless. A DVD can hold about six times that much. If
you're good at making notes on the disc or its case, it will help you locate specific
files quickly. However, all discs look alike and it could get hard to remember
what's stored on any one disc.

If you haven't burned to a disc before, now's the time to learn. Also, if your
computer doesn't have a built-in CD/DVD drive, don't worry. You can buy an
external drive that plugs into your computer through a USB port. SD (Secure
Digital) cards are the ultra-small chips you see in digital cameras, and they can
hold up to 1TB! But even though they hold data, they're not necessarily a durable
long-term storage solution for daily backups.

Hardware approach: Hook up to an external hard drive.

(imgaz1.staticbg.com)

All the programs you download and files you save on your computer end up on
your internal hard drive. If your drive crashes (or something else goes wrong), your
files are history. Another backup alternative is to connect an external hard drive to
your computer. Many of today's external storage devices are small and portable
enough to fit in a jacket or backpack pocket, and they cost as little as $60 or so for
1 terabyte of storage—that's a lot of space for your files. (For your information, 1
terabyte is equal to 1,000 gigabytes.

According to one website, if you took 200,000 photos with an 8-pixel camera, you
could likely store all of the shots on a 1TB drive. You can find 2TB hard drives
starting around $100. An external hard drive may take a little technical savvy to
set up, so you may want to have someone help you, especially if you use
Windows...simply because there are so many drive choices for PCs.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 127
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
If you own a Mac, you can use their built-in Time Machine application to back up
your computers' content to an external hard drive. Time Machine routinely (hourly
and daily) backs up all your files to an external hard drive.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 128
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Offsite approach: cloud storage

(projectrawcast.com)

If your computer gets stolen or if there's a disaster such as a fire, and your
flash drive or external drive are close by, you'll lose your original files and your
backup. That's why storing your data in the cloud—or an off-site location—is a
great idea.

The cloud simply refers to a company, a cloud provider, that allows you to
save your data on their huge computers/servers. They charge you a small fee to
keep the data protected—both physically and from hackers. But best of all, you
have instant online access to your stored data from any computer whenever you
need it. You could think of the cloud is a massive external hard drive you share
with other computer users to safely store data offsite. It is truly safe? There have
been some hacks into cloud servers in the past, so do your research.

Your cloud service, in fact, might quickly become your primary "folder" or
destination for saving photos, documents and more. And why not? You never have
to worry about where you store your data. It will seem like it's on your computer,
but technically, it's in the cloud.

There are several cloud vendors out there to choose from. Even Apple,
(iCloud), Microsoft (OneDrive) and Google (Google Drive) offer minimal cloud
storage for free, and more storage for a small fee. Other popular cloud providers
include Dropbox, Sync and pCloud.

Next-level approach: cloud backup

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 129
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
There are services that will do the backup work for you. Cloud backup
services, such as CrashPlan and Carbonite, can "continuously back up entire
folders on your hard drive, instead of just a few files that you choose," as stated on
Carbonite's website.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 130
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
Wise approach: start NOW!

You're probably in the habit of copying some files now and then; but if your
computer crashed, you would certainly wish you had copied all of your critical
files. With the backup options you know about now—and all the information and
help that exists on the Internet—there is no excuse for not backing up files.

All you need to do is pick your files, pick your method of back up, get some
helpful information online and start protecting your data from hackers and
disasters.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 131
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
SELF-CHECK 5.3.4

Directions: Identify what is described by the sentence. Write your answers before
the number.

1. They are about the size of your finger and plug right into a USB port.

2. Ultrasmall chips you see in digital cameras that act as a storage device.

3. Storage device that can be hooked up externally and can have as much as
1TB storage space.

4. Online storage system where your files are saved in an off-site location.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 132
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
ANSWER KEY 5.3.4

1. Flash or thumb drive

2. SD Card

3. External Hard Drive

4. Cloud Storage

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 133
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
JOB SHEET 5.3.4

Title: Encoding Two Sample Cases in the Contact Line List Form Using the Google
Sheet Created in Task Sheet 5.3.3 and Submitting It Through eMail.

Performance Objective : Based on the information provided and using the data
found in the two cases of close, you must be able to encode the data provided in
the google sheet created in task sheet 5.3.3 and submit it to your trainer through
email.

Supplies/Materials : Sample cases sheet

Equipment: Computer, Internet Connection

Steps/Procedure:

1. Get and read the Case A and Case B.

2. Access your created close contact line list summary google sheet.

3. Encode the data found in Case A and Case B in the google sheet.

4. We will assume that your trainer is the R/M/CESU office in-charge to receive
the summary. Download your file and rename it using the following format:
your CCLLFSummary_surname_region_mm/dd/yyyy. Submit the file through
email to your trainer using (insert email address of trainer).

5. Print a copy of your email and submit it also to your trainer.

Case A.
PH4456

He returned home (Lot 15, Phase III, Sasa, Davao City) in the afternoon after
the cockfight derby at Matina Gallera last March 8, 2020. He submitted himself for
testing 10 days after numerous public announcement that attendees of the said
event have to be tested and quarantined. His PCR test returned with a positive
result.

During days between the derby event and his voluntary testing, he

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 134
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
verbalized that he was only at staying at home with his wife, Thelma and his
sister, Sonia. Both of which were not subjected to PCR testing or RDT.

Thelma is a 26 years old call center agent. She reported to have itchy throat
and runny nose after she and her husband went to the testing center last March
19.

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 135
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
On the other hand, Sonia, a 3 rd year Architecture student, reported that
when she celebrated her 19th birthday last March 12, PH4456 and Thelma
surprised her with a mini-birthday party at their home. Her close friends –Maya,
Tina and Romy, were also in attendance.

She was also with PH4456 and Thelma at the testing center to give moral
support on the day he was tested. She reported that she feels fine and does not
have any signs and symptoms indicating COVID-19 disease.

Case B.
PH4459

PH4459, a resident of Ladislawa Village, Buhangin, Davao City, flew back


from Manila last May 11, 2020 after an inter-agency emergency meeting at Camp
Crame together with PCol. Richard Mattias and PGen. Romulo Santos. Three days
after, he reported to have fever, colds and sore throat. He was admitted a day after
to the Southern Philippines Medical Center and was tested positive in the PCR
test.

When interviewed, he related that after the meeting, he and Col. Mattias did
some reminiscing and catching up since they are childhood friends. He was his
longest friend since they were the same age when they were in the 2 nd grade 36
years ago.

Col. Mattias was called using 09176629875 to be informed that he was an


identified close contact. He reported not to exhibit any signs and symptoms.

Gen. Santos, the other hand, called in sick a day after their meeting. He
reported to have colds, sore throat and has been coughing during the meeting. He
generally feels under the weather. He also reported to have isolated himself from
his family at their home (Jupiter Street, bel-air, Makati City) with his private nurse
taking care of him when this happened. He was concerned since he knows that he
was vulnerable since he is 60 years old and has been in the frontlines distributing
PPEs to other front liners.

Assessment Method: Portfolio Assessment, Performance Criteria Checklist

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 136
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
PERFORMANCE CRITERIA CHECKLIST 5.3.4

Name of Trainee:

During the performance of the activity, did the trainee perform according to the
required criteria?

Criteria Yes No

Did the trainee access own google sheet created at Task 5.3.3?

Did the trainee encode correctly the data found in Case A and
Case B?

Did the trainee download the file and renamed it according to


the format?

Did the trainee email it to the trainer?

Did the trainee printed a copy of email and submitted it to the


trainer?

For satisfactory achievement, all items should receive a yes response.

Comment/s:

Name and Signature of Trainer

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 137
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
REFERENCES:

Electronic Sources

10 best uses microsoft excel


https://magoosh.com/excel/10-best-uses-microsoft-excel/

10 most powerful uses of microsoft word


https://www.klientsolutech.com/top-10-most-powerful-uses-of-microsoft-word/

Difference between search engine and web browser


https://www.geeksforgeeks.org/difference-between-search-engine-and-web-
browser/

Email System
https://www.tutorialspoint.com/internet_technologies/e_mail_working.htm

How to create a new document in WPS http://help.wps.com/articles/how-to-


create-a-new-document

Microsoft Office Application https://www.educba.com/microsoft-office-


application/

Records Management https://www.opengovguide.com/topics/records-


management/

Records Management Procedures https://vitalrecordscontrol.com/records-


management-procedures/

Top 5 uses powerpoint


https://finepoint-design.com/top-5-uses-powerpoint

Web Searching https://courses.lumenlearning.com/suny-wm-


compapp/chapter/web-searching/

WPS Office https://en.wikipedia.org/wiki/WPS_Office

Data Privacy Act of 2012. https://www.privacy.gov.ph/wp-content/uploads/DPA-


of-2012.pdf

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 138
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
DOH Scanned Document. (n.d.) Memorandum Circular No. 2020-0189: Updated
Guidelines on Contact Tracing of Close Contacts of Confirmed Coronavirus
Disease (COVID-19) Cases. https://www.doh.gov.ph/sites/default/files/health-
update/dm2020-0189.pdf

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 139
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez
How to Write a Report. Openpolytechnic.
https://www.openpolytechnic.ac.nz/current-students/study-tips-and-
techniques/assignments/how-to-write-a-report/

It’s Easy to Back Up your Files and Stay Safe.


https://whatismyipaddress.com/backup-files

Montejo, R.D. (2020). Recording and Reporting Tools [PowerPoint Presentation].


Davao City: Regional Multiplier Program on Contact Tracing Level II for TESDA
Technology Institutions.

National Privacy Commission. https://www.privacy.gov.ph/

Date Developed: Document No.


Contact Tracing September, 2020
Level II Date Revised: Issued by:
-- PTC-DN Page | 140
Performing Data Developed by: Revision #
Recording and Major P. Salipot CBLM Dev’t
Reporting Prepared By: Romally 00
Antonette B. Tagnipez

You might also like