Professional Documents
Culture Documents
Copy-of-CBLM-CT2-Core-M5-Performing-data-recording-reporting NEW 1
Copy-of-CBLM-CT2-Core-M5-Performing-data-recording-reporting NEW 1
Sector:
HUMAN HEALTH / HEALTH CARE
Qualification:
CONTACT TRACING LEVEL II NC II
Unit of Competency:
PERFORM DATA RECORDING AND REPORTING
The unit of competency Perform Data Recording and Reporting contains the
knowledge, skills and attitudes required for Contact Tracing Level II. It is one of
the Core Modules at National Certificate Level II (NC II).
List of Competencies
PREREQUISITES : NONE
CONTENTS:
Basic MS Office Application
Email System
Search Engines and Web Browsing
Data/Records management
ASSESSMENT CRITERIA:
Basic Microsoft Office applications are navigated/operated in accordance
with established standards and procedures
E-mail system is used in accordance with established standards and
procedures
Basic functions of www-browser to search for necessary information are
conducted in accordance with established standards and procedures
Data or files are stored, maintained, stored, and easily retrieved data in a
hard drive in an organized manner
Protocol and confidentiality of records and data are followed at all times
CONDITION:
The following resources should be provided
Computer
Microsoft Office applications, i.e. Microsoft Word, Microsoft Excel,
Microsoft PowerPoint
Internet Connection
Storage Device i.e. Internal/External Hard drive, Floppy Drive, SD Cards
Records and Reports
Standard Forms
ASSESSMENT METHODS:
Oral questioning/interview
Written Test
Return demonstration
Direct observation of candidate
METHODOLOGIES:
Individual/Modular/ Self-paced Learning
Distance Learning
Individual home assignment
Focus Group Discussion
Face-to-face lecture/ discussion
Role-playing
Learning Outcome 1:
DEMONSTRATE COMPUTER LITERACY AND DATA/RECORDS MANAGEMENT
Learning Objective:
Microsoft Office
Microsoft Office is a set of vital applications primarily known as Office Suite
which has been designed by Microsoft to carry out different office tasks smoothly
and with ease. Bill Gates, the Chairman of Microsoft Corporation first launched it
on August 1 1988at COMDEX in Las Vegas US. Four years ago, the users of MS
Office had already crossed over one billion worldwide and are steadfastly growing
with time. Whenever you buy a new desktop computer or a laptop you will find
that the MS Office is already preinstalled in it most of the time. Recently, Microsoft
launched its newest desktop version Office 2016 for Windows and OS X on
September 22, and July 9, 2015.
Out of all the different components, the Microsoft Word Processor is the most
common and widely used application all throughout the world. You can easily open
the application on both Windows and Mac Operating Systems. Microsoft Office
Word first came into existence in 1983 initially for the MS-DOS OS. That was when
the mouse was added to the keyword, although there was no need for it. People
could buy Word 1.0 with a bundled mouse. The word for MAC OS was introduced a
couple of years later in 1985. Previously, the Word Processor was in the Doc format
but when the 2007 version was released the format changed to Office Open XML.
This was the time when the Portable Document Format (PDF) and Open Document
Format were first introduced in the 2007 version.
You can send an email by using a mail merge that helps you to send one
document to thousands of people with name and address. The use of Microsoft
Word in official works is really easy and productive other than any other word
processing software. After installing and working on MS word you don’t need to
find anything on the search engine. It’s because if you don’t know something,
you can even search inside Microsoft Word when it’s connected to the internet.
Other than that, you can type and edit question papers in Microsoft Word. You
can write an application, a letter that is helpful in a certain situation. Microsoft
Word is used to create various educational materials. It’s helpful to create
error-free documents.
A book needs a cover page, content, head and footers, image adjustments, text
alignment, and text highlighter, etc. All these features are available in Microsoft
Word.
Also, you can create e-books or pdf documents by just saving your document in
.pdf. This is an option you can find in the file menu after that change the save
type from .docx to .pdf and it will create an eBook or notes files for you. But
save an original copy of Word file in .docx, before saving in .pdf format.
Microsoft Word is used by data entry operators, assistants and typists more
often to enter and format text in a word file. You can also use Microsoft Word to
translate a document from English to Hindi and Italian to English. But to type
in Hindi, you need Hindi fonts such as Kundli, Agra, etc.
8. You can start an offline/online business after learning the Microsoft word:
–
Now you know that there are so many uses of Microsoft Word and Office in our
daily life. So, you can use Microsoft Word to start the business. You can start
your business online and offline. You need to create documents for official
works. It’s like a data entry business. You can start freelancing to get Microsoft
Word related works. You can sell documents on your own website. You can
You can teach your own kids how to download images and align text with
images for notes. How to create resumes. If you have minimum knowledge of
official works then you can even start teaching people online by creating a video
tutorial that you can upload on YouTube. After that, you can monetize your
video and website content with Google AdSense.
When Microsoft Office Excel was initially introduced by Microsoft, it had to face a
stiff competition from Lotus 1-2-3 but outclassed it eventually. It is an application
which is based on a spreadsheet and available on both Windows as well as OS X.
The Microsoft Office programs were launched for Mac OS in the same year as the
MS Word. However, the first Windows version came in November 1987. It was
much better than the earlier offering more functions.
Once the data is stored in a systematic way, it can be used easily for multiple
purposes. MS Excel makes it easier to implement various operations on the
data through various tools that it possesses.
The next important use is that there are spreadsheets in MS Excel which also
makes your work easy and with the help of new Microsoft MS Excel XML format
you can reduce the size of the spreadsheet and make things compact easily.
Suppose you have stored data in MS Excel and you want to highlight
something that is important so then you can do that through the various
features of data presentations available in MS Excel. You can even make the
spreadsheets more attractive on which you have stored data.
Another use of MS Excel is that it can be accessed online from anywhere and
everywhere which means that you can access it from any device and from any
location whenever you want. It provides the facility of working conveniently
which means that if you don’t have laptops then you can use mobile and do
your work easily without any problem. Therefore, due to the large amount of
flexibility that MS Excel provides, people like to work on MS Excel so that they
can comfortably work without worrying about their device or location.
Another interesting use of MS Excel is that you can keep all your data at one
location. This will help you in saving your data from getting lost. It will keep all
your data in one place and then you will not have to waste your time in
There are a lot of benefits of using MS Excel, which is why it is used worldwide
by people for performing so many tasks. It not only saves time but also it
makes the work easier. It can almost perform every type of task. For example,
you can do mathematical calculations and you can also make graphs as well as
charts for storing the data. It becomes easy for the businessman to calculate
things and store data in it.
You can store a large amount of data in the MS Excel and analyze it as well. It
helps in keeping the data combined in one place so that data does not get lost
and one does not waste time in finding a particular data. Due to these factors,
it has become such a popular software and we have become habitual of using
it.
1. PowerPoint in education
Teachers can use PowerPoint to teach subjects lessons and chapters of any
book. They can create or delegate to produce a complete presentation of a book.
It gives the opportunity to the teacher to cover a topic in the different t slides.
And in each slide, they can manage, highlight, mention and teach important
points which are essential to cover in that topic. On the contrary, students can
create their own presentation for self-learning or can create for teachers to
show them. Students can create it for various schools’ programs and speech.
2. PowerPoint in business
Business is all about creating a plan, marketing strategies, execution and
making methods to follow and integrate. PowerPoint helps people in business
to create a plan, structure related to the business or organization. In the case of
the training team, you create and showcase the methods with the help of
diagrams, images, and circles. PowerPoint also provides the facility of
exceptional animation effects so you don’t have to buy special animation
software.
Read the question carefully and encircle the letter for your answer.
3. It is the most common and widely used application all throughout the world.
a. Microsoft Excel
b. Microsoft Word
c. Microsoft PowerPoint
d. None of the above
2. a
3. b
4. a
5. c
Assessment Method:
Performance Criteria Checklist
Please tick (√) the column that best describes your evaluation of each identified
evidence.
CRITERIA YES NO
Comment:
Name of Trainer
Learning Objective:
After reading this information sheet, you will be able to operate and create a
new file document using the WPS office.
https://logos-download.com/wp-content/uploads/2020/06/WPS_Office_Logo_full.png
WPS Office
(an acronym for Writer, Presentation and Spreadsheets, previously known as
Kingsoft Office) is an office suite for Microsoft Windows, macOS, Linux, iOS and
Android, developed by Zhuhai-based Chinese software developer Kingsoft. WPS
Office is made up of three primary components: WPS Writer, WPS Presentation,
and WPS Spreadsheet.
The product has had a long history of development in China under the name
"WPS" and "WPS Office". For a time, Kingsoft branded the suite as "KSOffice" in an
attempt to gain an international market foothold, but later returned to "WPS
Office". Since WPS Office 2005 the user interface is similar to that of Microsoft
Office products, and supports Microsoft document formats besides native Kingsoft
formats.
You can choose preferred templates from the General, Business, Daily Life,
Education, Letters and Faxes, and Personal tabs. Click the OK button to create a
new document by the chosen template.
New from Default Templates: select this option to create a new document by the
default template (a blank document here).
ENUMERATION
1. Writer
2. Presentation
3. Spreadsheet
Learning Objective:
E-mail System
Mailer
Mail Server
The function of a mail server is to receive, store and deliver the email. It is
necessary for mail servers to be Running all the time because if it crashes or is
down, email can be lost.
Mailboxes
Mailbox is generally a folder that contains emails and information about them.
Working of E-mail
Email working follows the client server approach. In this client is the mailer i.e.
the mail application or mail program and server is a device that manages emails.
Person A composes the messages using a mailer program i.e. mail client and then
select
Send option.
The message is routed to Simple Mail Transfer Protocol to person B’s mail
server.
The mail server stores the email message on disk in an area designated for person
B.
The disk space area on the mail server is called mail spool.
Now, suppose person B is running a POP client and knows how to communicate
with B’s mail server.
It will periodically poll the POP server to check if any new email has arrived for
B.As in this case, person B has sent an email for person B, so email is forwarded
over the network to B’s PC. This message is now stored on person B’s PC.
The following diagram gives pictorial representation of the steps discussed above:
There are various email service providers available such as Gmail, Hotmail,
Now a form will appear. Fill your details here and click Next Step.
This step allows you to add your picture. If you don’t want to upload now, you can
do it later. Click Next Step.
Wow!! You are done with creating your email account with Gmail. It’s that easy.
Isn’t it?
Now you will see your Gmail account as shown in the following image:
Key Points:
Gmail manages the mail into three categories namely Primary,
Social and Promotions.
You should specify the correct email address; otherwise it will send an error back
to the sender.
Once you have specified all the above parameters, It’s time to send the email. The
mailer program provides a Send button to send email, when you click Send, it is
sent to the mail server and a message sent successfully is shown at the above.
Reading Email
Every email program offers you an interface to access email messages. Like in
Gmail, emails are stored under different tabs such as primary, social, and
promotion. When you click one of the tabs, it displays a list of emails under that
tab.
In order to read an email, you just have to click on that email. Once you click a
particular email, it gets opened.
The opened email may have some file attached with it. The attachments are shown
at the bottom of the opened email with an option called download attachment.
Replying Email
After reading an email, you may have to reply to that email. To reply to an email,
click the Reply option shown at the bottom of the opened email.
Once you click on Reply, it will automatically copy the sender’s address into the To
field. Below the To field, there is a text box where you can type the message.
Once you are done with entering the message, click the Send button. It’s that
easy. Your email is sent.
It is also possible to send a copy of the message that you have received along with
your own comments if you want. This can be done using the forward button
available in mail client software.
The difference between replying and forwarding an email is that when you reply a
message to a person who has sent the mail but while forwarding you can send it to
anyone.
When you receive a forwarded message, the message is marked with a > character
in front of each line and the Subject: field is prefixed with Fw.
Deleting Email
If you don’t want to keep email into your inbox, you can delete it by simply selecting the message
from the message list and clicking delete or pressing the appropriate command.
Watch Videos
Gmail:Sending Email
https://www.youtube.com/watch?v=2eH0JbEE-6k
Read the question carefully and encircle the letter for your answer.
2. Its function is to receive, store and deliver the email. It is necessary for mail servers to be
Running all the time because if it crashes or is down, email can be lost.
a. Mailer
b. Mail Server
c. Mailbox
d. None of the above
1. d
2. b
3. c
4. a
Learning Objective:
http://ai-europe.com/index.php/author/admin-ai/
Search Engine
A search engine is a kind of website through which users can search the content
available on the Internet. For this purpose, users enter the desired keywords into
the search field. Then the search engine looks through its index for relevant web
pages and displays them in the form of a list. The Internet is a huge source of
information & resources and to access the resource from the Internet there are
some kinds of software, this software is known as Search Engine. Some of the
popular ones are: Google, Bing, Yahoo, Duck duck go, Baidu, etc.
https://networkencyclopedia.com/web-browser/
The most productive way to conduct a search on the internet is through a search
engine. A web search engine is a software system designed to search for
information on the World Wide Web. The search results are generally presented in
a line of results often referred to as search engine results pages (SEROs). The
information may be a mix of web pages, images, and other types of files. Some
search engines also mine data available in databases or open directories.
There are a number of various search engines available and some of them may
seem familiar to you. The top web search engines are Google, Bing, Yahoo,
Ask.com, and AOL.com. For the purpose of this course, we will be searching using
the Google Chrome web browser, and search first with the Google search engine
and then Microsoft’s Bing search engine.
Searching on Chrome
The first step is to open a Chrome browser by clicking on the desktop icon or the
icon on the computer desktop’s taskbar. Once the browser window is open, type
www.google.com into the address bar on the top of the browser window and press
the Enter (or Return) key on the keyboard.
The browser now displays the large Google search bar. As you begin to enter the
phrase most popular toys of 2017 into the search bar, notice how the search bar
moves to the top of the screen as the words are typed. This movement is normal;
continue to type the phrase.
The search is now entered and the webpage displays the results of your search.
Notice how the results are displayed. Box #1 is the first page of the search results.
Box #2 is an advertisement targeted to be relevant to the search. The search
results in the list are titled by hyperlinks in a larger font and in a blue color. These
links direct you to a website with information about the search. The
advertisements on the right side are linked to something to buy. When conducting
a search for information, the primary focus is on the list of search results, not the
advertisements.
Now that the Bing search page is open, type in your key words, retail customer
service improvement, into the search bar. You see suggestions begin to appear, but
none of them are what you are searching for so keep typing.
Now that you have typed in your full search phrase, push the Enter (or Return)
button or click on the blue magnifying glass to the right of the search box. The
search results will look like this:
If you select the top result it links to an article from Inc. Magazine about
improving the customer service experience. Reading through this article will give
you information and ideas which you can research further and present to your
boss. Scan through the other results on this page. There are many additional
articles, ideas, and search results to discover as you continue to research more
ideas.
Read the question carefully and encircle the letter for your answer.
1. A kind of website through which users can search the content available on
the Internet?
a. Web browser
b. Search engine
c. Internet Explorer
2. Are software programs sometimes referred to the bots. It regularly scans the
websites automatically for URLs, keywords, and links in order to discover
the new updates.
a. Crawler
b. Index
c. Search Algorithm
1. b
2. a
3. a
4. c
5. c
Learning Objective:
After reading this information sheet, you must be able to value the
importance of Records Management
Every public sector policy maker, auditor, court official and fraud investigator
knows the importance of being able to find, use and trust official records as
evidence of policies, actions, transactions, expenditure, precedents, rights and
entitlements. Most citizens know how important it is to have proof of their rights,
for instance land rights or rights in court. And yet, in many countries, public
sector records are difficult to locate and to trust.
Well-managed records provide clear and durable evidence of what the government
has promised, what it has done, what services it has provided and how it has
spent public funds. Weak records controls result in an ad hoc, potentially
misleading national evidence base that opens opportunities for manipulation,
corruption and fraud; weakens citizens’ ability to claim fair rights and
entitlements; undermines the ability to plan and monitor policies and services;
and makes it difficult to open information effectively. The quality of the records,
especially new forms of digital records, depends on the strength of the control
regime, including laws, policies, practices, structures, and skills as developed
through international professional collaboration and defined in international
records management standards.
Records management principles also support data management. Data are often
extracted or aggregated from records, for instance from land records, personnel
records or hospital records. Inaccurate or incomplete source records result in
misleading data that can reduce trust in the government. Moreover, when data
and its associated metadata is not protected and preserved systematically, it can
easily be lost entirely, lose its value as evidence or hinder exchange between
information systems. As databases are used, changed and updated over a period
of years, especially when several authorities maintain them jointly, it is essential
to document the context of how they are created and altered to support future
sharing, access and long-term management. Records management have been
developed internationally to support systematic control through time.
When determining the retention period for your records, it’s important to:
Perform a record inventory of all physical and electronic records
Establish a standardized record classification system
Conduct research on all federal, state, and local requirements
By setting a records retention schedule, your organization will benefit from the
management of information assets, control storage costs, improve records
retrieval, and eliminate legal risks.
Your records management program should support policies and procedures both
legally and operationally. Policies and procedures set the standard for a compliant
records management system. They should include the management of all records
and media types, including email. Your company may have separate policies for
records retention, active files, unused files, emails, and several other areas of
information management.
Once you’ve organized your files and determined the right retention policy, it’s
time to dispose of unneeded documents. Businesses can encounter trouble when
it retains documents for longer than required, including data breaches and hefty
penalties. Why chance the risk and keep confidential documents past their legal
requirements? Finalize your records retention policy by using shredding services
with chain-of-custody procedures and NAID certification to destroy backlog files in
a compliant manner.
Incorporating the timely destruction of records that have reached the end of their life-
cycle into your records management plan will reduce the likelihood of a potential
audit, legal risks, and storage costs.
Reference:
ASSESSMENT CRITERIA:
Types of Records
Documentation and Recording Procedure
Standard Forms in records system
Basic Statistics
CONDITIONS:
Oral questioning/interview
Written Test
Return demonstration
Direct observation of candidate
METHODOLOGIES:
Individual/Modular/Self-paced Learning
Distance Learning
Individual home assignment
Focus Group Discussion
Face-to-face lecture/discussion
Learning Objective:
Ward Records
o
Reducing or increase in beds
Alphabetically
Dictionary order
Encyclopedic order
Advantages Disadvantages
Most people are familiar System does not work well with very
Staff should be able to learn and large filing systems
become comfortable with the Color coding is more difficult since
system in a timely manner you need to have 26 colors or
The need to shift the records after combination of colors to designate all
purging records is reduced the letters of the alphabet
Cross reference may be avoided Confidentiality is an issue
Some of the rules of alpha filing can
be very confusing
Numerically
Serial number
Digit filing
Geographically
Information is arranged alphabetically by geographical of place name.
Example: - forms, case records and registers. Diaries- diary of M & F Return –
monthly report of HW (M& F)
The Nursing and Midwifery Council (NMC 2002) has said that patient and client
records should:
be based on fact, correct and consistent
be written as soon as possible after an event has happened
be written clearly and in such a way that the text cannot be erased
be written in such a way that any alterations or additions are dated, timed
and signed, so that the original entry is still clear
be accurately dated, timed and signed, with the signature printed alongside
the first entry
not include abbreviations, jargon meaningless phrases, irrelevant
speculation and offensive subjective statements
be readable on any photocopies
Report
A report containing information against in a narrative graphic or tabular form,
prepared on periodic, receiving, regular or as a required basis. Reports may refer
to specific periods, events, occurrence, or subject and may be communicated or
presented in oral or written form.
Purposes
Report is an essential tool to communication
To show the kind and amount of services rendered over a specific period
To illustrate the progress in teaching goals.
As an aid in studying health condition.
As an aid in planning.
To interpret the services to the public and to the other interested agencies
Types of Reports
24 hours reports
Census report
Anecdotal report Birth and
Death report
Incidental report
Advantages Disadvantages
Monitoring operations It is time consuming
Controlling Expensive
Guide decision can be biased
Employee motivation Sometimes implementations of the
Performance evaluation recommendations of a report become
unrealistic
Technical reports are not easily
understandable
Records and reports must be functional accurate, complete, current organized and
confidential
facts
accuracy
completeness
currentness
organization
confidentiality
Other problems
Incomplete sentences
Confusing and unclear sentences
Miscommunication
Too general
Confidentiality.
Missing information and facts
Wordiness
Reference:
https://www.slideshare.net/anuannie1/records-and-reports-1
Types of Records
Types of records
1.
2.
3.
4.
Types of Records
Types of records
1. Patient’s clinical record
2. Individual staff records
3. Ward records
4. Administrative records with educational value
Title:
Filling and arranging of records
Performance Objective:
Given the materials and list of patient’s names, you should able to file and
arrange records alphabetically.
Supplies:
Pencil or pen, paper, list of patient’s names, eraser
Steps/ Procedures:
1. Gather the records of patients.
2. Arrange the patients name alphabetically.
3. Records the patient’s name.
4. File the patient record in the records rooms.
Assessment Method:
Performance Criteria Checklist
CRITERIA YES NO
Please tick (√) the column that best describes your evaluation of each identified
evidences.
Comment:
Name of Trainer
Reference:
https://www.slideshare.net/anuannie1/records-and-reports-1
Learning Objective:
Test procedures
EQA (for example, submission of EQA specimens to reference lab and
internal assessments)
Reordering of supplies and kits
Equipment use and maintenance
These photos of logbooks are common. Storage of logbooks and records should be
kept in a manner that will minimize deterioration. Although many sites uses paper-
based logbooks and records, they should be indexed so to allow for easy.
Reference:
https://www.who.int/diagnostics_laboratory/documents/guidance/pm_module15
.pdf?ua=1
1-5
1. Documents are written policies, process descriptions, and procedures used
to communicate information.
2. They provide written instructions for HOW TO do a specific task.
3. Blank forms are also considered documents.
4. Forms are used to capture data or information from performing a
procedure.
5. Records are generated when written instructions are followed. In other
words, after data, information, or results are recorded onto a form, label,
etc., then it becomes a record. Documents and records may be paper or
electronic.
6-10
6. country testing algorithm,
7. safety manual,
8. standard operation procedures (SOPs) for an approved HIV rapid test,
9. manufacturer test kit inserts,
10. temperature log (blank form),
11-14
11. Understand the information to be collected. Before you record any
information, make sure that you understand what is to be collected
12. Record the information every time. Record on the appropriate form each
time you perform a procedure.
13. Record all the information. Make sure you have provided all the
information requested on a form.
14. Record the information the same way every time. Be consistent in how you
record information.
15-18
15. Materials required, but not in kit
16. Specific safety requirements
17. Sequence of tests in country algorithm
18. External quality control requirements
19-24
19. Cover page
20. Descriptive Title
21. SOP number
22. Date when SOP become effective
23. Signature of person responsible for writing the SOP
24. Signature of person authorizing the SOP
Learning Objective:
Standard forms for Case Investigation used by the Contact Tracer during their
collecting data from the patient. By using of standard form from DOH is helpful to
be easier to collecting and investigate the case of the patient and also can identify
the needs of patient to be addressed it. Here the standard forms using by the
contact tracer.
Used by health care facilities that have either cared for or admitted COVID-19
patients.
This form is to be completed for all health workers who have been exposed to a
confirmed COVID-19 patient in a health care facility.
Protecting HCWs is of paramount importance.
The data that will be captured using this data collection form and risk assessment
tool can be used to identify IPC breaches and define policy to mitigate health
worker and nosocomial infection
Standard forms
1.
2.
3.
4.
5.
6.
7.
Standard forms
Learning Outcome 3.
PREPARE REPORTS BASED ON WORKPLACE SYSTEM
Learning Outcome 3.
PREPARE REPORTS BASED ON WORKPLACE SYSTEM
(www.hldataprotection.com)
Learning Objectives:
When it comes to handling information coming from your client, it always good to
have a nodding understanding of what data privacy and the law which covers it.
Data privacy is the right of the individual not to have private information about
himself disclosed and to live freely from surveillance and intrusion.
(https://www.privacy.gov.ph/)
Republic Act 10173 (RA 10173) is also known as the Data Privacy Act of 2012 is
an act protecting individual personal information in information and
communication systems in the government and the private sector, creating for this
purpose a national privacy commission, and for other purposes.
It is the policy of the State to protect the fundamental human right of privacy, of
communication while ensuring free flow of information to promote innovation and
growth. The State recognizes the vital role of information and communications
technology in nation-building and its inherent obligation to ensure that personal
information in information and communications systems in the government and in
This Act applies to the processing of all types of personal information and to any
natural and juridical person involved in personal information processing including
those personal information controllers and processors who, although not found or
established in the Philippines, use equipment that are located in the Philippines,
or those who maintain an office, branch or agency in the Philippines.
About an individual’s race, ethnic origin, marital status, age, color, and
religious, philosophical or political affiliations;
About an individual’s health, education, genetic or sexual life of a person, or
to any proceeding for any offense committed or alleged to have been
committed by such person, the disposal of such proceedings, or the
sentence of any court in such proceedings;
Issued by government agencies peculiar to an individual which includes, but
not limited to, social security numbers, previous or cm-rent health records,
licenses or its denials, suspension or revocation, and tax returns; and
Specifically established by an executive order or an act of Congress to be
kept classified.
This law also is the basis of the creation of an independent body named the
National Privacy Commission. Its main function is to administer and implement
the provisions of this Act, and to monitor and ensure compliance of the country
with international standards set for data protection.
(https://www.privacy.gov.ph/wp-content/uploads/DPA-of-2012.pdf)
https://www.privacy.gov.ph/wp-content/themes/npcbootstrap/img/Lockups-01.png
1. The Data Privacy Act of 2012 is also known as Republic Act 10175.
TRUE
TRUE
TRUE
(https://d1whtlypfis84e.cloudfront.net)
Learning Objective:
There are many different types of reports, including business, scientific and
research reports, but the basic steps for writing them are the same. These are
outlined below.
To decide on the terms of reference for your report, read your instructions and any
other information you've been given about the report, and think about the purpose
of the report:
What is it about?
What exactly is needed?
Why is it needed?
When do I need to do it?
Who is it for, or who is it aimed at?
This will help you draft your Terms of reference.
This means planning your investigation or research, and how you'll write the
report. Ask yourself:
What information do I need?
Do I need to do any background reading?
What articles or documents do I need?
Do I need to contact the library for assistance?
Do I need to interview or observe people?
Do I have to record data?
How will I go about this?
Answering these questions will help you draft the procedure section of your report,
which outlines the steps you've taken to carry out the investigation.
The next step is to find the information you need for your report. To do this
you may need to read written material, observe people or activities, and/or talk to
people. Make sure the information you find is relevant and appropriate. Check the
assessment requirements and guidelines and the marking schedule to make sure
you're on the right track. If you're not sure how the marks will be assigned contact
your lecturer.
What you find out will form the basis, or main body, of your report – the
findings.
Reports generally have a similar structure, but some details may differ. How they
differ usually depends on:
The sections, of a report usually have headings and subheadings, which are
usually numbered
Once you have your structure, write down the headings and start to fill these in
with the information you have gathered so far. By now you should be able to draft
the terms of reference, procedure and findings, and start to work out what will go
in the report’s appendix.
Findings
Appendices
As you are writing your draft decide what information will go in the
The conclusion is where you analyze your findings and interpret what you
have found. To do this, read through your findings and ask yourself:
What have I found?
What's significant or important about my findings?
What do my findings suggest?
For example, your conclusion may describe how the information you collected
explains why the situation occurred, what this means for the organization, and
what will happen if the situation continues (or doesn't continue).
Recommendations are what you think the solution to the problem is and/or what
you think should happen next. To help you decide what to recommend:
Reread your findings and conclusions.
Think about what you want the person who asked for the report should to
do or not do; what actions should they carry out?
Check that your recommendations are practical and are based logically on
your conclusions.
Ensure you include enough detail for the reader to know what needs to be
done and who should do it.
Some reports require an executive summary and/or list of contents. Even though
these two sections come near the beginning of the report you won't be able to do
them until you have finished it, and have your structure and recommendations
finalized.
An executive summary is usually about 100 words long. It tells the readers what
It is always important to revise your work. Things you need to check include:
If you have done what you were asked to do. Check the assignment
question, the instructions/guidelines and the marking schedule to make
sure.
That the required sections are included, and are in the correct order.
That your information is accurate, with no gaps.
If your argument is logical. Does the information you present support your
conclusions and recommendations?
That all terms, symbols and abbreviations used have been explained.
That any diagrams, tables, graphs and illustrations are numbered and
labelled.
That the formatting is correct, including your numbering, headings, are
consistent throughout the report.
That the report reads well, and your writing is as clear and effective as
possible.
You might need to prepare several drafts before you are satisfied. If possible, get
someone else to check your report.
(https://www.acronis.com)
Learning Objectives:
The reporting tools that are basically used in contact tracing for non-health
workers and health workers as presented by Dr. Montejo (2020) in her lecture
were
Timeline
Close Contact Line List Form
Signs and Symptoms Form
HCW Risk Assessment Tools (for health care workers).
Last April 17, 2020, the Department of Health (DOH) released its
Department Memorandum No. 2020-0189 that has a subject of Updated
Guidelines on Contact Tracing of Close Contacts of Confirmed Coronavirus
Disease (COVID-19) Cases. It identified the necessary forms that will be used by
the contact tracer when s/he is performing the contact tracing.
Timeline
Patient Code
Barangay
Name
Primary Address
Secondary Address
Profession/Occupation
Company Name
Office Address
Age
Birthdate
Onset of Illness
Cellphone No.
Once the contact tracer has identified these demographics, s/he will then
proceed to inquire for the case’s past activities before the onset of illness or the
date of the swab test.
This form presents more detailed information of the close contacts identified
at the timeline form. Its main purpose is to discover and monitor the close
contact’s exposure with the coronavirus disease.
Data presented in this form will include the nature of the contacts whether
it is in the household (HH), work station (WS), sea vessel (S), accommodation (A),
health care worker (HCW) or others.
With this form, it shows a more detailed picture who is the close contact. It
is a two-paged form which supports the data on the close contact line list.
It has several
sections:
Demographic Profile – shows the personal information of the close contact
Health Profile – shows the known medical condition and history
Nature of Exposure – shows the list of possible nature exposure including
the date, addresses, work category, etc.
Symptoms – shows the date of the onset of the illness, where was the last
activity.
This form is used by the monitoring team at the barangay level. It will be
done twice a day to assess the condition whether the signs and symptoms are
worsening of or is it is asymptomatic.
This form is used specifically for the health care workers who performs their
duty at the hospital setting or isolation facilities. The World Health Organization
(WHO) created this risk tool assessment last March 2020 as part of the health
protocols for managing incidence at health care facilities that handles COVID-19
cases.
to determine the risk categorization of each health care worker (HCW) after
exposure to a COVID-19 patient; and
to inform the management of the exposed HCWs based on risk.
After the data collection of the contact tracer, it will now be encoded and
reported to the appropriate unit with their specific timelines.
This image shows that the consolidation of the signs and symptoms log
forms of the Barangay Health Emergency Response Team (BHERT) will be on the
next day and has to be reported by 8 o’clock in the morning to the
municipal/city/provincial epidemiology surveillance unit (MESU/CESU/PESU).
As for the other forms, consolidated reports of the confirmed case timeline,
close contact profile, close contact line list form, HCW exposure risk assessment
will be submitted by 2 in the afternoon at the MESU/CESU/PESU. By 3 in the
afternoon, it will be submitted to the RESU and by 5:00 pm, it will be submitted to
the EB.
Directions: Identify what is described by the sentence. Write your answers before
the number.
1. It is the form used for listing the activities of a confirmed case 14 days
before the onset of illness or disease confirmation.
3. It is the form used to show more detailed information of the close contacts
identified at the timeline form.
5. Used by the monitoring team at the barangay level. It monitors the signs
and symptoms of a close contact every day for 14 days.
1. Timeline
Title: Creating a Summary of Close Contact Line List Form Using Google Sheet
Performance Objective : Based on the information provided and using the close
contact list form, you must be able to create a google sheet for summarizing the
data of sample cases close contact list
Steps/Procedure :
1. Review and familiarize the close contact list form found in page 24.
2. Access your Gmail account. If you do not have a Gmail account yet, follow the
steps:
3. In any browser (Internet Explorer, Mozilla Firefox, Google Chrome, etc.), type
www.gmail.com.
4. Click Create Account.
5. The sign-in form will appear. Follow the directions by entering the required
information. Click Next.
6. Enter your phone number to verify your account. Google uses a two-step
verification process for your security. Click next.
7. You will receive a text message from Google with a verification code. Enter the
code to complete the account verification. Click verify.
8. Next, you will see a form to enter some of your personal information, like your
name and birthday. Click next.
9. Review Google’s Terms of Service and Privacy Policy, then click I Agree.
10. Your account will be created.
11. In your Gmail, look the icon in the upper right side. Click.
13. In your google sheet, select a new blank sheet. Create a Close Contact Line
During the performance of the activity, did the trainee perform according to the
required criteria?
Criteria Yes No
Comment/s:
(https://cdn.whatismyipaddress.com/)
Learning Objective:
Imagine this – you were immersed encoding the reports you have to submit for
your 3:00 pm deadline. After pages and pages, the electricity was suddenly cut off.
You then realize that you haven’t saved your work. Another one – your computer
got corrupted and all files in it can’t be retrieved or worst, you accidentally clicked
a link then it was a ransomware, locking all of our year and years of files.
Painful isn’t it. However, these are some of the scenarios you may encounter
in the digital age of information.
Based on what you decide; you can pick any or all of these very doable
approaches. (https://whatismyipaddress.com/backup-files)
(https://ae01.alicdn.com/)
Any office supply store sells inexpensive flash/thumb drives that you can
store data on. They are about the size of your finger and plug right into a USB
port. The amount of storage space varies by the size of the flash drive—4GB, 8GB,
16GB, etc. With the simple "drag and drop" coping process, you can make copies
of entire folders in seconds. This a great way to get started.
Any drawbacks? Flash drives can get lost easily or left in a pocket and run
through the wash! You need to handle them wisely and safely. Still, this is the
simplest, fastest and cheapest way to start store copies of some of your data.
Some flash drives offer tremendous storage space. Question is, would you
want risk putting that much data on a small, lose-able flash drives? You can
spend as little as a few dollars for one flash drive with a few gigs of storage, or $50
and up for higher storage capacity or multipacks.
If you haven't burned to a disc before, now's the time to learn. Also, if your
computer doesn't have a built-in CD/DVD drive, don't worry. You can buy an
external drive that plugs into your computer through a USB port. SD (Secure
Digital) cards are the ultra-small chips you see in digital cameras, and they can
hold up to 1TB! But even though they hold data, they're not necessarily a durable
long-term storage solution for daily backups.
(imgaz1.staticbg.com)
All the programs you download and files you save on your computer end up on
your internal hard drive. If your drive crashes (or something else goes wrong), your
files are history. Another backup alternative is to connect an external hard drive to
your computer. Many of today's external storage devices are small and portable
enough to fit in a jacket or backpack pocket, and they cost as little as $60 or so for
1 terabyte of storage—that's a lot of space for your files. (For your information, 1
terabyte is equal to 1,000 gigabytes.
According to one website, if you took 200,000 photos with an 8-pixel camera, you
could likely store all of the shots on a 1TB drive. You can find 2TB hard drives
starting around $100. An external hard drive may take a little technical savvy to
set up, so you may want to have someone help you, especially if you use
Windows...simply because there are so many drive choices for PCs.
(projectrawcast.com)
If your computer gets stolen or if there's a disaster such as a fire, and your
flash drive or external drive are close by, you'll lose your original files and your
backup. That's why storing your data in the cloud—or an off-site location—is a
great idea.
The cloud simply refers to a company, a cloud provider, that allows you to
save your data on their huge computers/servers. They charge you a small fee to
keep the data protected—both physically and from hackers. But best of all, you
have instant online access to your stored data from any computer whenever you
need it. You could think of the cloud is a massive external hard drive you share
with other computer users to safely store data offsite. It is truly safe? There have
been some hacks into cloud servers in the past, so do your research.
Your cloud service, in fact, might quickly become your primary "folder" or
destination for saving photos, documents and more. And why not? You never have
to worry about where you store your data. It will seem like it's on your computer,
but technically, it's in the cloud.
There are several cloud vendors out there to choose from. Even Apple,
(iCloud), Microsoft (OneDrive) and Google (Google Drive) offer minimal cloud
storage for free, and more storage for a small fee. Other popular cloud providers
include Dropbox, Sync and pCloud.
You're probably in the habit of copying some files now and then; but if your
computer crashed, you would certainly wish you had copied all of your critical
files. With the backup options you know about now—and all the information and
help that exists on the Internet—there is no excuse for not backing up files.
All you need to do is pick your files, pick your method of back up, get some
helpful information online and start protecting your data from hackers and
disasters.
Directions: Identify what is described by the sentence. Write your answers before
the number.
1. They are about the size of your finger and plug right into a USB port.
2. Ultrasmall chips you see in digital cameras that act as a storage device.
3. Storage device that can be hooked up externally and can have as much as
1TB storage space.
4. Online storage system where your files are saved in an off-site location.
2. SD Card
4. Cloud Storage
Title: Encoding Two Sample Cases in the Contact Line List Form Using the Google
Sheet Created in Task Sheet 5.3.3 and Submitting It Through eMail.
Performance Objective : Based on the information provided and using the data
found in the two cases of close, you must be able to encode the data provided in
the google sheet created in task sheet 5.3.3 and submit it to your trainer through
email.
Steps/Procedure:
2. Access your created close contact line list summary google sheet.
3. Encode the data found in Case A and Case B in the google sheet.
4. We will assume that your trainer is the R/M/CESU office in-charge to receive
the summary. Download your file and rename it using the following format:
your CCLLFSummary_surname_region_mm/dd/yyyy. Submit the file through
email to your trainer using (insert email address of trainer).
Case A.
PH4456
He returned home (Lot 15, Phase III, Sasa, Davao City) in the afternoon after
the cockfight derby at Matina Gallera last March 8, 2020. He submitted himself for
testing 10 days after numerous public announcement that attendees of the said
event have to be tested and quarantined. His PCR test returned with a positive
result.
During days between the derby event and his voluntary testing, he
Thelma is a 26 years old call center agent. She reported to have itchy throat
and runny nose after she and her husband went to the testing center last March
19.
She was also with PH4456 and Thelma at the testing center to give moral
support on the day he was tested. She reported that she feels fine and does not
have any signs and symptoms indicating COVID-19 disease.
Case B.
PH4459
When interviewed, he related that after the meeting, he and Col. Mattias did
some reminiscing and catching up since they are childhood friends. He was his
longest friend since they were the same age when they were in the 2 nd grade 36
years ago.
Gen. Santos, the other hand, called in sick a day after their meeting. He
reported to have colds, sore throat and has been coughing during the meeting. He
generally feels under the weather. He also reported to have isolated himself from
his family at their home (Jupiter Street, bel-air, Makati City) with his private nurse
taking care of him when this happened. He was concerned since he knows that he
was vulnerable since he is 60 years old and has been in the frontlines distributing
PPEs to other front liners.
Name of Trainee:
During the performance of the activity, did the trainee perform according to the
required criteria?
Criteria Yes No
Did the trainee access own google sheet created at Task 5.3.3?
Did the trainee encode correctly the data found in Case A and
Case B?
Comment/s:
Electronic Sources
Email System
https://www.tutorialspoint.com/internet_technologies/e_mail_working.htm