SlideShare una empresa de Scribd logo
1 de 23
Working
with
Families
Learning Objectives
1. Contrast family privacy policy with promoting
welfare policy including the ‘ten principles of’
and S.17 of The Children Act 1989.
2. Introduction to The Human Rights Act 1998,
in particular Article 8; Right to Family Life.
3. Introduction to Data Protection Act 2000.
4. Debate the concept of ‘confidentiality’ and
record keeping.
Last Time
• We explored ‘parenting’. In doing so we used
what might be called a ‘bottom up’ approach:
We based our presentations of the research
that we read.
• In this session we shall use an alternative
method a ‘top down’ approach: We will come
up with some ideas before we undertake the
research.
In your groups
• Spend 10 minutes discussing why those who
work with children and families must be
mindful of ‘freedom’ and ‘privacy’.
• Can you have ‘freedom’ without ‘privacy’; can
you have ‘privacy’ without ‘freedom’?
• Make a list of your reasons. (You will need this
list later)
Entick v Carrington [1765]

A leading case in English law
establishing the civil liberties of
individuals and limiting the
scope that the ‘state’ can
interfere in ‘private life’
The Details
• In 1762, the King's Chief Messenger Nathan
Carrington, and three other King's messengers, went
into the home of writer, John Entick "with force and
arms" and seized Entick's private papers. Entick was
arrested. The King's messengers were acting on the
orders of Lord Halifax "to make strict and diligent
search for . . . the author, or one concerned in the
writing of several weekly very seditious papers”. Entick
sought judgment against Carrington and his colleagues
who argued that they had acted upon Halifax's
warrant. A jury returned a special verdict finding that
the defendants had broken into Entick's home "with
force and arms”.
Perhaps summarised by: An
Englishman’s home is his…
However,
As English law has proceeded in a ‘liberal’
tradition protecting an individual’s right to
freely make business contracts and hold
property, some individuals in society have
not had the same equal rights before the
law, significantly because they did not hold
property.
Did you know:
• There has been a long tradition in England that
only very wealthy males had the right to vote.
• The situation was ‘improved’ by the Reform Act
1832 giving 1 in 7adult land owning males the
right to vote.
• This increased to all men aged over 21 and
wealthy women in 1918.
• Both men and women aged over 21 could vote by
1929.
• The voting age was reduced to 18 in 1969.
Do you think that we take
our ‘rights’ and ‘freedoms’
for granted…?
At around the same time, over the last
150 years

E-X-P-A-N-S-I-O-N
Of
The
Welfare State

Report on Social Insurance and Allied
Services (1942) : The Beveridge Report.
The ‘state’ needs
to do more to help
people!

The ‘state’
interferes with
our freedoms
and privacy!

Where do you stand?
• Over the years, one can see how each side of
the state debate has gotten in front but then
slipped behind again.

• This can usually be seen in the balloon like
expansion of the services followed by
contraction (cuts) in services.
• However, in general there has been an
increase in legislation, policy and powers
relating to state intervention into
family/private life.
The Children Act 1989
Read excerpt 1: The 10
Principles of the Act.
Discuss and write of the
pack whether you think the
principle ‘protects’ privacy
or ‘invades’ privacy?
What about s.17 The Children Act 1989
duty

It shall be the general
of every Local Authority
to safeguard and promote the welfare of children within
their area

need

who are in
; and so far as is reasonably
consistent with that duty, to promote the upbringing of
such children by their families, by providing a range
and level of services appropriate to those children’s
needs.
Read Excerpt 2:

The Daily Mail, 2013,
“Social Workers to
Meddle in Every Family
Home”[what do you think?]
The Human Rights Act 1998
Read Excerpt 3: Making Sense of Human Rights.
What are
1. Absolute Rights
2. Limited Rights
3. Qualified Rights?
What is Article 8 about?
What is a ‘public authority’?
Confidentiality
Read the Stephen King quotation
on the front of today’s pack: What
do you think it means?
“No one likes to see a government
folder with his name on it.”
Confidentiality
• Read excerpt 4 – Information
sharing, confidentiality and
consent.
• List the seven golden rules for
information sharing? (try to
summarise each one into five
words).
Consent to information sharing
• What is consent?
• Why is consent important?
• Can children give consent
For next time: Read Excerpt 5:
Thompson (2009), Written
Communication
1. Why is written information important?
2. Why is ‘working from memory’ difficult?
3. How do written records make us
accountable?
4. What does Thompson write about
‘relevance’?
5. What does Thompson write about ‘fact and
opinion’?
Summary
1.

2.
3.
4.

Contrast family privacy policy with promoting
welfare policy including the ‘ten principles of’
and S.17 of The Children Act 1989.
Introduction to The Human Rights Act 1998,
in particular Article 8; Right to Family Life.
Introduction to Data Protection Act 2000.
Debate the concept of ‘confidentiality’ and
record keeping.
Final thought
When I worked as a Social Worker
the head of children’s services
said to me, “If it isn’t written

down recorded – then it
never happened”.

What do you think this means?
(Do you agree?)

Más contenido relacionado

La actualidad más candente

Immigration in America Policy Project Presentation By Sean Cox
Immigration in America Policy Project Presentation By Sean CoxImmigration in America Policy Project Presentation By Sean Cox
Immigration in America Policy Project Presentation By Sean CoxSean Cox
 
The new revolutionaries
The new revolutionariesThe new revolutionaries
The new revolutionariesPhillippj96
 
Taking that final step: The road to equal protection in Wales
Taking that final step: The road to equal protection in WalesTaking that final step: The road to equal protection in Wales
Taking that final step: The road to equal protection in WalesBASPCAN
 
Key issues from the family violence inquiry awl conference 7 august
Key issues from the family violence inquiry   awl conference 7 augustKey issues from the family violence inquiry   awl conference 7 august
Key issues from the family violence inquiry awl conference 7 augustALRC
 
Rights and responsibilities
Rights and responsibilitiesRights and responsibilities
Rights and responsibilitiesKiciaCigail
 
Workers Make Progress
Workers Make ProgressWorkers Make Progress
Workers Make Progressrobcwatson
 
Constitution for kids
Constitution for kidsConstitution for kids
Constitution for kidswcharafeddine
 

La actualidad más candente (11)

Good governance
Good governanceGood governance
Good governance
 
Governt
GoverntGovernt
Governt
 
Immigration in America Policy Project Presentation By Sean Cox
Immigration in America Policy Project Presentation By Sean CoxImmigration in America Policy Project Presentation By Sean Cox
Immigration in America Policy Project Presentation By Sean Cox
 
The new revolutionaries
The new revolutionariesThe new revolutionaries
The new revolutionaries
 
The 54 articles of the un crc
The 54 articles of the un crcThe 54 articles of the un crc
The 54 articles of the un crc
 
Taking that final step: The road to equal protection in Wales
Taking that final step: The road to equal protection in WalesTaking that final step: The road to equal protection in Wales
Taking that final step: The road to equal protection in Wales
 
Key issues from the family violence inquiry awl conference 7 august
Key issues from the family violence inquiry   awl conference 7 augustKey issues from the family violence inquiry   awl conference 7 august
Key issues from the family violence inquiry awl conference 7 august
 
Rights and responsibilities
Rights and responsibilitiesRights and responsibilities
Rights and responsibilities
 
Workers Make Progress
Workers Make ProgressWorkers Make Progress
Workers Make Progress
 
Fix Congress1
Fix Congress1Fix Congress1
Fix Congress1
 
Constitution for kids
Constitution for kidsConstitution for kids
Constitution for kids
 

Destacado

The ‘preventative services’ agenda
The ‘preventative services’ agendaThe ‘preventative services’ agenda
The ‘preventative services’ agendaNathan Loynes
 
Direct communication
Direct communicationDirect communication
Direct communicationNathan Loynes
 
Multi agency working
Multi agency workingMulti agency working
Multi agency workingNathan Loynes
 
Child protection and the police
Child protection and the policeChild protection and the police
Child protection and the policeNathan Loynes
 
Lesson 16 - Regional and National identity
Lesson 16 - Regional and National identityLesson 16 - Regional and National identity
Lesson 16 - Regional and National identityElle Sullivan
 

Destacado (6)

The ‘preventative services’ agenda
The ‘preventative services’ agendaThe ‘preventative services’ agenda
The ‘preventative services’ agenda
 
Communication
CommunicationCommunication
Communication
 
Direct communication
Direct communicationDirect communication
Direct communication
 
Multi agency working
Multi agency workingMulti agency working
Multi agency working
 
Child protection and the police
Child protection and the policeChild protection and the police
Child protection and the police
 
Lesson 16 - Regional and National identity
Lesson 16 - Regional and National identityLesson 16 - Regional and National identity
Lesson 16 - Regional and National identity
 

Similar a Working with families & privacy

14 Academic Plan Worksheet Worksheeto.Com
14 Academic Plan Worksheet Worksheeto.Com14 Academic Plan Worksheet Worksheeto.Com
14 Academic Plan Worksheet Worksheeto.ComJessica Howard
 
Civil Liberties in America
Civil Liberties in AmericaCivil Liberties in America
Civil Liberties in AmericaWayne Williams
 
Strathmore Writing 24Lb Soft White Wove 8-12X11 500
Strathmore Writing 24Lb Soft White Wove 8-12X11 500Strathmore Writing 24Lb Soft White Wove 8-12X11 500
Strathmore Writing 24Lb Soft White Wove 8-12X11 500Crystal Williams
 
How To Write The Perfect Essay Introduction Examples And Tec
How To Write The Perfect Essay Introduction Examples And TecHow To Write The Perfect Essay Introduction Examples And Tec
How To Write The Perfect Essay Introduction Examples And TecMariana Arnold
 
Short Essay With Figurative Language. Online assignment writing service.
Short Essay With Figurative Language. Online assignment writing service.Short Essay With Figurative Language. Online assignment writing service.
Short Essay With Figurative Language. Online assignment writing service.Lisa Long
 
Academic Phrases For Yo. Online assignment writing service.
Academic Phrases For Yo. Online assignment writing service.Academic Phrases For Yo. Online assignment writing service.
Academic Phrases For Yo. Online assignment writing service.Angel Ashford
 
The Bill of Rights
The Bill of RightsThe Bill of Rights
The Bill of RightsAmy LC
 
15 lesson right to vote and referendum - THOP
15 lesson  right to vote and referendum - THOP15 lesson  right to vote and referendum - THOP
15 lesson right to vote and referendum - THOPPeterThoms2
 
Human Rights A341- Notes Year 10
Human Rights A341- Notes Year 10Human Rights A341- Notes Year 10
Human Rights A341- Notes Year 10Amjad Ali
 
How To Write A Two Page Essay Quickly Wikihow
How To Write A Two Page Essay Quickly WikihowHow To Write A Two Page Essay Quickly Wikihow
How To Write A Two Page Essay Quickly WikihowMary Price
 
Buy College Essay
Buy College EssayBuy College Essay
Buy College EssaySara Parker
 
Civil War Research Essay Topics
Civil War Research Essay TopicsCivil War Research Essay Topics
Civil War Research Essay TopicsJacqueline Ramirez
 
Exactely How Much Is Often A
Exactely How Much Is Often AExactely How Much Is Often A
Exactely How Much Is Often AValerie Lohkamp
 
YOUnited States of America - Understanding The Bill of Rights
YOUnited States of America  - Understanding The Bill of RightsYOUnited States of America  - Understanding The Bill of Rights
YOUnited States of America - Understanding The Bill of RightsJAMES EUGENE BARBUSH
 

Similar a Working with families & privacy (17)

14 Academic Plan Worksheet Worksheeto.Com
14 Academic Plan Worksheet Worksheeto.Com14 Academic Plan Worksheet Worksheeto.Com
14 Academic Plan Worksheet Worksheeto.Com
 
Civil Liberties in America
Civil Liberties in AmericaCivil Liberties in America
Civil Liberties in America
 
Strathmore Writing 24Lb Soft White Wove 8-12X11 500
Strathmore Writing 24Lb Soft White Wove 8-12X11 500Strathmore Writing 24Lb Soft White Wove 8-12X11 500
Strathmore Writing 24Lb Soft White Wove 8-12X11 500
 
How To Write The Perfect Essay Introduction Examples And Tec
How To Write The Perfect Essay Introduction Examples And TecHow To Write The Perfect Essay Introduction Examples And Tec
How To Write The Perfect Essay Introduction Examples And Tec
 
Short Essay With Figurative Language. Online assignment writing service.
Short Essay With Figurative Language. Online assignment writing service.Short Essay With Figurative Language. Online assignment writing service.
Short Essay With Figurative Language. Online assignment writing service.
 
Academic Phrases For Yo. Online assignment writing service.
Academic Phrases For Yo. Online assignment writing service.Academic Phrases For Yo. Online assignment writing service.
Academic Phrases For Yo. Online assignment writing service.
 
The Bill of Rights
The Bill of RightsThe Bill of Rights
The Bill of Rights
 
15 lesson right to vote and referendum - THOP
15 lesson  right to vote and referendum - THOP15 lesson  right to vote and referendum - THOP
15 lesson right to vote and referendum - THOP
 
Human Rights A341- Notes Year 10
Human Rights A341- Notes Year 10Human Rights A341- Notes Year 10
Human Rights A341- Notes Year 10
 
Human rights
Human rightsHuman rights
Human rights
 
How To Write A Two Page Essay Quickly Wikihow
How To Write A Two Page Essay Quickly WikihowHow To Write A Two Page Essay Quickly Wikihow
How To Write A Two Page Essay Quickly Wikihow
 
Buy College Essay
Buy College EssayBuy College Essay
Buy College Essay
 
Chapter 19.ppt
Chapter 19.pptChapter 19.ppt
Chapter 19.ppt
 
Chap19
Chap19Chap19
Chap19
 
Civil War Research Essay Topics
Civil War Research Essay TopicsCivil War Research Essay Topics
Civil War Research Essay Topics
 
Exactely How Much Is Often A
Exactely How Much Is Often AExactely How Much Is Often A
Exactely How Much Is Often A
 
YOUnited States of America - Understanding The Bill of Rights
YOUnited States of America  - Understanding The Bill of RightsYOUnited States of America  - Understanding The Bill of Rights
YOUnited States of America - Understanding The Bill of Rights
 

Más de Nathan Loynes

2285 (2021) week 2 self awareness (hand out)
2285 (2021) week 2 self awareness (hand out)2285 (2021) week 2 self awareness (hand out)
2285 (2021) week 2 self awareness (hand out)Nathan Loynes
 
2285 (2021) week 1 introduction to the module online
2285 (2021) week 1 introduction to the module online2285 (2021) week 1 introduction to the module online
2285 (2021) week 1 introduction to the module onlineNathan Loynes
 
Vision, mission and values statements
Vision, mission and values statementsVision, mission and values statements
Vision, mission and values statementsNathan Loynes
 
Lllc1080 module review
Lllc1080 module reviewLllc1080 module review
Lllc1080 module reviewNathan Loynes
 
Session 10. final course summary[ 2016
Session 10. final course summary[ 2016Session 10. final course summary[ 2016
Session 10. final course summary[ 2016Nathan Loynes
 
Session 9. violence retribution & restoration.2016
Session 9. violence retribution & restoration.2016Session 9. violence retribution & restoration.2016
Session 9. violence retribution & restoration.2016Nathan Loynes
 
Session 8. knives gangs guns.2016
Session 8.  knives gangs  guns.2016Session 8.  knives gangs  guns.2016
Session 8. knives gangs guns.2016Nathan Loynes
 
Session 7 restoration ppt.2016
Session 7  restoration   ppt.2016Session 7  restoration   ppt.2016
Session 7 restoration ppt.2016Nathan Loynes
 
Session 6 the cycle of abuse.2016
Session 6  the cycle of abuse.2016Session 6  the cycle of abuse.2016
Session 6 the cycle of abuse.2016Nathan Loynes
 
Session 5 youth crime the media.2016
Session 5  youth crime  the media.2016Session 5  youth crime  the media.2016
Session 5 youth crime the media.2016Nathan Loynes
 
Session 4 the murer of james bulger.2016
Session 4  the murer of james bulger.2016Session 4  the murer of james bulger.2016
Session 4 the murer of james bulger.2016Nathan Loynes
 
Session 3 1 lllc 2222 official statistics.2016
Session 3 1 lllc 2222 official statistics.2016Session 3 1 lllc 2222 official statistics.2016
Session 3 1 lllc 2222 official statistics.2016Nathan Loynes
 
Session 2 1 lllc 2222 defining social construction 2016
Session 2 1 lllc 2222 defining social construction 2016Session 2 1 lllc 2222 defining social construction 2016
Session 2 1 lllc 2222 defining social construction 2016Nathan Loynes
 
Session 1 lllc 2222 2016
Session 1 lllc 2222 2016Session 1 lllc 2222 2016
Session 1 lllc 2222 2016Nathan Loynes
 
Parenting capacity to change
Parenting capacity to changeParenting capacity to change
Parenting capacity to changeNathan Loynes
 

Más de Nathan Loynes (20)

2285 (2021) week 2 self awareness (hand out)
2285 (2021) week 2 self awareness (hand out)2285 (2021) week 2 self awareness (hand out)
2285 (2021) week 2 self awareness (hand out)
 
2285 (2021) week 1 introduction to the module online
2285 (2021) week 1 introduction to the module online2285 (2021) week 1 introduction to the module online
2285 (2021) week 1 introduction to the module online
 
Planning
PlanningPlanning
Planning
 
Vision, mission and values statements
Vision, mission and values statementsVision, mission and values statements
Vision, mission and values statements
 
Lllc1080 module review
Lllc1080 module reviewLllc1080 module review
Lllc1080 module review
 
Motivation
MotivationMotivation
Motivation
 
TT2018
TT2018TT2018
TT2018
 
Toxic Trio
Toxic TrioToxic Trio
Toxic Trio
 
Session 10. final course summary[ 2016
Session 10. final course summary[ 2016Session 10. final course summary[ 2016
Session 10. final course summary[ 2016
 
Session 9. violence retribution & restoration.2016
Session 9. violence retribution & restoration.2016Session 9. violence retribution & restoration.2016
Session 9. violence retribution & restoration.2016
 
Session 8. knives gangs guns.2016
Session 8.  knives gangs  guns.2016Session 8.  knives gangs  guns.2016
Session 8. knives gangs guns.2016
 
Session 7 restoration ppt.2016
Session 7  restoration   ppt.2016Session 7  restoration   ppt.2016
Session 7 restoration ppt.2016
 
Session 6 the cycle of abuse.2016
Session 6  the cycle of abuse.2016Session 6  the cycle of abuse.2016
Session 6 the cycle of abuse.2016
 
Session 5 youth crime the media.2016
Session 5  youth crime  the media.2016Session 5  youth crime  the media.2016
Session 5 youth crime the media.2016
 
Session 4 the murer of james bulger.2016
Session 4  the murer of james bulger.2016Session 4  the murer of james bulger.2016
Session 4 the murer of james bulger.2016
 
Session 3 1 lllc 2222 official statistics.2016
Session 3 1 lllc 2222 official statistics.2016Session 3 1 lllc 2222 official statistics.2016
Session 3 1 lllc 2222 official statistics.2016
 
Session 2 1 lllc 2222 defining social construction 2016
Session 2 1 lllc 2222 defining social construction 2016Session 2 1 lllc 2222 defining social construction 2016
Session 2 1 lllc 2222 defining social construction 2016
 
Session 1 lllc 2222 2016
Session 1 lllc 2222 2016Session 1 lllc 2222 2016
Session 1 lllc 2222 2016
 
Parenting capacity to change
Parenting capacity to changeParenting capacity to change
Parenting capacity to change
 
Significant harm
Significant harmSignificant harm
Significant harm
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Working with families & privacy

  • 2. Learning Objectives 1. Contrast family privacy policy with promoting welfare policy including the ‘ten principles of’ and S.17 of The Children Act 1989. 2. Introduction to The Human Rights Act 1998, in particular Article 8; Right to Family Life. 3. Introduction to Data Protection Act 2000. 4. Debate the concept of ‘confidentiality’ and record keeping.
  • 3. Last Time • We explored ‘parenting’. In doing so we used what might be called a ‘bottom up’ approach: We based our presentations of the research that we read. • In this session we shall use an alternative method a ‘top down’ approach: We will come up with some ideas before we undertake the research.
  • 4. In your groups • Spend 10 minutes discussing why those who work with children and families must be mindful of ‘freedom’ and ‘privacy’. • Can you have ‘freedom’ without ‘privacy’; can you have ‘privacy’ without ‘freedom’? • Make a list of your reasons. (You will need this list later)
  • 5. Entick v Carrington [1765] A leading case in English law establishing the civil liberties of individuals and limiting the scope that the ‘state’ can interfere in ‘private life’
  • 6. The Details • In 1762, the King's Chief Messenger Nathan Carrington, and three other King's messengers, went into the home of writer, John Entick "with force and arms" and seized Entick's private papers. Entick was arrested. The King's messengers were acting on the orders of Lord Halifax "to make strict and diligent search for . . . the author, or one concerned in the writing of several weekly very seditious papers”. Entick sought judgment against Carrington and his colleagues who argued that they had acted upon Halifax's warrant. A jury returned a special verdict finding that the defendants had broken into Entick's home "with force and arms”.
  • 7. Perhaps summarised by: An Englishman’s home is his…
  • 8. However, As English law has proceeded in a ‘liberal’ tradition protecting an individual’s right to freely make business contracts and hold property, some individuals in society have not had the same equal rights before the law, significantly because they did not hold property.
  • 9. Did you know: • There has been a long tradition in England that only very wealthy males had the right to vote. • The situation was ‘improved’ by the Reform Act 1832 giving 1 in 7adult land owning males the right to vote. • This increased to all men aged over 21 and wealthy women in 1918. • Both men and women aged over 21 could vote by 1929. • The voting age was reduced to 18 in 1969.
  • 10. Do you think that we take our ‘rights’ and ‘freedoms’ for granted…?
  • 11. At around the same time, over the last 150 years E-X-P-A-N-S-I-O-N Of The Welfare State Report on Social Insurance and Allied Services (1942) : The Beveridge Report.
  • 12. The ‘state’ needs to do more to help people! The ‘state’ interferes with our freedoms and privacy! Where do you stand?
  • 13. • Over the years, one can see how each side of the state debate has gotten in front but then slipped behind again. • This can usually be seen in the balloon like expansion of the services followed by contraction (cuts) in services. • However, in general there has been an increase in legislation, policy and powers relating to state intervention into family/private life.
  • 14. The Children Act 1989 Read excerpt 1: The 10 Principles of the Act. Discuss and write of the pack whether you think the principle ‘protects’ privacy or ‘invades’ privacy?
  • 15. What about s.17 The Children Act 1989 duty It shall be the general of every Local Authority to safeguard and promote the welfare of children within their area need who are in ; and so far as is reasonably consistent with that duty, to promote the upbringing of such children by their families, by providing a range and level of services appropriate to those children’s needs.
  • 16. Read Excerpt 2: The Daily Mail, 2013, “Social Workers to Meddle in Every Family Home”[what do you think?]
  • 17. The Human Rights Act 1998 Read Excerpt 3: Making Sense of Human Rights. What are 1. Absolute Rights 2. Limited Rights 3. Qualified Rights? What is Article 8 about? What is a ‘public authority’?
  • 18. Confidentiality Read the Stephen King quotation on the front of today’s pack: What do you think it means? “No one likes to see a government folder with his name on it.”
  • 19. Confidentiality • Read excerpt 4 – Information sharing, confidentiality and consent. • List the seven golden rules for information sharing? (try to summarise each one into five words).
  • 20. Consent to information sharing • What is consent? • Why is consent important? • Can children give consent
  • 21. For next time: Read Excerpt 5: Thompson (2009), Written Communication 1. Why is written information important? 2. Why is ‘working from memory’ difficult? 3. How do written records make us accountable? 4. What does Thompson write about ‘relevance’? 5. What does Thompson write about ‘fact and opinion’?
  • 22. Summary 1. 2. 3. 4. Contrast family privacy policy with promoting welfare policy including the ‘ten principles of’ and S.17 of The Children Act 1989. Introduction to The Human Rights Act 1998, in particular Article 8; Right to Family Life. Introduction to Data Protection Act 2000. Debate the concept of ‘confidentiality’ and record keeping.
  • 23. Final thought When I worked as a Social Worker the head of children’s services said to me, “If it isn’t written down recorded – then it never happened”. What do you think this means? (Do you agree?)