Pages
Belper’s new health centre – latest updates and project plans
https://dchs.nhs.uk/our-services-and-locations/our-locations/clinics-health-centres/belper-clinic
Logging compliments – new system
https://dchs.nhs.uk/my_dchs/show-me/staff-news-my-download/logging-compliments-new-system
NHS Board signs up to Smokefree Derby and Derbyshire pledge
https://dchs.nhs.uk/news/nhs-board-signs-smokefree-derby-and-derbyshire-pledge
Come and discover how research can benefit your Derbyshire community!
https://dchs.nhs.uk/news/come-and-discover-how-research-can-benefit-your-derbyshire-community
Files
HR23 Formal Notification of Return Date from Adoption Leave.doc
Lets not get stuck on it - email signature
Preventing facial skin damage beneath PPE_v3 - DCHS_1.pdf
Trust Induction - role requirements training matrix
An overview of the clinical Trust Induction requirements for individual roles
Disclosure Ref 2022103 - Interpretation services provided & cost.pdf
FOI Disclosure
SOP for DCHS Foot Dressing Clinic (S149)
The DCHS Foot Dressing Clinic Standard Operating Procedure has been developed to support the administration of the clinics and the staff to facilitate equitable, safe, and effective management of all patients coming into this service.
E-Rostering, Leave Approval, and Safe Staffing Levels Document history SOP (S154)
This SOP outlines the procedures for effective electronic rostering (e-rostering), leave approval, and ensuring compliance with safe staffing levels across the integrated sexual health service. It ensures that staffing levels are maintained to deliver safe, high-quality care while balancing fair and consistent access to leave for staff. This SOP applies to all staff working within the department including permanent, temporary, bank and agency staff.
Pain Definitions and Relationship between Pain and Damage Slides for Week 2 (Session 1) PMP
Information Management and Technology Security Policy.docx
Information Management and Technology (IM&T) policies and procedures are required to ensure that all staff understand their roles and responsibilities in protecting information and information systems from unauthorised use and access.The aim of this policy is to establish and maintain the security and confidentiality of information, information systems, applications and networks owned or held by the Trust.