SlideShare a Scribd company logo
1 of 39
Download to read offline
Page 0 of 39
Introduction to
Information Governance
Mandatory Training
Page 1 of 39
Contents Page
Page
Introduction to Information Governance 2
Types of information 3
Information Governance Standards 4
The Information Governance Toolkit 5
Confidentiality- Topic 1………………………………..5
Confidentiality Scenario 1 6
Confidentiality, Duty of confidence. 7
Consent, Legal requirements 7
The Caldicott Guardian……………………………..8
Caldicott Principles 9
Providing a Confidential Service 10
Data Protection- Topic 2 11
Data protection and the law 11
Data Protection Scenario 1 11
Data protection principles 12
The principles explained 13,14
Data Protection Scenario 2&3 15
Data Protection Scenario 4&5 16
Data Protection Scenario 6 17
Data Protection Scenario 7&8 18
Data Protection Scenario 9 19
Freedom of Information - Topic 3 20
Exemptions, Spotting a request 20
What you need to know about FOI 21&22
FOI Case study 1 23&24
FOI Case study 2 24&25
Page
Good Record Keeping - Topic4 26
History, Tracking, Timeliness 26
Duplicates 26
Recording Quality Information 27
Locating records 28
What’s the best approach 29
Information Security- Topic 5 30
What is information security 30&31
Hints and Tips 32,33,34
Portable media, passwords, use of IT 32
Use of Email, audit reports 33
Software/ Unlicensed software 34&35
Summary of Information Governance 35&36
Recap on topics 36
Relevant legislation 37
Assessment 38
Instructions 38
Question sheet 39 onwards
Page 2 of 39
Viewpoints:
Keeping information secure
Keeping information secure in our
organisations is a hot topic. Sometimes
it can be very simple actions which keep
information secure and confidential.
Introduction to Information
Governance
Put simply, Information Governance is to do with the
rules that should be followed when we process
information. It allows organisations and individuals to
ensure information is processed legally, securely,
efficiently and effectively.
IG applies to all the types of information which your
Organisation may process, but the rules may differ
according to the type of information concerned.
In this module you’ll look at how you can make sure you
follow the right processes and procedures when you
process information – in other words, how to practice
good Information Governance (IG).
You’ll find out about:
· how to avoid breaching confidentiality law and
guidelines
· how to comply with data protection and
freedom of information legislation
· what support you have - the IG Toolkit
· good record keeping
· effective information security.
All of the above topics will give you good knowledge and
skills to provide an effective, confidential and secure
healthcare service. You will also find out about the IG
Toolkit and how your contribution to IG best practice in
your organisation is very important.
Headline News
In December 2007 it was
widely reported in the
national press that nine NHS
trusts had misplaced
thousands of patient and staff
records.
This was the latest in a series
of data security incidents
affecting organisations
ranging from HH revenues and
Customs to the DVLA
Richard Vautrey deputy
chairman of the British
Medical Association’s
committee of GP’s, told the
BBC that:
"Patients need to be
absolutely confident that the
information that is held
securely cannot be lost in
some haphazard way as
appears to be the case.”
In such a sensitive climate,
good Information Governance
(IG) is very important and
impacts on all of our jobs.
In this introductory level
module you will look at the
principles and procedures, in
short ‘the rules’ that can help
Page 3 of 39
Types of Information
There are different types of data, listed below. What type of information do you think details of a
patient's mental health condition in their medical file would be classed as?
Personal
Information – e.g.
medical records,
staff records
Information about individuals is personal information when it enables
an individual to be identified or non-personal when it doesn’t. This
isn’t always straightforward to establish but it is an important
distinction in law. For example, a person’s name and address are
clearly personal information when presented together, but an unusual
surname may itself enable someone to be identified.
Personal information may be held subject to obligations of
confidentiality and may be legally sensitive as defined by the Data
Protection Act 1998.
Personal information is classed as confidential if it was provided in
circumstances where an individual could reasonably expect that it
would be held in confidence, e.g. the doctor/patient relationship.
Confidentiality is generally accepted to extend after death.
Personal information may be classed as legally sensitive when it
makes reference to particular matters, such as health, ethnicity or
sexual life that are listed in the Data Protection Act. Other details, for
example an individual’s bank account details would also be regarded
as sensitive by most people but are not legally sensitive. A further
limit on the Data Protection Act is that it only applies to personal
information about living individuals.
Correct
answer
Person-based but
anonymous
information – e.g.
public health
statistical
information that
does not identify
an individual
Person-based anonymised information does not identify an individual
directly and cannot be reasonably used to determine identity. The
mental health conditions in this case would not be classed as person-
based anonymised information as they are clearly linked with the
individual's name and address etc.
It is important to be aware that person-based but anonymised
information is not subject to the same restrictions on processing as
personal information. This is because no-one can be harmed or
reasonably distressed by its disclosure. Neither confidentiality law nor
the Data Protection Act applies to person-based information that has
been effectively anonymised. This means that taking steps to
anonymise information is often very important as it enables
information to be processed without having to satisfy strict legal
requirements.
Not
correct
Corporate data –
e.g. Trust accounts
or statistical
reports
The mental health conditions in this case would not be classed as
corporate data.
Documents or information that are not about individuals are clearly
not personal information but may be classed as commercially
confidential e.g. for commercial reasons or because they contain legal
advice. They may also be regarded as sensitive in a general sense
because of the subject matter. An important consideration in relation
to documents is whether or not they have to be disclosed when a
Freedom of Information Act request is made and where they are
confidential or sensitive they may be exempt from disclosure.
Not
correct
Page 4 of 39
Information Governance Standards
You’ll look at Information Governance standards in more detail later in this module, but at this
stage it is worth noting that they are derived from the following:
The Confidentiality
NHS Code of Practice
and the NHS Care
Record Guarantee for
England
The Code tells you how to comply with the common law duty of
confidentiality.
The Guarantee tells patients how the NHS will use and protect the
information in their health records.
You will learn more about confidentiality in topic 1.
The Data Protection
Act 1998
The Act sets rules for how personal data is obtained, held, used or
disclosed.
You will learn more about the Data Protection Act in topic 2.
The Freedom of
Information Act 2000
The Act sets rules for disclosure of information about the work carried
out by a public sector organisation.
You will learn more about the Freedom of Information (FOI) Act in topic 3.
The Records
Management NHS
Code of Practice
The Code includes guidelines about how records, including health
records, should be used and disposed of.
You will learn more about how records management applies to your role
in topic 4.
The Information
Security NHS Code of
Practice
The Code sets out, at a high level, how organisations should comply with
information security principles. You will learn more about how you can
keep information secure in topic 5.
Page 5 of 39
The Information Governance Toolkit
To help improve Information Governance across the NHS in England, the Department of Health
determined a set of key standards. These are now mandatory for NHS organisations to carry out as
an annual self-assessment.
Annual reports
The annual reports are monitored and approved through the
Information Governance Toolkit, hosted and managed by the NHS
Connecting for Health (CFH) Information Governance Policy Team.
Who can view performance?
NHS CFH then send the results to the Healthcare Commission to
contribute to the Annual Health Check returns, for reference and
potential audit and to the National Information Governance Board, the body responsible for
driving improvements in information governance across health and adult social care.
The Information Governance Toolkit standards and approved organisation reports can be found on
the public-facing website www.igt.connectingforhealth.nhs.uk.
Who is involved?
There is a lead in your organisation who is responsible for carrying out this annual assessment and
collating evidence. In order to help your organisation perform better it is necessary for all staff to
be involved. Do your part in complying with Information Governance standards and best practice
guidelines, and follow your organisation's policies.
The assessment involves the contribution of the whole organisation, including you. Keep informed
about your organisation's Information Governance agenda and find out who your Information
Governance Lead is.
At this stage you will begin to see how Information Governance is a cultural agenda, which is every
employee’s responsibility.
Your responsibilities
Information Governance (IG) helps to ensure that all staff know their responsibilities and comply
with the law and best practice when processing information.
You’ll look at your responsibilities in some detail throughout this module, but in summary they
include:
· providing a confidential service to patients, sharing information lawfully and appropriately
· processing information in accordance with the ‘data protection rules’ and respecting the
rights of individuals
· complying with Freedom of Information requirements
· recording information accurately and ensuring it is accessible when needed
· ensuring that information is held securely.
Information Governance sets common guidelines that help NHS staff know they are working to the
same standards as people outside their own area.
Page 6 of 39
Viewpoints:
Maintaining patient confidentiality
The duty to maintain confidentiality is part
of the duty of care to the patient. It is also
integral to the contract of employment
and regulatory professional codes of
conduct. The breaches could lead to a
disciplinary procedure or even dismissal
Confidentiality- Topic 1
Confidentiality Scenario 1
It’s late one Friday afternoon in a county hospital. A celebrity is rushed into surgery for the
emergency removal of his appendix.
Best practice?
The Hospital carries out an internal investigation to identify the staff member that disclosed the
information, as well as the staff who viewed the record. If they were not directly involved with
the patient's care, what actions were the staff members not justified in doing?
Option 1: Viewing the patient’s
healthcare record
Option 2: Sharing information
relating to the patient’s upcoming
surgery
Option 3: Disclosing information
relating to the patient’s past
healthcare history
The employees had no justified
purpose for carrying out any of these
actions.
Page 7 of 39
Viewpoints:
Sensitive information and exemptions to
consent
Sensitive information is a category of personal
information that is usually held in confidence and
whose loss, misdirection or loss of integrity could
impact adversely on individuals, the organisation
or on the wider community..
Confidentiality
To help prevent the kind of breaches in confidentiality seen in this scenario, there are certain
procedures to follow.
Duty of confidence
A duty of confidence arises when
sensitive information is obtained
and/or recorded in circumstances
where it is reasonable for the subject
of the information to expect that the
information will be held in confidence.
Patients provide sensitive information
relating to their health and other
matters as part of their seeking
treatment and they have a right to
expect that we will respect their
privacy and act appropriately. The duty
can equally arise with some staff records, e.g. occupational health, financial matters, etc.
Patients have a right to be informed about how we will use their information for healthcare, the
choices they have about restricting the use of their information and whether exercising this
choice will impact on the services offered to them.
Explicit consent
Where it is proposed that patient information is disclosed outside of the organisation for
purposes other than healthcare, in most cases it is necessary to ensure that the patient has
explicitly consented to this happening. There are limited exceptions to this general rule.
Legal requirement
Always remember confidentiality is a legal
requirement, supported by the confidentiality
clause in your contract and, where applicable,
your professional code of conduct. Your
organisation is required to:
· inform patients about how
personal information
relating to them will be
used
· inform patients of their
right to object to the
disclosure of their
confidential personal
information outside of the
organisation
· seek explicit consent before
disclosing patient personal
information for non-healthcare
purposes (unless rarely an
exception applies).
Page 8 of 39
Certain types of information are classed as sensitive under the Data Protection Act 1998, but the
definition for NHS Information Governance purposes is wider than, and fully encompasses,
legally sensitive information. Personal information becomes sensitive if it includes any of the
following types of information:
· health records or information relating to physical or mental health
· sexual life, sexual orientation or gender realignment
· social care records, child protection or housing assessments
· racial or ethnic origin
· political opinions or trade union membership
· religious beliefs
· DNA or fingerprints
· bank, financial or credit card details
· National Insurance number or tax, benefit or pension records
· travel details (for example at immigration control, or Oyster records
· passport number / information on immigration status or travel records
· work record or place of work, school attendance or records
· conviction, prison or court records, evidence or commission of offences or alleged
offences.
This is not meant to be an exhaustive list, but it does provide an indication of the wide range of
information that needs to be processed with particular care. Note also that whilst the Data
Protection Act only applies to personal information relating to living individuals, NHS
Information Governance also encompasses information about deceased individuals.
The exceptions to the requirement for consent are rare and limited to legal requirements to
disclose information, e.g. by Acts of Parliament or court orders; disclosures permitted by
regulations made under section 251 of the NHS Act 2006 (previously known as section 60 of the
Health and Social Care Act 2001), or where there is a public interest justification for breaching
confidentiality such as a serious crime, e.g. murder, rape or child abuse.”
The Caldicott Guardian
To help maintain levels of confidentiality throughout the NHS, a report was commissioned in
1997 by the Chief Medical Officer.
One of the key outcomes of this
report was that Caldicott Guardians
were appointed in each NHS Trust,
in order to safeguard access to
patient-identifiable information.
Our Caldicott Guardian
Is the Medical Director who
is a member of the Board
Page 9 of 39
The Caldicott Guardian is normally at Board or Senior Management level as they are responsible
for reviewing, overseeing and agreeing policies governing the protection of patient or personal
information.
The Caldicott Guardian also takes responsibility for overseeing organisational compliance with
the Caldicott Management Principles.
Caldicott Principles
A key recommendation of the Caldicott report was that staff justify every use of confidential
information and routinely test it against six principles. Never disclose confidential information if
you are unsure about your response to any of these six questions.
Do you have a justified
purpose for using this
confidential information?
The purpose for using confidential information should be
justified, which means making sure there is a valid reason for
using it to carry out that particular purpose.
Are you using it because it
is absolutely necessary to
do so?
The use of confidential information must be absolutely necessary
to carry out the stated purpose.
Are you using the
minimum information
required?
If it is necessary to use confidential information, it should include
only the minimum that’s needed to carry out the purpose.
Are you allowing access to
this information on a strict
need-to-know basis only?
Before confidential information is accessed, a quick assessment
should be made to determine whether it is actually needed for the
stated purpose.
If the intention is to share the information, it should only be
shared with those who need it to carry out their role.
Do you understand your
responsibility and duty to
the subject with regards to
keeping their information
secure and confidential?
Everyone should understand their responsibility for protecting
information, which generally requires that training and
awareness sessions are put in place.
If the intention is to share the information, those people must
also be made aware of their own responsibility for protecting
information and they must be informed of the restrictions on
further sharing.
Do you understand the law
and are you complying
with the law before
handling the confidential
information
There are a range of legal obligations to consider when using
confidential information. The key ones that must be complied
with by law are provided by the common law duty of
confidentiality and under the Data Protection Act 1998.
If you have a query around the disclosure of medical or other
confidential personal information you should go to your Line
Manager initially then the IG Manager if you are still not sure. For
serious and complex issues your Manager should contact the
Caldicott Guardian for advice and guidance.
Page 10 of 39
Viewpoints:
At the end of the day the focus of
confidentiality is consent. Personal information
shared in confidence should not be used or
disclosed further without the consent of the
individual.
Exceptions to the requirement for consent are
rare and limited to legal requirements to
disclose information
Providing a Confidential Service
As well as the Caldicott Guidelines, you can also refer to the Confidentiality NHS Code of Practice
model known as ‘Protect, Inform, Provide Choice and Improve’ to help maintain a confidential
service within your organisation.
You should protect a person’s information by recording relevant data accurately, consistently and
keeping it secure and confidential.
· Write patient records appropriately – free of jargon or offensive, subjective or opinionated
statements.
· Inform a patient how their information is used and when it may be disclosed.
· Where practical, provide patients with information leaflets about the organisation's
confidentiality vows, or posters informing patients what the organisation does with patient
information and why.
· Also, inform patients of their right to access their health records.
· Provide choice for patients to decide whether their information can be disclosed.
· Patients have the right to object to information they provide in confidence being disclosed
to a third party in a form that identifies them.
· As long as the patient is competent to
make such a choice and where the
consequences of the choice
have been fully explained,
their decision should be
respected.
· Always look to improve
the way you and the
organisation protect,
inform and provide
choice to the patient,
clients and
employees. You can
do this by attending
regular update
training, seeking line
manager support and by
reporting possible
breaches.
.
Page 11 of 39
Data Protection- Topic 2
Data protection issues can crop up in any organisation. Breaches often occur because staff are
unaware of data protection principles, which are contained in the Data Protection Act 1998.
In this topic you are going to look at a series of data protection issues that may occur
Data protection and the law
The Data Protection Act 1998 applies to all organisations in the UK that process personal
information.
· The Act goes hand-in-hand with the common law duty of confidence and professional and
local confidentiality codes of practice to provide individuals with a statutory route to
monitor the use of their personal information.
· A breach of one of the eight Data Protection Principles can result in legal action being taken
against an individual and/or the organisation. Learning the Principles of the Data Protection
Act is therefore very important.
· There are additional offences under section 55 of the Act of unlawfully obtaining, disclosing
or selling personal data. You will explore the Principles and the effects of section 55 in more
detail later in this topic.
Data Protection Scenario 1
Take a look at the list below. Which do you think are not real data protection principles?
Option 1: 1. Processed Fairly and Lawfully
Option 2: 2. Processed for a Specified Purpose
Option 3: 3. Adequate, relevant and not excessive
Option 4: 4. Processed under supervision
Option 5: 5. Permanently kept on record for future reference
The correct answer is Principles 4 and 5.
Page 12 of 39
Data protection principles
There are eight principles that must be followed when handling personal information.
Processed
fairly and
lawfully
Ensure that the proposed use of the information is lawful in the widest sense, e.g.
doesn't breach other legal restrictions such as the common law duty of
confidentiality.
· Inform patients why you are collecting their information, what you are
going to do with it, and who you may share it with.
· Information recorded as part of the process of providing care should not be
used for purposes that are unrelated to that care.
· There should be no surprises! Be open, honest and clear.
· The same principle applies to the personal information of staff.
Processed for
a specified
purpose
Only use personal information for the purpose for which it was obtained. Only share
information outside your organisation, team, ward, department, or service if you are
certain it is appropriate and necessary to do so. If in doubt, check first!
Adequate,
relevant and
not excessive
Only collect and keep the information you need. Do not collect information “just in
case it might be useful one day!" You cannot hold information unless you know
how it will be used and it is a justified use. Explain all abbreviations, use clear
legible writing and stick to the facts – avoiding personal opinions and comments.
Accurate and
kept up-to-
date
Take care when entering data to make sure it is correct. Make sure you check with
patients that the information is accurate and up-to-date. Check existing records
thoroughly before creating new records and avoid creating duplicate records
Not kept for
longer than
necessary
Follow retention guidelines set out by the Records Management NHS Code of
Practice and your organisation’s retention policy. Make sure your information gets
a regular "spring clean" so that it is not kept “just in case it might be useful one
day!” Dispose of information correctly, according to your organisation's disposal
policy.
Processed in
accordance
with rights of
data subject
Individuals, whether staff or patients, have several rights under the Act. In summary
individuals have:
· the right of access to personal data held about them
· the right to prevent processing likely to cause damage or distress
· the right to have inaccurate data about them corrected, blocked or erased
· the right to prevent processing of information about themselves for purposes
of direct marketing
· rights in relation to automated decision-taking.
· The rights are not absolute, that means there may be occasions where the
organisation is permitted to override them.
· Later in this module you will explore the rights in more detail
Protected by
appropriate
security
This requires that all organisations that process personal information have security
measures in place to ensure that the information is protected from accidental or
deliberate loss, damage or destruction.
Your organisation will have a security policy and processes to ensure the security of
personal information. They will also have guidelines for staff about how to ensure
Page 13 of 39
personal information is protected from unauthorised access.
You must make sure you comply with all the security processes and guidelines so
that access to personal information is only available to those authorised to do so,
and information is not accidentally or deliberately lost, damaged or destroyed.
Some of the measures you should comply with are:
· only send confidential faxes using safe haven or secure faxes
· ensure confidential conversations cannot be overheard
· keep your passwords secret
· lock paper files away when they are not in use
· transport personal information by secure methods.
You’ll learn more on keeping information secure in the Information Security topic of
this module.
Not
transferred
outside the
EEA without
adequate
protection
If sending personal information outside the European Economic Area (EEA), make
sure consent is obtained where required and ensure the information is adequately
protected. Be careful about putting personal information on websites, which can be
accessed from anywhere in the world - get consent first. Check where your
information is going, and know where your suppliers are based.
The principles explained
As you have just seen, Principle 1 of the Data Protection Act requires
that personal data is processed fairly and lawfully. It also requires
that personal data is only processed if one of the conditions in the
Act is also met.
Processing conditions
There are several of these “processing conditions”, but the main ones that you need to be aware of
when providing care and treatment are processing:
· for medical purposes
· where the patient has given their explicit consent
· to protect the vital interests of the patient or another person.
Processing for medical purposes
This means that sensitive personal data can be processed for the purposes of preventative medicine,
medical diagnosis, the provision of care and treatment and the management of healthcare services.
Explicit consent
If you wish to process patient information for purposes other than healthcare, in most cases you
must have the explicit consent of the patient to do so.
Vital interests
In exceptional circumstances, e.g. life or death situations, processing of sensitive information for
non-healthcare purposes without consent is permitted.
Page 14 of 39
Earlier, you saw a summary of individual’s rights under Section 7 of
the Data Protection Act. Now you’ll look at the rights that may be
most relevant to your organisation.
Subject access requests
Generally, individuals have the right to see information about
them held by an organisation that is processing their personal
data. Applications, which are known as “subject access requests”
must be in writing and the individual should provide the organisation with sufficient information to
enable their records to be correctly identified. The request must be complied with within 40 days of
receipt but wherever possible information should be provided within 21 days.
Therefore, if you receive a request for information, you should promptly forward it to the person in
your organisation that has responsibility for subject access requests. Make sure you know who has
this responsibility in your organisation.
If you are the nominated person, you should ensure that staff members are aware that subject
access requests should be forwarded to you promptly.
If you require further advice about handling subject access requests, your IG Lead should be able to
help you.
You’ll explore a scenario about complying with a subject access request later in this topic.
The right to prevent processing likely to cause damage or distress.
The individual is entitled to send a written notice to an organisation requesting that processing of
their data stop, or does not begin. The individual must be able to show that he/she has suffered or
would suffer substantial and unwarranted damage or distress if the processing goes ahead.
The organisation doesn’t have to comply where the organisation believes the processing is so
important it must go ahead even though it causes damage or distress.
Rectification, blocking, erasure and destruction
An individual who believes that an organisation has recorded inaccurate personal information about
them is entitled to apply to the court to have the information corrected or removed.
This right applies to factual information only, not to opinions or a diagnosis that the patient
disagrees with or which turns out to be wrong.
Rights in relation to automated processing
The individual can ask for your organisation to ensure that no decision which is taken by or on behalf
of the organisation and significantly affects the individual, is based solely on information processed
by automatic means.
Page 15 of 39
Data Protection Scenario 2
Now it's time to see what can happen when these principles are ignored... Mr Jones answers his
mobile phone one Tuesday morning to a call from the local hospital.
By informing Mr. Jones of his ex-wife’s condition, the receptionist unlawfully breached Mrs. Jones’
confidentiality.
Also, the records being used here were obviously very out-of-date. If the patient had been asked
whether her contact details were still correct when she came in for previous appointments, this
mistake wouldn't have happened.
Data Protection Scenario 3
Mrs. Foster has written asking for a copy of all her health records held by the local general hospital.
The Data Protection Lead opens the letter and puts it on top of his to-do pile. Later the pile is
accidentally knocked over and the letter slips behind the desk.
After two months Mrs. Foster contacts the
hospital to ask what is happening with her
request. She is put through to the Data
Protection Lead’s extension, and hears a
voicemail that the Lead is on holiday. The
call is put back through to switchboard and
Mrs. Foster enquires whether there is
anyone else that can help her.
Unfortunately, the switchboard operator
has never heard of Information Governance
so is unaware that there is anyone else she
can refer Mrs. Foster to.
She puts the call through to Trust
Headquarters and one of the staff there
takes Mrs. Foster’s details and promise to
get back to her. No-one does. Seven days pass and Mrs. Foster has still not been contacted, so she
decides to ring the Information Commissioner to complain.
Principle 6 requires compliance with the individual rights set out in section 7 of the Act. One of these
rights is the right to subject access, which means that individuals have the right, with some limited
Page 16 of 39
exceptions, to see information held by organisations that are processing their personal data.
Organisations are required to comply with the request within set time limits. You looked at some of
the individual rights earlier in this topic.
Data Protection Scenario 4
Sharon, a health records assistant, has to check 100 health records at random to make sure they
have the correct NHS number.
Which one of these data protection principles might have been breached in this scenario?
Data Protection Scenario 5
Miss Ford has requested to look at her health records held by the local general hospital.
The hospital arrange for her to visit and go through the records with a
health professional on hand to explain any abbreviations or complex
medical issues. Whilst reading one of the entries written many years ago,
Miss Ford points out a strange abbreviation, “What does NLL stand for?”
The health professional responds, “Hmm, I think it means “Nice Looking
Legs!”
Which of the following data protection principles is being breached in this scenario?
Option 1: Principle 1: Processed fairly and lawfully
Option 2: Principle 3: Adequate, relevant and not excessive
Option 3: Principle 5: Not kept for longer than necessary
Option 4: Principle 7: Protected by appropriate security
Option 5: Principle 8: Not transferred outside the EEA without adequate protection
By leaving the health records unprotected and unprocessed Sharon has allowed a situation
to arise where patient confidentiality could be breached. Fortunately, this was not the case
here. Sharon has also breached Principle 7 of the Act by not ensuring that access to the
health records was protected, either by locking the door or taking the records back to the
correct storage area
Option 1: Principle 1: Processed fairly and lawfully
Option 2: Principle 3: Adequate, relevant and not excessive
Option 3: Principle 4: Accurate and kept up to date
Option 4: Principle 6: Processed in accordance with rights of data subject
Option 5: Principle 7: Protected by appropriate security
Page 17 of 39
Data Protection Scenario 6
Option 6: Principle 8: Not transferred outside the EEA without adequate protection
The inclusion of inappropriate and irrelevant detail within records breaches the 3rd principle
and in this case could be considered offensive.
Option 1: Principle 1: Processed fairly and lawfully
Option 2: Principle 2: Processed for a specified purpose.
Option 3: Principle 4: Accurate and kept up to date
Option 4: Principle 5: Not kept for longer than necessary
Option 5: Principle 7: Protected by appropriate security
Option 6: Principle 8: Not transferred outside the EEA without adequate protection
Principle 1 requires that personal data is processed fairly; this means that individuals should
be informed of the purposes for which their data will be processed and who it may be
disclosed to. This is normally done by use of fair processing notices setting out the list of
purposes and other information regarding who may have access to the information.
Information about staff home addresses is generally provided for Human Resources, payroll
and emergency purposes; not for being contacted by the Communications team. It would be
far better to distribute the information through internal systems, perhaps accompanying pay
slips.
Principle 2 requires that information provided for one or more specific purpose should not be
used in a way incompatible with those purposes.
New decisions about how data will be processed cannot be made by the data controller after
the information has already been obtained.
Additionally, some contracts may have clauses that enable staff to opt in or out of receiving
such mail shots from the Communications team.
Page 18 of 39
Data Protection Scenario 7
A company that specialises in data transcription has contacted the Trust.
The company is based outside of the European Economic Area (EEA) and
is offering a cost-effective transcription service. This seems a great
opportunity and the Trust decides to trial the service offered. It sends a
set of dictation tapes through a secure courier to the overseas address
provided.
In accordance with the trial the company transcribes the information,
puts it on an encrypted DVD and returns it to the Trust. Shortly afterwards two patients contact the
Trust to complain that they have been contacted by a drugs company offering them condition-
specific medicines.
Which of the eight data protection principles is being breached in this scenario?
Data Protection Scenario 8: Retaining records
Meg is a new ward clerk at the general hospital. She has been asked to check the storage room and
dispose of any old patient admission books.
Which of the eight data protection principles is being breached in this scenario?
Option 1: Principle 1: Processed fairly and lawfully
Option 2: Principle 2: Processed for a specified purpose.
Option 3: Principle 3: Adequate, relevant and not excessive
Option 4: Principle 4. Accurate and kept up-to-date
Option 5: Principle 5: Not kept for longer than necessary
Option 6: Principle 8: Not transferred outside the EEA without adequate protection
The Trust failed to ensure that there was an adequate level of protection for the personal
information and failed to safeguard the rights of the patients concerned.
In the case of person-identifiable data, regard should be paid to the guidelines issued by the
Department of Health. These require that such information is NOT transferred outside the UK
unless appropriate assessment of risk has been undertaken and mitigating controls put in
place.
Patients should also be made aware of this activity and form of processing via patient
information materials.
Option 1: Principle 1: Processed fairly and lawfully
Page 19 of 39
Data Protection Scenario 9: Information for sale
James is an administrations clerk at the local general hospital, currently involved in patient
registrations. One morning on his way to work he is approached by a man claiming to be a private
detective hired to locate the beneficiary of a will
Would James have breached the Data Protection Act by providing this information?
Option 2: Principle 4: Accurate & kept up-to-date
Option 3: Principle 5: Not kept for longer than necessary
Option 4: Principle 6: Processed in accordance with rights of data subject.
Option 5: Principle 7: Protected by appropriate security
Option 6: Principle 8: Not transferred outside the EEA without adequate protection
To comply with Principle 5 data controllers should regularly review the personal data they hold
in line with record retention standards and delete information that is no longer required for
the purposes for which it was obtained.
In this case, the personal data was obtained for the purpose of recording a patient admission
to a particular ward over 12 years ago. The information was retained to provide a record of
which patients were also on the ward at the same time. However, it is unlikely that this
information is still required and it should have been disposed of some time ago.
Disposal does not necessarily mean destruction and care should always be taken to do things
right when destruction is required. More information on record retention and disposal is
provided in the Records Management NHS Code of Practice.
Option 1: No, the woman would want to know that she had been left something in the will
Option 2: It depends whether he accepts the £100.
Option 3: No, James would have only provided the woman’s address, this isn’t personal data.
Option 4: Yes, James would have unlawfully disclosed personal data
The address is personal data because it relates to a living individual who can be identified
either solely with that data or with other information already available. The detective already
has the woman’s name and if James had supplied the address this would enable accurate
identification.
The disclosure would be a criminal offence under section 55 of the Act. James had not been
given authority by the Trust to supply this information It makes no difference whether or not
he accepts any money for the information. James could have easily referred the matter to his
IG Lead, who if necessary can contact the woman and ask whether she wants this information
given to the detective.
Page 20 of 39
Freedom of Information- Topic 3
If you received a letter from a patient requesting a detailed breakdown of your organisation's
expenditure for the year, would you know what to do?
The Freedom of Information (FOI) Act 2000 requires
disclosure of information by public authorities, such as NHS
Trusts, County Councils and Government departments.
Exemptions
There are several exemptions within the Act, which are circumstances where you will not have to
provide the requested information.
The exemptions you may need to know about are where:
· the applicant could easily obtain the requested information from elsewhere
· the organisation already has published or has firm plans to publish the information
Or where the information:
· relates to confidential business information
· is personal information about the applicant
· is personal information about someone other than the applicant and disclosure of it would
breach either the Principles or section 10 of the Data Protection Act 1998, e.g. it is
confidential to a third party.
Unless an exemption applies, information must be supplied if a request is received.
Spotting a request
The FOI Act allows anyone to write to any public authority to ask for information to be provided to
them. Which of the letters displayed do you think is an FOI request for information, A or B?
The FOI Act only applies to requests
for information that do not fall into
one of the exemptions as in letter A.
The request in letter B is for personal
information about the applicant,
therefore it should be considered
under the Data Protection Act 1998.
We will learn more about the actions
that need to be taken when an FOI
request comes through to your
organisation, and what your
responsibility is later on in this topic.
Page 21 of 39
What you need to know about FOI
First of all, take a look at the basic principles behind FOI:
Types of information
The FOI Act gives the public the
right to request any information
held by any type of public authority
or by persons/organisations
providing services for them.
This includes educational
institutions, NHS Trusts and
contractors, Local Authorities etc.
The public can request information
held within things like minutes of
meetings, work emails, work
diaries, corporate reports and
other work documents. Exemptions
may apply for certain information,
which therefore would not be
disclosed.
Form of request
Requests for information must be made in writing but there is no need for the applicant to mention
the FOI Act.
If a patient or member of the public asks you for information that you think is covered by the FOI
Act, you should ask them to put their request in writing or assist them to do so.
An applicant need not provide their true name in the request, but there must be a valid address for
correspondence, which can be a postal address or an email.
Processing requests
If you receive a request for information, you should promptly forward it to the person in the
organisation that has been assigned responsibility for FOI requests. Make sure you know who has
this responsibility in your organisation.
You will learn more about processing requests on the next screen.
Response time
Generally, the organisation must comply with requests for information within 20 working days.
If the organisation decides not to provide the requested information the applicant must be informed
of this and in most cases he/she must also be told why the information has been withheld.
Exemptions
There are several circumstances under which information should not be disclosed, and earlier you
had a brief look at some of the ones most applicable to your organisation.
Unless you are the person nominated to respond to FOI requests, you will not have to take decisions
on whether information should be withheld.
If you are the responsible person, you can obtain further advice from the Information
Commissioner’s Office at: www.ico.gov.uk
Page 22 of 39
Processing requests
A designated FOI lead should be appointed within each Public Authority organisation and they
should be trained to make judgement on what can and can’t be disclosed under the FOI Act 2000.
So, ask your FOI Lead if in doubt and follow your organisation’s local procedure on dealing with FOI
requests. OP13
The role of the Freedom of Information Lead is
to establish, develop and manage an
organisation-wide Freedom of Information
policy and strategy designed to ensure that the
organisation fully complies with all aspects of
the Freedom of Information Act 2000. They
may or may not be directly involved with
handling requests for information as and when
they arrive.
You can also get advice from the Information
Commissioner’s Office, the contact details are
on their website at: www.ico.gov.uk
Breaches of the Act
A criminal offence is committed if requested information is altered, defaced, blocked, erased,
destroyed or concealed with the intention of preventing disclosure of any or part of the information.
Liability
Both your organisation, i.e. the legal entity, and the employee that prevented disclosure of
information are liable to conviction.
The Information Commissioner can take action through the issuing of notices if a complaint is
received about the way a request for information has been handled.
Information notices
The Information Commissioner can issue an information notice that requires the organisation to
provide information relating to the particular request that has resulted in the complaint.
Page 23 of 39
Enforcement notices
If the Information Commissioner believes that an organisation is not complying with the Act, he can
issue an enforcement notice requiring compliance within a set timescale. This might relate to
providing information that has been incorrectly withheld.
Decision notices
Here the Information Commissioner can issue a decision notice stating that a request for information
has or has not been properly handled. If the decision is that the organisation has not handled a
request adequately, the Information Commissioner will set out the steps that need taking to ensure
compliance.
Failure to comply
If an organisation fails to comply with any one of the notices issued, the Information Commissioner
can refer the matter to the High Court who can deal with the matter as contempt of court.
The Act in practice
Have a look at the two case studies below. You are going to see examples of members of the public
requesting information and will be asked questions in each case, so pay close attention to what is
happening. Remember to consider what constitutes an FOI request and also any breaches of the FOI
Act in each case.
FOI Case study 1: A call to action?
The Trust receives a phone call from an anonymous source requesting details about the Trust’s
annual income and expenditure report.
Caller: "Hi, yeah. My name's Jeff and I want to
know how much money the hospital makes and
your general expenditure. I want exact amounts
and would like you to get me the details by the
end of the week."
The receptionist advises him to put his request in
writing to the hospital and informs him that a
response will follow once the request is received.
Later that day, the patient advisory liaison service
team (PALS team) receives an email requesting
the information. They forward the email to the
person responsible for dealing with FOI requests
within the Trust, who decides there is no need to disclose the information as it is readily available
elsewhere and they have firm plans to publish their next annual report.
A response is emailed to Jeff informing him that:
· this information is within the Trust’s annual report, which is published on the Trust’s website
· if he requires next year’s report, they have plans to publish this at the end of the next
financial year, usually by 6th April.
The response also contains the link to the Trust website.
Page 24 of 39
Select the reason you think the FOI Lead had for not sending the information requested once the
written request was received
FOI Case study 2: Art attack
A children's ward has recently been redecorated as part of a Care in the Community project. A
patient’s father is not happy with the equipment being used in the ward.
The Trust FOI lead sent the letter to Mr. Heath within one week after receiving the written request.
He includes the following in the letter:
· a link to these documents on the Trust publication
scheme website
· a copy of the most recent PAT report for this particular
ward
· a list of new equipment ordered and due to be
delivered by March of this year.
Option 1: The applicant didn’t give their name.
Option 2: The applicant made the request by telephone.
Option 3: Information was accessible elsewhere
Option 4: The applicant didn’t state that he was requesting the information in accordance with
the FOI Act
Option 5: The applicant wasn't very polite
The information requested by the applicant could easily be obtained from the Trust’s website,
and in fact there was an intention to publish the latest annual report in April. Therefore, the
Trust was not obliged to comply with the disclosure request.
For information, the person requesting the information is not required to disclose their true
identity and neither do they have to mention the FOI Act.
Page 25 of 39
Was this FOI request dealt with efficiently and according to the terms of the FOI Act?
· Option 1: Yes
· Option 2: No
Minimising complaints
Many of the complaints concerning FOI requests are about organisations not responding to
applicants in a timely fashion. Because of the tight timescales it is vital that if you receive a request
for information you forward it to the person who has responsibility for FOI in your organisation as
soon as possible.
It is also important that you comply with good record keeping principles, such as using logical file
names for records and documents so that they can be easily located if requested.
You will explore good record keeping in a later topic.
Option 1: Yes
Option 2: No
Part of the information was available already so the applicant was directed to where this
information could be located, in line with the exemption that the information is available
elsewhere. The second part of the request was held by the Trust but not published. This
information was disclosed as a valid request was received and the Trust responded correctly by
sending a copy of the ‘new equipment order list’ and the PAT report. Additionally, the request
was processed and responded to within the 20 working days as required by the FOI Act 2000.
Page 26 of 39
Good Record Keeping
Getting it right
Bob comes to A&E with a chronic breathing condition. The receptionist completes an A&E card for
him and finds out that he has attended A&E six times in the last two months.
The Nurse checks the Patient Administration System for Bob’s case notes but doesn’t seem to have
any record of his previous visits.
The Consultant asks the medical records staff for
Bob’s paper case notes, but they cannot find them
in the records library. They don’t have any
tracking system in place to know whether another
consultant had requested the notes and not
returned them.
The filing guidelines had been neglected by the
medical records team as they have been too busy
carrying out a housekeeping task to archive old
records. Files have been left in huge piles but in
date order to be filed later when they have time.
As a result Bob was admitted and a new set of
paper records were created.
There are several record keeping risks highlighted
in Bob’s case.
Lack of history
The case notes from previous visits were not
logged on the electronic system. This can be a risk
to patients as the lack of history means the next
team of clinical staff dealing with Bob’s care would
not have all the information they need.
What if Bob was unconscious? How would they
have known about the previous visits and missing
case notes?
Medical records not tracked
The medical records staff were not working according to Trust guidelines.
Medical records are not being tracked when taken out and when returned to the records library.
Case notes not filed in a timely manner
Case notes are left in heaps and not being filed in a timely manner, which means that if a patient
visits the hospital again soon after the first visit, key information will be missing from their medical
record, as in Bob’s case.
Page 27 of 39
A duplicate record has been created
The final action to create a new medical record for Bob is necessary in this case but represents very
poor practice, as this means a duplicate record is created with only a partial medical history. This
could be a risk to the patient and have a huge impact on the care delivered by the clinical team.
This topic will provide you with information about good record keeping and about what you can do
to ensure records are complete, accurate, and available where and when needed.
What is a good record?
Which of the following do you think would make a good record?
Recording Quality Information
Commitment 8 of the NHS Care Record Guarantee promises patients that the NHS will take
appropriate steps to make sure personal information is accurate. To meet this commitment you
need to ensure that you have good record keeping and ensure records are:
Accurate
Make sure that when you create a file or update a record
the information you are recording is correct and clear. Give
patients the opportunity to check records about them and
point out any mistakes.
Ensure that any factual mistakes are corrected or where
appropriate, reported to your manager or a senior clinician.
Up-to-date
Ask patients to confirm their details when attending
appointments and ensure changes of address, name, next of kin details etc are updated as soon as
possible.
If your organisation has a formal procedure for updating records, make sure you comply with it.
Complete, including the NHS Number
Incomplete or inaccurate healthcare information can put patients at risk. For example, the lack of
certain information could cause a patient to be given the wrong treatment or advice.
Ensure patient records include their NHS number; as this helps ensure that the correct record is
accessed for the correct patient. There is also a financial implication of keeping incomplete records.
All treatments carried out by your organisation are coded on the computer system. If these codes
are incorrect, or haven't been inputted, then there is no record of them and the organisation will not
be paid for them. The organisation may also face allegations of fraudulent behaviour.
Option 1: Legible writing
Option 2: Complete, i.e. all the information in one place
Option 3: Including accurate information
Option 4: Easy to locate
Option 5: Written contemporaneously, i.e. at the time an
event occurred
All of these things are essential to good records keeping.
Your organisation needs to make sure the information
contained within its records is good quality. Poor quality
information is dangerous and presents a high risk to the
organisation, the staff and the patients
Page 28 of 39
Quick and easy to locate
You need to make sure that records and the information within them can be quickly located when
required, e.g. by using a logical filing system that allows easy retrieval of records.
Make sure you comply with any procedures that aim for consistent and standardised filing of
records, and for safe and secure records storage areas. If there are no such procedures, speak to
your line manager in the first instance, then the Records Manager or IG Lead if necessary about ways
of ensuring efficient retrieval of records and the information contained within them.
Free from duplication
Good record keeping should prevent record duplication. Before you create a new record, make sure
that one doesn’t already exist.
Having more than one record for the same patient could increase risks, as there may be missing vital
information in one record. It would be pot luck which record is accessible in an emergency situation.
Written contemporaneously
Good record keeping requires that information is recorded at the same time an event has occurred
or as soon as possible afterwards.
This means that records will be updated whilst the event, care or otherwise, is still fresh in your
mind.
Good record keeping
There are other issues that you should be aware of and comply
with to ensure good record keeping in your organisation.
· When you are responsible for using a record containing
personal data you should make sure you comply with the Data
Protection Act 1998 and the common law duty of
confidentiality, these were covered earlier in this module.
· Be aware that individuals are able to gain access to their own personal information under the
Data Protection Act and to documents under the Freedom of Information Act 2000. Make sure
the information you add to records and documents is legible, factual, complete and easy to
locate upon request.
· Decisions about storage of health records are likely to be handled by your Records Manager,
Health Record Manager or your IG Lead. Your organisation is likely to have a records
management procedure so you can refer to this for further guidance.
· If you have a computer account you will be responsible for maintaining effective document
management within it. You should ensure you set up folders with logical names and save
electronic documents with file names that reveal what information they contain. In addition, if
you receive documents by email, ensure you do not retain lots of attachments in your email
account as this can seriously affect the working speed of your account.
· All of these measures will assist you to retrieve files when you need them.
· When a record has achieved its purpose and no longer has any justified use then it is considered
closed. After a record has been closed, it should be kept in line with the Record Management
NHS Code of Practice retention schedule which will require you to archive or dispose of the
record within a certain timescale
· When disposing of paper files, disks or CDs, especially those which contain person identifiable
information, you need to do so in the appropriate manner and inline with your organisation's
Page 29 of 39
Viewpoints:
All staff have a legal and professional
obligation to be responsible for any
records which they create or use in
the performance of their duties.
Records Management Policy. For example, in the confidential waste bin, incineration, NHS
approved shredder etc.
· You should also regularly review your electronic files and emails and make decisions about
whether you need to keep a document or email any longer. If it’s no longer needed, consider
disposal, either through moving it to an archive file or deletion.
· Any record created by an individual, up to the end of its retention period, is a public record and
subject to Information requests such as Freedom of Information requests and Subject Access
requests.
What's the best approach?
Which of the following statements shows the correct approach to managing a record?
Option 1: “We keep track of records from start to finish, and always destroy them when they are no
longer needed by the Hospital.”
Option 2: “We keep track of records from start to finish, and always make decisions on how long a
record should be kept, at each point of review, throughout the life of the record.”
Option 3: “We keep track of records from start to finish, and always keep all records for at least 100
years in case they are needed in the future.”
Some records of the deceased may need to be retained by the Hospital to comply with legal
obligations, e.g. complaints, disciplinary matters. Other records may have archival value requiring
that they are permanently preserved. If retained they must be stored in secure, safe and appropriate
storage facilities.
Further guidance on how long types of records e.g. supplier records, should be retained is available
in the Records Management NHS Code of Practice. The Code also contains guidance on preserving
records in an archive.
Page 30 of 39
Information Security
Scenario “I really need to get
on top of updating my patient
records. I’ll just pop them onto
this memory stick to take home
with me
Risk The doctor is transferring
patient information to a
portable device to take home
with him. The risk of theft of
any portable media is high. But
due to their size, memory sticks
are at a higher risk of being
misplaced. If you have been
authorised to use a memory
stick to transport patient
information it should have
encryption applied beforehand.
You will look at maintaining
security outside of the
workplace later in this topic.
Scenario “Can I borrow your
security pass for a few
minutes? I left mine at home!”
Risk Angelique has forgotten
her door pass. She needs to
get something from the stock
room so asks her colleague to
borrow her pass. Do not lend
out your security pass to
anyone else – not even to
close colleagues. Your pass is
intended for you and your use
only. You have no control over
the security consequences if it
gets into the wrong hands, but
you will be identified by any
audit trail as the individual
who accessed the system,
room or area.
You will explore security in the
workplace later in this topic.
Scenario “My password is my
girlfriend’s name. It’s easy for me
to remember that way!”
Risk David has chosen a password
he can remember. What he
doesn’t realise is that anyone
who knows him could easily
guess it. Always select a password
that cannot be found out by
anyone else.
You will explore best practice for
choosing a secure password later
in this topic
What is information security?
Information Security is about ensuring information is:
Safe and protected
Information should be kept safe and protected at all
stages during which it is held by the organisation.
You looked at why information must be protected in
topic 1 – confidentiality. Information security is more
concerned with how information is protected, for
example, using passwords, locks and security passes.
Page 31 of 39
A reliable record
Information should be a reliable presentation of what was recorded, so that people know they can
make decisions based on it. It is important that the information we use is a reliable presentation of
what was recorded, particularly personal information as this is used to provide care and treatment.
Implementing information security measures helps us to ensure that information created or used is
accurate, complete and not tampered with.
Available to authorised people
Information should be available to those authorised to see it at the time they need it.
The information security measures put in place must ensure those authorised to use information
have access to it where and when it’s needed.
Ensuring good information security.
What measures should you take to ensure that information is appropriately protected so that access
is controlled but the information is available to those authorised to use it?
Stop others from viewing the information
Don’t leave paper records lying around; lock them
away when they’re not being used.
Return paper records to the correct storage area
when no longer required so that they are available if
needed by someone else.
Keep electronic records password protected
Use a password-protected screensaver to prevent
unauthorised access to electronic records if you have
to leave your computer unattended.
Log out and switch off your computer at the end of each day.
Choose effective passwords
Choose a good password of at least 6 characters long, with a mixture of letters, numbers and
symbols.
Keep passwords secret and your smartcards safe. You’ll find out more about creating an effective
password later in this topic.
Avoid inappropriate disclosures of information
Make sure you don’t discuss sensitive information in inappropriate venues, e.g. public areas of the
organisation.
When you take phone calls ask patients to confirm personal information to you rather than you
reading their details out loud.
Ensure the premises are secure
Don’t leave key coded doors propped open.
If you’re the last to leave the building at the end of the working day, make sure windows and doors
are locked. If there is a burglar alarm make sure it is turned on.
Seek advice from your IG Lead
Make sure you know who your IG Lead is and ensure that you seek his/her advice on information
security issues.
If you discover an actual or potential breach of information security, such as missing, lost, damaged
or stolen information and equipment make sure you report it to your IG Lead.
Page 32 of 39
Hints and Tips
Portable equipment and removable
media
How else can you ensure information
remains secure?
· Look after portable equipment such as laptops,
PDAs and memory sticks.
· If you’re travelling with them ensure you keep
them within your sight at all times. Where
possible attach a memory stick to a key ring.
· For more information on laptop security, please
see the module on Secure transfers of personal
data.
· Only transfer personal information to removable
media such as CDs, DVDs and floppy disks if you
have been authorised to do so.
· Unauthorised access to the information should be
prevented by the use of encryption.
Password management
David chose a password that was easy
for anyone who knew him to guess. The
password you choose should be
memorable but hard to guess. Which of
these would be the most effective
password?
· Option 1: 18feb1980
· Option 2: Reds
· Option 3: Dk9+jtb3sH*nw26w
· Option 4: #5~Lp4Y
ANSWER Option 4- this is because the password uses a
combination of lower case and capital letters, numbers
and symbols.
Personal and acceptable use of IT
equipment
Personal and acceptable use of the
internet and email in your workplace
may be permitted to some extent. But
what do you think is acceptable and
Acceptable use
Sending, displaying or knowingly accessing offensive
material is a breach of the acceptable use policy.
You should not commit to email anything which you
would be unhappy to sign your name to in print.
Any non-work related email or documents, e.g. private
emails, should be stored in your email account or network
folder clearly marked as ‘Personal’.
Your organisation will have internet filters in place to help
block offensive sites, but if you do come across any while
doing legitimate work you should inform your ICT
Services.
Personal use
IT facilities such as the internet and email have been
Page 33 of 39
personal use, and when is it considered
excessive?
Personal and acceptable use of IT
equipment (Continued)
provided by your organisation primarily for business
purposes.
In most organisations, limited personal use of these
facilities is generally permitted during lunch breaks and
after work hours.
However, not all organisations allow personal use, so
please check with your IG Lead or Information Security
Officer before you start shopping online!
Excessive personal use
Excessive personal use or inappropriate use of the IT
systems is a disciplinary offence.
If your organisation has an acceptable use policy,
excessive or inappropriate use will be defined in it, so
read the policy.
If there is no written policy, speak to your IG Lead or
Information Security Officer.
In general, it will cover such things as accessing or
downloading pornographic images, or carrying on a
business using the organisation’s email and other IT
facilities or sending harassing or offensive emails, etc.
Appropriate use of email
Every morning David’s inbox is full of
Spam. What should he do with these
emails?
· Option 1: Reply and tell them to stop sending
them
· Option 2: File them in a folder marked ‘Spam’
· Option 3: Delete them without opening
· Option 4: Forward them if they look interesting
ANSWER Option 3, this is because spam email can contain
viruses or malicious code which will attack the computer
system if opened.
Audit trails and reporting security
breaches
Why is it important that everything you
do on a computer, including emails and
internet use, can be tracked?
Where breaches of security, the law or the acceptable use
policy are suspected, this tracked data can be used to aid
an investigation.
Any incident, however small, wastes time and often
requires work to be repeated. It also poses a risk to
individuals or the organisation.
Page 34 of 39
We can make improvements to security by reporting any
breaches through the incident reporting process in your
organisation.
We can make improvements to security by reporting any
breaches through the incident reporting process in your
organisation.
Installing software
David has reported a virus to Angelique. Whilst waiting he downloads anti-virus software from the
internet onto his computer. Should he do this?
· Option 1: Yes
· Option 2: No
Malicious code and unauthorised software
So, by installing software yourself, you risk infecting the system with malicious code and potentially
creating licensing issues for the organisation. Here is some advice about the issues and what you can
do to counter the risk of either occurring.
Malicious code
Malicious code includes computer viruses and spyware, and the
effects will vary depending on which you have downloaded. Some
malicious code will just waste time while another can destroy data
ANSWER: You should never use software that hasn’t been authorised by your organisation on
your work computer. There are two main reasons why you should never do this.
· First, you risk infecting your computer, other computers and the network from malicious code
embedded in the software
· Second, there are licensing issues. Your organisation has to pay for a license for the software
used on its systems.
Page 35 of 39
or even allow another user to gain access to your computer. Email attachments you receive may also
contain malicious code.
To combat some malicious code, your organisation has an anti-virus system that will catch most
incoming viruses on emails. You can help by being extremely cautious of opening email attachments
from people you don’t know.
Remember: Do not download software from the internet, from free CDs etc, unless you have been
authorised to do so. If in doubt get advice from your ICT Services helpdesk or IG Lead or Information
Security Officer.
Unlicensed software
Software includes any programs and games you download from the internet, on floppy disk, CD or
any other storage media.
Your organisation will have processes regarding the installation of such software, and if you install
software without authorisation this process is bypassed. You then put the organisation at risk of
legal action from the owner of the software.
Any ‘free’ software could be an illegal copy, or it could be trial software with an expiry date. Even if
neither of these things apply, the software is likely to be for single personal use and require a licence
for corporate use.
Remember: Do not install software from the internet, from free CDs etc, unless you have been
authorised to do so.
Securing Access to Information
Who do you think is responsible for securing information in your workplace?
· Option 1: Senior Management staff
· Option 2: Receptionists
· Option 3: Nurses
· Option 4: Doctors
Summary – Information Governance
This module has given an overview of Information Governance (IG). You’ve reached the end of the
module "Introduction to Information Governance for NHS".
Information governance allows organisations and individuals to ensure information is processed
legally, securely, efficiently and effectively. IG applies to all the types of information which your
organisation may process, but the rules may differ according to the type of information concerned.
ANSWER: It is everyone’s duty to secure information at work, no matter what your role.
This means you’re responsible for reporting any known or suspected breaches in security, as well
as any weaknesses in security measures. Make sure you know who your IG Lead or Information
Security Officer is.
Page 36 of 39
Responsibilities
Remind yourself of the answers to these questions.
Who is responsible?
Remember: everyone is responsible for Information
Governance and for:
· providing a confidential service to patients,
sharing information lawfully and appropriately
· recording information accurately and ensuring it
is accessible when needed
· ensuring that information is held securely
· processing information in accordance with the
‘data protection rules’ and respecting the rights
of individuals
· complying with Freedom of Information
requirements.
Where can I get advice about confidentiality?
If you need any advice about confidentiality issues, you should refer to the:
· IG Lead or Caldicott Guardian in your organisation
· Care Record Guarantee which sets out our commitments to patients
· Six Caldicott principles for handling patient information
· Confidentiality NHS Code of Practice
· Information Governance Toolkit.
How do I comply with good record keeping principles?
When you enter information into a record or document, ensure it is:
· accurate
· legible
· written at the time an event occurred.
When you are responsible for storage of files or documents, make sure you use a logical naming and
filing system so that they are easy to locate and retrieve. For more in-depth information about
records management principles, see Records Management NHS Code of Practice in "Read More
About It".
How can I keep information secure?
Look at your organisation’s Information Governance or IT policy specific to your area for the security
standards you need to meet. In general you should:
· choose a secure password, and keep it private
· lock away files when they are not in use
· delete spam emails without opening them
· never use unauthorised software.
Are there any tools that will help?
The Information Governance Toolkit is an online tool that aims to support NHS organisations in
handling information correctly. The Toolkit:
· encourages staff to work together and share knowledge
· assists organisations to develop strategies and policies
· provides a number of resources that can help with the handling of information
Page 37 of 39
· contains a set of standards for information handling that organisations can rate themselves
against.
Relevant legislation
There are two pieces of legislation that you need to be aware of when thinking about Information
Governance.
The Data Protection Act 1998
This Act states that information should be:
· processed fairly and lawfully
· processed for a specified purpose
· adequate, relevant and not excessive
· accurate and kept up-to-date
· not kept for longer than necessary
· processed in accordance with rights of
data subject
· protected by appropriate security
· only transferred outside the EEA with
adequate protection.
The Freedom of Information Act 2000
This Act gives the public the right to request
any information held by any type of public
authority or healthcare organisation.
· These requests must be made in
writing
· Organisations must respond within 20
working days
· Each organisation must have an FOI
lead who is trained in dealing with
these requests.
If your job requires you to deal with FOI
requests you are advised to participate in a
more advanced training package.
The next step is to take an assessment on this module once you have completed all the topics. It is
recommended that you have a quick revision session before attempting the assessment to help you
achieve the final pass mark of 80%.
Page 38 of 39
Assessment
To carry out your assessment online via the KITE site please follow the instructions below:
· Select the back button on the internet page browser
· Then select the “Information Governance Questions” button from the KITE site
· Work you way through the KITE question package
· Once complete the package will give you your score, you must have a pass rate of 80% or
above to complete the training.
· If your score is under 80% the package will direct you back to the beginning to have another
go.
· If you pass you will be forwarded to the KITE certificate screen. Please fill in your details,
which will automatically be forwarded to the Training database team.

More Related Content

What's hot

Confidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health CareConfidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health CareVaileth Mdete
 
Impact of ict on privacy and personal data
Impact of ict on privacy and personal dataImpact of ict on privacy and personal data
Impact of ict on privacy and personal datamohd kamal
 
Slides dr farah jameel's gdpr presentation april 2018
Slides dr farah jameel's gdpr presentation april 2018Slides dr farah jameel's gdpr presentation april 2018
Slides dr farah jameel's gdpr presentation april 2018amirhannan
 
The U.S. Healthcare Implications of Europe’s Stricter Data Privacy Regulation
The U.S. Healthcare Implications of Europe’s Stricter Data Privacy RegulationThe U.S. Healthcare Implications of Europe’s Stricter Data Privacy Regulation
The U.S. Healthcare Implications of Europe’s Stricter Data Privacy RegulationCognizant
 
ISACA Journal Data Protection Act (UK) and GAPP Alignment
ISACA Journal Data Protection Act (UK) and GAPP AlignmentISACA Journal Data Protection Act (UK) and GAPP Alignment
ISACA Journal Data Protection Act (UK) and GAPP AlignmentMohammed J. Khan
 
Data Protection & Privacy in Malaysian Total Hospital Information System
Data Protection & Privacy in Malaysian Total Hospital Information SystemData Protection & Privacy in Malaysian Total Hospital Information System
Data Protection & Privacy in Malaysian Total Hospital Information SystemQuotient Consulting
 
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT LegalCyber Watching
 
HIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersHIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersLawgical
 
HIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowHIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowShred-it
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)29535814851
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processingTim Gough
 
GDPR and Analytics
GDPR and AnalyticsGDPR and Analytics
GDPR and Analyticsbrunomase
 
Example Association Internal GDPR Policy
Example Association Internal GDPR PolicyExample Association Internal GDPR Policy
Example Association Internal GDPR PolicyLen Murphy
 

What's hot (20)

Confidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health CareConfidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health Care
 
Impact of ict on privacy and personal data
Impact of ict on privacy and personal dataImpact of ict on privacy and personal data
Impact of ict on privacy and personal data
 
Slides dr farah jameel's gdpr presentation april 2018
Slides dr farah jameel's gdpr presentation april 2018Slides dr farah jameel's gdpr presentation april 2018
Slides dr farah jameel's gdpr presentation april 2018
 
The U.S. Healthcare Implications of Europe’s Stricter Data Privacy Regulation
The U.S. Healthcare Implications of Europe’s Stricter Data Privacy RegulationThe U.S. Healthcare Implications of Europe’s Stricter Data Privacy Regulation
The U.S. Healthcare Implications of Europe’s Stricter Data Privacy Regulation
 
ISACA Journal Data Protection Act (UK) and GAPP Alignment
ISACA Journal Data Protection Act (UK) and GAPP AlignmentISACA Journal Data Protection Act (UK) and GAPP Alignment
ISACA Journal Data Protection Act (UK) and GAPP Alignment
 
Data Protection & Privacy in Malaysian Total Hospital Information System
Data Protection & Privacy in Malaysian Total Hospital Information SystemData Protection & Privacy in Malaysian Total Hospital Information System
Data Protection & Privacy in Malaysian Total Hospital Information System
 
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
 
HIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersHIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process Servers
 
Data Protection In Ghana
Data Protection In GhanaData Protection In Ghana
Data Protection In Ghana
 
HIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowHIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to know
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
 
Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health Informatics
 
Hitech Act
Hitech ActHitech Act
Hitech Act
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
Privacy Access Letter I Feb 5 07
Privacy Access Letter I   Feb 5 07Privacy Access Letter I   Feb 5 07
Privacy Access Letter I Feb 5 07
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processing
 
Data Management Protection Acts
Data Management Protection ActsData Management Protection Acts
Data Management Protection Acts
 
GDPR and Analytics
GDPR and AnalyticsGDPR and Analytics
GDPR and Analytics
 
Example Association Internal GDPR Policy
Example Association Internal GDPR PolicyExample Association Internal GDPR Policy
Example Association Internal GDPR Policy
 

Similar to Intro to information governance booklet

data-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdfdata-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdfkiruthigajawahar6
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .ClinosolIndia
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk- Mark - Fullbright
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA ComplianceRaffa Learning Community
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance Raffa Learning Community
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Ethical Considerations for Healthcare Analytics Data Disposal.pdf
Ethical Considerations for Healthcare Analytics Data Disposal.pdfEthical Considerations for Healthcare Analytics Data Disposal.pdf
Ethical Considerations for Healthcare Analytics Data Disposal.pdfAlex860662
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 
GDPRpresentationFeb-Apr2018.pptx
GDPRpresentationFeb-Apr2018.pptxGDPRpresentationFeb-Apr2018.pptx
GDPRpresentationFeb-Apr2018.pptxpixvilx
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 

Similar to Intro to information governance booklet (20)

data-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdfdata-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdf
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .
 
Lecture 6 data protection and access to client records
Lecture 6  data protection and access to client recordsLecture 6  data protection and access to client records
Lecture 6 data protection and access to client records
 
GDPR Presentation
GDPR PresentationGDPR Presentation
GDPR Presentation
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
 
1307 Privacy Act
1307 Privacy Act1307 Privacy Act
1307 Privacy Act
 
Ethical Considerations for Healthcare Analytics Data Disposal.pdf
Ethical Considerations for Healthcare Analytics Data Disposal.pdfEthical Considerations for Healthcare Analytics Data Disposal.pdf
Ethical Considerations for Healthcare Analytics Data Disposal.pdf
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
GDPRpresentationFeb-Apr2018.pptx
GDPRpresentationFeb-Apr2018.pptxGDPRpresentationFeb-Apr2018.pptx
GDPRpresentationFeb-Apr2018.pptx
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Hipaa
HipaaHipaa
Hipaa
 

More from Gerardo Medina

Case law medicines management
Case law medicines managementCase law medicines management
Case law medicines managementGerardo Medina
 
The law and medicine management
The law and medicine managementThe law and medicine management
The law and medicine managementGerardo Medina
 
Return to professional practice drug calculation
Return to professional practice drug calculationReturn to professional practice drug calculation
Return to professional practice drug calculationGerardo Medina
 
NMC handbook on Prep Requirements
NMC handbook on Prep RequirementsNMC handbook on Prep Requirements
NMC handbook on Prep RequirementsGerardo Medina
 

More from Gerardo Medina (6)

How to use must
How to use mustHow to use must
How to use must
 
Nutrition and must
Nutrition and mustNutrition and must
Nutrition and must
 
Case law medicines management
Case law medicines managementCase law medicines management
Case law medicines management
 
The law and medicine management
The law and medicine managementThe law and medicine management
The law and medicine management
 
Return to professional practice drug calculation
Return to professional practice drug calculationReturn to professional practice drug calculation
Return to professional practice drug calculation
 
NMC handbook on Prep Requirements
NMC handbook on Prep RequirementsNMC handbook on Prep Requirements
NMC handbook on Prep Requirements
 

Recently uploaded

Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

Intro to information governance booklet

  • 1. Page 0 of 39 Introduction to Information Governance Mandatory Training
  • 2. Page 1 of 39 Contents Page Page Introduction to Information Governance 2 Types of information 3 Information Governance Standards 4 The Information Governance Toolkit 5 Confidentiality- Topic 1………………………………..5 Confidentiality Scenario 1 6 Confidentiality, Duty of confidence. 7 Consent, Legal requirements 7 The Caldicott Guardian……………………………..8 Caldicott Principles 9 Providing a Confidential Service 10 Data Protection- Topic 2 11 Data protection and the law 11 Data Protection Scenario 1 11 Data protection principles 12 The principles explained 13,14 Data Protection Scenario 2&3 15 Data Protection Scenario 4&5 16 Data Protection Scenario 6 17 Data Protection Scenario 7&8 18 Data Protection Scenario 9 19 Freedom of Information - Topic 3 20 Exemptions, Spotting a request 20 What you need to know about FOI 21&22 FOI Case study 1 23&24 FOI Case study 2 24&25 Page Good Record Keeping - Topic4 26 History, Tracking, Timeliness 26 Duplicates 26 Recording Quality Information 27 Locating records 28 What’s the best approach 29 Information Security- Topic 5 30 What is information security 30&31 Hints and Tips 32,33,34 Portable media, passwords, use of IT 32 Use of Email, audit reports 33 Software/ Unlicensed software 34&35 Summary of Information Governance 35&36 Recap on topics 36 Relevant legislation 37 Assessment 38 Instructions 38 Question sheet 39 onwards
  • 3. Page 2 of 39 Viewpoints: Keeping information secure Keeping information secure in our organisations is a hot topic. Sometimes it can be very simple actions which keep information secure and confidential. Introduction to Information Governance Put simply, Information Governance is to do with the rules that should be followed when we process information. It allows organisations and individuals to ensure information is processed legally, securely, efficiently and effectively. IG applies to all the types of information which your Organisation may process, but the rules may differ according to the type of information concerned. In this module you’ll look at how you can make sure you follow the right processes and procedures when you process information – in other words, how to practice good Information Governance (IG). You’ll find out about: · how to avoid breaching confidentiality law and guidelines · how to comply with data protection and freedom of information legislation · what support you have - the IG Toolkit · good record keeping · effective information security. All of the above topics will give you good knowledge and skills to provide an effective, confidential and secure healthcare service. You will also find out about the IG Toolkit and how your contribution to IG best practice in your organisation is very important. Headline News In December 2007 it was widely reported in the national press that nine NHS trusts had misplaced thousands of patient and staff records. This was the latest in a series of data security incidents affecting organisations ranging from HH revenues and Customs to the DVLA Richard Vautrey deputy chairman of the British Medical Association’s committee of GP’s, told the BBC that: "Patients need to be absolutely confident that the information that is held securely cannot be lost in some haphazard way as appears to be the case.” In such a sensitive climate, good Information Governance (IG) is very important and impacts on all of our jobs. In this introductory level module you will look at the principles and procedures, in short ‘the rules’ that can help
  • 4. Page 3 of 39 Types of Information There are different types of data, listed below. What type of information do you think details of a patient's mental health condition in their medical file would be classed as? Personal Information – e.g. medical records, staff records Information about individuals is personal information when it enables an individual to be identified or non-personal when it doesn’t. This isn’t always straightforward to establish but it is an important distinction in law. For example, a person’s name and address are clearly personal information when presented together, but an unusual surname may itself enable someone to be identified. Personal information may be held subject to obligations of confidentiality and may be legally sensitive as defined by the Data Protection Act 1998. Personal information is classed as confidential if it was provided in circumstances where an individual could reasonably expect that it would be held in confidence, e.g. the doctor/patient relationship. Confidentiality is generally accepted to extend after death. Personal information may be classed as legally sensitive when it makes reference to particular matters, such as health, ethnicity or sexual life that are listed in the Data Protection Act. Other details, for example an individual’s bank account details would also be regarded as sensitive by most people but are not legally sensitive. A further limit on the Data Protection Act is that it only applies to personal information about living individuals. Correct answer Person-based but anonymous information – e.g. public health statistical information that does not identify an individual Person-based anonymised information does not identify an individual directly and cannot be reasonably used to determine identity. The mental health conditions in this case would not be classed as person- based anonymised information as they are clearly linked with the individual's name and address etc. It is important to be aware that person-based but anonymised information is not subject to the same restrictions on processing as personal information. This is because no-one can be harmed or reasonably distressed by its disclosure. Neither confidentiality law nor the Data Protection Act applies to person-based information that has been effectively anonymised. This means that taking steps to anonymise information is often very important as it enables information to be processed without having to satisfy strict legal requirements. Not correct Corporate data – e.g. Trust accounts or statistical reports The mental health conditions in this case would not be classed as corporate data. Documents or information that are not about individuals are clearly not personal information but may be classed as commercially confidential e.g. for commercial reasons or because they contain legal advice. They may also be regarded as sensitive in a general sense because of the subject matter. An important consideration in relation to documents is whether or not they have to be disclosed when a Freedom of Information Act request is made and where they are confidential or sensitive they may be exempt from disclosure. Not correct
  • 5. Page 4 of 39 Information Governance Standards You’ll look at Information Governance standards in more detail later in this module, but at this stage it is worth noting that they are derived from the following: The Confidentiality NHS Code of Practice and the NHS Care Record Guarantee for England The Code tells you how to comply with the common law duty of confidentiality. The Guarantee tells patients how the NHS will use and protect the information in their health records. You will learn more about confidentiality in topic 1. The Data Protection Act 1998 The Act sets rules for how personal data is obtained, held, used or disclosed. You will learn more about the Data Protection Act in topic 2. The Freedom of Information Act 2000 The Act sets rules for disclosure of information about the work carried out by a public sector organisation. You will learn more about the Freedom of Information (FOI) Act in topic 3. The Records Management NHS Code of Practice The Code includes guidelines about how records, including health records, should be used and disposed of. You will learn more about how records management applies to your role in topic 4. The Information Security NHS Code of Practice The Code sets out, at a high level, how organisations should comply with information security principles. You will learn more about how you can keep information secure in topic 5.
  • 6. Page 5 of 39 The Information Governance Toolkit To help improve Information Governance across the NHS in England, the Department of Health determined a set of key standards. These are now mandatory for NHS organisations to carry out as an annual self-assessment. Annual reports The annual reports are monitored and approved through the Information Governance Toolkit, hosted and managed by the NHS Connecting for Health (CFH) Information Governance Policy Team. Who can view performance? NHS CFH then send the results to the Healthcare Commission to contribute to the Annual Health Check returns, for reference and potential audit and to the National Information Governance Board, the body responsible for driving improvements in information governance across health and adult social care. The Information Governance Toolkit standards and approved organisation reports can be found on the public-facing website www.igt.connectingforhealth.nhs.uk. Who is involved? There is a lead in your organisation who is responsible for carrying out this annual assessment and collating evidence. In order to help your organisation perform better it is necessary for all staff to be involved. Do your part in complying with Information Governance standards and best practice guidelines, and follow your organisation's policies. The assessment involves the contribution of the whole organisation, including you. Keep informed about your organisation's Information Governance agenda and find out who your Information Governance Lead is. At this stage you will begin to see how Information Governance is a cultural agenda, which is every employee’s responsibility. Your responsibilities Information Governance (IG) helps to ensure that all staff know their responsibilities and comply with the law and best practice when processing information. You’ll look at your responsibilities in some detail throughout this module, but in summary they include: · providing a confidential service to patients, sharing information lawfully and appropriately · processing information in accordance with the ‘data protection rules’ and respecting the rights of individuals · complying with Freedom of Information requirements · recording information accurately and ensuring it is accessible when needed · ensuring that information is held securely. Information Governance sets common guidelines that help NHS staff know they are working to the same standards as people outside their own area.
  • 7. Page 6 of 39 Viewpoints: Maintaining patient confidentiality The duty to maintain confidentiality is part of the duty of care to the patient. It is also integral to the contract of employment and regulatory professional codes of conduct. The breaches could lead to a disciplinary procedure or even dismissal Confidentiality- Topic 1 Confidentiality Scenario 1 It’s late one Friday afternoon in a county hospital. A celebrity is rushed into surgery for the emergency removal of his appendix. Best practice? The Hospital carries out an internal investigation to identify the staff member that disclosed the information, as well as the staff who viewed the record. If they were not directly involved with the patient's care, what actions were the staff members not justified in doing? Option 1: Viewing the patient’s healthcare record Option 2: Sharing information relating to the patient’s upcoming surgery Option 3: Disclosing information relating to the patient’s past healthcare history The employees had no justified purpose for carrying out any of these actions.
  • 8. Page 7 of 39 Viewpoints: Sensitive information and exemptions to consent Sensitive information is a category of personal information that is usually held in confidence and whose loss, misdirection or loss of integrity could impact adversely on individuals, the organisation or on the wider community.. Confidentiality To help prevent the kind of breaches in confidentiality seen in this scenario, there are certain procedures to follow. Duty of confidence A duty of confidence arises when sensitive information is obtained and/or recorded in circumstances where it is reasonable for the subject of the information to expect that the information will be held in confidence. Patients provide sensitive information relating to their health and other matters as part of their seeking treatment and they have a right to expect that we will respect their privacy and act appropriately. The duty can equally arise with some staff records, e.g. occupational health, financial matters, etc. Patients have a right to be informed about how we will use their information for healthcare, the choices they have about restricting the use of their information and whether exercising this choice will impact on the services offered to them. Explicit consent Where it is proposed that patient information is disclosed outside of the organisation for purposes other than healthcare, in most cases it is necessary to ensure that the patient has explicitly consented to this happening. There are limited exceptions to this general rule. Legal requirement Always remember confidentiality is a legal requirement, supported by the confidentiality clause in your contract and, where applicable, your professional code of conduct. Your organisation is required to: · inform patients about how personal information relating to them will be used · inform patients of their right to object to the disclosure of their confidential personal information outside of the organisation · seek explicit consent before disclosing patient personal information for non-healthcare purposes (unless rarely an exception applies).
  • 9. Page 8 of 39 Certain types of information are classed as sensitive under the Data Protection Act 1998, but the definition for NHS Information Governance purposes is wider than, and fully encompasses, legally sensitive information. Personal information becomes sensitive if it includes any of the following types of information: · health records or information relating to physical or mental health · sexual life, sexual orientation or gender realignment · social care records, child protection or housing assessments · racial or ethnic origin · political opinions or trade union membership · religious beliefs · DNA or fingerprints · bank, financial or credit card details · National Insurance number or tax, benefit or pension records · travel details (for example at immigration control, or Oyster records · passport number / information on immigration status or travel records · work record or place of work, school attendance or records · conviction, prison or court records, evidence or commission of offences or alleged offences. This is not meant to be an exhaustive list, but it does provide an indication of the wide range of information that needs to be processed with particular care. Note also that whilst the Data Protection Act only applies to personal information relating to living individuals, NHS Information Governance also encompasses information about deceased individuals. The exceptions to the requirement for consent are rare and limited to legal requirements to disclose information, e.g. by Acts of Parliament or court orders; disclosures permitted by regulations made under section 251 of the NHS Act 2006 (previously known as section 60 of the Health and Social Care Act 2001), or where there is a public interest justification for breaching confidentiality such as a serious crime, e.g. murder, rape or child abuse.” The Caldicott Guardian To help maintain levels of confidentiality throughout the NHS, a report was commissioned in 1997 by the Chief Medical Officer. One of the key outcomes of this report was that Caldicott Guardians were appointed in each NHS Trust, in order to safeguard access to patient-identifiable information. Our Caldicott Guardian Is the Medical Director who is a member of the Board
  • 10. Page 9 of 39 The Caldicott Guardian is normally at Board or Senior Management level as they are responsible for reviewing, overseeing and agreeing policies governing the protection of patient or personal information. The Caldicott Guardian also takes responsibility for overseeing organisational compliance with the Caldicott Management Principles. Caldicott Principles A key recommendation of the Caldicott report was that staff justify every use of confidential information and routinely test it against six principles. Never disclose confidential information if you are unsure about your response to any of these six questions. Do you have a justified purpose for using this confidential information? The purpose for using confidential information should be justified, which means making sure there is a valid reason for using it to carry out that particular purpose. Are you using it because it is absolutely necessary to do so? The use of confidential information must be absolutely necessary to carry out the stated purpose. Are you using the minimum information required? If it is necessary to use confidential information, it should include only the minimum that’s needed to carry out the purpose. Are you allowing access to this information on a strict need-to-know basis only? Before confidential information is accessed, a quick assessment should be made to determine whether it is actually needed for the stated purpose. If the intention is to share the information, it should only be shared with those who need it to carry out their role. Do you understand your responsibility and duty to the subject with regards to keeping their information secure and confidential? Everyone should understand their responsibility for protecting information, which generally requires that training and awareness sessions are put in place. If the intention is to share the information, those people must also be made aware of their own responsibility for protecting information and they must be informed of the restrictions on further sharing. Do you understand the law and are you complying with the law before handling the confidential information There are a range of legal obligations to consider when using confidential information. The key ones that must be complied with by law are provided by the common law duty of confidentiality and under the Data Protection Act 1998. If you have a query around the disclosure of medical or other confidential personal information you should go to your Line Manager initially then the IG Manager if you are still not sure. For serious and complex issues your Manager should contact the Caldicott Guardian for advice and guidance.
  • 11. Page 10 of 39 Viewpoints: At the end of the day the focus of confidentiality is consent. Personal information shared in confidence should not be used or disclosed further without the consent of the individual. Exceptions to the requirement for consent are rare and limited to legal requirements to disclose information Providing a Confidential Service As well as the Caldicott Guidelines, you can also refer to the Confidentiality NHS Code of Practice model known as ‘Protect, Inform, Provide Choice and Improve’ to help maintain a confidential service within your organisation. You should protect a person’s information by recording relevant data accurately, consistently and keeping it secure and confidential. · Write patient records appropriately – free of jargon or offensive, subjective or opinionated statements. · Inform a patient how their information is used and when it may be disclosed. · Where practical, provide patients with information leaflets about the organisation's confidentiality vows, or posters informing patients what the organisation does with patient information and why. · Also, inform patients of their right to access their health records. · Provide choice for patients to decide whether their information can be disclosed. · Patients have the right to object to information they provide in confidence being disclosed to a third party in a form that identifies them. · As long as the patient is competent to make such a choice and where the consequences of the choice have been fully explained, their decision should be respected. · Always look to improve the way you and the organisation protect, inform and provide choice to the patient, clients and employees. You can do this by attending regular update training, seeking line manager support and by reporting possible breaches. .
  • 12. Page 11 of 39 Data Protection- Topic 2 Data protection issues can crop up in any organisation. Breaches often occur because staff are unaware of data protection principles, which are contained in the Data Protection Act 1998. In this topic you are going to look at a series of data protection issues that may occur Data protection and the law The Data Protection Act 1998 applies to all organisations in the UK that process personal information. · The Act goes hand-in-hand with the common law duty of confidence and professional and local confidentiality codes of practice to provide individuals with a statutory route to monitor the use of their personal information. · A breach of one of the eight Data Protection Principles can result in legal action being taken against an individual and/or the organisation. Learning the Principles of the Data Protection Act is therefore very important. · There are additional offences under section 55 of the Act of unlawfully obtaining, disclosing or selling personal data. You will explore the Principles and the effects of section 55 in more detail later in this topic. Data Protection Scenario 1 Take a look at the list below. Which do you think are not real data protection principles? Option 1: 1. Processed Fairly and Lawfully Option 2: 2. Processed for a Specified Purpose Option 3: 3. Adequate, relevant and not excessive Option 4: 4. Processed under supervision Option 5: 5. Permanently kept on record for future reference The correct answer is Principles 4 and 5.
  • 13. Page 12 of 39 Data protection principles There are eight principles that must be followed when handling personal information. Processed fairly and lawfully Ensure that the proposed use of the information is lawful in the widest sense, e.g. doesn't breach other legal restrictions such as the common law duty of confidentiality. · Inform patients why you are collecting their information, what you are going to do with it, and who you may share it with. · Information recorded as part of the process of providing care should not be used for purposes that are unrelated to that care. · There should be no surprises! Be open, honest and clear. · The same principle applies to the personal information of staff. Processed for a specified purpose Only use personal information for the purpose for which it was obtained. Only share information outside your organisation, team, ward, department, or service if you are certain it is appropriate and necessary to do so. If in doubt, check first! Adequate, relevant and not excessive Only collect and keep the information you need. Do not collect information “just in case it might be useful one day!" You cannot hold information unless you know how it will be used and it is a justified use. Explain all abbreviations, use clear legible writing and stick to the facts – avoiding personal opinions and comments. Accurate and kept up-to- date Take care when entering data to make sure it is correct. Make sure you check with patients that the information is accurate and up-to-date. Check existing records thoroughly before creating new records and avoid creating duplicate records Not kept for longer than necessary Follow retention guidelines set out by the Records Management NHS Code of Practice and your organisation’s retention policy. Make sure your information gets a regular "spring clean" so that it is not kept “just in case it might be useful one day!” Dispose of information correctly, according to your organisation's disposal policy. Processed in accordance with rights of data subject Individuals, whether staff or patients, have several rights under the Act. In summary individuals have: · the right of access to personal data held about them · the right to prevent processing likely to cause damage or distress · the right to have inaccurate data about them corrected, blocked or erased · the right to prevent processing of information about themselves for purposes of direct marketing · rights in relation to automated decision-taking. · The rights are not absolute, that means there may be occasions where the organisation is permitted to override them. · Later in this module you will explore the rights in more detail Protected by appropriate security This requires that all organisations that process personal information have security measures in place to ensure that the information is protected from accidental or deliberate loss, damage or destruction. Your organisation will have a security policy and processes to ensure the security of personal information. They will also have guidelines for staff about how to ensure
  • 14. Page 13 of 39 personal information is protected from unauthorised access. You must make sure you comply with all the security processes and guidelines so that access to personal information is only available to those authorised to do so, and information is not accidentally or deliberately lost, damaged or destroyed. Some of the measures you should comply with are: · only send confidential faxes using safe haven or secure faxes · ensure confidential conversations cannot be overheard · keep your passwords secret · lock paper files away when they are not in use · transport personal information by secure methods. You’ll learn more on keeping information secure in the Information Security topic of this module. Not transferred outside the EEA without adequate protection If sending personal information outside the European Economic Area (EEA), make sure consent is obtained where required and ensure the information is adequately protected. Be careful about putting personal information on websites, which can be accessed from anywhere in the world - get consent first. Check where your information is going, and know where your suppliers are based. The principles explained As you have just seen, Principle 1 of the Data Protection Act requires that personal data is processed fairly and lawfully. It also requires that personal data is only processed if one of the conditions in the Act is also met. Processing conditions There are several of these “processing conditions”, but the main ones that you need to be aware of when providing care and treatment are processing: · for medical purposes · where the patient has given their explicit consent · to protect the vital interests of the patient or another person. Processing for medical purposes This means that sensitive personal data can be processed for the purposes of preventative medicine, medical diagnosis, the provision of care and treatment and the management of healthcare services. Explicit consent If you wish to process patient information for purposes other than healthcare, in most cases you must have the explicit consent of the patient to do so. Vital interests In exceptional circumstances, e.g. life or death situations, processing of sensitive information for non-healthcare purposes without consent is permitted.
  • 15. Page 14 of 39 Earlier, you saw a summary of individual’s rights under Section 7 of the Data Protection Act. Now you’ll look at the rights that may be most relevant to your organisation. Subject access requests Generally, individuals have the right to see information about them held by an organisation that is processing their personal data. Applications, which are known as “subject access requests” must be in writing and the individual should provide the organisation with sufficient information to enable their records to be correctly identified. The request must be complied with within 40 days of receipt but wherever possible information should be provided within 21 days. Therefore, if you receive a request for information, you should promptly forward it to the person in your organisation that has responsibility for subject access requests. Make sure you know who has this responsibility in your organisation. If you are the nominated person, you should ensure that staff members are aware that subject access requests should be forwarded to you promptly. If you require further advice about handling subject access requests, your IG Lead should be able to help you. You’ll explore a scenario about complying with a subject access request later in this topic. The right to prevent processing likely to cause damage or distress. The individual is entitled to send a written notice to an organisation requesting that processing of their data stop, or does not begin. The individual must be able to show that he/she has suffered or would suffer substantial and unwarranted damage or distress if the processing goes ahead. The organisation doesn’t have to comply where the organisation believes the processing is so important it must go ahead even though it causes damage or distress. Rectification, blocking, erasure and destruction An individual who believes that an organisation has recorded inaccurate personal information about them is entitled to apply to the court to have the information corrected or removed. This right applies to factual information only, not to opinions or a diagnosis that the patient disagrees with or which turns out to be wrong. Rights in relation to automated processing The individual can ask for your organisation to ensure that no decision which is taken by or on behalf of the organisation and significantly affects the individual, is based solely on information processed by automatic means.
  • 16. Page 15 of 39 Data Protection Scenario 2 Now it's time to see what can happen when these principles are ignored... Mr Jones answers his mobile phone one Tuesday morning to a call from the local hospital. By informing Mr. Jones of his ex-wife’s condition, the receptionist unlawfully breached Mrs. Jones’ confidentiality. Also, the records being used here were obviously very out-of-date. If the patient had been asked whether her contact details were still correct when she came in for previous appointments, this mistake wouldn't have happened. Data Protection Scenario 3 Mrs. Foster has written asking for a copy of all her health records held by the local general hospital. The Data Protection Lead opens the letter and puts it on top of his to-do pile. Later the pile is accidentally knocked over and the letter slips behind the desk. After two months Mrs. Foster contacts the hospital to ask what is happening with her request. She is put through to the Data Protection Lead’s extension, and hears a voicemail that the Lead is on holiday. The call is put back through to switchboard and Mrs. Foster enquires whether there is anyone else that can help her. Unfortunately, the switchboard operator has never heard of Information Governance so is unaware that there is anyone else she can refer Mrs. Foster to. She puts the call through to Trust Headquarters and one of the staff there takes Mrs. Foster’s details and promise to get back to her. No-one does. Seven days pass and Mrs. Foster has still not been contacted, so she decides to ring the Information Commissioner to complain. Principle 6 requires compliance with the individual rights set out in section 7 of the Act. One of these rights is the right to subject access, which means that individuals have the right, with some limited
  • 17. Page 16 of 39 exceptions, to see information held by organisations that are processing their personal data. Organisations are required to comply with the request within set time limits. You looked at some of the individual rights earlier in this topic. Data Protection Scenario 4 Sharon, a health records assistant, has to check 100 health records at random to make sure they have the correct NHS number. Which one of these data protection principles might have been breached in this scenario? Data Protection Scenario 5 Miss Ford has requested to look at her health records held by the local general hospital. The hospital arrange for her to visit and go through the records with a health professional on hand to explain any abbreviations or complex medical issues. Whilst reading one of the entries written many years ago, Miss Ford points out a strange abbreviation, “What does NLL stand for?” The health professional responds, “Hmm, I think it means “Nice Looking Legs!” Which of the following data protection principles is being breached in this scenario? Option 1: Principle 1: Processed fairly and lawfully Option 2: Principle 3: Adequate, relevant and not excessive Option 3: Principle 5: Not kept for longer than necessary Option 4: Principle 7: Protected by appropriate security Option 5: Principle 8: Not transferred outside the EEA without adequate protection By leaving the health records unprotected and unprocessed Sharon has allowed a situation to arise where patient confidentiality could be breached. Fortunately, this was not the case here. Sharon has also breached Principle 7 of the Act by not ensuring that access to the health records was protected, either by locking the door or taking the records back to the correct storage area Option 1: Principle 1: Processed fairly and lawfully Option 2: Principle 3: Adequate, relevant and not excessive Option 3: Principle 4: Accurate and kept up to date Option 4: Principle 6: Processed in accordance with rights of data subject Option 5: Principle 7: Protected by appropriate security
  • 18. Page 17 of 39 Data Protection Scenario 6 Option 6: Principle 8: Not transferred outside the EEA without adequate protection The inclusion of inappropriate and irrelevant detail within records breaches the 3rd principle and in this case could be considered offensive. Option 1: Principle 1: Processed fairly and lawfully Option 2: Principle 2: Processed for a specified purpose. Option 3: Principle 4: Accurate and kept up to date Option 4: Principle 5: Not kept for longer than necessary Option 5: Principle 7: Protected by appropriate security Option 6: Principle 8: Not transferred outside the EEA without adequate protection Principle 1 requires that personal data is processed fairly; this means that individuals should be informed of the purposes for which their data will be processed and who it may be disclosed to. This is normally done by use of fair processing notices setting out the list of purposes and other information regarding who may have access to the information. Information about staff home addresses is generally provided for Human Resources, payroll and emergency purposes; not for being contacted by the Communications team. It would be far better to distribute the information through internal systems, perhaps accompanying pay slips. Principle 2 requires that information provided for one or more specific purpose should not be used in a way incompatible with those purposes. New decisions about how data will be processed cannot be made by the data controller after the information has already been obtained. Additionally, some contracts may have clauses that enable staff to opt in or out of receiving such mail shots from the Communications team.
  • 19. Page 18 of 39 Data Protection Scenario 7 A company that specialises in data transcription has contacted the Trust. The company is based outside of the European Economic Area (EEA) and is offering a cost-effective transcription service. This seems a great opportunity and the Trust decides to trial the service offered. It sends a set of dictation tapes through a secure courier to the overseas address provided. In accordance with the trial the company transcribes the information, puts it on an encrypted DVD and returns it to the Trust. Shortly afterwards two patients contact the Trust to complain that they have been contacted by a drugs company offering them condition- specific medicines. Which of the eight data protection principles is being breached in this scenario? Data Protection Scenario 8: Retaining records Meg is a new ward clerk at the general hospital. She has been asked to check the storage room and dispose of any old patient admission books. Which of the eight data protection principles is being breached in this scenario? Option 1: Principle 1: Processed fairly and lawfully Option 2: Principle 2: Processed for a specified purpose. Option 3: Principle 3: Adequate, relevant and not excessive Option 4: Principle 4. Accurate and kept up-to-date Option 5: Principle 5: Not kept for longer than necessary Option 6: Principle 8: Not transferred outside the EEA without adequate protection The Trust failed to ensure that there was an adequate level of protection for the personal information and failed to safeguard the rights of the patients concerned. In the case of person-identifiable data, regard should be paid to the guidelines issued by the Department of Health. These require that such information is NOT transferred outside the UK unless appropriate assessment of risk has been undertaken and mitigating controls put in place. Patients should also be made aware of this activity and form of processing via patient information materials. Option 1: Principle 1: Processed fairly and lawfully
  • 20. Page 19 of 39 Data Protection Scenario 9: Information for sale James is an administrations clerk at the local general hospital, currently involved in patient registrations. One morning on his way to work he is approached by a man claiming to be a private detective hired to locate the beneficiary of a will Would James have breached the Data Protection Act by providing this information? Option 2: Principle 4: Accurate & kept up-to-date Option 3: Principle 5: Not kept for longer than necessary Option 4: Principle 6: Processed in accordance with rights of data subject. Option 5: Principle 7: Protected by appropriate security Option 6: Principle 8: Not transferred outside the EEA without adequate protection To comply with Principle 5 data controllers should regularly review the personal data they hold in line with record retention standards and delete information that is no longer required for the purposes for which it was obtained. In this case, the personal data was obtained for the purpose of recording a patient admission to a particular ward over 12 years ago. The information was retained to provide a record of which patients were also on the ward at the same time. However, it is unlikely that this information is still required and it should have been disposed of some time ago. Disposal does not necessarily mean destruction and care should always be taken to do things right when destruction is required. More information on record retention and disposal is provided in the Records Management NHS Code of Practice. Option 1: No, the woman would want to know that she had been left something in the will Option 2: It depends whether he accepts the £100. Option 3: No, James would have only provided the woman’s address, this isn’t personal data. Option 4: Yes, James would have unlawfully disclosed personal data The address is personal data because it relates to a living individual who can be identified either solely with that data or with other information already available. The detective already has the woman’s name and if James had supplied the address this would enable accurate identification. The disclosure would be a criminal offence under section 55 of the Act. James had not been given authority by the Trust to supply this information It makes no difference whether or not he accepts any money for the information. James could have easily referred the matter to his IG Lead, who if necessary can contact the woman and ask whether she wants this information given to the detective.
  • 21. Page 20 of 39 Freedom of Information- Topic 3 If you received a letter from a patient requesting a detailed breakdown of your organisation's expenditure for the year, would you know what to do? The Freedom of Information (FOI) Act 2000 requires disclosure of information by public authorities, such as NHS Trusts, County Councils and Government departments. Exemptions There are several exemptions within the Act, which are circumstances where you will not have to provide the requested information. The exemptions you may need to know about are where: · the applicant could easily obtain the requested information from elsewhere · the organisation already has published or has firm plans to publish the information Or where the information: · relates to confidential business information · is personal information about the applicant · is personal information about someone other than the applicant and disclosure of it would breach either the Principles or section 10 of the Data Protection Act 1998, e.g. it is confidential to a third party. Unless an exemption applies, information must be supplied if a request is received. Spotting a request The FOI Act allows anyone to write to any public authority to ask for information to be provided to them. Which of the letters displayed do you think is an FOI request for information, A or B? The FOI Act only applies to requests for information that do not fall into one of the exemptions as in letter A. The request in letter B is for personal information about the applicant, therefore it should be considered under the Data Protection Act 1998. We will learn more about the actions that need to be taken when an FOI request comes through to your organisation, and what your responsibility is later on in this topic.
  • 22. Page 21 of 39 What you need to know about FOI First of all, take a look at the basic principles behind FOI: Types of information The FOI Act gives the public the right to request any information held by any type of public authority or by persons/organisations providing services for them. This includes educational institutions, NHS Trusts and contractors, Local Authorities etc. The public can request information held within things like minutes of meetings, work emails, work diaries, corporate reports and other work documents. Exemptions may apply for certain information, which therefore would not be disclosed. Form of request Requests for information must be made in writing but there is no need for the applicant to mention the FOI Act. If a patient or member of the public asks you for information that you think is covered by the FOI Act, you should ask them to put their request in writing or assist them to do so. An applicant need not provide their true name in the request, but there must be a valid address for correspondence, which can be a postal address or an email. Processing requests If you receive a request for information, you should promptly forward it to the person in the organisation that has been assigned responsibility for FOI requests. Make sure you know who has this responsibility in your organisation. You will learn more about processing requests on the next screen. Response time Generally, the organisation must comply with requests for information within 20 working days. If the organisation decides not to provide the requested information the applicant must be informed of this and in most cases he/she must also be told why the information has been withheld. Exemptions There are several circumstances under which information should not be disclosed, and earlier you had a brief look at some of the ones most applicable to your organisation. Unless you are the person nominated to respond to FOI requests, you will not have to take decisions on whether information should be withheld. If you are the responsible person, you can obtain further advice from the Information Commissioner’s Office at: www.ico.gov.uk
  • 23. Page 22 of 39 Processing requests A designated FOI lead should be appointed within each Public Authority organisation and they should be trained to make judgement on what can and can’t be disclosed under the FOI Act 2000. So, ask your FOI Lead if in doubt and follow your organisation’s local procedure on dealing with FOI requests. OP13 The role of the Freedom of Information Lead is to establish, develop and manage an organisation-wide Freedom of Information policy and strategy designed to ensure that the organisation fully complies with all aspects of the Freedom of Information Act 2000. They may or may not be directly involved with handling requests for information as and when they arrive. You can also get advice from the Information Commissioner’s Office, the contact details are on their website at: www.ico.gov.uk Breaches of the Act A criminal offence is committed if requested information is altered, defaced, blocked, erased, destroyed or concealed with the intention of preventing disclosure of any or part of the information. Liability Both your organisation, i.e. the legal entity, and the employee that prevented disclosure of information are liable to conviction. The Information Commissioner can take action through the issuing of notices if a complaint is received about the way a request for information has been handled. Information notices The Information Commissioner can issue an information notice that requires the organisation to provide information relating to the particular request that has resulted in the complaint.
  • 24. Page 23 of 39 Enforcement notices If the Information Commissioner believes that an organisation is not complying with the Act, he can issue an enforcement notice requiring compliance within a set timescale. This might relate to providing information that has been incorrectly withheld. Decision notices Here the Information Commissioner can issue a decision notice stating that a request for information has or has not been properly handled. If the decision is that the organisation has not handled a request adequately, the Information Commissioner will set out the steps that need taking to ensure compliance. Failure to comply If an organisation fails to comply with any one of the notices issued, the Information Commissioner can refer the matter to the High Court who can deal with the matter as contempt of court. The Act in practice Have a look at the two case studies below. You are going to see examples of members of the public requesting information and will be asked questions in each case, so pay close attention to what is happening. Remember to consider what constitutes an FOI request and also any breaches of the FOI Act in each case. FOI Case study 1: A call to action? The Trust receives a phone call from an anonymous source requesting details about the Trust’s annual income and expenditure report. Caller: "Hi, yeah. My name's Jeff and I want to know how much money the hospital makes and your general expenditure. I want exact amounts and would like you to get me the details by the end of the week." The receptionist advises him to put his request in writing to the hospital and informs him that a response will follow once the request is received. Later that day, the patient advisory liaison service team (PALS team) receives an email requesting the information. They forward the email to the person responsible for dealing with FOI requests within the Trust, who decides there is no need to disclose the information as it is readily available elsewhere and they have firm plans to publish their next annual report. A response is emailed to Jeff informing him that: · this information is within the Trust’s annual report, which is published on the Trust’s website · if he requires next year’s report, they have plans to publish this at the end of the next financial year, usually by 6th April. The response also contains the link to the Trust website.
  • 25. Page 24 of 39 Select the reason you think the FOI Lead had for not sending the information requested once the written request was received FOI Case study 2: Art attack A children's ward has recently been redecorated as part of a Care in the Community project. A patient’s father is not happy with the equipment being used in the ward. The Trust FOI lead sent the letter to Mr. Heath within one week after receiving the written request. He includes the following in the letter: · a link to these documents on the Trust publication scheme website · a copy of the most recent PAT report for this particular ward · a list of new equipment ordered and due to be delivered by March of this year. Option 1: The applicant didn’t give their name. Option 2: The applicant made the request by telephone. Option 3: Information was accessible elsewhere Option 4: The applicant didn’t state that he was requesting the information in accordance with the FOI Act Option 5: The applicant wasn't very polite The information requested by the applicant could easily be obtained from the Trust’s website, and in fact there was an intention to publish the latest annual report in April. Therefore, the Trust was not obliged to comply with the disclosure request. For information, the person requesting the information is not required to disclose their true identity and neither do they have to mention the FOI Act.
  • 26. Page 25 of 39 Was this FOI request dealt with efficiently and according to the terms of the FOI Act? · Option 1: Yes · Option 2: No Minimising complaints Many of the complaints concerning FOI requests are about organisations not responding to applicants in a timely fashion. Because of the tight timescales it is vital that if you receive a request for information you forward it to the person who has responsibility for FOI in your organisation as soon as possible. It is also important that you comply with good record keeping principles, such as using logical file names for records and documents so that they can be easily located if requested. You will explore good record keeping in a later topic. Option 1: Yes Option 2: No Part of the information was available already so the applicant was directed to where this information could be located, in line with the exemption that the information is available elsewhere. The second part of the request was held by the Trust but not published. This information was disclosed as a valid request was received and the Trust responded correctly by sending a copy of the ‘new equipment order list’ and the PAT report. Additionally, the request was processed and responded to within the 20 working days as required by the FOI Act 2000.
  • 27. Page 26 of 39 Good Record Keeping Getting it right Bob comes to A&E with a chronic breathing condition. The receptionist completes an A&E card for him and finds out that he has attended A&E six times in the last two months. The Nurse checks the Patient Administration System for Bob’s case notes but doesn’t seem to have any record of his previous visits. The Consultant asks the medical records staff for Bob’s paper case notes, but they cannot find them in the records library. They don’t have any tracking system in place to know whether another consultant had requested the notes and not returned them. The filing guidelines had been neglected by the medical records team as they have been too busy carrying out a housekeeping task to archive old records. Files have been left in huge piles but in date order to be filed later when they have time. As a result Bob was admitted and a new set of paper records were created. There are several record keeping risks highlighted in Bob’s case. Lack of history The case notes from previous visits were not logged on the electronic system. This can be a risk to patients as the lack of history means the next team of clinical staff dealing with Bob’s care would not have all the information they need. What if Bob was unconscious? How would they have known about the previous visits and missing case notes? Medical records not tracked The medical records staff were not working according to Trust guidelines. Medical records are not being tracked when taken out and when returned to the records library. Case notes not filed in a timely manner Case notes are left in heaps and not being filed in a timely manner, which means that if a patient visits the hospital again soon after the first visit, key information will be missing from their medical record, as in Bob’s case.
  • 28. Page 27 of 39 A duplicate record has been created The final action to create a new medical record for Bob is necessary in this case but represents very poor practice, as this means a duplicate record is created with only a partial medical history. This could be a risk to the patient and have a huge impact on the care delivered by the clinical team. This topic will provide you with information about good record keeping and about what you can do to ensure records are complete, accurate, and available where and when needed. What is a good record? Which of the following do you think would make a good record? Recording Quality Information Commitment 8 of the NHS Care Record Guarantee promises patients that the NHS will take appropriate steps to make sure personal information is accurate. To meet this commitment you need to ensure that you have good record keeping and ensure records are: Accurate Make sure that when you create a file or update a record the information you are recording is correct and clear. Give patients the opportunity to check records about them and point out any mistakes. Ensure that any factual mistakes are corrected or where appropriate, reported to your manager or a senior clinician. Up-to-date Ask patients to confirm their details when attending appointments and ensure changes of address, name, next of kin details etc are updated as soon as possible. If your organisation has a formal procedure for updating records, make sure you comply with it. Complete, including the NHS Number Incomplete or inaccurate healthcare information can put patients at risk. For example, the lack of certain information could cause a patient to be given the wrong treatment or advice. Ensure patient records include their NHS number; as this helps ensure that the correct record is accessed for the correct patient. There is also a financial implication of keeping incomplete records. All treatments carried out by your organisation are coded on the computer system. If these codes are incorrect, or haven't been inputted, then there is no record of them and the organisation will not be paid for them. The organisation may also face allegations of fraudulent behaviour. Option 1: Legible writing Option 2: Complete, i.e. all the information in one place Option 3: Including accurate information Option 4: Easy to locate Option 5: Written contemporaneously, i.e. at the time an event occurred All of these things are essential to good records keeping. Your organisation needs to make sure the information contained within its records is good quality. Poor quality information is dangerous and presents a high risk to the organisation, the staff and the patients
  • 29. Page 28 of 39 Quick and easy to locate You need to make sure that records and the information within them can be quickly located when required, e.g. by using a logical filing system that allows easy retrieval of records. Make sure you comply with any procedures that aim for consistent and standardised filing of records, and for safe and secure records storage areas. If there are no such procedures, speak to your line manager in the first instance, then the Records Manager or IG Lead if necessary about ways of ensuring efficient retrieval of records and the information contained within them. Free from duplication Good record keeping should prevent record duplication. Before you create a new record, make sure that one doesn’t already exist. Having more than one record for the same patient could increase risks, as there may be missing vital information in one record. It would be pot luck which record is accessible in an emergency situation. Written contemporaneously Good record keeping requires that information is recorded at the same time an event has occurred or as soon as possible afterwards. This means that records will be updated whilst the event, care or otherwise, is still fresh in your mind. Good record keeping There are other issues that you should be aware of and comply with to ensure good record keeping in your organisation. · When you are responsible for using a record containing personal data you should make sure you comply with the Data Protection Act 1998 and the common law duty of confidentiality, these were covered earlier in this module. · Be aware that individuals are able to gain access to their own personal information under the Data Protection Act and to documents under the Freedom of Information Act 2000. Make sure the information you add to records and documents is legible, factual, complete and easy to locate upon request. · Decisions about storage of health records are likely to be handled by your Records Manager, Health Record Manager or your IG Lead. Your organisation is likely to have a records management procedure so you can refer to this for further guidance. · If you have a computer account you will be responsible for maintaining effective document management within it. You should ensure you set up folders with logical names and save electronic documents with file names that reveal what information they contain. In addition, if you receive documents by email, ensure you do not retain lots of attachments in your email account as this can seriously affect the working speed of your account. · All of these measures will assist you to retrieve files when you need them. · When a record has achieved its purpose and no longer has any justified use then it is considered closed. After a record has been closed, it should be kept in line with the Record Management NHS Code of Practice retention schedule which will require you to archive or dispose of the record within a certain timescale · When disposing of paper files, disks or CDs, especially those which contain person identifiable information, you need to do so in the appropriate manner and inline with your organisation's
  • 30. Page 29 of 39 Viewpoints: All staff have a legal and professional obligation to be responsible for any records which they create or use in the performance of their duties. Records Management Policy. For example, in the confidential waste bin, incineration, NHS approved shredder etc. · You should also regularly review your electronic files and emails and make decisions about whether you need to keep a document or email any longer. If it’s no longer needed, consider disposal, either through moving it to an archive file or deletion. · Any record created by an individual, up to the end of its retention period, is a public record and subject to Information requests such as Freedom of Information requests and Subject Access requests. What's the best approach? Which of the following statements shows the correct approach to managing a record? Option 1: “We keep track of records from start to finish, and always destroy them when they are no longer needed by the Hospital.” Option 2: “We keep track of records from start to finish, and always make decisions on how long a record should be kept, at each point of review, throughout the life of the record.” Option 3: “We keep track of records from start to finish, and always keep all records for at least 100 years in case they are needed in the future.” Some records of the deceased may need to be retained by the Hospital to comply with legal obligations, e.g. complaints, disciplinary matters. Other records may have archival value requiring that they are permanently preserved. If retained they must be stored in secure, safe and appropriate storage facilities. Further guidance on how long types of records e.g. supplier records, should be retained is available in the Records Management NHS Code of Practice. The Code also contains guidance on preserving records in an archive.
  • 31. Page 30 of 39 Information Security Scenario “I really need to get on top of updating my patient records. I’ll just pop them onto this memory stick to take home with me Risk The doctor is transferring patient information to a portable device to take home with him. The risk of theft of any portable media is high. But due to their size, memory sticks are at a higher risk of being misplaced. If you have been authorised to use a memory stick to transport patient information it should have encryption applied beforehand. You will look at maintaining security outside of the workplace later in this topic. Scenario “Can I borrow your security pass for a few minutes? I left mine at home!” Risk Angelique has forgotten her door pass. She needs to get something from the stock room so asks her colleague to borrow her pass. Do not lend out your security pass to anyone else – not even to close colleagues. Your pass is intended for you and your use only. You have no control over the security consequences if it gets into the wrong hands, but you will be identified by any audit trail as the individual who accessed the system, room or area. You will explore security in the workplace later in this topic. Scenario “My password is my girlfriend’s name. It’s easy for me to remember that way!” Risk David has chosen a password he can remember. What he doesn’t realise is that anyone who knows him could easily guess it. Always select a password that cannot be found out by anyone else. You will explore best practice for choosing a secure password later in this topic What is information security? Information Security is about ensuring information is: Safe and protected Information should be kept safe and protected at all stages during which it is held by the organisation. You looked at why information must be protected in topic 1 – confidentiality. Information security is more concerned with how information is protected, for example, using passwords, locks and security passes.
  • 32. Page 31 of 39 A reliable record Information should be a reliable presentation of what was recorded, so that people know they can make decisions based on it. It is important that the information we use is a reliable presentation of what was recorded, particularly personal information as this is used to provide care and treatment. Implementing information security measures helps us to ensure that information created or used is accurate, complete and not tampered with. Available to authorised people Information should be available to those authorised to see it at the time they need it. The information security measures put in place must ensure those authorised to use information have access to it where and when it’s needed. Ensuring good information security. What measures should you take to ensure that information is appropriately protected so that access is controlled but the information is available to those authorised to use it? Stop others from viewing the information Don’t leave paper records lying around; lock them away when they’re not being used. Return paper records to the correct storage area when no longer required so that they are available if needed by someone else. Keep electronic records password protected Use a password-protected screensaver to prevent unauthorised access to electronic records if you have to leave your computer unattended. Log out and switch off your computer at the end of each day. Choose effective passwords Choose a good password of at least 6 characters long, with a mixture of letters, numbers and symbols. Keep passwords secret and your smartcards safe. You’ll find out more about creating an effective password later in this topic. Avoid inappropriate disclosures of information Make sure you don’t discuss sensitive information in inappropriate venues, e.g. public areas of the organisation. When you take phone calls ask patients to confirm personal information to you rather than you reading their details out loud. Ensure the premises are secure Don’t leave key coded doors propped open. If you’re the last to leave the building at the end of the working day, make sure windows and doors are locked. If there is a burglar alarm make sure it is turned on. Seek advice from your IG Lead Make sure you know who your IG Lead is and ensure that you seek his/her advice on information security issues. If you discover an actual or potential breach of information security, such as missing, lost, damaged or stolen information and equipment make sure you report it to your IG Lead.
  • 33. Page 32 of 39 Hints and Tips Portable equipment and removable media How else can you ensure information remains secure? · Look after portable equipment such as laptops, PDAs and memory sticks. · If you’re travelling with them ensure you keep them within your sight at all times. Where possible attach a memory stick to a key ring. · For more information on laptop security, please see the module on Secure transfers of personal data. · Only transfer personal information to removable media such as CDs, DVDs and floppy disks if you have been authorised to do so. · Unauthorised access to the information should be prevented by the use of encryption. Password management David chose a password that was easy for anyone who knew him to guess. The password you choose should be memorable but hard to guess. Which of these would be the most effective password? · Option 1: 18feb1980 · Option 2: Reds · Option 3: Dk9+jtb3sH*nw26w · Option 4: #5~Lp4Y ANSWER Option 4- this is because the password uses a combination of lower case and capital letters, numbers and symbols. Personal and acceptable use of IT equipment Personal and acceptable use of the internet and email in your workplace may be permitted to some extent. But what do you think is acceptable and Acceptable use Sending, displaying or knowingly accessing offensive material is a breach of the acceptable use policy. You should not commit to email anything which you would be unhappy to sign your name to in print. Any non-work related email or documents, e.g. private emails, should be stored in your email account or network folder clearly marked as ‘Personal’. Your organisation will have internet filters in place to help block offensive sites, but if you do come across any while doing legitimate work you should inform your ICT Services. Personal use IT facilities such as the internet and email have been
  • 34. Page 33 of 39 personal use, and when is it considered excessive? Personal and acceptable use of IT equipment (Continued) provided by your organisation primarily for business purposes. In most organisations, limited personal use of these facilities is generally permitted during lunch breaks and after work hours. However, not all organisations allow personal use, so please check with your IG Lead or Information Security Officer before you start shopping online! Excessive personal use Excessive personal use or inappropriate use of the IT systems is a disciplinary offence. If your organisation has an acceptable use policy, excessive or inappropriate use will be defined in it, so read the policy. If there is no written policy, speak to your IG Lead or Information Security Officer. In general, it will cover such things as accessing or downloading pornographic images, or carrying on a business using the organisation’s email and other IT facilities or sending harassing or offensive emails, etc. Appropriate use of email Every morning David’s inbox is full of Spam. What should he do with these emails? · Option 1: Reply and tell them to stop sending them · Option 2: File them in a folder marked ‘Spam’ · Option 3: Delete them without opening · Option 4: Forward them if they look interesting ANSWER Option 3, this is because spam email can contain viruses or malicious code which will attack the computer system if opened. Audit trails and reporting security breaches Why is it important that everything you do on a computer, including emails and internet use, can be tracked? Where breaches of security, the law or the acceptable use policy are suspected, this tracked data can be used to aid an investigation. Any incident, however small, wastes time and often requires work to be repeated. It also poses a risk to individuals or the organisation.
  • 35. Page 34 of 39 We can make improvements to security by reporting any breaches through the incident reporting process in your organisation. We can make improvements to security by reporting any breaches through the incident reporting process in your organisation. Installing software David has reported a virus to Angelique. Whilst waiting he downloads anti-virus software from the internet onto his computer. Should he do this? · Option 1: Yes · Option 2: No Malicious code and unauthorised software So, by installing software yourself, you risk infecting the system with malicious code and potentially creating licensing issues for the organisation. Here is some advice about the issues and what you can do to counter the risk of either occurring. Malicious code Malicious code includes computer viruses and spyware, and the effects will vary depending on which you have downloaded. Some malicious code will just waste time while another can destroy data ANSWER: You should never use software that hasn’t been authorised by your organisation on your work computer. There are two main reasons why you should never do this. · First, you risk infecting your computer, other computers and the network from malicious code embedded in the software · Second, there are licensing issues. Your organisation has to pay for a license for the software used on its systems.
  • 36. Page 35 of 39 or even allow another user to gain access to your computer. Email attachments you receive may also contain malicious code. To combat some malicious code, your organisation has an anti-virus system that will catch most incoming viruses on emails. You can help by being extremely cautious of opening email attachments from people you don’t know. Remember: Do not download software from the internet, from free CDs etc, unless you have been authorised to do so. If in doubt get advice from your ICT Services helpdesk or IG Lead or Information Security Officer. Unlicensed software Software includes any programs and games you download from the internet, on floppy disk, CD or any other storage media. Your organisation will have processes regarding the installation of such software, and if you install software without authorisation this process is bypassed. You then put the organisation at risk of legal action from the owner of the software. Any ‘free’ software could be an illegal copy, or it could be trial software with an expiry date. Even if neither of these things apply, the software is likely to be for single personal use and require a licence for corporate use. Remember: Do not install software from the internet, from free CDs etc, unless you have been authorised to do so. Securing Access to Information Who do you think is responsible for securing information in your workplace? · Option 1: Senior Management staff · Option 2: Receptionists · Option 3: Nurses · Option 4: Doctors Summary – Information Governance This module has given an overview of Information Governance (IG). You’ve reached the end of the module "Introduction to Information Governance for NHS". Information governance allows organisations and individuals to ensure information is processed legally, securely, efficiently and effectively. IG applies to all the types of information which your organisation may process, but the rules may differ according to the type of information concerned. ANSWER: It is everyone’s duty to secure information at work, no matter what your role. This means you’re responsible for reporting any known or suspected breaches in security, as well as any weaknesses in security measures. Make sure you know who your IG Lead or Information Security Officer is.
  • 37. Page 36 of 39 Responsibilities Remind yourself of the answers to these questions. Who is responsible? Remember: everyone is responsible for Information Governance and for: · providing a confidential service to patients, sharing information lawfully and appropriately · recording information accurately and ensuring it is accessible when needed · ensuring that information is held securely · processing information in accordance with the ‘data protection rules’ and respecting the rights of individuals · complying with Freedom of Information requirements. Where can I get advice about confidentiality? If you need any advice about confidentiality issues, you should refer to the: · IG Lead or Caldicott Guardian in your organisation · Care Record Guarantee which sets out our commitments to patients · Six Caldicott principles for handling patient information · Confidentiality NHS Code of Practice · Information Governance Toolkit. How do I comply with good record keeping principles? When you enter information into a record or document, ensure it is: · accurate · legible · written at the time an event occurred. When you are responsible for storage of files or documents, make sure you use a logical naming and filing system so that they are easy to locate and retrieve. For more in-depth information about records management principles, see Records Management NHS Code of Practice in "Read More About It". How can I keep information secure? Look at your organisation’s Information Governance or IT policy specific to your area for the security standards you need to meet. In general you should: · choose a secure password, and keep it private · lock away files when they are not in use · delete spam emails without opening them · never use unauthorised software. Are there any tools that will help? The Information Governance Toolkit is an online tool that aims to support NHS organisations in handling information correctly. The Toolkit: · encourages staff to work together and share knowledge · assists organisations to develop strategies and policies · provides a number of resources that can help with the handling of information
  • 38. Page 37 of 39 · contains a set of standards for information handling that organisations can rate themselves against. Relevant legislation There are two pieces of legislation that you need to be aware of when thinking about Information Governance. The Data Protection Act 1998 This Act states that information should be: · processed fairly and lawfully · processed for a specified purpose · adequate, relevant and not excessive · accurate and kept up-to-date · not kept for longer than necessary · processed in accordance with rights of data subject · protected by appropriate security · only transferred outside the EEA with adequate protection. The Freedom of Information Act 2000 This Act gives the public the right to request any information held by any type of public authority or healthcare organisation. · These requests must be made in writing · Organisations must respond within 20 working days · Each organisation must have an FOI lead who is trained in dealing with these requests. If your job requires you to deal with FOI requests you are advised to participate in a more advanced training package. The next step is to take an assessment on this module once you have completed all the topics. It is recommended that you have a quick revision session before attempting the assessment to help you achieve the final pass mark of 80%.
  • 39. Page 38 of 39 Assessment To carry out your assessment online via the KITE site please follow the instructions below: · Select the back button on the internet page browser · Then select the “Information Governance Questions” button from the KITE site · Work you way through the KITE question package · Once complete the package will give you your score, you must have a pass rate of 80% or above to complete the training. · If your score is under 80% the package will direct you back to the beginning to have another go. · If you pass you will be forwarded to the KITE certificate screen. Please fill in your details, which will automatically be forwarded to the Training database team.