Document Management. Children s Services. Guidance. Partner organisation logo Version: 3

Size: px
Start display at page:

Download "Document Management. Children s Services. Guidance. Partner organisation logo Version: 3"

Transcription

1 Document Management Children s Services Guidance Partner organisation logo Version: 3 Effective from: 8 Aug 2010 Revised: January 2014 Next review date: January 2016 Signed off by: Stuart Gallimore Title: Director of Operations, Children s Social Care Date: January 2014

2 Version: 3 Page 2 DOCUMENT MANAGEMENT FOR CHILDRENS SERVICES IN FRAMEWORKI INDEX INDEX Page INTRODUCTION 3 BUSINESS CONTEXT 3 DOCUMENT MANAGEMENT 3 E mails in 3 E mails out 4 Fax In 4 Fax Out 5 Paper mail in 5 Scanning 5 Hard copies 5 FILE LOCATION 6 NOTES 6 Note Types 6 General Notes 6 Warnings 6 Warning Types 6 ACTING FOR 7 Data Protection guidelines 7 ASSIGNING/REASSIGNING WORK 8 GUIDANCE ON RECORDING CONTACTS 8 GUIDANCE ON RECORDING CASE NOTES 9 SECURITY 10 STAKEHOLDERS 11 APPENDIX 1: GUIDANCE ON UPLOADING DOCUMENTS 13 APPENDIX 2: GUIDANCE ON NAMING CONVENTION 18 APPENDIX 3: ADDRESS CONFIDENTIALITY 20 APPENDIX 4: INFORMATION ON AN OPEN CASE 22 Author: Sue Price, Principal Manager Policy and Practice 2

3 Version: 3 Page 3 INTRODUCTION 1. This document is a guide to how document management should be undertaken following the introduction of the frameworki case management system, to Children s Services. 2. The information presented in this document is a result of consultation with both the business and with Support Services (ORMS). 3. The maintenance of the child s record is a shared activity and will involve both support staff and all the social care staff that are involved with a child at any one time. The child s record is a record of key information about the needs, interventions and outcomes for a child or young person. 4. The data and information under consideration is personal customer information and information about service providers. It may contain financial details and is generally considered to be information of the highest level of sensitivity, requiring enhanced security. Document Management Principles and use the most efficient approach and minimise duplication of effort wherever possible create a single view of the child enable decision making based on full current case information rationalise processes that are often time consuming and duplicated maximise new technology such as the GCSX secure network be consistently applied across all areas of the business be based on business requirements be underpinned by training, policy and guidance be in line with data security guidance BUSINESS CONTEXT 5. Children s Services provides family support to children in need and at risk of harm, services to children in care, and provides a range of placements for children not living at home. The Service works in accordance with legislation and practice guidance that is common to all local authorities. 6. Teams are based in a number of locations. In all these locations documents are received, generated and sent out using a variety of methods. DOCUMENT MANAGEMENT 7. Processes linked to the receipt, generation and communication of information can broadly be described as follows: E mails in: received directly from children or young people, from family members and from other professionals within and outside of the County Council, to the individual WSCC e mail address on Lotus Notes or Outlook. Author: Sue Price, Principal Manager Policy and Practice 3

4 Version: 3 Page 4 Currently, e mails containing sensitive or personal data cannot be received from Health, Police, and some other partner agencies via the standard Lotus Notes or Outlook addresses, as these are not secure sites. In order for such e mails to be received, they need to be sent to a GCSX secure network address. To acquire a secure address the owner needs to undertake on line security training and give an undertaking about care of this information. (see GCSX guidance) 8. If it is necessary to record the content of an on a child s record there are a number of options: Key points could be typed/ transcribed directly into the Case Note, or into a Contact. The Contact allows for further actions to take place depending on the decision made; the outcome chosen. This is particularly relevant if information about potential risk of harm to a child is received, on an open case (see APPENDIX 4). It allows a strategy meeting to be chosen as an outcome to start Child Protection activity, or it can be used to record a Missing Child (see MIN 19). You should not copy and paste text from an e mail into fwi as it can adversely impact the system, and affect the chronology function; only plain text can be recorded in Case Notes. Sometimes an e mail will have considerable content which you feel should be saved in it s entirety to the child s record; if so you will need to save and upload the into either the documents screen of an episode (if it is pertinent to that particular episode, and the episode is still available to edit) or it can be uploaded to on the blue button bar of the Child s record. (see guidance in APPENDIX 1 on uploading documents) This also applies to saving and uploading other documents. 9. It is good practice to record a case note, detailing what you have uploaded to frameworki, and what the upload is called. (see guidance below in APPENDIX 2 on naming conventions ). 10. If e mails have attachments that need to be uploaded to fwi you should detach them and follow the procedure for uploading (APPENDIX 1) and naming documents (APPENDIX 2). Before attempting to upload documents you should create a folder in your H:drive called frameworki Uploads. Anything you wish to upload into frameworki should be saved in a secure temporary location. The idea behind saving in your H:drive is that you will have a shorter path to find any documents you have saved. Once you have uploaded the document to frameworki it must be deleted from your H:drive. 11. E mails out: to other agencies containing sensitive information should only be sent using the GCSX secure network addresses. This restricts such communication to other Government agencies and does not cover the majority of Providers, the voluntary sector or others involved with a child. Where information is being sent to a child or parent without a secure e mail address the subject should be made aware of the slight risk that exists and have agreed to this through the existing Consent to Share. There is no functionality in frameworki for direct ing out. 12. E mails sent internally using the County Council network are not subject to the same GCSX requirement. However, it should be unnecessary to send fwi Author: Sue Price, Principal Manager Policy and Practice 4

5 Version: 3 Page 5 documents in this way unless the recipient does not have access to fwi. It should always be remembered that e mail communication about a child or family member will form part of the core record, and the content should therefore be couched in a professional manner. To upload s to the record please follow the procedure set out in APPENDIX Fax in: faxing remains a common method of communication due to the issue of insecure e mail addresses, and for organisations or individuals without access to a computer. Some faxes are typed, many are handwritten. 14. When using frameworki the same principles apply as to e mails in. Depending on the content of the fax it may be scanned and attached to the record, scanned and key data only input into a form, transcribed in full onto a frameworki form, or transcribed into a case note. 15. If a fax is legible, is communicating information and no response is required, then it should be scanned into the record and the paper copy destroyed. It is good practice to write a case note recording the receipt of the fax. 16. If a fax requires a decision and action then it should either be transcribed in full into a form (depending on length and legibility) or scanned, and key data entered into a form. This will ensure that an outcome is recorded and any necessary workflow commenced. If the fax is poor quality then it will need to be transcribed in full and recorded either as a Contact or a case note. 17. Fax out: Faxes are sent out from the business when onwards communication is required and the document is either not held electronically or should not be sent through an insecure network, due to its content. Faxes are frequently of forms already completed by the practitioner (e.g review forms). In these circumstances it may be appropriate to send a hard copy by post unless speed is the determining factor. A case note on the record should record this activity. 18. Paper mail in: In general, documents should be keyed in, in full or part, when received as a completed form either by fax, by post or e mail. 19. Scanning: Other documents will be scanned in order to achieve a single, integrated customer record. It must be determined whether the document is in a condition worth scanning. If it is unreadable, so will its image be. In this instance another option should be chosen; either transcribing the document or storing the paper version and noting this on the record. 20. Hard copies: Documents with customer signatures signifying agreement or consent to share information, etc should be scanned for general availability and kept in hard copy. This will ensure the highest level of integrity should the document be required in the event of legal challenge. Documents such as deeds, guarantees or certificates, which are not the property of the Council, must not be destroyed without the express written permission of the owner. It is reasonably safe to destroy a document when its image has been captured and managed in accord with the BIP 0008 Code of Practice. 21. There is a system stamp on all entries, which establishes ownerships and responsibility. System roles and responsibilities have been developed for frameworki in line with the corporate principles of data ownership. Author: Sue Price, Principal Manager Policy and Practice 5

6 Version: 3 Page 6 Customer Data Statement of Policy (PDF) accessible for staff through the search engine on the county council s intranet. The system has been set up to reflect these same principles. Decisions about making changes to the system set up will also be made in line with these principles. FILE LOCATION 22. File location for existing paper records, must be recorded on frameworki to enable the whole record to be accessed easily, and all records to be held and destroyed in line with current policies. NOTES File retention destruction policy children s services 2013 (PDF) (linked to MIN 30) From the customer s personal details screen there is a button called File location. This offers a picklist: Open Closed Deceased Archived Miscellaneous papers 23. Note Types : contains both general and warning type notes which, when entered, appear on the customer front screen. 24. General Notes: appear in black in the middle right of the screen and the title on the drop down list pulls through. The list is as follows: Access Information Allergies Communication Needs Consent to Share Information Cultural and Religious Needs Emergency Contact Other General Note 25. Warnings: Warning notes appear in red at the top left of the screen and the title on the drop down list does not pull through. Warnings must be entered and managed in accordance with MIN 25 and the Warning Information Policy. Warning information policy 2013 (PDF) (linked to MIN 30) This gives guidance on holding information in accordance with Data Protection guidelines which are set out below. 26. Warning types Potential Risk to Children Warning Potentially Violent Warning DOLS Authorisation Severe Allergy Warning Warning - Other Author: Sue Price, Principal Manager Policy and Practice 6

7 Version: 3 Page 7 ACTING FOR Data Protection guidelines: Personal data shall be managed in the following ways: 1. Fairly and lawfully processed. Whether the processing is 'fair' will depend on what expectation of privacy employees have in relation to their personal data. A thorough communication of the and internet policy will highlight to employees that they have no right to privacy in terms of their s or internet access. The policy informs them of the monitoring arrangements. Unless not practical, employees should be warned before their systems use is monitored. 2. Obtained only for 1 or more specified and lawful purposes. Personal data obtained pursuant to an investigation into systems misuse should not be used for any other purpose. 3. Adequate, relevant and not excessive. The investigation should monitor a limited time period and be a proportionate response to a genuine suspicion. 4. Accurate and, where necessary, kept up to date. 5. Not be kept for longer than is necessary. The information which arises during the investigation should be communicated to the relevant contact in HR immediately the investigation is finished. It should not be retained by IT Services. 6. Processed in accordance with the rights of data subjects under this Act. Individuals have a right of access to their personal data. The data used in the investigation may be disclosed to the individual unless this would be prejudicial to any potential criminal investigation. 7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. A nominated member of staff should carry out the investigations. Their reports are confidential and should be communicated to the HR department securely to prevent any unauthorised personnel obtaining access to the information. The information should not be disclosed to the individual's line manager by IT Services. 8. Not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data. 27. Acting for is a function within Frameworki that needs to be governed by a set of rules. Acting for another user confers all the system roles and authorisations on the delegated individual. 28. Each worker will have only one login. This login will be their main user record on frameworki. In addition to this main login, each user can optionally be set up to act for other users. 29. Managers and Senior Practitioners in similar teams can be set up to act for each other to maintain the flow of work, especially in relation to outcomes and authorization. In this way the Authorisation function that sits with managers can be shared with the Senior Practitioner, to authorise action, and to agree spend. If this is a regular part of a Senior Practitioners work then it would be preferable to give this Authorisation in their own right rather than as an act for function. 30. Sometimes workers will act for a different version of themselves. They will do this if they need to work under a different role to their normal one or if they Author: Sue Price, Principal Manager Policy and Practice 7

8 Version: 3 Page 8 need to access a different teams workload than their normal team. 31. Sometimes they will act for a virtual worker. This may be a virtual duty worker, or a virtual unallocated worker. 32. Admin staff will be set up to act for Virtual Admin workers in the relevant hubs/teams. 33. It is not acceptable for support staff to be given act for permissions for operational staff, and neither is it generally acceptable for staff to act above their grade when acting for. This should be by exception rather than rule. ASSIGNING/REASSIGNING WORK TO TEAMS OR TO WORKERS 34. In West Sussex we will be restricting the ability to assign work, to Team Managers and Senior Practitioners, Admin and Finance. 35. If work is sent to a Team, then the Manager, or anyone with a "Leading Role" will assign that work to a named worker. Once work has started it cannot be put back into the Team folder. If work is sent to a worker, this could be to either a real worker or a virtual worker. Whoever has the ability to act for this virtual worker can pick up the work and work on it while acting as the virtual worker. If you have a Leading role you could also choose to reallocate it to yourself. Reassigning work will happen if a worker is off sick or on leave, and an episode needs to be progressed. The manager will need to look at uncompleted, incoming and sometimes the future work folders, as well as incoming tasks, and reassign work accordingly. GUIDANCE ON RECORDING CONTACTS 36. A Contact is used to record information, which may or may not lead to a referral and an assessment. It will be heavily used by the Children s Access Point (CAP) as the first point of contact, and has other uses on open cases as described in Appendix Recording all contacts is good practice, not just those that result in an assessment or a service, as it reflects the volume of work undertaken, records advice and redirection and starts to build a customer history. 38. It is highly likely that there will be repeat calls, and recording information helps to build up a picture of customer needs and options explored. A professional s time will have been spent assisting the caller and it is important to reflect this service. It is also key data to reflect and shape the Information and Advice Strategy across the County Council, aimed at assisting residents to help themselves wherever possible through accessing universal services. 39. Frameworki does not allow the completion of a Contact episode containing just the referrer s details. The subject s name, address and DOB or approximate age, are all mandatory fields. As far as possible this information should be elicited from the caller even if the outcome is redirection to another Agency or the provision of information and advice. 40. Should a caller refuse to give subject details, this cannot be recorded as a Contact on frameworki, and so should be disregarded for inputting. 41. The exception to this is if the caller is raising a Child Protection or Safeguarding issue of potential risk to a vulnerable person. In this instance all available information must be recorded and pursued by the Help Desk with the aim of identifying the location and name of the person potentially at risk. This should be recorded in the first instance by setting up a dummy record in order to progress. Author: Sue Price, Principal Manager Policy and Practice 8

9 Version: 3 Page Guidance on how to set up a dummy customer record: INITIAL SET UP OF THE CUSTOMER RECORD: To start a new record on Frameworki it is necessary to enter a name. If information is received about a possible risk of harm to a child but the name is unknown, the same of Anon-CP should be entered. It will be helpful to have easy access to the date that the referral was made so this should be entered as the first name eg The Person Class of Anonymous Child Protection should be selected All other information provided can then be entered. RECORDING THE ACTUAL SUBJECT NAME: When the subject is identified by name, the appropriate anonymous record should be ren-named. If it is found to be a person who already has a record on Frameworki, this record and the appropriate anonymous record can be merged by the IT Business Support team. GUIDANCE ON RECORDING CASE NOTES 43. If the case manager is recording the Contact and no further workflow is needed to record further action then a case note would be appropriate. When there is any decision made on a case, either at a meeting or in conversation between a manager and practitioner there should be agreement about who should record this decision on fwi. 44. Case note types are listed alphabetically in Children s frameworki as: a. Adoption Information b. Case Audit c. Case Summary d. Contact Arrangements e. Correspondence f. Legal g. Manager s Comment h. Other i. Record of Meeting j. Record of Supervision Discussion k. Safeguarding l. Serious case Review m. Telephone Contact n. Visit In addition to choosing the case note type it is important to add a title that is meaningful. The case note type will show when the case notes are listed, and can be used for sorting. The title is completely free text and can be given by the writer as they see fit. It is also possible to sort case notes by key words in the title. 45. For example, FRT staff may wish to quickly identify all their activity by using FRT home visits, as the subject of the note. Being careful with the title enables a more meaningful sorting of case notes can take place. Author: Sue Price, Principal Manager Policy and Practice 9

10 Version: 3 Page Third party information that is relevant should be recorded. Wherever possible staff should ensure that permission is gained from third parties so that information can be shared on an ongoing basis with customers. (see Recording Policy and Guidance Sept 2010 (PDF) SECURITY 47. New policy, procedures, guidelines and training have been necessitated by the rapid development of electronic communication, mobile working, hot desking, the availability of memory sticks and the security requirements of Government departments. 48. In some cases there are technical solutions that need to be enabled such as the GCSX connection and encryption of laptops and memory sticks. Only memory sticks supplied by WSCC should be used to transfer customer data and information and these should be encrypted. There are county council policy documents on information security which are all accessible for staff through the search engine on the county council s intranet. The Acceptable Use Policy for IT facilities is the key reference document. 49. In addition to these changes there are some underlying principles that should be applied to all methods of recording information within Children s Social Care. 50. Whether using an electronic device, a verbal exchange or a paper note book these principles should be applied: Ensure that members of the public cannot view your computer screen or paper reports or notes. Ensure that you are not discussing confidential matters or using identifying names in a public place where you can be overheard. Do not leave your computer, hand written notes or notebook unattended in the office without first ensuring that confidential information cannot be viewed or accessed by others. There is a Corporate Clear Desk Policy that reinforces this requirement. This is outlined below: Clear desk policy: The clear desk policy isn t an actual policy ; it is a way of working that helps facilitate the use of the flexible workspaces. At the end of the working day we are asking that out of respect for the next person wishing to use the desk you clear down all of your files and personal belongings including your laptop if you have one, and lock them in your personal locker or take them home with you. If you are away from your desk for more than 3 hours, please make sure that the desk you are using is clear. This will enable another member of staff to use the desk if required. The clear desk policy is there simply to enable any member of staff to work from any free desk. Close your computer down or lock it when moving away from your desk. Do not take papers concerning other families on home visits. Take great care of your notebook and do not leave it unattended. If travelling by car between appointments lock any information you may need to leave in the car (paper or electronic) in the boot when leaving the car for a visit. Author: Sue Price, Principal Manager Policy and Practice 10

11 Version: 3 Page 11 Once transferred to the electronic record handwritten notes should be destroyed as Courts now accept electronic records as the accurate record. The current standard (MIN 5 PS8) is Record of visit to be recorded within the Child In Need, Child Protection or Looked After Child episode on frameworki within 24 hours of the visit taking place. If you take electronic or paper records home with you it is your responsibility to keep them safe at all times and to maintain confidentiality. If you lose or mislay information, or have a near miss you must report it to your line manager who should complete the Security Incident checklist and send to your ISMG member and /or the Policy and Planning Security lead (Shantha Dickinson) Security follow up template (word) (linked to MIN 30) 51. Although breaches of this policy may lead to disciplinary action being taken there is a need to strike a balance between punishment and education. It is in no-one s interest to have data losses or breaches covered up due to fear of the consequences and so the circumstances of each incident should be carefully investigated and assessed before any action is taken. 52. Where there are system, process or practice changes that would support better information security habits they should be identified, promoted and actively supported. However, if there are serious or repeated breaches then this may constitute gross misconduct and result in dismissal and/or legal prosecution. 53. West Sussex County Council is obliged to report data breaches to the Information Commissioner s Office (ICO) and this can result in both a financial penalty and reputational loss. One of the most significant factors is impact. For example, in the case where a confidential foster placement address was disclosed to parents the impact was that the children had to be moved. This was viewed extremely seriously by the ICO and resulted in a large fine. STAKEHOLDERS 54. Children, young people and their families have a legal right to expect that personal and confidential information will be kept securely and shared appropriately with their permission. They have the right to access their own record under the Data Protection Act. 55. Partners: Have the right to expect that information they provide will be kept securely and shared appropriately with their permission. 56. Children s Services staff: should be provided with guidance and training proportionate to their role and have a right to expect that equipment will be provided to support their key activities and ways of working. Staff should expect to be held accountable for information storage and management. 57. Support Services staff: should be provided with guidance and training proportionate to their role and have a right to expect that equipment will be provided to support their key activities and ways of working. Staff should expect to be held accountable for information storage and management. 58. Financial Services staff: should be provided with guidance and training proportionate to their role and have a right to expect that equipment will be provided to support their key activities and ways of working. Staff should expect to be held accountable for information storage and management Author: Sue Price, Principal Manager Policy and Practice 11

12 Version: 3 Page Customer Care Team: Complaints and Customer Care Team staff will be called upon to address complaints relating to information management and security should a breach be identified by a customer. A breach will need to be viewed in line with the circumstances, policy and guidelines relating to information management and data sharing protocols. 60. IT: IT staff manage the system infrastructure used to hold and record information and solutions need to be developed in partnership with IT to ensure that they meet corporate standards and guidelines. 61. County Council: Any breach of data and information management has an adverse affect on the reputation of the County Council. This guardianship role is invested in the Data Protection Manager and the IT security staff. Author: Sue Price, Principal Manager Policy and Practice 12

13 Version: 3 Page 13 APPENDIX 1 GUIDANCE ON UPLOADING DOCUMENTS TO Fwi There are 2 places where documents uploaded to frameworki are stored. If a document is received which relates to a current and open episode e.g a LAC review then the document must be uploaded to the episode. The document will also appear in Documents immediately. The forms in the episode will only show in Documents once the episode has been finished If there is no open episode then the upload should be to Documents. The identification of documents is key and if there is no open episode e.g between LAC reviews then the choice of main category is an important indicator of what the document relates to How to upload a document. Uploading a document On the personal details screen you can view any documents that have been uploaded and attached to the child s record and upload other documents as required. Important note: If the document is relevant to an episode it is important to upload it in the documents section of the episode. First, it is recommended that you create a folder on the H:/drive called Frameworki Uploads. Ensure the document you wish to upload has been saved to this folder. DO NOT save document to the Desktop as this is NOT a secure location. 1. Click on Documents if the document is not relevant to a current episode OR Open the relevant Episode and access the Documents section Author: Sue Price, Principal Manager Policy and Practice 13

14 Version: 3 Page Click on the Upload button 3. Click on Browse 4. Double click on the H:drive and navigate to the Frameworki Uploads folder 5. Select the document you wish to upload 6. Click on the Open button Author: Sue Price, Principal Manager Policy and Practice 14

15 Version: 3 Page Once the document is attached you can: > Rename the file name (File as ) add a date for reference > Select a Main category > Select a Sub-category, if applicable 8. Click on the Save button A copy of the original document is now attached to Frameworki. It can be viewed or edited as required. Remember now you must delete the document from your H:drive! It is very important to delete the original copy from the Frameworki Uploads folder on the H:/drive. Failure to do this could mean that more than one version of the document exists. All future amendments MUST be made via Frameworki. View or Edit an Uploaded Document To view an uploaded document click on the blue link Author: Sue Price, Principal Manager Policy and Practice 15

16 Version: 3 Page 16 To edit an uploaded document click on the Edit icon 1. Click on Download Copy of Document 2. Click on Open and read or edit as required NB Once you have edited the document you must re-save it to the H:/drive and upload it back into Frameworki Password protection must be removed from all documents before they are uploaded to frameworki. To do this: Open the relevant document using the provided password Go to File and click on the Information tab on the left hand side of the page A Protect Document button should be highlighted on the screen stating that A password is required to open this document Click on the Protect Document button and select Encrypt with password from the drop down list Remove the password that is entered in the box and click ok Save the document This will remove the password encryption and therefore allow the document to be uploaded to FWI without any issues. All documents can be searched for in Documents. Documents that need to be attached and sent out following reviews should be found in the relevant episode. In order to simplify the search a consistent naming convention is required. Author: Sue Price, Principal Manager Policy and Practice 16

17 Version: 3 Page 17 GUIDANCE ON SAVING AND UPLOADING AN FROM OUTLOOK Text from s should not be copied into a case notes as this can cause system problems. Please follow the instructions below to attach the full to Frameworki. Saving & Uploading an from Outlook TEXT FROM S SHOULD NOT BE COPIED INTO A CASE NOTE AS THIS CAN CAUSE SYSTEM PROBLEMS. PLEASE FOLLOW THE INSTRUCTIONS BELOW TO ATTACH THE FULL TO FRAMEWORKi In Outlook: Open the that you want to save Click on File Select Save As Give the an appropriate name and save to a Designated Folder in My Documents Select Text Only from the Save as type drop down list. Click In Frameworki: On the customer s Personal Details screen, click button. Click to navigate to the saved . and then the Select My Documents from Libraries and then open the Designated folder where you saved the Once you have found the saved click on it (it will turn blue) now click Open. File as * Allows you to re-name the (adding a date is useful for future searches) Main Category * Select Category Click Save. ***Once you have Uploaded the , you MUST delete it from the My Documents folder*** Author: Sue Price, Principal Manager Policy and Practice 17

18 Version: 3 Page 18 APPENDIX 2 GUIDANCE ON THE NAMING CONVENTION FOR FILING DOCUMENTS IN FWI 1. Guidance at point 7 in Appendix 1 on how to upload a document describes how, once the document is attached, it needs to be renamed and saved. This must be done consistently for ease of retrieval, and because the record is likely to be searched by users who have not themselves saved the document. 2. The agreed naming convention is set out below. This must be followed in all cases. The main purpose of having a consistent naming convention is to ensure easy and accurate access to documents and so name the upload as clearly as possible. If it is helpful to write Letter in from solicitor rather than just Letter then please do so. 3. <file as: file name and date document written (or received if there is no originating date) and > main category 4. For CP/LAC reports the date of the Conference/Review should be entered rather than the date written if the document is not being uploaded into the episode. FILE AS (NAME SUGGESTIONS) Contact Agreement dd.mm.yyyy Letter dd.mm.yyyy OOH Log dd.mm.yyyy GP Report dd.mm.yyyy Consent to Share (Adult s Surname) dd.mm.yyyy HV reply dd.mm.yyyy ICPC report dd.mm.yyyy Memo dd.mm.yyyy Report dd.mm.yyyy Complaint Letter In from MP (Complainants surname/) dd.mm.yyyy Name of Service dd.mm.yyyy ICPC/RCPC Report dd.mm.yyyy Request For Information dd.mm.yyyy TAC Minutes dd.mm.yyyy Chronology dd.mm.yyyy (date chronology created) MAIN CATEGORY (PICKLIST) ADOPTION (LAC episodes - from Best Interest to Placement Order) ADOPTION SUPPORT (receiving a service from the Adoption Support Team) AGE ASSESSMENT (episode used by Gatwick Team) ASSESSMENTS (episodes - Initial and Core Assessments) AUTHORISATION (Documents giving consent to the County Council) CHILD PROTECTION (episodes:s47,strategy Meetings, ICPC, RCPC, Core groups) CHILDREN IN NEED (all episodes relating to S17 CIN) COMMISSIONING (Episodes relating to purchasing or arranging a service for a child) COMPLAINTS (No episode). CONTRACT DOCUMENTS (No episode) EDUCATION (all episodes) GENERAL (all episodes) HEALTH DOCUMENTS (all episodes) HISTORY PRIOR TO FRAMEWORKI (could relate to any episode or no episode) Author: Sue Price, Principal Manager Policy and Practice 18

19 Version: 3 Page 19 FILE AS (NAME SUGGESTIONS) Education Report dd.mm.yyyy Report dd.mm.yyyy Legal Advice (CONFIDENTIAL) dd.mm.yyyy Application for EPO Report dd.mm.yyyy Migrated Chronology dd.mm.yyyy (date document created) Assessment dd.mm.yyyy College report dd.mm.yyyy MOGP dd.mm.yyyy Report dd.mm.yyyy Letter dd.mm.yyyy Letter dd.mm.yyyy Report dd.mm.yyyy Report dd.mm.yyyy MAIN CATEGORY (PICKLIST) LAC (all episodes and cases where child has a LAC legal status) LEAVING CARE (all episodes and cases where a y/p has a status of S24) LEGAL (Legal advice or planning meetings. May be part of a LAC or CP episode. Advice provided to Children s Services should not be disclosed as part of the child s record) LEGAL PROCEEDINGS (Episodes where legal activity is initiated) MIGRATION (documents that have been migrated from another system e.g eric) OT/ROVI (episodes) PATHWAY PLANNING (episode) PERSONS POSING A RISK (no episode) PLANNING (all care planning episodes CIN, LAC, CP, Pathway Plan) PRIVATE FOSTERING (episode) REFERRAL (episode) SERVICE PROVISION (relating to any service provided or commissioned e.g Children and Family Centre, LAC placement) TRANSITION (episode in transition to Adult services) Author: Sue Price, Principal Manager Policy and Practice 19

20 Version: 3 Page 20 APPENDIX 3 ADDRESS CONFIDENTIALITY Customer addresses have a number of rules applied within the system which must be followed to avoid the inadvertent sharing of information. 1. Where an address should be recorded but not displayed (for example the placement address of a child) then the way to set this up is: leave the parents home address as the main address tick the display address box add the Placement address by choosing the address type of Placement and leaving the display address box empty (see below) This will ensure that the address that pulls through onto documents is the display address which is the main parental home address. The placement address will be visible in the child s personal details screen but not printed on documents or visible on the front screen. Author: Sue Price, Principal Manager Policy and Practice 20

21 Version: 3 Page When setting up a carer, two addresses must be entered to avoid the carer s address being displayed on the child s documentation. Enter xxx in the postcode field and then press Find Address and choose CONFIDENTIAL ADDRESS Tick the Display address box and choose an address type of Main address 3. This will ensure that the displayed address is always xxx. 4. The real address is displayed in the address history by entering the address, leaving the display address field blank and choosing main address as the address type. This will not appear on the front screen of the carer s record or be pulled through onto documentation but it will be displayed as part of their personal details. 5. NB Once phase 2 of frameworki has been implemented the current LAC placement will pull through the address of the allocated carer from the purchasing episode. This comes from the allocated carer address (not the child s details) it will therefore be particularly important to ensure that not only the child s details are set up to keep the placement address confidential but also the carers. Author: Sue Price, Principal Manager Policy and Practice 21

22 Version: 3 Page 22 APPENDIX 4 RECEIVING INFORMATION ON AN OPEN CASE When significant information is received on an open case, or the child is at potential risk of harm (this could be following receipt of a MOGP re: an incident of domestic abuse or a child who has gone missing) then the process is either: Record this as a Contact > record the outcome as Follow up Information Received and then choose > the Strategy Discussion option if this is a child potentially at risk, or Contact > Notification of Missing Child or Young person (MIN 19) if this a child missing for whom there are not immediate safeguarding concerns (e.g if the child has returned home) or Contact > Follow up Information Received for anything else that is significant but not safeguarding. One common reason for such a contact is if a young person has moved out of the family home and in with friends or relatives that may become a private fostering arrangement. The process in this case is: Contact> Follow up Information Received> Private Fostering Assessment The reasons why all such notifications must be recorded in this way rather than just as a case note are three fold: Recording a Contact opens up new episodes and workflows if required. A Contact is in itself an episode and will form part of the chronology. (A case note can also be selected to appear in the chronology but is less easily visible when looking for incident patterns) Documents can be uploaded into the episode for easy location. Where children are exposed to numerous low level incidents of domestic abuse, or frequently abscond or go missing for short periods of time these incidents may not receive a response if seen in isolation, but when seen as part of a pattern the cumulative impact or underlying issues may need to be assessed (see MIN 19 for Missing Children procedure). Should the person recording the Contact be someone other than the allocated worker it is important to ensure that the worker or manager is aware of the new information. Any information received at the CAP will be forwarded straight to the allocated worker without review or being entered on to frameworki. See Initial contact and referral guide (PDF, 4 pages, 29KB) for full guidance in the Practice Standards. Author: Sue Price, Principal Manager Policy and Practice 22

Case Recording Practice Adults Services

Case Recording Practice Adults Services Case Recording Practice Adults Services Guidance on case recording practice and on document management Version: 3.3 Effective from: 1 st October 2014 Next review date: 1 st Nov 2015 Signed off by: Jenny

More information

Why do we need to protect our information? What happens if we don t?

Why do we need to protect our information? What happens if we don t? Warwickshire County Council Why do we need to protect our information? What happens if we don t? Who should read this? What does it cover? Linked articles All WCC employees especially mobile and home workers

More information

GCSx Email Guide for Internal Users. How to send sensitive business and personal information securely

GCSx Email Guide for Internal Users. How to send sensitive business and personal information securely GCSx Email Guide for Internal Users How to send sensitive business and personal information securely Document control Description Version V.2 Created May 2013 GCSx Email Guide for Internal Users Status

More information

Human Resources Policy documents. Data Protection Policy

Human Resources Policy documents. Data Protection Policy Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and

More information

Encrypt and Send Email Guide for Internal Users. How to send business or personally sensitive emails securely

Encrypt and Send Email Guide for Internal Users. How to send business or personally sensitive emails securely Encrypt and Send Email Guide for Internal Users How to send business or personally sensitive emails securely Document control Description Encrypt and Send Email Guide for Internal Users Version V.2 Created

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

How to Manage Email. Guidance for staff

How to Manage Email. Guidance for staff How to Manage Email Guidance for staff 1 Executive Summary Aimed at Note Purpose Benefits staff Necessary skills to All staff who use email This guidance does NOT cover basic IT literacy skills. Staff

More information

Information Security Adults Services. Practice guidance. Revised Version: 1.2 Effective from: August 2014 Next review date: August 2015

Information Security Adults Services. Practice guidance. Revised Version: 1.2 Effective from: August 2014 Next review date: August 2015 Information Security Adults Services Practice guidance Revised Version: 1.2 Effective from: August 2014 Next review date: August 2015 Sign off: Jenny Daniels Title: Head of Health and Social Care Practice

More information

Information Governance

Information Governance CONTROLLED Information Governance Caldicot Version-Workbok Non Caldicott Version - Workbook Version 12 January 2015 40 1 Don t Get Bitten by the Data Demon Notes Using this Workbook The objective of this

More information

Data and Information Security Policy

Data and Information Security Policy St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration

More information

Document Management Policy

Document Management Policy Document Management Policy April 2014 1 Table of contents Introduction 1 Purpose... 1 Implementing a Paperless Office in Xplan 1 Introduction... 1 Benefits and Risks... 1 Issues to consider before transitioning

More information

St Bernadette s Catholic Primary School. E-Safety Policy

St Bernadette s Catholic Primary School. E-Safety Policy St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational

More information

Document Management User Guide

Document Management User Guide Document Management User Guide For the attention of SystmOne users: This document explains how to use the Document Management functionality once the setup has been completed. Contents Beginning to Scan...

More information

Merthyr Tydfil County Borough Council. Data Protection Policy

Merthyr Tydfil County Borough Council. Data Protection Policy Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the

More information

E-SAFETY POLICY 2014/15 Including:

E-SAFETY POLICY 2014/15 Including: E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable

More information

Somerset County Council - Data Protection Policy - Final

Somerset County Council - Data Protection Policy - Final Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council

More information

Mobility and Young London Annex 4: Sharing Information Securely

Mobility and Young London Annex 4: Sharing Information Securely Young London Matters April 2009 Government Office For London Riverwalk House 157-161 Millbank London SW1P 4RR For further information about Young London Matters contact: younglondonmatters@gol.gsi.gov.uk

More information

Information Governance Framework. June 2015

Information Governance Framework. June 2015 Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review

More information

GroupWise Web Access 8.0

GroupWise Web Access 8.0 GroupWise Web Access 8.0 How to check your email via the Internet For More Information, please contact: Administrative Office of the Courts Technology Help Desk (615) 532 9503 or (800) 448-7980 Table of

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

DATA PROTECTION AND DATA STORAGE POLICY

DATA PROTECTION AND DATA STORAGE POLICY DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether

More information

Everyone in the workplace has a legal duty to protect the privacy of information about individuals. AEP/BELB/LJ/2010 Awareness Session

Everyone in the workplace has a legal duty to protect the privacy of information about individuals. AEP/BELB/LJ/2010 Awareness Session Everyone in the workplace has a legal duty to protect the privacy of information about individuals AEP/BELB/LJ/2010 Awareness Session During 2007 alone, 36,989,300 people in the UK have had their private

More information

Freedom of Information & Records Management Group Standards for Creation and Storage of Physical & Electronic Files

Freedom of Information & Records Management Group Standards for Creation and Storage of Physical & Electronic Files Freedom of Information & Records Management Group Standards for Creation and Storage of Physical & Electronic Files 1 Document Control: Issued By: Freedom of Information and Records Management Group (FIRM)

More information

HADS 2.1.0e Quick Reference Guide

HADS 2.1.0e Quick Reference Guide HACC Funded Service Providers HADS 2.1.0e Quick Reference Guide HACC and Disability Services System (HADS) MDS Data Collection and Reporting Version 3.0 Ageing, Disability and Home Care, Family & Community

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

A common sense guide to the Data Protection Act 1998 for volunteers

A common sense guide to the Data Protection Act 1998 for volunteers A common sense guide to the Data Protection Act 1998 for volunteers Why is it necessary? The Data Protection Act 1998 is a law introduced to control the way information held about individuals is handled

More information

Frequently Asked Questions. RightNow (CRM)

Frequently Asked Questions. RightNow (CRM) Frequently Asked Questions RightNow (CRM) Table of Contents Table of Contents... 1 A note about privacy:... 2 1. Deployment... 3 What will happen when our team deploys RightNow?... 3 What support will

More information

Email Usage Policy Document Profile Box

Email Usage Policy Document Profile Box Document Profile Box Document Category / Ref QSSD 660 Version: 0004 Ratified by: Governance and Risk Committee Date ratified: 12 th January 2012 Name of originator / author: Name of responsible committee

More information

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6

More information

OUTLOOK WEB ACCESS. User Guide

OUTLOOK WEB ACCESS. User Guide OUTLOOK WEB ACCESS User Guide V3 2 August 2013 Not protectively marked GETTING STARTED Outlook Web Access (OWA) provides a useful means to remotely access Council email from outside of the council access.

More information

Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3

Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3 Paper 9 Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3 Please ensure that all THREE pages of this contract are returned to: Information Governance Manager, Health Informatics, Chertsey House, St Peter

More information

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Indirani 02/11/2009 Draft 2 Include JG s comments Jackie Groom

More information

Microsoft Outlook. KNOW HOW: Outlook. Using. Guide for using E-mail, Contacts, Personal Distribution Lists, Signatures and Archives

Microsoft Outlook. KNOW HOW: Outlook. Using. Guide for using E-mail, Contacts, Personal Distribution Lists, Signatures and Archives Trust Library Services http://www.mtwlibrary.nhs.uk http://mtwweb/cgt/library/default.htm http://mtwlibrary.blogspot.com KNOW HOW: Outlook Using Microsoft Outlook Guide for using E-mail, Contacts, Personal

More information

PS 172 Protective Monitoring Policy

PS 172 Protective Monitoring Policy PS 172 Protective Monitoring Policy January 2014 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010;

More information

Final Version 1.0 December 2015

Final Version 1.0 December 2015 Final Version 1.0 December 2015 Contents Page 1 Introduction...2 2 Charter Principles...2 3 Scope...2 4 Partner Commitment...3 5 Governance...4 6 The Lawful basis and Legal Requirements...5 7 Personal

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

How To Protect Your Personal Information At A College

How To Protect Your Personal Information At A College Data Protection Policy Policy Details Produced by Assistant Principal Information Systems Date produced Approved by Senior Leadership Team (SLT) Date approved July 2011 Linked Policies and Freedom of Information

More information

Working Practices for Protecting Electronic Information

Working Practices for Protecting Electronic Information Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that

More information

Good Practice in Records Management and Information Security

Good Practice in Records Management and Information Security Good Practice in Records Management and Information Security BELB LJ Schools 2013 How Valuable are Records & Documents? Valuable only because of the information they contain. Usable if they can be accessed

More information

John Leggott College. Data Protection Policy. Introduction

John Leggott College. Data Protection Policy. Introduction John Leggott College Data Protection Policy Introduction The College needs to keep certain information about its employees, students and other users to allow it to monitor performance, achievements, and

More information

1 P a g e. User Guide. 0845 456 3103 support.keytime.co.uk

1 P a g e. User Guide. 0845 456 3103 support.keytime.co.uk 1 P a g e User Guide 2 P a g e Contents Introduction to Client Manager... 4 Configuring Client Manager... 4 Register your Software... 4 Manage Software Updates... 5 Maintain Staff Grades and Charge-out

More information

Lotus Notes Client Version 8.5 Reference Guide

Lotus Notes Client Version 8.5 Reference Guide Lotus Notes Client Version 8.5 Reference Guide rev. 11/19/2009 1 Lotus Notes Client Version 8.5 Reference Guide Accessing the Lotus Notes Client From your desktop, double click the Lotus Notes icon. Logging

More information

How to Manage and Organise Shared Drives. Guidance for Administrators

How to Manage and Organise Shared Drives. Guidance for Administrators How to Manage and Organise Shared Drives Guidance for Administrators 1 Executive Summary Aimed at Purpose Benefits for Staff Necessary skills Related Guidance Administrators with responsibility for management

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

Acceptable Use Policy (AUP) School Computing

Acceptable Use Policy (AUP) School Computing Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,

More information

NHS Mail Basic Training Guide

NHS Mail Basic Training Guide Royal Derby Hospital 2011 Education, Training and Development I.T. Training Department NHS Mail Basic Training Guide Version 3.1 ND 05/11 No amendments should be made to the document without the Authors

More information

Data Protection Policy June 2014

Data Protection Policy June 2014 Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:

More information

NHS LANARKSHIRE HEALTH RECORDS POLICY Management and Maintenance, Security, Storage, Distribution and Retention of Health Records

NHS LANARKSHIRE HEALTH RECORDS POLICY Management and Maintenance, Security, Storage, Distribution and Retention of Health Records NHS LANARKSHIRE HEALTH RECORDS POLICY Management and Maintenance, Security, Storage, Distribution and Retention of Health Records Author: Responsible Lead Executive Director: Endorsing Body: Governance

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: PROCEDURE FOR SCANNING & UPLOADING DOCUMENTS TO CLINICAL INFORMATION SYSTEMS Version: 1 Reference Number: CO94 Supersedes Originator Originated By: Carole McCarthy

More information

ICOTS Frequently Asked Questions

ICOTS Frequently Asked Questions General Questions ICOTS Frequently Asked Questions What is the purpose of ICOTS and what does ICOTS track? Where can I get an overview of ICOTS? Will ICOTS be the clearing house for all offender related

More information

PS177 Remote Working Policy

PS177 Remote Working Policy PS177 Remote Working Policy January 2014 Version 2.0 Statement of Legislative Compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data Protection

More information

Once more unto the breach... Dealing with Personal Data Security Breaches. Helen Williamson Information Governance Officer

Once more unto the breach... Dealing with Personal Data Security Breaches. Helen Williamson Information Governance Officer Once more unto the breach... Dealing with Personal Data Security Breaches Helen Williamson Information Governance Officer Aims of the session What are we going to look at? What is a data security breach?

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

Where to Store and how to Share Electronic Documents. Guidance for staff

Where to Store and how to Share Electronic Documents. Guidance for staff Where to Store and how to Share Electronic Documents Guidance for staff 1 Executive Summary Aimed at Purpose Benefits for Staff Necessary skills Related Policy Related Guidance All trust staff who create

More information

DocuShare User Guide

DocuShare User Guide DocuShare User Guide Publication date: April 2011 This document supports DocuShare Release 6.6.1 Prepared by: erox Corporation DocuShare Business Unit 3400 Hillview Avenue Palo Alto, California 94304 USA

More information

emobile Bulk Text User Guide Copyright Notice Copyright Phonovation Ltd

emobile Bulk Text User Guide Copyright Notice Copyright Phonovation Ltd emobile Bulk Text User Guide Copyright Notice Copyright Phonovation Ltd Important Notice: The Information contained in this document is subject to change without notice and should not be construed as a

More information

Data Protection Guidance

Data Protection Guidance 53 September 2010 Management Circular No. 53 Glasgow City Council Education Services Wheatley House 25 Cochrane Street Merchant City GLASGOW G1 1HL To Heads of all Educational Establishments Data Protection

More information

Scottish Rowing Data Protection Policy

Scottish Rowing Data Protection Policy Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011)

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011) Security Awareness A Supplier Guide/Employee Training Pack May 2011 (updated November 2011) Contents/Chapters 1. How do I identify a DWP asset 2. Delivering on behalf of DWP - Accessing DWP assets 3. How

More information

Executive Board. Records Manager. Quality. Trustwide

Executive Board. Records Manager. Quality. Trustwide PROCEDURE REF. SABP/QUALITY/0035 NAME OF PROCEDURE REASON FOR PROCEDURE WHAT THE PROCEDURE WILL ACHIEVE? WHO NEEDS TO KNOW ABOUT IT? Integrated Paper and Electronic Health Records To ensure effective and

More information

IT ACCESS CONTROL POLICY

IT ACCESS CONTROL POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

Enterprise Information Security Procedures

Enterprise Information Security Procedures GHL Network Services Ltd Enterprise Information Security Procedures Prepared By Nigel Gardner Date 16/11/09 1 Contents 1. Openwork s Information Security Policy...3 2. Enterprise Information Security Procedures...3

More information

Disciplinary and Dismissals Policy

Disciplinary and Dismissals Policy Policy Purpose/statement/reason for being Disciplinary and Dismissals Policy E.G - MIP is designed to strengthen the effectiveness of individual s contribution to the Council s success. Purpose The Disciplinary

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

Data Protection and Information Security Policy and Procedure

Data Protection and Information Security Policy and Procedure Data Protection and Information Security Policy and Procedure Document Detail Category: Data Protection Authorised By: Full Governing Body Author: School Business Manager Version: 1 Status: Approved May

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages

More information

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING Introduction and Policy Aim The Royal Borough of Windsor and Maidenhead (the Council) recognises the need to protect Council

More information

DATA PROTECTION. OneWorld Encrypted Messages USER GUIDE

DATA PROTECTION. OneWorld Encrypted Messages USER GUIDE DATA PROTECTION OneWorld Encrypted Messages USER GUIDE Table of Contents 1 Why use Encrypted emails?... 3 2 Activation and Login... 4 2.1 Activating Your New OneWorld Encrypted Messages Account... 4 2.2

More information

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE

More information

Outlook 2013 ~ Advanced

Outlook 2013 ~ Advanced Mail Using Categories 1. Select the message that for the category. 2. Select the appropriate category. 3. The category color displays next to the message. Renaming Categories 1. Select a message. 2. Select

More information

HMRC Secure Electronic Transfer (SET)

HMRC Secure Electronic Transfer (SET) HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government

More information

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

End User Manual. SharePoint. Please send feedback or suggestions for updates to the following email address IT.Training@lse.ac.uk

End User Manual. SharePoint. Please send feedback or suggestions for updates to the following email address IT.Training@lse.ac.uk SharePoint End User Manual Please send feedback or suggestions for updates to the following email address IT.Training@lse.ac.uk London School of Economics & Political Science 1 02/12/2014/lse.ac.uk/IMT/training

More information

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY Putting Barnsley People First BARNSLE CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLIC Version: 2.0 Approved By: Governing Body Date Approved: Feb 2014 (initial approval), March

More information

Data Protection and Privacy Policy

Data Protection and Privacy Policy Data Protection and Privacy Policy 1. General This policy outlines Conciliation Resources commitments to respect the privacy of people s personal information and observe the relevant data protection legislation.

More information

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Security Incident Management Policy

Security Incident Management Policy Security Incident Management Policy January 2015 Document Version 2.4 Document Status Owner Name Owner Job Title Published Martyn Ward Head of ICT Business Delivery Document ref. Approval Date 27/01/2015

More information

UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY

UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY 1. Purpose 1.1 The Data Protection Act 1998 ( the Act ) has two principal purposes: i) to regulate the use by those (known as data controllers) who obtain,

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts

More information

TERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation

TERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation TERMS & CONDITIONS of SERVICE for MSKnote Definitions: "Us or Our or We or Company" You or Your or Client Refers to MSKnote Limited Refers to you or your organisation Information about us: We are MSKnote

More information

SURVEILLANCE AND PRIVACY

SURVEILLANCE AND PRIVACY info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Introduction The Data Protection Act 1998 gives individuals the right to know what personal information is held about them. It provides a framework to ensure that the Office of the

More information

Secure Access: School to School aka S2S

Secure Access: School to School aka S2S Secure Access: School to School aka S2S User Guide Updated October 2014 V04 Amendments in this version clarify: The advice for Children Missing from Education and the procedure for taking a pupil off roll.

More information

Employment Policies, Procedures & Guidelines for Schools

Employment Policies, Procedures & Guidelines for Schools DEALING WITH ALLEGATIONS OF ABUSE AGAINST TEACHERS, OTHER STAFF AND VOLUNTEERS GUIDANCE FOR LOCAL AUTHORITIES, HEAD TEACHERS, SCHOOL STAFF AND GOVERNING BODIES March 2012 1 ABOUT THIS GUIDANCE This is

More information

Vodafone Bulk Text. User Guide. Copyright Notice. Copyright Phonovation Ltd

Vodafone Bulk Text. User Guide. Copyright Notice. Copyright Phonovation Ltd Vodafone Bulk Text User Guide Copyright Notice Copyright Phonovation Ltd Important Notice: The Information contained in this document is subject to change without notice and should not be construed as

More information

Corporate Data Protection Policy

Corporate Data Protection Policy Corporate Data Protection Policy September 2010 Records Management Policy RMP-09 GOLDEN RULE When you think about Data Protection remember that we are all data subjects. Think about how appropriately and

More information

A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2013. Mastering Outlook Made Easy for Lawyers CPE Edition v.2.

A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2013. Mastering Outlook Made Easy for Lawyers CPE Edition v.2. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2013 Mastering Outlook Made Easy for Lawyers CPE Edition v.2.0 TeachUcomp, Inc. it s all about you Copyright: Copyright 2013 by TeachUcomp,

More information

2014 Core Training 1

2014 Core Training 1 2014 Core Training 1 Course Agenda Review of Key Privacy Laws/Regulations: Federal HIPAA/HITECH regulations State privacy laws Privacy & Security Policies & Procedures Huntsville Hospital Health System

More information

Information governance

Information governance Information governance Staff handbook RDaSH 88 02 Information governance Introduction to information governance Overview 88 03 Information governance or IG - includes information security and confidentiality,

More information

Data Protection Policy

Data Protection Policy 1. Introduction 1.1 The College needs to keep certain information about its employees, students and other stakeholders, for example to allow it to monitor performance, achievements and health and safety.

More information

Outlook XP Email Only

Outlook XP Email Only Outlook XP Email Only Table of Contents OUTLOOK XP EMAIL 5 HOW EMAIL WORKS: 5 POP AND SMTP: 5 TO SET UP THE POP AND SMTP ADDRESSES: 6 TO SET THE DELIVERY PROPERTY: 8 STARTING OUTLOOK: 10 THE OUTLOOK BAR:

More information

Safe Haven Policy. Equality & Diversity Statement:

Safe Haven Policy. Equality & Diversity Statement: Title: Safe Haven Policy Reference No: 010/IT Owner: Deputy Chief Officer Author Information Governance Lead First Issued On: November 2012 Latest Issue Date: March 2015 Operational Date: March 2015 Review

More information

MINAP Web-portal Guide

MINAP Web-portal Guide MINAP Web-portal Guide Version 1.0 June 2014 Contents 1. Scope... 1 2. Getting started... 2 i. 2.1 Introduction... 2 2.2 Access requirements... 2 2.3 Requesting access... 3 3. How to create a record...

More information

Internet, E-mail and SMS Texting Usage Policy Group Policy

Internet, E-mail and SMS Texting Usage Policy Group Policy Internet, E-mail and SMS Texting Usage Policy Group Policy Scope: This Orbit Housing Group Limited ( Group ) policy provides a set of guidelines for all users within the Group on the proper usage of the

More information