your hospitals, your health, our priority STANDARD OPERATING PROCEDURE: Safe Haven Procedure TW SOP 3 SOP NO: VERSION NO:

Size: px
Start display at page:

Download "your hospitals, your health, our priority STANDARD OPERATING PROCEDURE: Safe Haven Procedure TW10-110 SOP 3 SOP NO: VERSION NO:"

Transcription

1 STANDARD OPERATING PROCEDURE: Safe Haven Procedure SOP NO: VERSION NO: APPROVING COMMITTEE: DATE THIS VERSION APPROVED: TW SOP 3 3 Information Governance Committee July 2013 RATIFYING COMMITTEE: DATE THIS VERSION RATIFIED: July 2013 PARC (Policy Approval and Ratification Committee) AUTHOR(S) (JOB TITLE) DIVISION/DIRECTORATE Information Governance IM&T TRUST WIDE SOP (YES/NO) LINKS TO OTHER POLICIES, SOP S, STRATEGIES ETC: Yes TW Information Governance Policy Date(s) previous version(s) approved (if known): Version:2 Date: April 2011 DATE OF NEXT REVIEW: July 2016 Manager responsible for review (Job title) N.B. This should be the Author s line manager Head of Information Governance your hospitals, your health, our priority

2 AT ALL TIMES, STAFF MUST TREAT EVERY INDIVIDUAL WITH RESPECT AND UPHOLD THEIR RIGHT TO PRIVACY AND DIGNITY Contents Page No. 1. Introduction 2 2. Definitions Safe Haven Personal Information Sensitive Information Bulk / Batch Data 3 3 Physical Security 4 4. Transfer of information by post Receiving confidential post Sending mail externally Sending mail internally 5 5. Transfer of information by fax 6 6. Transfer of information by Sending personal / sensitive information by Transfer of data using NHS Secure File Transfer Service 7 8. Transfer of information to supplier / third party 7 9. Transfer of information via telephone Transfer of information verbally via face to face conversation Transfer of information via notice boards / whiteboards Transfer of paper health records / casenotes Electronic information Disposal of sensitive / personal / confidential waste Incident Reporting Human Rights Act Accessibility Statement Audit Monitoring and Review Equality & Diversity 11 Appendices App 1: Staff Guidance regarding Clear Desk / Screen 12 App 2. Monitoring and Review Template 13 1

3 1. Introduction 1.1 Everyday the Trust collects vast amounts of personal and sensitive information about patients and staff. This information is not the property of the Trust; it belongs to the people who we collected it from and we are the data custodians of this data. We are responsible for the safe keeping and security of all information that we process. 1.2 As a data collector and information user, you are responsible for ensuring that you process this information with care and respect. If is your responsibility to protect this information from those who are not authorised to use it or view it. You must ensure that whilst in your care and when transporting this information to somebody else it is done so securely with an associated information risk assessment (if necessary) in order to comply with the Data Protection Act 1998 and Caldicott principles. 1.3 Therefore, all NHS organisations require safe haven procedures to maintain the privacy and confidentiality of the personal and sensitive information they process. The implementation of these processes facilitates compliance with legal requirements placed upon the Trust. 1.4 This procedure provides you with advice and guidance on how to transport personal and sensitive information securely using safe haven processes. It sits under the Information Governance Policy.If you require further advice and guidance, please contact the Information Governance Department. 1.5 The principles for transporting / transferring information are: 1. Information should only be transferred for a justifiable purpose 2. The transfer should only take place when absolutely necessary 3. Only the minimum amount of information necessary must be transferred 4. The information transferred should be on a need to know basis 2. Definitions 2.1 Safe Haven The term Safe Haven is a location (or in some case a piece of equipment) situated on Trust premises where security arrangements are in place to ensure personal and sensitive information can be transported securely. 2.2 Personal Information This is data falling into one or both of the categories below. 2

4 A. Any information that links one or more identifiable living persons with information about them whose release would put them at significant risk of harm or distress. 1. one or more of the pieces of information which can be used along with public domain information to identify an individual Name / addresses (home or business or both) / postcode / / telephone numbers / driving licence number / date of birth [Note that driving licence number is included in this list because it directly yields date of birth and first part of surname] combined with 2. information about that individual whose release is likely to cause harm or distress Sensitive personal data as defined by s2 of the Data protection Act, including records relating to the criminal justice system, and group membership DNA or finger prints / bank, financial or credit card details / mother s maiden name / National Insurance number / Tax, benefit or pension records / health records / employment record / school attendance or records / material relating to social services including child protection and housing 3 These are not exhaustive lists. Departments should determine whether other information they hold should be included in either category. B. Any source of information about 51or more identifiable individuals, other than information sourced from the public domain. This could be a database with multiple entries containing facts mentioned in box 1, or an electronic folder, disc, or paper records containing 51 or more records about individuals. Again, this is a minimum standard. Information on smaller numbers of individuals may warrant protection because of the nature of the individuals, nature or source of the information, or extent of information. 2.3 Sensitive information Sensitive information is classed as follows: 1. Health or physical condition (this is the main type of information the Trust processes 2. Sexual life 3. Ethnic origin 4. Religious beliefs 5. Political views 6. Criminal convictions This type of information requires further protection than personal information. 2.4 Bulk data / batch data Bulk data or batch data is personal and / or sensitive information relating to 50 or more individuals. 3 Physical Security 3.1 Door and windows should be locked when the room is unattended and external protection should be considered for windows, particularly at ground level. 3.2 Manual paper records (including casenotes) which contain personal and sensitive information and business confidential information must be locked in cabinets / cupboards / offices when not in use to prevent unauthorised access. They must not be left in areas

5 4 Safe Haven Procedure TW10 /110 SOP 3 where unauthorised access could occur, for example, hospital corridors, ward areas where access to notes is easily obtainable 3.3 Computer / laptop screens must not be left unlocked or left with personal / sensitive information on view. You must use a secure screen saver function / log off or close down if no longer in use. 3.4 Restrict and secure access to rooms / offices where personal and sensitive information is left unattended. If a room can be locked which does not compromise patient care then lock it. In areas where access cannot be restricted, for example, reception desks, patient information must not be left on view. If you have concerns about this, please complete an information risk assessment. 3.5 Only have the minimum amount of information necessary on your desk for you to carry out your work particularly in shared office spaces, ward areas (usually known as Clear Desk/Clear Screen See Appendix 1). All information containing personal / sensitive or business confidential information must be securely locked away when not in use. Access codes and keys must also be stored securely which allow access to this information. 3.6 Do not walk away from a computer / laptop or device leaving personal / sensitive information exposed. 3.7 Do not use insecure postal box locations / pigeonholes ensure post is delivered and collected from secure areas 3.8 If documents containing personal / sensitive information come into your possession and you are not the intended recipient, you must inform the intended recipient immediately informing them it was sent in error. Please report this incident on DatixWeb. Await instructions from the IG Department before sending the information back. 4 Transfer of information by post The Trust is moving towards paper-lite and paper-less methods of processing personal / sensitive information. However, a vast majority of personal / sensitive information is still sent via internal and external post. External mail / post / parcels this is paper mail / packages / post sent or received from outside the Trust via Royal Mail or specified courier Internal mail / post / parcels this is paper mail / post / packages sent internally across the Trust sites. 4.1 Receiving confidential post Confidential information mail is to be opened away from public areas and by addressee or designated personnel only. Envelopes marked Private and Confidential and / or Confidential should be opened by the named staff member or department (if no staff member is named) who has a need to know. Where information needs to be restricted to a named individual, for example, human resource information, the envelope must be addressed Private and Confidential to be opened by the recipient only. 4.2 Sending mail externally Sending mail to patients post that is sent out to patient should be addressed clearly and marked Private and Confidential. The patient s name and correct address with postcode must be stated. Sending mail to staff in another organisation All post must be addressed clearly by ensuring the recipient s name is stated, their job title and the address where the

6 correspondence is being sent. When sending out information in the post where the recipient might not be clear as to the identity of the sender, staff should ensure that either a compliment slip is included or that the enclosure / letter clearly states the name, title and contact details of the sender. Please note ensure the following must be adhered to when sending personal / sensitive information: 1. Ensure the seal of the envelope / package is tamper proof. For example, a piece of sellotape / sticky tape over the seal rather than using the seal itself to close the envelope. A return label over the seal is also good practice. This informs the receiver (who is not the correct recipient) who to send it back to and acts as a tamper seal. Self seals often come unstuck and loss of data can occur. 2. Record what you have sent so you can track and remember when you sent it, in case of loss or queries. 3. For batches / bulks of personal / sensitive data use recorded delivery and / or courier. Always get confirmation of receipt. As the Trust is moving toward using Paper-lite methodologies, consider using electronic methods to securely transport the information rather than using paper methods. 4.3 Sending mail internally Internal mail envelopes are normally used to transport mail internally from one department to another. Before using internal envelopes to send personal and sensitive data on paper, please consider using electronic methods to send this securely. However, if you are using internal mail to send personal / sensitive information, please ensure the envelope is clearly labelled with the recipient s name, job title, department and base. Please use a blank envelope and not the internal envelopes used which have printed squares on as often mail is lost using these envelopes. These envelopes are not ideal as you are instructed to tuck the lip of the envelope into the envelope and not to seal. Please do not follow these instructions and ensure envelopes are always securely sealed and clearly labelled. It is also good practice to use 2 envelopes when sending personal / sensitive information via internal mail. 5. Transfer of information by fax 5.1 Faxes are commonly used to send / receive personal / sensitive information however this is one of the highest risks regarding breaching patient confidentiality and the Information Commissioners Officer (ICO) have served monetary penalties to organisations who have sent faxes to an incorrect numbers. Therefore, you must ensure electronic methods are used as a first priority to send personal / sensitive information rather than faxing this information. To add, the Trust are phasing out the use of fax machines in order to support the paper lite initiative. 5.2 Faxing personal and sensitive information must only be used when patient safety or their care and treatment is jeopardised and no other method of communication will suffice. This must be risk assessed in all cases. If you require further information, please contact the Information Governance Department. 5.3 Please also refer to the Faxing What to do guidance document that is associated with this procedure. 5

7 6. Transfer of information by Please refer to the IT Acceptable Use Policy for further information about the use of at the Trust. 6.1 Sending personal / sensitive information by Transfer of personal / sensitive information by must be avoided unless the is encrypted. You can use NHSmail or the Trust encrypted service for external recipients. Sending s internally is secure but if you are sending personal / sensitive data, please put this information into an attachment (for example, excel spreadsheet or word document), password protect this attachment and then send to the recipient. To find out more how to use the Trust encrypted service please visit the IT Training pages. Before you send personal / sensitive information using an encrypted , you must: 1. Double check that you have the correct recipient(s) before pressing Send secure. s containing personal and sensitive data sent to wrong recipient even if this is WWL member of staff are a breach of confidentiality if the other member of staff did not need to see the personal / sensitive information. 2. Mark the message confidential and request a read receipt. 3. Be aware that your can be forwarded by the initial recipient to third parties. Inform them if they are not to disclose the information further. 4. Use the minimum amount of personal information, particularly in subject titles and document names. 5. Any attachments containing personal / sensitive data must be password protected. Do not include the password for the attachment in the same as the attachment. Send a second with the password in or telephone / use communicator to inform the recipient of the password. 6. When in receipt of personal / sensitive information, remove it from your system as soon as possible and file it in a network folder if required. 7. Do not keep personal / sensitive data on for longer than is necessary 8. If you allow delegate access to other people to your inbox, consider whether they need to see any personal / sensitive data you receive. 9. Anonymised information can be sent via outside the Trust 7. Transfer of data using NHS Secure File Transfer Service The Secure File Transfer (SFT)isprovided by the NHS to allow members of the NHS to securely exchange patient identifiable data or NHS business information between nhs.net (NHSmail) addresses. Usage must be in accordance with Caldicott guidelines and patient consent must be sought where appropriate. All files sent via this utility are held encrypted on a database for a maximum of 3 days, after which they are purged to release space on the server. For added security, users must register their address prior to using this utility to either download or upload files. To obtain an NHSmail (@nhs.net) address, staff will be required to contact the IT Department to request one. The Secure File Transfer service can be used to transfer files up to 1GB in size. For additional information, please visit the Secure File Transfer online help page. 8. Transfer of information to suppliers / third parties Transfer of personal, sensitive or confidential business information must be duly authorised. It is now a mandated requirement that all NHS organisations are required to ensure there are no transfers of unencrypted personal / sensitive or business critical information. If you need to transfer information to and from a third party which contains personal / sensitive or business confidential information, there are 3 authorised Trust methods of transfer. You must complete a Data Transfer Request From (Appendix 1) 6

8 7 which will need to be authorised. 8.1 Data Transfer Options Option 1 Transfer via secure (256 Bit AES encryption with 64 character high strength password) ZIP file over unsecure Internet to supplier s unsecure FTP server Option 2 Transfer via secure (256 Bit AES encryption with 64 character high strength password) ZIP file over unsecure N3 to another NHS Organisation on N Option 3 Transfer using a secure courier service (using the process as described in Appendix 1 via secure (256 Bit AES encryption with 64 character high strength password) ZIP file stored on a: USB Encrypted Memory Stick Hard Disk Encrypted Compact Disc Media Digital Versatile Disc Tape Media The Transfer of patient/clinical data must be authorised by: The Information Asset Owner The Caldicott Guardian Information Security Manager and / or Information Governance Department The Transfer of business data must be authorised by: The Information Asset Owner The Senior Information Risk Owner Information Security Manager and / or Information Governance Department If you do not obtain authorisation from the above regarding the data transfer then the process will not be undertaken. Please contact IT Services who will advise you of the best method of transfer the data. 9 Transfer of information via telephone Please follow the guidelines below when discussing confidential information on the telephone. What information can be provided to relatives / legal representatives? 1. Check the identity of the caller and the patient s full name who they are enquiring about. Ask if you can call them back to confirm their identity. 2. Ask the patient if you can provide information to callers and check which callers you can provide information to if they telephone asking for information. If you are unable to seek consent from the patient then please seek the advice from a senior member of staff regarding whether information can be disclosed in the patients best interests. You may also what to set up a password system that only callers who know the patient know and inform you off when they telephone.

9 8 3. If you ever unsure, do not disclose the information and contact the Information Governance Department for advice and guidance. What information can you give to the police? 1. Always refer the request to the Access to Health Records Department / Information Governance Department or a senior clinician in charge when police ask for information about a patient. If you have the patients consent and this is documented, you can release. However, the police do try to obtain information by not following the correct process under the Data Protection Act Always seek advice. What information can you provide to other NHS staff? 1. First of all are they a member of staff check their identity so name, department and nature of the enquiry and telephone them back. If you are unsure of the caller s identity, contact the Information Governance Department. 2. Second, ask why they need the information. If they are providing patient s care and treatment then information can be shared with them as long as the patient has been informed. If not, do they need to know the information and have a justified reason for asking for the information remember the Caldicott principles. 3. If there is a genuine need for clinical information to be released be aware of others who may be listening. Ensure you cannot be overheard. What information can be provided to patient s employers? 1. No information can be provided to the patient s employers without the explicit consent of the patient concerned. Please contact the Information Governance Department for advice and guidance. 9.1 Answer phone / Voice mail messages If you are required to contact a patient by telephone, obtain consent from the patient in advance to establish whether they are happy for you to leave a message. If you are required to leave a message on a patient s answer phone or voic without prior consent, for example the cancellation of an appointment at short notice, do not disclose any clinical / sensitive information. Only leave contact details and a brief message to call you back on the required telephone number. Do not leave messages for patients if there is any doubt regarding the validity of the telephone number. The information risks of leaving messages are: 1. Who might hear the message? 2. Are you sure that you have telephoned the correct number? 3. Will the recipient fully understand the content of the message? 4. Can you be certain the message has been received by the patient? 5. You may inadvertently breach patient confidentiality because the patient s friends or relatives may not know the patient is receiving health care. 10. Transfer of information verbally via face to face conversations When patients are registering for a service at a reception desk and are required to give personal information verbally ensure this cannot be overheard by others. In some areas this is more difficult, for example, A&E reception. Therefore in areas such as this where staff are faced with other risks to their health and safety, this risk is balanced against the risk of breaching confidentiality in the patients and staffs best interest. During ward rounds

10 9 Safe Haven Procedure TW10 /110 SOP 3 when patient s details are being discussed, staff should bear in mind that they might be overheard by other patients, staff, visitors etc in the area. Whilst it is appreciated that it is difficult to manage confidentiality in situations like these, staff are expected to be aware of the possible information risks and do all they can to respect confidentiality. It is not appropriate to discuss personal information in corridors, stairways and when using Trust transport facilities (staff minibus) Face to face requests for personal information You may be asked the whereabouts of a patient, e.g. if you are working on a reception area. You must ensure that the enquirer has a right to see the patient and undertake some checks to verify this as follows: Ask the enquirer regarding details about the patient such as name, relationship with the patient, location of patient Contact the relevant ward / area and confirm whether the enquirer can visit the patient (this may be via telephone / face to face) by asking the patient and obtaining consent. If consent cannot be obtained, speak to a senior member of the team on the ward / area who will then make decision whether visitor can see the patient. 11. Transfer of information via notice board / white boards 11.1 White boards and notice boards above patient s beds and in other patient areas should only display patient information when the patient has consented to this and not because staff require this information to be displayed. Other alternatives than using whiteboard / notice boards must be used such as electronic methods / systems to check status of patients on a ward. You must use confidential methods of communicating information about patients with each other If a patient has consented for their information to be displayed then the minimum amount of personal identifiers must be used, for example, initials instead of patient full name and surname. If a patient insists that they do not want this information displayed, this wish must be respected and not overruled by Trust staff. No other personal identifiable information is to be displayed on white board which is unnecessary such as address, date of birth and / or sensitive clinical details. White boards must be located in areas where unauthorised viewing cannot occur (even other members of staff do not need to see this information). They should be located in offices / rooms with a locked door / key coded access. 12. Transfer of health records / casenotes Paper health records / casenotes must be transported securely across the Trust at all times whether this be via the transport system or if they are sent with a patient to another department /ward/ They must not be sent without being securely wrapped or being placed in an securely sealed envelope. The wrapping or envelope must be securely sealed and correctly addressed with the full address of the destination they are going to. The notes must be tracked. You are encouraged to use electronic systems for the care / treatment of patients rather than using the paper notes. If they are needed, please inform the relevant department not to send them to you. For further information, please see the Health Records Policies and Procedures and the Clinical Record Keeping Policy. 13. Electronic information For advice and guidance regarding use of information systems and technology, please see the IT Acceptable Use Policy. Please adhere to the following: 1. Ensure portable equipment and media is securely locked away when not in use

11 2. Keep your passwords confidential at all times. Never disclose to anyone. Never disclose to colleagues who use the same system as you because they need access to. They must apply for access following Trust procedures. This can lead to disciplinary action. 3. Use strong passwords with a minimum of 6 characters and a mix of upper and lower case letters, numbers and characters / symbols. 4. Position computer screens / laptop screens so they cannot be viewed by unauthorised persons. 5. Always exit applications / systems when you have finished with them and always shut down fully at the end of the session / day. 6. Computer / laptops screens must be locked when you are away from your workstation / desk. To lock the screen press ctrl, alt and delete and then click lock computer or windows symbol and c and the screen will be locked. To unlock, press ctril, alt and delete and then type in your password and the screen will re-appear immediately. You do not have to wait for the computer to restart. 14. Disposal of personal / sensitive information / confidential waste 14.1 When disposing of confidential waste / paper information containing personal / sensitive or business confidential information, there are only 2 secure methods which are: Use a Shred-IT console each department is responsible to procure a console and have regular collections Use a cross cut shredder (not a single cut shredder as the strips can be stuck together to view the information which was on the paper). The cross cut paper can then be recycled or disposed off via the general waste disposal processes Never put confidential information whether this be on paper or electronic media into a general waste bin (black bags) Never put confidential waste into a bag (whether this be a green, black or blue bag) and never label the bag Confidential Waste. You are advertising the bag contains confidential waste and you must not use bags anyway to dispose of confidential waste All removable media which contains personal and sensitive information must be disposed of in a confidential manner. For further information, please see the IT Acceptable Use Policy and / or contact the Information Security Manager / IG Department For the disposal of health records, please refer to the Health Records policies and procedures (located on the policy library on the intranet) Ensure that records whether they are clinical or non clinical are kept for the minimum recommended length of time according to the Department of Health s Records Management: NHS Code of Practice (available via the Information Governance intranet pages). 15 Incident Reporting Please ensure that information governance / information security incidents are reported as soon as possible using DatixWeb. If any of the processes as highlighted in this procedure are not followed and / or breached, this is an information governance incident and must be reported immediately. For further information about reporting information governance incidents, please see the Information Governance Incident Reporting Procedure on the Trust policy library on the intranet. 10

12 16 Human Rights Act Implications of the Human Rights Act have been taken into account in the formulation of this policy and they have, where appropriate, been fully reflected in its wording. 17 Accessibility Statement This document can be made available in a range of alternative formats e.g. large print, Braille and audiocassette. For more details, please contact the HR Department on (3766)or equalityanddiversity@ 18. Audit, Monitoring and Review The processes contained within this SOP will be; audited, monitored and reviewed in line with the audit and monitoring template. 19. Equality and Diversity Assessment The completed assessment is contained within the associated Information Governance Policy TW

13 Staff Guidance regarding Clear Desk / Clear Screen Policy APPENDIX 1 The term clear desk / screen is used to ensure that when paper documents or electronic equipment / systems are used which hold personal / sensitive information these remain secure when not in use or unauthorised access is prevented. This assists to adhere to principle 7 of the Data Protection Act Clear Desk Clear Screen Outside working hours and when an area or office containing personal / sensitive and / or business confidential information is not being used or is left unattended, the information must be locked away securely either in locked cupboard / cabinet, drawers, safes or if not available the office itself must be locked to prevent unauthorised access Removable media and portable IT equipment must be securely locked away when not in use. Printers must be checked to ensure that no personal and sensitive information is left on the printer double check before you leave the area Before a patient enters a consulting room, all evidence of the previous patients information must be removed from view (medical records, test papers, samples etc) Publically accessible areas must be kept as clear as possible at all times; in particular medical records must not be left in public corridors or left in areas / stations which can be easily viewed by others / stolen or accessed. This is a breach of confidentiality and the information must be moved to a secure area. Outside working hours, users must log off and switch off computers / laptops During working hours, computers / laptops unattended for short periods of time must be screen locked ( Ctrl, Alt and Delete activates the password protected screensaver). During working hours, screens which show personal / sensitive information must be shielded from public view and other staff who do not need to see the information. 12

14 NAME OF POLICY: Safe Haven Procedure POLICY MONITORING AND REVIEW ARRANGEMENTS Para Audit / Monitoring requirement Method of Audit / Monitoring Responsible person All 1. All procedure sections 1. IGTK evidence IG Dpt 2. IG Incidents and IG Dpt Complaints Logbook 3. Confidentiality Audits IG Dpt 4. Personal Data Flow IG Dpt Mapping Analysis 5. DATIX RFI Module IG Dpt 6. IG Training Compliance IG Dpt Statistics Report 7. IG Staff Survey IG Dpt 8. IG Patient Survey IG Dpt Frequency of Audit Annually Ongoing Annually Annually Ongoing Monthly Annually Annually Monitoring committee IG Committee for all Evidence IGTK evidence Logbook Conf Audit Rpt Report IG KPI Report IG KPI Report Report Report Location IG Dpt / IG TK website Logbook IG Comm Ag & Mins IGTK website / IG Com Datix IG Comm / Trust Board IG Comm IG Comm

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer:

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer: Secure Storage, Communication & Transportation of Personal Information Policy Version No: 3.0 Prepared By: Information Governance, IT Security & Health Records Effective From: 20/12/2010 Review Date: 20/12/2011

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3

Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3 Paper 9 Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3 Please ensure that all THREE pages of this contract are returned to: Information Governance Manager, Health Informatics, Chertsey House, St Peter

More information

Secure Transfer of Information Guidance for staff

Secure Transfer of Information Guidance for staff Secure Transfer of Information Guidance for staff Document number CCG.GOV.013.1.1 Version: 1.1 Ratified by: NHS Bury CCG Quality and Risk Committee Date ratified: 8 th January 2014 Name of originator /author

More information

Safe Haven Policy. Equality & Diversity Statement:

Safe Haven Policy. Equality & Diversity Statement: Title: Safe Haven Policy Reference No: 010/IT Owner: Deputy Chief Officer Author Information Governance Lead First Issued On: November 2012 Latest Issue Date: March 2015 Operational Date: March 2015 Review

More information

Information Governance Manual Training Booklet

Information Governance Manual Training Booklet Information Governance Manual Training Booklet Introduction This booklet is aimed at staff who do not access a computer whilst working for the Trust. If you have access to a computer, you must complete

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Policy for the electronic transfer of Person Identifiable Data - harmonised Version: 5 Reference Number: CO51 Supersedes Supersedes: 4 Description of Amendment(s):

More information

Human Resources Policy documents. Data Protection Policy

Human Resources Policy documents. Data Protection Policy Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and

More information

Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information

Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information Im&t directorate\policies\approved ig policiesprocedures.1 Index 1. Purpose... 3 2. Introduction... 3 3. Scope...

More information

Data Transfer Policy. Data Transfer Policy London Borough of Barnet

Data Transfer Policy. Data Transfer Policy London Borough of Barnet Data Transfer Policy Data Transfer Policy London Borough of Barnet Document Control POLICY NAME Data Transfer Policy Document Description Policy surrounding data transfers (electronic and paper based).

More information

Information Governance

Information Governance Information Governance Information for Patients Information Governance (IG) Contents: Identifying the IG Lead for the Practice. This identifies the main people responsible for Information Governance Policy.

More information

Safe Haven Procedure. Final. Date Issued March 2009 Review Date March 2010 NHS East Midland Employees. Safe Haven Procedure: v1.

Safe Haven Procedure. Final. Date Issued March 2009 Review Date March 2010 NHS East Midland Employees. Safe Haven Procedure: v1. Safe Haven Procedure Final Version 1.0 (Final) Ratified By Executive Team Originator/Author Fabian Henderson Date Issued March 2009 Review Date March 2010 Target NHS East Midland Employees Safe Haven Procedure:

More information

Information governance

Information governance Information governance Staff handbook RDaSH 88 02 Information governance Introduction to information governance Overview 88 03 Information governance or IG - includes information security and confidentiality,

More information

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review

More information

Information Security Policy for Associates and Contractors

Information Security Policy for Associates and Contractors Policy for Associates and Contractors Version: 1.12 Status: Issued Date: 30 July 2015 Reference: 61418080 Location: Livelink Review cycle: Annual Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...

More information

Name of responsible committee: Information Governance Board Date issued: 15 th April 09 Review date: 14 th April 11 Referenced Documents:

Name of responsible committee: Information Governance Board Date issued: 15 th April 09 Review date: 14 th April 11 Referenced Documents: Storage and Transfer of Person Identifiable Information Policy Trust Wide Policy number: ULH-IM&T-AUP03 Version: 1.1 New or Replacement: New Approved by: Executive Board Date approved: 14 th April 09 Name

More information

Personal Data Handling and Sharing Policy

Personal Data Handling and Sharing Policy Personal Data Handling and Sharing Policy Originator Richard Gibson Date 20 June 2012 Verifier Lynda Oliver Date 20 June 2012 Reviewed Richard Gibson, Lynda Oliver Date July 2013 Contents Page 1. Introduction

More information

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011)

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011) Security Awareness A Supplier Guide/Employee Training Pack May 2011 (updated November 2011) Contents/Chapters 1. How do I identify a DWP asset 2. Delivering on behalf of DWP - Accessing DWP assets 3. How

More information

Mobility and Young London Annex 4: Sharing Information Securely

Mobility and Young London Annex 4: Sharing Information Securely Young London Matters April 2009 Government Office For London Riverwalk House 157-161 Millbank London SW1P 4RR For further information about Young London Matters contact: younglondonmatters@gol.gsi.gov.uk

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

Information Security Policy London Borough of Barnet

Information Security Policy London Borough of Barnet Information Security Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Document Description Information Security Policy Policy which sets out the council s approach to information

More information

Information Security Policy. Appendix B. Secure Transfer of Information

Information Security Policy. Appendix B. Secure Transfer of Information Information Security Policy Appendix B Secure Transfer of Information Author: Data Protection and Information Security Officer. Version: 0.7 Date: March 2008 Document Control Information Document ID Document

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

Information Governance

Information Governance CONTROLLED Information Governance Caldicot Version-Workbok Non Caldicott Version - Workbook Version 12 January 2015 40 1 Don t Get Bitten by the Data Demon Notes Using this Workbook The objective of this

More information

SECURITY POLICY REMOTE WORKING

SECURITY POLICY REMOTE WORKING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices

More information

Data Protection and Information Security Policy and Procedure

Data Protection and Information Security Policy and Procedure Data Protection and Information Security Policy and Procedure Document Detail Category: Data Protection Authorised By: Full Governing Body Author: School Business Manager Version: 1 Status: Approved May

More information

Career Connection, Inc. Data Privacy. Bringing Talent Together With Opportunity

Career Connection, Inc. Data Privacy. Bringing Talent Together With Opportunity Career Connection, Inc. Data Privacy Objectives This course is intended for CCI employees. The course gives guidance on data privacy concepts and describes how data privacy is relevant when delivering

More information

Data Security Policy. 1. Document Status. Version 1.0. Approval. Review By June 2011. Secure Research Database Analyst. Change History. 1 Version 1.

Data Security Policy. 1. Document Status. Version 1.0. Approval. Review By June 2011. Secure Research Database Analyst. Change History. 1 Version 1. Data Security Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2011 Owner Secure Research Database Analyst Change History

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment

More information

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject

More information

Scottish Rowing Data Protection Policy

Scottish Rowing Data Protection Policy Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this

More information

Information Governance

Information Governance Information Governance Safe Haven Procedures; Guidance for all BHR CCG Staff Fax Machines Email Postage Telephone Conversations Fax Machines Confidential information faxed in emergency situations only

More information

Findings from ICO audits and reviews of community healthcare providers. June 2013 to December 2014

Findings from ICO audits and reviews of community healthcare providers. June 2013 to December 2014 Findings from ICO audits and reviews of community healthcare providers June 2013 to December 2014 Introduction The Information Commissioner s Office (ICO) is the regulator responsible for ensuring that

More information

Trust Informatics Policy. Information Governance. Secure Transfer of Information Policy

Trust Informatics Policy. Information Governance. Secure Transfer of Information Policy Trust Informatics Policy Information Governance Policy Reference: 3628 Document Title Author/Contact Document Reference 3628 Document Control Pauline Nordoff-Tate, Information Assurance Manager Document

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third

More information

Legal and statutory obligations, in particular under the Data Protection Act, will be followed, whatever the protective marking used.

Legal and statutory obligations, in particular under the Data Protection Act, will be followed, whatever the protective marking used. Handling information based on the protective marking OFFICIAL INFORMATION MARKING Legal and statutory obligations, in particular under the Data Protection Act, will be followed, whatever the protective

More information

Policy: Remote Working and Mobile Devices Policy

Policy: Remote Working and Mobile Devices Policy Policy: Remote Working and Mobile Devices Policy Exec Director lead Author/ lead Feedback on implementation to Clive Clarke SHSC Information Manager SHSC Information Manager Date of draft 16 February 2014

More information

Best practice guidance for information security within Choose and Book May 2009

Best practice guidance for information security within Choose and Book May 2009 Best practice guidance for information security within Choose and Book May 2009 Best practice guidance for information security within Choose and Book This guidance has been prepared to help organisations

More information

Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website

Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Date created: November 2015 Date for review: July 2016 Created by: Mark Vanstone,

More information

Road to Recovery Fact Sheet

Road to Recovery Fact Sheet Road to Recovery Fact Sheet What is the American Cancer Society s Road to Recovery program? Road to Recovery is an American Cancer Society program designed to ensure that cancer patients have transportation

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

Information security incident reporting procedure

Information security incident reporting procedure Information security incident reporting procedure Responsible Officer Author Date effective from 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended

More information

Enterprise Information Security Procedures

Enterprise Information Security Procedures GHL Network Services Ltd Enterprise Information Security Procedures Prepared By Nigel Gardner Date 16/11/09 1 Contents 1. Openwork s Information Security Policy...3 2. Enterprise Information Security Procedures...3

More information

LSE PCI-DSS Cardholder Data Environments Information Security Policy

LSE PCI-DSS Cardholder Data Environments Information Security Policy LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project

More information

Data Access Request Service

Data Access Request Service Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations

More information

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING Introduction and Policy Aim The Royal Borough of Windsor and Maidenhead (the Council) recognises the need to protect Council

More information

INFORMATION MANAGEMENT & TECHNOLOGY SECURITY POLICY

INFORMATION MANAGEMENT & TECHNOLOGY SECURITY POLICY Information Management & Technology Security Policy INFORMATION MANAGEMENT & TECHNOLOGY SECURITY POLICY POLICY NO IM&T 003 DATE RATIFIED October 2010 NEXT REVIEW DATE October 2013 POLICY STATEMENT/KEY

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

Remote Working and Portable Devices Policy

Remote Working and Portable Devices Policy Remote Working and Portable Devices Policy Policy ID IG04 Version: V1 Date ratified by Governing Body 29/09/13 Author South Commissioning Support Unit Date issued: 21/10/13 Last review date: N/A Next review

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

E-SAFETY POLICY 2014/15 Including:

E-SAFETY POLICY 2014/15 Including: E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable

More information

IG Toolkit Version 8. Information Security Assurance. Requirement 322. Detailed Guidance on Secure Transfers

IG Toolkit Version 8. Information Security Assurance. Requirement 322. Detailed Guidance on Secure Transfers IG Toolkit Version 8 Information Security Assurance Requirement 322 Detailed Guidance on Secure Transfers IG Toolkit Version 8 Requirement 322: Detailed guidance on secure transfers Page 1 of 7 All transfers

More information

HIPAA 101: Privacy and Security Basics

HIPAA 101: Privacy and Security Basics HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually

More information

Privacy & Security Standards to Protect Patient Information

Privacy & Security Standards to Protect Patient Information Privacy & Security Standards to Protect Patient Information Health Insurance Portability & Accountability Act (HIPAA) 12/16/10 Topics An An Introduction to to HIPAA HIPAA Patient Rights Rights Routine

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Data Protection and Data security Policy

Data Protection and Data security Policy Data Protection and Data security Policy Statement of policy and purpose of Policy 1. Somer Valley Community Radio Ltd (the Employer) is committed to ensuring that all personal information handled by us

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Three

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Three Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Three Data Handling in University Information Classification and Handling Agenda Background People-Process-Technology

More information

Angard Acceptable Use Policy

Angard Acceptable Use Policy Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants

More information

A Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail email including Generic Mailboxes

A Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail email including Generic Mailboxes A Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail email including Generic Mailboxes Contents 1 Introduction 3 2 NHSmail Acceptable Use Policy 3 3 Objectives 4 4 General

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Data Protection Policy Version: 3 Reference Number: CO59 Keywords: Data, access, principles, protection, Act. Data Subject, Information Supersedes Supersedes:

More information

OxCCARE Information Governance Policy

OxCCARE Information Governance Policy OxCCARE Information Governance Policy Introduction: This document is intended to act as a practical guide to information governance (IG) for all research, audit, quality improvement and service evaluation

More information

CONTACTING SERVICE USERS BY TEXT MESSAGES (SMS) POLICY

CONTACTING SERVICE USERS BY TEXT MESSAGES (SMS) POLICY CONTACTING SERVICE USERS BY TEXT MESSAGES (SMS) POLICY POLICY NUMBER 098/Corporate POLICY VERSION 1 RATIFYING COMMITTEE Information Governance Group DATE RATIFIED May 2012 DATE OF EQUALITY & HUMAN RIGHTS

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title

More information

This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business.

This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. FSA factsheet for All firms This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. It explains: What you should

More information

Research Governance Standard Operating Procedure

Research Governance Standard Operating Procedure Research Governance Standard Operating Procedure The Management and Use of Research Participant Data for Secondary Research Purposes SOP Reference: Version Number: 01 Date: 28/02/2014 Effective Date: Review

More information

Policy Document Control Page. Updated to include new NHS mail encryption feature

Policy Document Control Page. Updated to include new NHS mail encryption feature Policy Document Control Page Title Title: Electronic Mail Policy Version: 6 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

How To Ensure Your Office Meets The Privacy And Security Requirements Of The Health Insurance Portability And Accountability Act (Hipaa)

How To Ensure Your Office Meets The Privacy And Security Requirements Of The Health Insurance Portability And Accountability Act (Hipaa) HIPAA - Privacy And Security Audit For Provider Practices THIS IS A MODEL AUDIT. IT WILL NEED TO BE CHANGED TO MEET THE PARTICULAR NEEDS AND CIRCUMSTANCES OF ANY TRUSTED SOURCES DEVELOPING AN AUDIT. The

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that

More information

Policy Document. IT Computer Usage Policy

Policy Document. IT Computer Usage Policy Policy Document IT Computer Usage Policy ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Author IT Services Manager Version 4.1 Issue Issue Date

More information

BERKELEY COLLEGE DATA SECURITY POLICY

BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data

More information

Somerset County Council - Data Protection Policy - Final

Somerset County Council - Data Protection Policy - Final Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council

More information

Why do we need to protect our information? What happens if we don t?

Why do we need to protect our information? What happens if we don t? Warwickshire County Council Why do we need to protect our information? What happens if we don t? Who should read this? What does it cover? Linked articles All WCC employees especially mobile and home workers

More information

Incident reporting procedure

Incident reporting procedure Incident reporting procedure Responsible Officer Author Date effective from Aug 2009 Date last amended Aug 2009 Review date July 2012 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance

More information

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September

More information

Bexley Safeguarding Children Board. Information Sharing and Secure Document Transfer Guidance

Bexley Safeguarding Children Board. Information Sharing and Secure Document Transfer Guidance Bexley Safeguarding Children Board Information Sharing and Secure Document Transfer Guidance All professionals who work with children and young people, or with adults who are parents or carers, should

More information

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

Physical Security Policy

Physical Security Policy Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security

More information

Informatics Policy. Information Governance. Network Account and Password Management Policy

Informatics Policy. Information Governance. Network Account and Password Management Policy Informatics Policy Information Governance Policy Ref: 3589 Document Title Author/Contact Document Reference 3589 Document Control Network Account Management and Password Policy Pauline Nordoff-Tate, Information

More information

Personal data - Personal data identify an individual. For example, name, address, contact details, date of birth, NHS number.

Personal data - Personal data identify an individual. For example, name, address, contact details, date of birth, NHS number. Background The Data Protection Act 1998 i came into force in March 2000 and is followed by all NHS employed staff via their policies and procedures. The act applies to all personal, identifiable information

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

Information Governance Toolkit. Information Security Assurance. Detailed Guidance on Secure Transfers

Information Governance Toolkit. Information Security Assurance. Detailed Guidance on Secure Transfers Information Governance Toolkit Information Security Assurance Detailed Guidance on Secure Transfers Information Transfers/Flows - Security Measures 1. The outcomes of information mapping and identified

More information

USB Data Stick Procedure

USB Data Stick Procedure SH IG 41 INFORMATION SECURITY SUITE OF POLICIES Procedure for the Management of Personal Data Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review : This procedure

More information

DOCUMENT CONTROL PAGE

DOCUMENT CONTROL PAGE DOCUMENT CONTROL PAGE Title: Title Version: 0.2a Reference Number: Supersedes Supersedes: IT Encryption and Security Policy and Guidelines Description of Amendment(s): Clarification of document approval

More information

Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines

Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines (This document supersedes the document previously entitled MCFD Contractor Records Guidelines) Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines November

More information

2014 Core Training 1

2014 Core Training 1 2014 Core Training 1 Course Agenda Review of Key Privacy Laws/Regulations: Federal HIPAA/HITECH regulations State privacy laws Privacy & Security Policies & Procedures Huntsville Hospital Health System

More information

Burton Hospitals NHS Foundation Trust. On: 16 January 2014. Review Date: December 2015. Corporate / Directorate. Department Responsible for Review:

Burton Hospitals NHS Foundation Trust. On: 16 January 2014. Review Date: December 2015. Corporate / Directorate. Department Responsible for Review: POLICY DOCUMENT Burton Hospitals NHS Foundation Trust INFORMATION SECURITY POLICY Approved by: Executive Management Team On: 16 January 2014 Review Date: December 2015 Corporate / Directorate Clinical

More information

INFORMATION GOVERNANCE STAFF HANDBOOK AND CODE OF CONDUCT

INFORMATION GOVERNANCE STAFF HANDBOOK AND CODE OF CONDUCT e-health Cumbria INFORMATION GOVERNANCE STAFF HANDBOOK AND CODE OF CONDUCT TABLE OF CONTENTS 1. INTRODUCTION... 4 2. INFORMATION GOVERNANCE... 4 3. WHAT DO YOU NEED TO KNOW ABOUT INFORMATION GOVERNANCE?..

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Electronic Mail Policy Version: 5 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

Data Transfer Policy London Borough of Barnet

Data Transfer Policy London Borough of Barnet London Borough of Barnet DATA PROTECTION 11 Document Control Document Description Data Transfer Policy Version v.2 Date Created December 2010 Status Authorisation Name Signature Date Prepared By: IS Checked

More information

University of Limerick Data Protection Compliance Regulations June 2015

University of Limerick Data Protection Compliance Regulations June 2015 University of Limerick Data Protection Compliance Regulations June 2015 1. Purpose of Data Protection Compliance Regulations 1.1 The purpose of these Compliance Regulations is to assist University of Limerick

More information

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared; Page 1 National Organization of Alternative Programs 2014 NOAP Educational Conference HIPAA and Privacy Risks Ira J Rothman, CPHIMS, CIPP/US/IT/E/G Senior Vice President - Privacy Official March 26, 2014

More information

EMMANUEL COLLEGE THE APPLICATION OF THE DATA PROTECTION ACT 1998. Contents

EMMANUEL COLLEGE THE APPLICATION OF THE DATA PROTECTION ACT 1998. Contents EMMANUEL COLLEGE THE APPLICATION OF THE DATA PROTECTION ACT 1998 Contents 1. Introduction Page 2 2. The Data Protection Act 1998 Page 2 3. Review of data used in College departments Page 3 4. Security

More information

Merthyr Tydfil County Borough Council. Data Protection Policy

Merthyr Tydfil County Borough Council. Data Protection Policy Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the

More information

Information Governance. User Handbook

Information Governance. User Handbook Information Governance User Handbook 2 CONTENTS Page 1.0 INTRODUCTION TO INFORMATION GOVERNANCE 4 1.2 How This Guidance Will Help You! 4 2.0 KEY INFORMATION GOVERNANCE ROLES 5 3.0 INFORMATION GOVERNANCE

More information