Information Governance Serious Incident Requiring Investigation Policy and Procedure

Size: px
Start display at page:

Download "Information Governance Serious Incident Requiring Investigation Policy and Procedure"

Transcription

1 Information Governance Serious Incident Requiring Investigation Policy and Procedure

2 Document Control Sheet Name of document: Information Governance Serious Incident Requiring Investigation (SIRI) Policy and Procedure Version: Final v1.0 Owner: File Location / Filename: Senior Information Risk Owner (Chief Finance Officer) G:\Corporate Documents\Policies Date of this version: December 2013 Produced by: Head of Corporate Affairs Synopsis and outcomes of consultation undertaken: Synopsis and outcomes of Equality and Diversity Impact Assessment: Approved by (Committee): N/a Audit Committee Date ratified: 14 th January 2014 Copyholders: Head of Corporate Affairs Corporate Affairs Officer Next review due: December 2015 Enquiries to: Head of Corporate Affairs Revision History Revision Date Summary of Changes Author(s) Version Number Approvals This document requires the following approval of either an individual(s), group(s) or board. Name Title Date of Issue Version Number Audit Committee 14/01/2014 V1.0 Page 2 of 20

3 Contents 1. Scope Introduction Definition Information Assets Roles and Responsibilities IG Incident Reporting Tool Reporting and Publication Monitoring... 9 Appendix 1 - IG SIRI High Level Process Appendix 2 - Assessing the Severity of the Incident Appendix 3 Definition of Breach Types Appendix 4 IG SIRI Annual Report Templates Page 3 of 20

4 1. Scope 1.1. This policy applies to all staff who work for NHS North Norfolk CCG (NNCCG) and members of the Governing Body. It is reflective of the Health and Social Care Information Centre (HSCIC) guidelines for reporting, managing and investigating Information Governance Serious Incidents Requesting Investigation (IG SIRI). 2. Introduction 2.1 This policy supports the organisation s strategic business aims and objectives by: Ensuring that the CCG has implemented an effective information incident management and response capability that supports the sharing of lessons learned; Ensuring that there is a considered and agreed IG incident response and communications plan available, including the reporting of perceived or actual IG SIRIs; and Ensuring that the CCG s management, investigation and reporting of IG SIRIs conforms to national guidance and does not conflict with the organisation s policies and procedures for non-ig Serious Incidents (SIs) (e.g. clinical incidents) 3. Definition 3.1 There is no simple definition of a serious incident. What may at first appear to be of minor importance may, on further investigation, be found to be serious and vice versa. However as a guide it includes: Any incident which involves actual or potential failure to meet the requirements of the Data Protection Act 1998 (DPA) and/or the Common Law of Confidentiality. Unlawful disclosure or misuse of confidential data, recording or sharing of inaccurate data, information security breaches and inappropriate invasion of people s privacy Personal data breaches which could lead to identity fraud or have other significant impact on individuals. Any form of media including both electronic media and paper records i.e. the CCG s information assets. N.B. Loss or theft of encrypted removable media (laptops, CDs, USB memory sticks, media cards, PDAs) is not a IG SIRI unless you have reason to believe that the protection applied to the device has been breached and personal data accessed inappropriately. 3.2 It is essential that all IG SIRIs which occur in Health are reported appropriately and managed in a robust way within work areas by applying a structured approach to the identification of Information Assets and assigned Information Asset Owners (IAO). IAOs will be supported by Information Asset Administrators (IAA) who are operational staff with day to day responsibility for managing the risk to their information assets. Page 4 of 20

5 4. Information Assets 4.1 Information assets come in many shapes and forms therefore the following list can only be illustrative. It is generally sensible to group information assets in a logical manner e.g. where they are related to the same information system or business process. Typical assets include, Personal Information Content Databases and data files Back-up and archive data Audit data Papers, records (patient care notes and staff records) Paper reports Other Information Content Databases and data files Back-up and archive data Audit data Papers, records and reports System / Process Documentation System information and documentation Operations and support procedures Manuals and training materials Contracts and agreements Business continuity plans Software Applications and System Software Data encryption utilities Development and Maintenance tools Hardware Computing hardware including PCs, Laptops, PDA, iphones, ipads and removable media Miscellaneous Environmental services e.g. power and air-conditioning People skills and experience Shared services including Networks and Printers Computer rooms and equipment Records libraries 5. Roles and Responsibilities 5.1 Senior Information Risk Owner (SIRO) The SIRO is responsible to the Governing Body for ensuring an Information Risk Policy is developed, implemented, reviewed and its effect monitored. The management and reporting of information incidents is one element of the management of information risk, which should be managed in accordance with the Assurance Framework: Key Strategic Risks. The SIRO will: Take ownership of the CCG s information risks; Act as the advocate for information risk on the Governing Body; Provide written advice to the Chief Officer, as detailed in the Annual Governance Statement; and Occupy a key role in ensuring effective management and identification of information risks. Page 5 of 20

6 5.2 Information Asset Owners Information Asset Owners (IAO) are senior staff responsible for ensuring that specific information assets are handled and managed appropriately. This means making sure that information assets are properly protected and that their value to the CCG is fully exploited. Their roles include: Understanding what information is held; Knowing what is to be added and removed; Knowing how information is moved / transferred; Knowing who has access and why; and Ensuring compliance with the relevant legal frameworks, i.e. consent and confidentiality As a result they are able to understand and address risks to the information assets they own and to provide assurance to the SIRO on the security, confidentiality, integrity and use of the assets. 5.3 Information Asset Administrators Information Asset Administrators (IAA) support IAOs by ensuring: Policies and procedures are followed; That actual or potential security incidents are recognised and reported; Consultation with their IAO on incident management occurring; and that Information Asset Registers are up to date. 6. IG Incident Reporting Tool 6.1 From June 2013 all Organisations processing health and adult social care personal data are required to use the IG Toolkit Incident Reporting Tool to report Level 2 IG SIRIs to the Department of Health (DH), Information Commissioner s Office (ICO) and other regulators. A Memorandum of Understanding is in development between the HSCIC and the ICO to share intelligence on IG SIRIs for the purpose of supporting, guiding, investigating breaches, performance monitoring and improving standards of health and adult social care services. 6.2 Local clinical and corporate incident management and reporting tools (including Strategic Executive Information System STEIS) can continue to be used for local purposes but notification of IG SIRIs for the attention of the DH and the ICO must be communicated using the IG Incident Reporting Tool with immediate effect. 6.3 The high level process for reporting an IG SIRI is categorised as follows, a flow-chart for which is described at Appendix 1: Initial Reporting Suspected Incidents Initial information is often sparse and it may be uncertain whether an IG SIRI has actually taken place. Suspected incidents and near misses can still be recorded on the IG Toolkit Incident Reporting Tool, as lessons can often be learnt from them and they can be closed or withdrawn when the full facts are known. Page 6 of 20

7 Early Notification Where a suspected IG SIRI has taken place, it is good practice to informally notify key staff (Chief Officer, SIRO, Caldicott Guardian) as an early warning to ensure that they are forewarned and in a position to respond to enquiries from third parties. Where incidents occur out of hours, current on-call arrangements will be followed to ensure that the correct contacts are notified On-call arrangements o o o A member of staff should contact the On-Call Manager using the designated telephone number as soon as they become aware of a suspected IG SIRI; The On-Call Manager should contact the IG Lead of the appropriate CCG, within 24 hours of the initial notification; The CCG IG Lead should take the appropriate steps described below to begin the reporting procedure Reporting Incidents Details of the initial findings should be entered onto the IG Incident Reporting Tool within 24 hours of notification of the incident. Staff should therefore ensure that the Head of Corporate Affairs is notified as soon as a potential IG SIRI has occurred. The severity of the incident will be determined by the scale (number of data subjects affected) and the sensitivity factors selected as detailed in Appendix 2. If the outcome of the severity is Level 2 (reportable) an notification will be generated by the system and sent to the HSCIC External IG Delivery Team, DH, ICO and escalated to regulators, as appropriate. The IG Incident Reporting Tool should be regularly updated as the investigation progresses, to enable automated s to be triggered to the HSCIC External IG Delivery Team, who will subsequently be responsible for notifying and updating relevant organisations. The reporting tool is intuitive but is reliant upon the user entering quality information. Free text field such as summary of the incident and details of the incident should be populated with data including: Date, time and location of the incident; Breach Type (Appendix 3); Details of local incident management arrangements; Confirmation that documented incident management procedures are being followed and disciplinary action will be invoked when appropriate; A factual description of what happened; Theft, accidental loss, inappropriate disclosure, procedural failure etc.; The number of patients / service users / staff (individual data subjects) involved; The number of records involved; The format of the records (paper or electronic); If electronic, whether encrypted or not; Whether the IG SIRI is in the public domain; Whether the media are aware or there is potential for media interest; Whether the IG SIRI could damage the reputation of an individual, work-team, an organisation or the Health and Adult Social Care sector; Page 7 of 20

8 Whether there are legal implications to consider; Initial assessment of the severity level; Immediate action taken, including whether any staff have been suspended pending a full investigation; and Whether the following individuals have been notified: o Data subjects o Caldicott Guardian o SIRO o Chief Officer o Police and / or Counter Fraud Managing the Incident Identify who is responsible for managing the incident and coordinating separate but related incidents; Identify who is responsible for the investigation and performance management; Identify expected outcomes; Identify stakeholders; Develop and implement an appropriate communications plan; Preserve evidence; Investigate the incident; Adopt formal documentation including configuration management and version control; Maintain an audit trail of events and evidence supporting decisions taken during the investigation; Inform data subjects (e.g. patients, service users, staff), especially whether there is potential for identity theft which can be avoided or mitigated if the data subject is notified of the incident; Institute recovery actions if possible; Institute counter measures to prevent reccurrence; and Invoke the CCG s disciplinary procedure as appropriate and document where a decision was taken not to take action (if it would be of relevance to a third party) Investigating the Incident Appoint an investigating officer; Engage appropriate specialist help (such as Local Counter Fraud Specialist, CSU Information Governance Manager, CSU IT Manager); Coordinate investigations conducted across organisational boundaries (such as Acute Trust, Mental Health, and Social Care); Conduct a Root Cause Analysis (RCA) Document the investigation and findings, preserving any evidence such as minutes of meetings, s etc.; Identify lessons learned; and Update the IG Incident Reporting Tool as appropriate, ensuring that only information that the CCG wishes to be published by the HSCIC has been recorded Final Reporting, Lessons Learned and Closure of the Incident Page 8 of 20

9 Set target timescale for completing investigation and finalising reports; Produce a final report and obtain sign-off from Investigating Officer, Chief Officer and Caldicott Guardian, subject to the severity (i.e. Level 2 IG SIRI); Disseminate lessons learned to staff and members of the Governing Body; Ensure that all investigations have been completed, affected parties notified and any disciplinary action against staff has been settled to enable the IG SIRI to be closed; and Complete all fields within the IG Incident Reporting Tool including action taken and lessons learned to enable the incident to be closed and the HSCIC External IG Delivery Team to be notified via Reporting and Publication 7.1 The reporting of personal data incidents in the Annual Report should observe the principles listed below: The information provided on personal data related incidents must be complete, reliable and accurate; All public statements made in relation to personal data incidents, particularly in response to requests under the Freedom of Information Act (FOI) 2000, should be reviewed to ensure that they are consistent with the information to be published in the Annual Report; and All exemptions under the FOI Act should be reviewed to establish whether details of a personal data incident are unsuitable for inclusion in the Annual Report. For example where the incident is sub judice i.e. cannot be reported publicly pending the outcome of legal proceedings. 7.2 Details of all level 2 IG SIRIs should be included in the SIRO s written advice to the Chief Officer, as detailed in the Annual Governance Statement, and using the template in Appendix Reports of Level 2 IG SIRIs extracted from the IG Incident Reporting Tool should be published on the NNCCG website. 7.4 Details of all level 1 IG incidents should be aggregated and reported in the Annual Report using the template in Appendix Monitoring 8.1 The policy will be reviewed on a biennial basis and in accordance with the following as and when required: Legislative changes; Good practice guidance; Case law; Changes to CCG infrastructure Page 9 of 20

10 Appendix 1 - IG SIRI High Level Process Potential SIRI Make an initial assessment on IGT Incident Reporting Tool and provide early warnings, if appropriate Manage in accordance with local procedures Yes IG SIRI Level 0 or 1? No IG SIRI Level 2? Yes Reported to ICO and DH via IG Incident Reporting Tool Initiate Incident Response Plan Review IG SIRI level in light of findings. Update IG Incident Reporting Tool Investigation Final Report Close incident, note lessons learned and publish in accordance with local procedure and on IG Incident Reporting Tool Page 10 of 20

11 Appendix 2 - Assessing the Severity of the Incident The main factors for assessing the severity level of an incident are: The number of individual data subjects affected; The potential for significant distress or damage to the data subject; The type of personal data breach of the Data Protection Act; The potential for media interest; The potential for reputational damage; and/or The potential for litigation Where the number of individuals potentially affected is unknown, the likely worst case scenario should be used to inform the initial assessment of the SIRI level. However the level should be re-assessed as soon as more information is known. Categorising the level of an IG SIRI Establish the scale of the incident. If this is not known it will be necessary to estimate the maximum potential scale point. Baseline Scale 0 Information about less than 10 individuals 1 Information about individuals 1 Information about individuals 2 Information about individuals 2 Information about individuals 2 Information about 501-1,000 individuals 3 Information about 1,001-5,000 individuals 3 Information about 5,001-10,000 individuals 3 Information about 10, ,000 individuals 3 Information about 100,001 + individuals Identify which sensitivity characteristics may apply and the baseline scale point will adjust accordingly. Low: For each of the following factors reduce the baseline score by 1-1 for each No clinical data at risk Limited demographic data at risk e.g. address not included, name not included Security controls / difficulty to access data partially mitigates risk

12 Medium: 0 The following factors have no effect on baseline score Basic demographic data at risk e.g. equivalent to telephone directory Limited clinical information at risk e.g. clinic attendance, ward handover sheet High: For each of the following factors increase the baseline score by 1 +1 for each Detailed clinical information at risk e.g. case notes Particularly sensitive information at risk e.g. HIV, STD, Mental Health, Children One or more previous incidents of a similar type in past 12 months Failure to securely encrypt mobile technology or other obvious security failing Celebrity involved or other newsworthy aspects or media interest A complaint has been made to the Information Commissioner Individuals affected are likely to suffer significant distress or embarrassment Individuals affected have been placed at risk of physical harm Individuals affected may suffer significant detriment e.g. financial loss Incident has incurred or risked incurring a clinical untoward incident Identify the adjusted scale and report as appropriate. Final Score Level of IG SIRI 1 or less Level 1 IG SIRI (Not Reportable) 2 or more Level 2 IG SIRI (Reportable via the IG Incident Reporting Tool) Example Incident Classification A Health Visitor data inappropriately disclosed in response to an FOI request. Data relating to 292 children, detailing their client and referral references, their ages, an indicator of their level of need and details of each disability or impairment that led to their being in contact with the health visiting service e.g. autism, chromosomal abnormalities etc.: Baseline scale factor 2-1 Limited demographic data 0 Limited clinical information Sensitivity factors +1 Particularly sensitive information +1 Parents likely to be distressed Final scale point 3 = Level 2 IG SIRI (Reportable) Page 12 of 20

13 B A filing cabinet containing CDs with personal data relating to several thousand members of staff sent to landfill in error during an office move. Baseline scale factor 3-1 no clinical data at risk -1 Landfill unlikely to be accessed Sensitivity factors 0 Basic demographic data +1 Security failure (no encryption and poor disposal) Final scale point 2 = Level 2 IG SIRI (Reportable) c Loss of an individual s medical records. The records were found to be missing when the patient concerned made a subject access request (SAR). Baseline scale factor 0 0 Basic demographic data +1 Detailed clinical information Sensitivity factors +1 Patient distressed +1 Complaint to the ICO Final scale point 3 = Level 2 IG SIRI (Reportable) Page 13 of 20

14 Appendix 3 Definition of Breach Types Breach Type Corruption or inability to recover electronic data Examples / incidents covered within this definition Avoidable or foreseeable corruption of data or an issue which otherwise prevents access which has quantifiable consequences for the affected data subjects e.g. disruption of care / adverse clinical outcomes. E.g. The corruption of a file which renders the data inaccessible; The inability to recover a file as its method / format of storage is obsolete; The loss of a password, encryption key or the poor management of access controls leading to the data becoming inaccessible Disclosed in error This category covers information which has been disclosed to the incorrect party or where it has been sent or otherwise provided to an individual or organisation in error. This would include situations where the information itself hasn t actually been accessed. E.g. Letters / correspondence / files sent to the incorrect individual; Verbal disclosures made in error (however, wilful inappropriate disclosures / disclosures made for personal or financial gain will fall within the reporting requirements pertaining to Section 55 of the DPA - unlawfully obtaining access to personal data); Failure to redact personal data from documentation supplied to third parties; Inclusion of information relating to other data subjects in error; s or faxes sent to the incorrect individual or with the incorrect information attached; Failure to blind carbon copy ( bcc ) s; Mail merge / batching errors on mass mailing campaigns leading to the incorrect individuals receiving personal data; and Disclosure of data to a third party contractor / data processor who is not entitled to receive it Lost in transit The loss of data (usually in paper format, but may also include CDs, tapes, DVDs or portable media) whilst in transit from one business area to another location. E.g. Page 14 of 20

15 Lost by a courier; Lost in the general post (i.e. does not arrive at its intended destination); Lost whilst on site but in situ between two separate premises / buildings or departments; Lost whilst being hand delivered, whether that be by a member of the data controller s staff or a third party acting on their behalf Generally speaking, lost in transit would not include data taken home by a member of staff for the purpose of home working or similar (please see lost or stolen hardware and lost or stolen paperwork for more information). Lost or stolen hardware The loss of data contained on fixed or portable hardware. E.g. Lost or stolen laptops; Hard-drives; Pen-drives; Servers; Cameras; Mobile phones containing personal data; Desk-tops / other fixed electronic equipment; Imaging equipment containing personal data; Tablets; and Any other portable or fixed devices containing personal data; The loss or theft could take place on or off a data controller s premises. For example the theft of a laptop from an employee s home or car, or the loss of a portable device whilst travelling on public transport. Unencrypted devices are at particular risk. Lost or stolen paperwork The loss of data held in paper format. Would include any paperwork lost or stolen which could be classified as personal data (i.e. is part of a relevant filing system/accessible record). E.g. Medical files; Letters; Rotas; Ward handover sheets; and Employee records The loss or theft could take place on or off a data controller s premises, so for example the theft of Page 15 of 20

16 paperwork from an employee s home or car or a loss whilst they were travelling on public transport would be included in this category. Work diaries may also be included (where the information is arranged in such a way that it could be considered to be an accessible record / relevant filing system). Non-secure disposal hardware The failure to dispose of hardware containing personal data using appropriate technical and organisational means. E.g. Failure to meet the contracting requirements of the Seventh Data Protection Principle* when employing a third party processor to carry out the removal / destruction of data; Failure to securely wipe data ahead of destruction; Failure to securely destroy hardware to appropriate industry standards; Re-sale of equipment with personal data still intact / retrievable; The provision of hardware for recycling with the data still intact *Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or changes to, personal data. Non-secure disposal paperwork The failure to dispose of paperwork containing personal data to an appropriate technical and organisational standard. E.g. Failure to meet the contracting requirements of the Seventh Data Protection Principle* when employing a third party processor to remove / destroy / recycle paper; Failure to use confidential waste destruction facilities (including on site shredding); and Data sent to landfill / recycling intact (this would include refuse mix ups in which personal data is placed in general waste); Uploaded to website in error This category is distinct from disclosure in error as it relates to information added to a website containing personal data which is not suitable for disclosure. E.g. Failures to carry out appropriate redactions; Uploading the incorrect documentation; Page 16 of 20

17 The failure to remove hidden cells or pivot tables when uploading a spread-sheet; and Failure to consider / apply FOIA exemptions to personal data Technical security failing (including hacking) This category concentrates on the technical measures a data controller should take to prevent unauthorised processing and loss of data: E.g. Failure to appropriately secure systems from inappropriate / malicious access; Failure to build website / access portals to appropriate technical standards; The storage of data such as Card Verification Data (CVD) alongside other personal identifiers in defiance of industry best practice; Failure to protect internal file sources from accidental / unwarranted access (for example failure to secure shared file spaces); and Failure to implement appropriate controls for remote system access for employees (for example when working from home). In respect of successful hacking attempts, the ICO s interest is in whether there were adequate technical security controls in place to mitigate this risk. Unauthorised access / disclosure The offence under section 55 of the DPA - wilful unauthorised access to, or disclosure of, personal data without the consent of the data controller. Example (1) An employee with admin access to a centralised database of patient details, accesses the records of her daughter s new boyfriend to ascertain whether he suffers from any serious medical conditions. The employee has no legitimate business need to view the documentation and is not authorised to do so. On learning that the data subject suffers from a GUM related medical condition, the employee than challenges him about his sexual history. Example (2) An employee with access to details of patients, who have sought treatment following an accident, sells the details to a claims company who then use this information to facilitate lead generation within the personal injury claims market. The employee has no legitimate business need to view the documentation and has committed an offence in Page 17 of 20

18 both accessing the information and in selling it on. Other This category is designed to capture the small number of occasions on which a Principle Seven breach occurs which does not fall into the aforementioned categories. E.g. Failure to decommission a former premises of the data controller by removing the personal data present; The sale or recycling of office equipment (such as filing cabinets) later found to contain personal data; and Inadequate controls around physical employee access to data leading to the insecure storage of files (for example, failure to implement a secure desk policy or a lack of secure cabinets). This category also covers all aspects of the remaining data protection principles as follows: Fair processing; Adequacy, relevance and necessity; Accuracy; Retention of records; Overseas transfers Page 18 of 20

19 Appendix 4 IG SIRI Annual Report Templates Summary of Level 2 Information Governance Serious Incident Requiring Investigation (IG SIRI) Involving Personal Data as Reported to the Information Commissioners Office (ICO) Date of Incident [Month / Year] Nature of Incident [Table 1] Nature of Data Involved [List of data items involved i.e. name, address, date of birth, NHS number] Number of Data Subjects Potentially Affected [An estimate of the number of individuals should be provided if no precise figure is available] Notification Steps [Individuals notified by post / / telephone / in person] [Details of media statement released] [Details of law enforcement / health and social care agencies notified] [Details of lessons learned disseminated to staff] Further Action on Information Risk [Summary of any disciplinary action taken as a result of the incident / any remedial action to prevent/mitigate reoccurrence] Table 1 A Corruption or inability to recover electronic data B Disclosed in error C Lost in transit D Lost or stolen hardware E Lost or stolen paperwork F Non-secure disposal hardware G Non-secure disposal paperwork H Uploaded to website in error I Technical security failing (including hacking) J Unauthorised access / disclosure K Other (refer to Appendix 3) Page 19 of 20

20 Summary of Other Personal Data Related Incident (Level 1) Category Breach Type Total A B C D E F G H I J Corruption or inability to recover electronic data Disclosed in error Lost in transit Lost or stolen hardware Lost or stolen paperwork Non-secure disposal hardware Non-secure disposal paperwork Uploaded to website in error Technical security failing (including hacking) Unauthorised access / disclosure K Other (refer to Appendix 3) Page 20 of 20

Incident Reporting Procedure

Incident Reporting Procedure Incident Reporting Procedure Version: Version 1 Ratified by: HEE Board Date ratified: 20 March 2014 Name and Title of Mike Jones, Corporate Secretary originator/author(s): Name of responsible Director:

More information

Checklist Guidance for Reporting, Managing and Investigating Information Governance Serious Incidents Requiring Investigation

Checklist Guidance for Reporting, Managing and Investigating Information Governance Serious Incidents Requiring Investigation Checklist Guidance for Reporting, Managing and Investigating Information Governance Serious Incidents Requiring Investigation 1 st June 2013 Version 2.0 Revision History Version Date Summary of Changes

More information

Policy: IG01. Information Governance Incident Reporting Policy. n/a. Date ratified: 16 th April 2014

Policy: IG01. Information Governance Incident Reporting Policy. n/a. Date ratified: 16 th April 2014 Policy: IG01 Information Governance Incident Reporting Policy Version: IG01/01 Ratified by: Trust Management Team Date ratified: 16 th April 2014 Title of Author: Head of Governance Title of responsible

More information

Information Incident Management and Reporting Procedures

Information Incident Management and Reporting Procedures Information Incident Management and Reporting Procedures Compliance with all policies, procedures, protocols, guidelines, guidance and standards is a condition of employment. Breach of policy may result

More information

Information Incident Management. and Reporting Policy

Information Incident Management. and Reporting Policy Information Incident Management and Reporting Policy Policy ID IG10 Version: 1 Date ratified by Governing Body 21/3/2014 Author South CSU Date issued: 21/3/2014 Last review date: N/A Next review date:

More information

Information Incident Management and Reporting Procedures

Information Incident Management and Reporting Procedures ` Information Incident Management and Reporting Procedures Compliance with all CCG policies, procedures, protocols, guidelines, guidance and standards is a condition of employment. Breach of policy may

More information

BHR CCGs Procedure for Managing Information Governance/Information Security Related Incidents

BHR CCGs Procedure for Managing Information Governance/Information Security Related Incidents BHR CCGs Procedure for Managing Information Governance/Information Security Related Incidents Version Description of Change(s) Reason for Author Date Change 0.1 Draft Created Initial Draft R Lavender 30/09/2013

More information

Checklist Guidance for Reporting, Managing and Investigating Information Governance Serious Incidents Requiring Investigation (IG SIRI)

Checklist Guidance for Reporting, Managing and Investigating Information Governance Serious Incidents Requiring Investigation (IG SIRI) Checklist Guidance for Reporting, Managing and Investigating Information Governance Serious Incidents Requiring Investigation (IG SIRI) Applicable to all organisations processing Health, Public Health

More information

NIGB. Information Governance Untoward Incident Reporting and Management Advice for Local Authorities

NIGB. Information Governance Untoward Incident Reporting and Management Advice for Local Authorities Information Governance Untoward Incident Reporting and Management Advice for Local Authorities March 2013 Contents Page 1. The Role of the NIGB.....3 2. Introduction...4 3. Background Information...6 4.

More information

Checklist Guidance for Reporting, Managing and Investigating Information Governance and Cyber Security Serious Incidents Requiring Investigation

Checklist Guidance for Reporting, Managing and Investigating Information Governance and Cyber Security Serious Incidents Requiring Investigation Checklist Guidance for Reporting, Managing and Investigating Information Governance and Cyber Security Serious Incidents Requiring Investigation Applicable to all organisations processing Health, Public

More information

Human Resources Policy documents. Data Protection Policy

Human Resources Policy documents. Data Protection Policy Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and

More information

Standard Operating Procedure for the Management of Information Governance Serious Incidents Requiring Investigation (IG SIRI)

Standard Operating Procedure for the Management of Information Governance Serious Incidents Requiring Investigation (IG SIRI) Standard Operating Procedure for the Management of Information Governance Serious Incidents Requiring Investigation (IG SIRI) DOCUMENT CONTROL: Version: V1 Ratified by: Risk Management Sub Group Date ratified:

More information

INFORMATION GOVERNANCE AND DATA PROTECTION POLICY

INFORMATION GOVERNANCE AND DATA PROTECTION POLICY INFORMATION GOVERNANCE AND DATA PROTECTION POLICY WN CCG Information Governance & Data Protection Policy July 2013 1 Document Control Sheet Name of Document: Information Governance & Data Protection Policy

More information

IP-PGN-14 Part of NTW(O)05 Incident Policy

IP-PGN-14 Part of NTW(O)05 Incident Policy Incident Policy Practice Guidance Note Information Governance Incident Reporting Management V01 Date Issued Planned Review PGN No: Issue 1 October 2014 October 2017 IP-PGN-14 Part of NTW(O)05 Incident

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review

More information

Information Governance and Data Protection Policy

Information Governance and Data Protection Policy Information Governance and Data Protection Policy Page 1 of 21 Document Control Sheet Name of document: Version: Owner: File location / Filename: Information Governance and Data Protection Policy Final

More information

Security Incident Management Policy

Security Incident Management Policy Security Incident Management Policy January 2015 Document Version 2.4 Document Status Owner Name Owner Job Title Published Martyn Ward Head of ICT Business Delivery Document ref. Approval Date 27/01/2015

More information

NHS Information Risk Management

NHS Information Risk Management NHS Information Risk Management Digital Information Policy NHS Connecting for Health January 2009 Contents Introduction Roles and Responsibilities Information Assets Information Risk Policies Links with

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Including the Information Governance Strategy Framework and associated Information Governance Procedures Last Review Date Approving Body N/A Governing Body Date of Approval

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

INFORMATION RISK MANAGEMENT POLICY

INFORMATION RISK MANAGEMENT POLICY INFORMATION RISK MANAGEMENT POLICY DOCUMENT CONTROL: Version: 1 Ratified by: Steering Group / Risk Management Sub Group Date ratified: 21 November 2012 Name of originator/author: Manager Name of responsible

More information

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Indirani 02/11/2009 Draft 2 Include JG s comments Jackie Groom

More information

INFORMATION GOVERNANCE POLICY & FRAMEWORK

INFORMATION GOVERNANCE POLICY & FRAMEWORK INFORMATION GOVERNANCE POLICY & FRAMEWORK Version 1.2 Committee Approved by Audit Committee Date Approved 5 March 2015 Author: Responsible Lead: Associate IG Specialist, YHCS Corporate & Governance Manger

More information

Information Security and Governance Policy

Information Security and Governance Policy Information Security and Governance Policy Version: 1.0 Ratified by: Information Governance Group Date ratified: 19 th October 2012 Name of organisation / author: Derek Wilkinson Name of responsible Information

More information

Remote Working and Portable Devices Policy

Remote Working and Portable Devices Policy Remote Working and Portable Devices Policy Policy ID IG04 Version: V1 Date ratified by Governing Body 29/09/13 Author South Commissioning Support Unit Date issued: 21/10/13 Last review date: N/A Next review

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Policy Summary This policy outlines the organisation s approach to the management of Information Governance and information handling. It explains the accountability and reporting

More information

NHS Waltham Forest Clinical Commissioning Group Information Governance Strategy

NHS Waltham Forest Clinical Commissioning Group Information Governance Strategy NHS Waltham Forest Clinical Commissioning Group Governance Strategy Author: Zeb Alam, CCG IG Lead, (NELCSU) David Pearce, Head of Governance, WFCCG Version 3.0 Amendments to Version 2.1 Annual Review Reference

More information

Data Protection Breach Reporting Procedure

Data Protection Breach Reporting Procedure Central Bedfordshire Council www.centralbedfordshire.gov.uk Data Protection Breach Reporting Procedure October 2015 Security Classification: Not Protected 1 Approval History Version No Approved by Approval

More information

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire

More information

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic

More information

All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid.

All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid. Policy Type Information Governance Corporate Standing Operating Procedure Human Resources X Policy Name CCG IG03 Information Governance & Information Risk Policy Status Committee approved by Final Governance,

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment

More information

SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures

SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures SECURITY INCIDENT REPORTING AND MANAGEMENT Standard Operating Procedures Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme.

More information

Information security incident reporting procedure

Information security incident reporting procedure Information security incident reporting procedure Responsible Officer Author Date effective from 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title

More information

Network Security Policy

Network Security Policy Department / Service: IM&T Originator: Ian McGregor Deputy Director of ICT Accountable Director: Jonathan Rex Interim Director of ICT Approved by: County and Organisation IG Steering Groups and their relevant

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September

More information

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE

More information

Information Governance Management Framework

Information Governance Management Framework Information Governance Management Framework Responsible Officer Author Business Planning & Resources Director Governance Manager Date effective from October 2015 Date last amended October 2015 Review date

More information

Information Governance Strategy

Information Governance Strategy Information Governance Strategy To whom this document applies: All Trust staff, including agency and contractors Procedural Documents Approval Committee Issue Date: January 2010 Version 1 Document reference:

More information

Incident reporting procedure

Incident reporting procedure Incident reporting procedure Responsible Officer Author Date effective from Aug 2009 Date last amended Aug 2009 Review date July 2012 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance

More information

Data Protection and Information Security Policy and Procedure

Data Protection and Information Security Policy and Procedure Data Protection and Information Security Policy and Procedure Document Detail Category: Data Protection Authorised By: Full Governing Body Author: School Business Manager Version: 1 Status: Approved May

More information

Privacy Impact Assessment and Information Governance Checklist

Privacy Impact Assessment and Information Governance Checklist Privacy Impact Assessment and Information Governance Checklist Review and Amendment Log / Control Sheet Responsible Officer: Clinical Chief Officer Clinical Lead: Author: Dr. Dave Mitchell Medical Director/Caldicott

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Policy: Remote Working and Mobile Devices Policy

Policy: Remote Working and Mobile Devices Policy Policy: Remote Working and Mobile Devices Policy Exec Director lead Author/ lead Feedback on implementation to Clive Clarke SHSC Information Manager SHSC Information Manager Date of draft 16 February 2014

More information

1. Introduction... 3. 2. Statement of Policy. 3. 3. The Eight Principles of Data Protection... 4. 4. Scope... 5. 5. Roles and Responsibilities.

1. Introduction... 3. 2. Statement of Policy. 3. 3. The Eight Principles of Data Protection... 4. 4. Scope... 5. 5. Roles and Responsibilities. Data Protection Policy 2011 Contents Page 1. Introduction... 3 2. Statement of Policy. 3 3. The Eight Principles of Data Protection...... 4 4. Scope.... 5 5. Roles and Responsibilities. 5 6. Development

More information

Guidance on data security breach management

Guidance on data security breach management ICO lo Guidance on data security breach management Data Protection Act Contents... 1 Data Protection Act... 1 Overview... 1 Containment and recovery... 2 Assessing the risks... 3 Notification of breaches...

More information

Caedmon College Whitby

Caedmon College Whitby Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be

More information

Incident reporting procedure

Incident reporting procedure Incident reporting procedure Number: THCCGCG0045 Version: V0d1 Executive Summary All incidents must be reported. This should be done as soon as practicable after the incident has been identified to ensure

More information

How To Ensure Network Security

How To Ensure Network Security NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:

More information

University of Aberdeen Information Security Policy

University of Aberdeen Information Security Policy University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...

More information

Merthyr Tydfil County Borough Council. Data Protection Policy

Merthyr Tydfil County Borough Council. Data Protection Policy Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the

More information

Introduction to the NHS Information Governance Requirements

Introduction to the NHS Information Governance Requirements Introduction to the NHS Information Governance Requirements 2 Version April 2014 Information Governance ensures necessary safeguards for, and appropriate use of, patient and personal information. The widely

More information

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

Information Governance Strategy Includes Information risk & incident management methodology

Information Governance Strategy Includes Information risk & incident management methodology Version 2.0 LOGOLOGO Information Governance Strategy Includes Information risk & incident management methodology Approved by: Quality & Governance Committee Ratification date: May 2014 Review date: May

More information

INFORMATION GOVERNANCE HANDBOOK

INFORMATION GOVERNANCE HANDBOOK INFORMATION GOVERNANCE HANDBOOK SECTION ONE Author Tracey Burrows Role Information Governance Manager (CSCSU) Date / Version February 2015 Version FINAL V1.0 Approved by IM&T Board Date 27 February 2015

More information

Guidance on data security breach management

Guidance on data security breach management Guidance on data security breach management Organisations which process personal data must take appropriate measures against unauthorised or unlawful processing and against accidental loss, destruction

More information

Policy: D9 Data Quality Policy

Policy: D9 Data Quality Policy Policy: D9 Data Quality Policy Version: D9/02 Ratified by: Trust Management Team Date ratified: 16 th October 2013 Title of Author: Head of Knowledge Management Title of responsible Director Director of

More information

Mobile and Remote Working Policy

Mobile and Remote Working Policy Mobile and Remote Working Policy UNIQUE REF NUMBER: AC/IG/018/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Policy Name. Completed

Policy Name. Completed ` Policy Type Information Governance Corporate Standing Operating Procedure Human Resources X Policy Name CO07: INCIDENT REPORTING AND MANAGEMENT POLICY Status Committee approved by Approved Management

More information

Information Governance Checklist and Privacy Impact Assessments

Information Governance Checklist and Privacy Impact Assessments Information Governance Checklist and Privacy Impact Assessments Authorship: Committee Approved: Chris Wallace Information Governance Manager Quality and Clinical Governance Committee Approved date: 1 Feb

More information

LSE PCI-DSS Cardholder Data Environments Information Security Policy

LSE PCI-DSS Cardholder Data Environments Information Security Policy LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project

More information

Burton Hospitals NHS Foundation Trust. On: 16 January 2014. Review Date: December 2015. Corporate / Directorate. Department Responsible for Review:

Burton Hospitals NHS Foundation Trust. On: 16 January 2014. Review Date: December 2015. Corporate / Directorate. Department Responsible for Review: POLICY DOCUMENT Burton Hospitals NHS Foundation Trust INFORMATION SECURITY POLICY Approved by: Executive Management Team On: 16 January 2014 Review Date: December 2015 Corporate / Directorate Clinical

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Version: 4 Bodies consulted: Caldicott Guardian, IM&T Directors Approved by: MT Date Approved: 27/10/2015 Lead Manager: Governance Manager Responsible Director: SIRO Date

More information

Safe Haven Policy. Equality & Diversity Statement:

Safe Haven Policy. Equality & Diversity Statement: Title: Safe Haven Policy Reference No: 010/IT Owner: Deputy Chief Officer Author Information Governance Lead First Issued On: November 2012 Latest Issue Date: March 2015 Operational Date: March 2015 Review

More information

NHS Commissioning Board: Information governance policy

NHS Commissioning Board: Information governance policy NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY ENFIELD CLINICAL COMMISSIONING GROUP INFORMATION GOVERNANCE POLICY PLEASE DESTROY ALL PREVIOUS VERSIONS OF THIS DOCUMENT Enfield CCG Information Governance Policy Information Governance Policy (Policy

More information

Barnsley Clinical Commissioning Group. Information Governance Policy and Management Framework

Barnsley Clinical Commissioning Group. Information Governance Policy and Management Framework Putting Barnsley People First Barnsley Clinical Commissioning Group Information Governance Policy and Management Framework Version: 1.1 Approved By: Governing Body Date Approved: 16 January 2014 Name of

More information

Information Management Handbook for Schools. Information Management Handbook for Schools London Borough of Barnet

Information Management Handbook for Schools. Information Management Handbook for Schools London Borough of Barnet Information Management Handbook for Schools London Borough of Barnet Document Name Document Description Information Management Handbook for Schools This document is intended for use by Barnet Borough Schools.

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Page 1 of 46 Policy Title: Executive Summary: Information Governance Policy This policy seeks to identify the actions required to ensure that information is appropriately

More information

Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website

Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Date created: November 2015 Date for review: July 2016 Created by: Mark Vanstone,

More information

NETWORK SECURITY POLICY

NETWORK SECURITY POLICY NETWORK SECURITY POLICY Policy approved by: Governance and Corporate Affairs Committee Date: December 2014 Next Review Date: August 2016 Version: 0.2 Page 1 of 14 Review and Amendment Log / Control Sheet

More information

Version Number Date Issued Review Date V1 25/01/2013 25/01/2013 25/01/2014. NHS North of Tyne Information Governance Manager Consultation

Version Number Date Issued Review Date V1 25/01/2013 25/01/2013 25/01/2014. NHS North of Tyne Information Governance Manager Consultation Northumberland, Newcastle North and East, Newcastle West, Gateshead, South Tyneside, Sunderland, North Durham, Durham Dales, Easington and Sedgefield, Darlington, Hartlepool and Stockton on Tees and South

More information

Cloud Software Services for Schools

Cloud Software Services for Schools Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone Parent Teacher Online

More information

CCG: IG06: Records Management Policy and Strategy

CCG: IG06: Records Management Policy and Strategy Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of

More information

Information Security Policy London Borough of Barnet

Information Security Policy London Borough of Barnet Information Security Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Document Description Information Security Policy Policy which sets out the council s approach to information

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third

More information

NHS Waltham Forest Clinical Commissioning Group Information Governance Policy

NHS Waltham Forest Clinical Commissioning Group Information Governance Policy NHS Waltham Forest Clinical Commissioning Group Information Governance Policy Author: Zeb Alam & David Pearce Version 3.0 Amendments to Version 2.1 Updates made in line with National Guidance and Legislation

More information

INFORMATION GOVERNANCE STAFF HANDBOOK

INFORMATION GOVERNANCE STAFF HANDBOOK INFORMATION GOVERNANCE STAFF HANDBOOK Contents Why do YOU need to know about Information Governance (IG)?... 2 Keeping Information Safe... 2 Confidentiality... 2 Deciding to Communicate Important Information...

More information

DATA PROTECTION CORPORATE POLICY

DATA PROTECTION CORPORATE POLICY DATA PROTECTION CORPORATE POLICY Information Management V1.1 03 July 2012 Not protectively marked This policy must be complied with fully by all Members, Officers Agents and Contractors of Plymouth City

More information

Information Security Policy for Associates and Contractors

Information Security Policy for Associates and Contractors Policy for Associates and Contractors Version: 1.12 Status: Issued Date: 30 July 2015 Reference: 61418080 Location: Livelink Review cycle: Annual Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...

More information

Information Governance Policy

Information Governance Policy Author: Susan Hall, Information Governance Manager Owner: Fiona Jamieson, Assistant Director of Healthcare Governance Publisher: Compliance Unit Date of first issue: February 2005 Version: 5 Date of version

More information

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING Introduction and Policy Aim The Royal Borough of Windsor and Maidenhead (the Council) recognises the need to protect Council

More information

Information Governance Policy. 2 RESPONSIBLE PERSON: Steve Beeho, Head of Integrated Governance. All CCG-employed staff.

Information Governance Policy. 2 RESPONSIBLE PERSON: Steve Beeho, Head of Integrated Governance. All CCG-employed staff. Information Governance Policy 1 SUMMARY This policy is intended to ensure that staff are fully aware of their Information Governance (IG) responsibilities, so that they can effectively manage and best

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

Portable Devices and Removable Media Acceptable Use Policy v1.0

Portable Devices and Removable Media Acceptable Use Policy v1.0 Portable Devices and Removable Media Acceptable Use Policy v1.0 Organisation Title Creator Oxford Brookes University Portable Devices and Removable Media Acceptable Use Policy Information Security Working

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

Findings from ICO audits and reviews of community healthcare providers. June 2013 to December 2014

Findings from ICO audits and reviews of community healthcare providers. June 2013 to December 2014 Findings from ICO audits and reviews of community healthcare providers June 2013 to December 2014 Introduction The Information Commissioner s Office (ICO) is the regulator responsible for ensuring that

More information

We then give an overall assurance rating (as described below) indicating the extent to which controls are in place and are effective.

We then give an overall assurance rating (as described below) indicating the extent to which controls are in place and are effective. Good Practice Audit outcomes analysis Police Forces April 2013 to April 2014 This report is based on the final audit reports the ICO completed in the Criminal Justice sector, specifically of Police forces,

More information

Information Governance Policy

Information Governance Policy Policy Policy Number / Version: v2.0 Ratified by: Audit Committee Date ratified: 25 th February 2015 Review date: 24 th February 2016 Name of originator/author: Name of responsible committee/individual:

More information

Date: 30 th May 2013. Agenda Item: 5.5. Ian Mackenzie Director of Information and Estates REPORT AUTHOR:

Date: 30 th May 2013. Agenda Item: 5.5. Ian Mackenzie Director of Information and Estates REPORT AUTHOR: TRUST BOARD IN PUBLIC Date: 30 th May 2013 Agenda Item: 5.5 REPORT TITLE: Information Governance Annual Report EXECUTIVE SPONSOR: Ian Mackenzie Director of Information and Estates REPORT AUTHOR: Sarah

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact

More information

Information Incident Management Policy

Information Incident Management Policy Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit

More information

Photography and filming in schools Code of Practice

Photography and filming in schools Code of Practice Photography and filming in schools Code of Practice Data Protection compliance September 2010 Photography and filming in schools September 2010 1 Contents 1. About this code 3 2. Complying with the Data

More information

Security Incident Policy

Security Incident Policy Organisation Title Author Owner Protective Marking Somerset County Council Security Incident Policy Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council will

More information