Information Governance
|
|
- Austen Gilmore
- 8 years ago
- Views:
Transcription
1 Information Governance Safe Haven Procedures; Guidance for all BHR CCG Staff Fax Machines Postage Telephone Conversations
2 Fax Machines Confidential information faxed in emergency situations only Person Identifiable information (PID) is confidential Always double check the number with the recipient Always use pre-programmed numbers to avoid misdialling Contact the recipient informing them you will be sending them a Fax Ask the recipient to confirm safe receipt of information sent Chase receipt if necessary you must obtain assurance Personal details should be always be faxed separately from any clinical details. Fax Header must always be used Marked Private and Confidential, recipients name and the amount of pages you are transmitting in the fax
3 NHSmail to NHSmail is the only approved method for communicating confidential information by in the NHS The following domains only are secure when sending from NHS.net; NHS (*.nhs.net), GSi (*.gsi.gov.uk), CJX (*.police.uk or.pnn.police.uk) GSE (*.gse.gov.uk), GSX (*.gsx.gov.uk), GCSX (*.gcsx.gov.uk) HSCIC.gov (*hscic.gov), SCN (*scn.gov.uk), CJSM (*cjsm.net), HSCIC (*>hscic.uk) are secure domains that can also be used NHS.net to (e.g. is not secure If you require an NHS.Mail account, these can be provided by contacting GP IT support on floor 2 at Becketts House Confirm the address with the other party then double check for accuracy Don t forget to request a read or delivery receipt when sending the
4 Postage If you need to send hard-copy of PID, sensitive or confidential information Please ensure that: Envelopes are sealed, clearly and accurately addressed and marked Private and Confidential and Addressee Only Sign with your signature across the flap of the envelope then apply sello-tape for extra security (this will inform recipient if it has been tampered with during transit A reliable and approved courier service is to be used, however if courier service is missed; If using the post, use a service that has tracking only (Royal Mail Special Recorded delivery) Request that the recipient confirms they have received the information by adding a compliments slip asking for confirmation Recipients should ensure that any information (incoming mail) received has been delivered correctly For any transfer of Bulk person identifiable information (21 individuals or more contact IG Consultant for help, guidance and support
5 Telephone If request is from someone unknown - Confirm the name, job title, department and organisation Confirm the reason for the information request Take a contact telephone number e.g. main switchboard never a direct dial or mobile telephone number This helps to confirm identity. Check whether the information can be provided if unsure contact Caldicott Guardian If OK - Provide the information to the person who has requested it, recording what information was disclosed, to whom, time and date and justification for providing Never leave messages on answer machines detailing any person identifiable information Simply leave Name, time and a number for you to be contacted on a brief description for the purpose of your call
6 When it goes wrong ICO British Pregnancy Advice Service 7 March 2014 British Pregnancy Advice Service fined 200,000. Hacker threatened to publish thousands of names of people who sought advice on abortion, pregnancy and contraception. View a PDF of the British Pregnancy Advice Service monetary penalty notice North Staffordshire Combined Healthcare NHS Trust 13 June 2013 A monetary penalty notice has been served to North Staffordshire Combined Healthcare NHS Trust, after several faxes containing sensitive personal data were sent to a member of the public in error. View a PDF of the North Staffordshire Combined Healthcare monetary penalty notice
7 When it goes wrong ICO NHS Surrey 12 July 2013 A monetary penalty notice has been served on NHS Surrey following the discovery of sensitive personal data belonging to thousands of patients on hard drives sold on an online auction site. Whilst NHS Surrey has now been dissolved outstanding issues are now being dealt with by the Department of Health. View a PDF of the NHS Surrey monetary penalty notice Brighton and Sussex University Hospitals NHS Trust 1 June 2012 A monetary penalty notice for 325,000 has been served on Brighton and Sussex University Hospitals NHS Trust following the discovery of highly sensitive personal data belonging to tens of thousands of patients and staff including some relating to HIV and Genito Urinary Medicine patients on hard drives sold on an Internet auction site in October and November View a PDF of the Brighton and Sussex University Hospitals NHS Trust monetary penalty notice
8 What Next? Do ensure that you annually update IG Training MANDATORY FOR ALL Do ensure you read key IG policies and all other policies relevant to your role Do not take any unnecessary risks with information if in any doubt ASK! Do report all IG IS incidents and near misses Don t be afraid to ask for help if required
Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information
Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information Im&t directorate\policies\approved ig policiesprocedures.1 Index 1. Purpose... 3 2. Introduction... 3 3. Scope...
More informationInformation Governance Toolkit. Information Security Assurance. Detailed Guidance on Secure Transfers
Information Governance Toolkit Information Security Assurance Detailed Guidance on Secure Transfers Information Transfers/Flows - Security Measures 1. The outcomes of information mapping and identified
More informationIG Toolkit Version 8. Information Security Assurance. Requirement 322. Detailed Guidance on Secure Transfers
IG Toolkit Version 8 Information Security Assurance Requirement 322 Detailed Guidance on Secure Transfers IG Toolkit Version 8 Requirement 322: Detailed guidance on secure transfers Page 1 of 7 All transfers
More informationEmail Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:
Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury
More informationSecure Transfer of Information Guidance for staff
Secure Transfer of Information Guidance for staff Document number CCG.GOV.013.1.1 Version: 1.1 Ratified by: NHS Bury CCG Quality and Risk Committee Date ratified: 8 th January 2014 Name of originator /author
More informationPersonal Data Handling and Sharing Policy
Personal Data Handling and Sharing Policy Originator Richard Gibson Date 20 June 2012 Verifier Lynda Oliver Date 20 June 2012 Reviewed Richard Gibson, Lynda Oliver Date July 2013 Contents Page 1. Introduction
More informationMaking use of Secure Email. Sharing Data and working collaboratively securely in health and social care
Making use of Secure Email Sharing Data and working collaboratively securely in health and social care Paul Bourke-Cockerill - 13 th August 2014 Background Secure email can transform how organisations
More informationNon ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3
Paper 9 Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3 Please ensure that all THREE pages of this contract are returned to: Information Governance Manager, Health Informatics, Chertsey House, St Peter
More informationMobility and Young London Annex 4: Sharing Information Securely
Young London Matters April 2009 Government Office For London Riverwalk House 157-161 Millbank London SW1P 4RR For further information about Young London Matters contact: younglondonmatters@gol.gsi.gov.uk
More informationSafe Haven Procedure. Final. Date Issued March 2009 Review Date March 2010 NHS East Midland Employees. Safe Haven Procedure: v1.
Safe Haven Procedure Final Version 1.0 (Final) Ratified By Executive Team Originator/Author Fabian Henderson Date Issued March 2009 Review Date March 2010 Target NHS East Midland Employees Safe Haven Procedure:
More informationyour hospitals, your health, our priority STANDARD OPERATING PROCEDURE: Safe Haven Procedure TW10-110 SOP 3 SOP NO: VERSION NO:
STANDARD OPERATING PROCEDURE: Safe Haven Procedure SOP NO: VERSION NO: APPROVING COMMITTEE: DATE THIS VERSION APPROVED: TW10-110 SOP 3 3 Information Governance Committee July 2013 RATIFYING COMMITTEE:
More informationInformation Governance
Information Governance Information for Patients Information Governance (IG) Contents: Identifying the IG Lead for the Practice. This identifies the main people responsible for Information Governance Policy.
More informationData Transfer Policy. Data Transfer Policy London Borough of Barnet
Data Transfer Policy Data Transfer Policy London Borough of Barnet Document Control POLICY NAME Data Transfer Policy Document Description Policy surrounding data transfers (electronic and paper based).
More informationName of responsible committee: Information Governance Board Date issued: 15 th April 09 Review date: 14 th April 11 Referenced Documents:
Storage and Transfer of Person Identifiable Information Policy Trust Wide Policy number: ULH-IM&T-AUP03 Version: 1.1 New or Replacement: New Approved by: Executive Board Date approved: 14 th April 09 Name
More informationInformation Governance Staff Handbook. Information Governance Staff Handbook
Information Governance Staff Handbook Information Governance Staff Handbook August 2014 Version 2 Page 1 of 35 Document History Document Reference: IG42 The document compliments all other Information Governance
More informationInformation Governance Manual Training Booklet
Information Governance Manual Training Booklet Introduction This booklet is aimed at staff who do not access a computer whilst working for the Trust. If you have access to a computer, you must complete
More informationSafe Haven Policy. Equality & Diversity Statement:
Title: Safe Haven Policy Reference No: 010/IT Owner: Deputy Chief Officer Author Information Governance Lead First Issued On: November 2012 Latest Issue Date: March 2015 Operational Date: March 2015 Review
More informationGuidance for sending and receiving an encrypted NHSmail e-mail
Contents Guidance for sending and receiving an encrypted NHSmail e-mail Introduction 2 Sending an encrypted e-mail to a VERIFIED e-mail address 2 Receiving an encrypted e-mail 4 Reply to and forward encrypted
More informationTrust Informatics Policy. Information Governance. Secure Transfer of Information Policy
Trust Informatics Policy Information Governance Policy Reference: 3628 Document Title Author/Contact Document Reference 3628 Document Control Pauline Nordoff-Tate, Information Assurance Manager Document
More informationEmailing and Texting with Patients
Emailing and Texting with Patients Trust Board Meeting - Part 1 Item: 8.4 25 September 2013 Enclosure: I Purpose of the Report: This paper explores the use of email and texting in certain forms of communication
More informationHulme Hall Medical Group
Beacon Practice for Patient Online Hulme Hall Medical Group Fax and Emailing Handling Policy Written By: Joanne Revell Signed: Authorised by: Anna Webster Signed: Job Title: Practice Manager CQC Lead Effective
More informationFaster, better, safer communications
Faster, better, safer communications Using email in health and social care (in England) For patients and healthcare professionals March 2015 Acknowledgements This project was funded by the NHSmail team
More informationBest practice guidance for information security within Choose and Book May 2009
Best practice guidance for information security within Choose and Book May 2009 Best practice guidance for information security within Choose and Book This guidance has been prepared to help organisations
More informationINFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Information Governance Policy_v2.0_060913_LP Page 1 of 14 Information Reader Box Directorate Purpose Document Purpose Document Name Author Corporate Governance Guidance Policy
More informationBexley Safeguarding Children Board. Information Sharing and Secure Document Transfer Guidance
Bexley Safeguarding Children Board Information Sharing and Secure Document Transfer Guidance All professionals who work with children and young people, or with adults who are parents or carers, should
More informationData Transfer Policy London Borough of Barnet
London Borough of Barnet DATA PROTECTION 11 Document Control Document Description Data Transfer Policy Version v.2 Date Created December 2010 Status Authorisation Name Signature Date Prepared By: IS Checked
More informationA Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail email including Generic Mailboxes
A Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail email including Generic Mailboxes Contents 1 Introduction 3 2 NHSmail Acceptable Use Policy 3 3 Objectives 4 4 General
More informationInformation Governance Strategy Includes Information risk & incident management methodology
Version 2.0 LOGOLOGO Information Governance Strategy Includes Information risk & incident management methodology Approved by: Quality & Governance Committee Ratification date: May 2014 Review date: May
More informationPolicy Document Control Page
Policy Document Control Page Title Title: Policy for the electronic transfer of Person Identifiable Data - harmonised Version: 5 Reference Number: CO51 Supersedes Supersedes: 4 Description of Amendment(s):
More informationFrequently Asked Questions on new guidance for email in NHSScotland
May 2012 Approved Frequently Asked Questions on new guidance for email in NHSScotland 1) Why the need for new guidance? There is confusion as to what can be sent between NHSScotland boards, to business
More informationInformation Governance Policy Version - Final Date for Review: 1 October 2017 Lead Director: Performance, Quality and Cooperate Affairs
Information Governance Policy Version - Final Date for Review: 1 October 2017 Lead Director: Performance, Quality and Cooperate Affairs NOTE: This is a CONTROLLED Document. Any documents appearing in paper
More informationData Breach Trends October 2015
Data Breach Trends October 2015 Introduction In October 2015 the Information Commissioner s Office (ICO) published the latest data breach trends including incidents by quarter, type of incident and incidents
More informationInformation Incident Management. and Reporting Policy
Information Incident Management and Reporting Policy Policy ID IG10 Version: 1 Date ratified by Governing Body 21/3/2014 Author South CSU Date issued: 21/3/2014 Last review date: N/A Next review date:
More informationStaff Information Governance Manual. All you need to know about Information Governance in one place
Staff Information Governance Manual All you need to know about Information Governance in one place CONTENTS Page 1. The roles of the Caldicott Guardian and the Senior Information Risk Owner 1 2. Fair Processing
More informationBEFORE USING THIS GUIDANCE, MAKE SURE YOU HAVE THE MOST UP TO DATE VERSION GUIDANCE 2 POLICY AREA: INFORMATION GOVERNANCE
GUIDANCE 1 TITLE: INFORMATION GOVERNANCE FRAMEWORK 2 POLICY AREA: INFORMATION GOVERNANCE 3 ACCOUNTABLE DIRECTOR FOR POLICY AREA: DIRECTOR OF QUALITY AND GOVERNANCE 4 GUIDANCE DRAFTED BY: INTEGRATED GOVERNANCE
More informationChecklist Guidance for Reporting, Managing and Investigating Information Governance Serious Incidents Requiring Investigation
Checklist Guidance for Reporting, Managing and Investigating Information Governance Serious Incidents Requiring Investigation 1 st June 2013 Version 2.0 Revision History Version Date Summary of Changes
More informationSomerset County Council - Data Protection Policy - Final
Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council
More informationInformation Governance Policy
Information Governance Policy Policy ID IG02 Version: V1 Date ratified by Governing Body 27/09/13 Author South Commissioning Support Unit Date issued: 21/10/13 Last review date: N/A Next review date: September
More informationE-Mail, Calendar and Messaging Services Good Practice Guideline
E-Mail, Calendar and Messaging Services Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0017.01 Prog. Director Mark Ferrar Status
More informationHealth and Social Care Information Centre
Health and Social Care Information Centre Information Governance Assessment Customer: Clinical Audit Support Unit of the Health and Social Care Information Centre under contract to the Royal College of
More informationSecure Storage, Communication & Transportation of Personal Information Policy Disclaimer:
Secure Storage, Communication & Transportation of Personal Information Policy Version No: 3.0 Prepared By: Information Governance, IT Security & Health Records Effective From: 20/12/2010 Review Date: 20/12/2011
More informationCONTACTING SERVICE USERS BY TEXT MESSAGES (SMS) POLICY
CONTACTING SERVICE USERS BY TEXT MESSAGES (SMS) POLICY POLICY NUMBER 098/Corporate POLICY VERSION 1 RATIFYING COMMITTEE Information Governance Group DATE RATIFIED May 2012 DATE OF EQUALITY & HUMAN RIGHTS
More informationInformation Governance Policy
Information Governance Policy Policy Summary This policy outlines the organisation s approach to the management of Information Governance and information handling. It explains the accountability and reporting
More informationGCSx Email Guide for Internal Users. How to send sensitive business and personal information securely
GCSx Email Guide for Internal Users How to send sensitive business and personal information securely Document control Description Version V.2 Created May 2013 GCSx Email Guide for Internal Users Status
More informationBorough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments
Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments V8 Contents What is Encryption?...3 Why do I need to know about it?...3 How do I use it?...3 What
More informationE-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:
E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:
More informationSMS Text Messaging to Service Users Policy
SMS Text Messaging to Service Users Policy Reference No: Version: 2 Ratified by: P_IG_24 LCHS Trust Board Date ratified: 29 th July 2014 Name of originator/author: Name of responsible committee/individual:
More informationCorporate Affairs Overview and Scrutiny Committee
Agenda item: 4 Committee: Corporate Affairs Overview and Scrutiny Committee Date of meeting: 29 January 2009 Subject: Lead Officer: Portfolio Holder: Link to Council Priorities: Exempt information: Delegated
More informationNHS Commissioning Board: Information governance policy
NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION
More informationEmail Policy. Information Steering Group. Version Author Date Reason for review 0.0 Andrew Thomas July 2013 0.1 Neil Taylor August 2013
Email Policy Author(s) Andrew Thomas Version 1.0 Version Date 21 August 2013 Implementation/approval Date 14 August 2013 Review Date August 2014 Review Body Information Steering Group Policy Reference
More informationReporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule
Reporting of HIPAA Privacy/Security Breaches The Breach Notification Rule Objectives What is the HITECH Act? An overview-what is Protected Health Information (PHI) and can I protect patient s PHI? What
More informationInformation Governance Framework and Strategy. November 2014
November 2014 Authorship : Committee Approved : Chris Wallace Information Governance Manager CCG Senior Management Team and Joint Trade Union Partnership Forum Approved Date : November 2014 Review Date
More informationInformation Governance Framework
Information Governance Framework Authorship: Chris Wallace, Information Governance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date: March
More informationInformation Sharing Policy
Information Sharing Policy REFERENCE NUMBER IG 010 / 0v3 February 2013 VERSION V1.0 APPROVING COMMITTEE & DATE Clinical Executive Committee 5.2.13 REVIEW DUE DATE February 2016 West Lancashire CCG is committed
More informationBulk Data Transfer Guidelines
Bulk Data Transfer Guidelines This procedural document supersedes: CORP/ICT 20 v.1 Bulk Data Transfer. Did you print this document yourself? The Trust discourages the retention of hard copies of policies
More informationTERMS OF REFERENCE: REVIEW OF THE INFORMATION GOVERNANCE TOOLKIT
TERMS OF REFERENCE: REVIEW OF THE INFORMATION GOVERNANCE TOOLKIT The Information Governance Professional Leadership Group hosted by the NHS Commissioning Board is committed to conducting a strategic review
More informationSUBJECT ACCESS REQUEST PROCEDURE
This document is uncontrolled once printed. Please check on the CCG s Intranet site for the most up to date version SUBJECT ACCESS REQUEST PROCEDURE DOCUMENT CONTROL Type of Document Document Title Description:
More informationInternet and Social Media Policy
Internet and Social Media Policy Page 1 of 19 Review and Amendment Log / Control Sheet Responsible Officer: Chief Officer Clinical Lead: Author: Date Approved: Committee: Version: Review Date: Medical
More informationInformation Governance Strategy Includes Information risk & incident management methodology
Version 3.0 LOGOLOGO Information Governance Strategy Includes Information risk & incident management methodology Approved by: Quality Assurance Group Ratification date: March 2015 Review date: March 2016
More informationInformation Security Adults Services. Practice guidance. Revised Version: 1.2 Effective from: August 2014 Next review date: August 2015
Information Security Adults Services Practice guidance Revised Version: 1.2 Effective from: August 2014 Next review date: August 2015 Sign off: Jenny Daniels Title: Head of Health and Social Care Practice
More informationPolicy Document Control Page
Policy Document Control Page Title Title: Electronic Mail Policy Version: 5 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version
More informationThe Newcastle upon Tyne Hospitals NHS Foundation Trust. Occupational Health Records Management and Retention Operational Policy
The Newcastle upon Tyne Hospitals NHS Foundation Trust Occupational Health Records Management and Retention Operational Policy Version No. 1.0 Effective From: 9 October 2013 Expiry Date: 30 September 2016
More informationCONTRACTS REVIEW FOR INFORMATION GOVERNANCE COMPLIANCE PROCEDURE
This document is uncontrolled once printed. Please check on the CCG s Intranet site for the most up to date version CONTRACTS REVIEW FOR INFORMATION GOVERNANCE COMPLIANCE PROCEDURE Document Title: Contracts
More informationWorkforce Development for People with Intellectual Disabilities
Developing people for health and healthcare Workforce Development for People with Intellectual Disabilities The report of the Kent, Surrey and Sussex Intellectual Disabilities Workforce Scoping Project
More informationInformation governance
Information governance Staff handbook RDaSH 88 02 Information governance Introduction to information governance Overview 88 03 Information governance or IG - includes information security and confidentiality,
More informationNHS DORSET CLINICAL COMMISSIONING GROUP GOVERNING BODY INFORMATION GOVERNANCE TOOLKIT REPORT
NHS DORSET CLINICAL COMMISSIONING GROUP GOVERNING BODY INFORMATION GOVERNANCE TOOLKIT REPORT 9.7 Date of the meeting 15/07/2015 Author Sponsoring Clinician Purpose of Report Recommendation J Green - Head
More informationInformation Security Assurance Plan 2015/16
Information Security Assurance Plan 2015/16 Policy number: N/A Version 2.0 Approved by Name of author/originator Owner (Exec Director) Date of approval August 2015 Date of last review July 2015 Next due
More informationHIPAA Awareness Training
New York State Office of Mental Health Bureau of Education and Workforce Development HIPAA Awareness Training This training material was prepared for internal use by the New York State Office of Mental
More informationRecipients Guide for Email Encryption Version 1.2
Recipients Guide for Email Encryption Version 1.2 Document Location n/a Copies can be requested from the IT Dept 01603 50 8622 Revision Previous Revision by Summary of Changes Version date revision date
More informationINFORMATION GOVERNANCE STAFF HANDBOOK
INFORMATION GOVERNANCE STAFF HANDBOOK Contents Why do YOU need to know about Information Governance (IG)?... 2 Keeping Information Safe... 2 Confidentiality... 2 Deciding to Communicate Important Information...
More informationInformation Incident Management and Reporting Procedures
Information Incident Management and Reporting Procedures Compliance with all policies, procedures, protocols, guidelines, guidance and standards is a condition of employment. Breach of policy may result
More informationInformation Governance
What you should know about Information Governance p2 Information Governance What is Information Governance? You have probably heard of clinical governance, which is a way for organisations and individuals
More informationENC Li Subject Access Request Procedure
Subject Access Request Procedure Version: 1.0 Page 1 of 23 Document control Document Information Document Name: Location: Consultation: Initial approval: Supersedes: Description: Audience: Contact details
More informationBarnet Partnership Information Sharing Protocol
Barnet Partnership Information Sharing Protocol Information Sharing Protocol V1_0C - FINAL Page 1 of 52 Version 1.0 (FINAL) Contents 1 Background... 4 1.1 The need to share information... 4 2 Scope...
More informationPRINCIPLES FOR HIGH QUALITY INTERPRETING AND TRANSLATION SERVICES
PRINCIPLES FOR HIGH QUALITY INTERPRETING AND TRANSLATION SERVICES [VERSION 1.19] POLICY STATEMENT The NHS is committed to providing high quality, equitable, effective healthcare services that are responsive
More informationInformation Governance
CONTROLLED Information Governance Caldicot Version-Workbok Non Caldicott Version - Workbook Version 12 January 2015 40 1 Don t Get Bitten by the Data Demon Notes Using this Workbook The objective of this
More informationSubject Access Requests Policy
Subject Access Requests Policy This Policy provides guidance on the processes that are to be followed when dealing with requests for access to personal information under section 7 of the Data Protection
More informationInformation Governance. User Handbook
Information Governance User Handbook 2 CONTENTS Page 1.0 INTRODUCTION TO INFORMATION GOVERNANCE 4 1.2 How This Guidance Will Help You! 4 2.0 KEY INFORMATION GOVERNANCE ROLES 5 3.0 INFORMATION GOVERNANCE
More informationA Question of Balance
A Question of Balance Independent Assurance of Information Governance Returns Audit Requirement Sheets Contents Scope 4 How to use the audit requirement sheets 4 Evidence 5 Sources of assurance 5 What
More informationHealth and social care staff members: What you should know about Information Governance
Health and social care staff members: What you should know about Information Governance p2 Information Governance What is Information Governance? You have probably heard of Clinical or Social Care Governance,
More informationGPES Independent Advisory Group Minutes
Meeting date: Thursday 13 December 2012 Location: Ambassadors Bloomsbury, 12 Upper Woburn Place, London WC1H 0HX Members in attendance: Name Neil Serougi Angus Dawson Joanne Bailey Eve Sariyiannidou MacDonald
More informationUSB Data Stick Procedure
SH IG 41 INFORMATION SECURITY SUITE OF POLICIES Procedure for the Management of Personal Data Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review : This procedure
More informationAccess to Health Records
Access to Health Records Crown Heights Medical Centre Procedure Access to Health Records ACCESS TO MEDICAL RECORDS (DATA PROTECTION) POLICY INTRODUCTION The Access to Health Records Act 1990 gave individuals
More informationINFORMATION GOVERNANCE STAFF HANDBOOK AND CODE OF CONDUCT
e-health Cumbria INFORMATION GOVERNANCE STAFF HANDBOOK AND CODE OF CONDUCT TABLE OF CONTENTS 1. INTRODUCTION... 4 2. INFORMATION GOVERNANCE... 4 3. WHAT DO YOU NEED TO KNOW ABOUT INFORMATION GOVERNANCE?..
More informationJoint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Three
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Three Data Handling in University Information Classification and Handling Agenda Background People-Process-Technology
More informationEmail Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
More informationINFORMATION SHARING AGREEMENT. Multi-Disciplinary Team (MDT): Service Information Sharing
INFORMATION SHARING AGREEMENT Multi-Disciplinary Team (MDT): Service Information Sharing SCOPE NAME OF LEAD Multi-Disciplinary Team (MDT) for high risk people: this agreement is for the patient and management
More informationInformation Governance in Commissioning. Mental Health Commissioners Collaborative
Information Governance in Commissioning Mental Health Commissioners Collaborative Introduction David Stone Head of Information Governance Apira Limited david.stone@apira.co.uk 07947 052704 2011/12 Standard
More informationINFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE
More informationIncident reporting procedure
Incident reporting procedure Number: THCCGCG0045 Version: V0d1 Executive Summary All incidents must be reported. This should be done as soon as practicable after the incident has been identified to ensure
More informationSHIP Guiding Principles and Best Practices
A document of the SHIP Information Governance Working Group The objectives of this document This document is a statement of agreed guiding principles for governance and instances of best practice arising
More informationInformation Governance Policy
Information Governance Policy UNIQUE REF NUMBER: AC/IG/013/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
More informationAPPENDIX 1: Frequently Asked Questions
APPENDIX 1: Frequently Asked Questions Practice Name Q: What is the HIPAA Privacy Rule? A: The HIPAA Privacy Rule controls the use and disclosure of what is known as Protected Health Information (PHI).
More informationInformation Incident Management and Reporting Procedures
` Information Incident Management and Reporting Procedures Compliance with all CCG policies, procedures, protocols, guidelines, guidance and standards is a condition of employment. Breach of policy may
More informationTRUST POLICY FOR DATA QUALITY
TRUST POLICY FOR DATA QUALITY Reference Number: IG 2012 001 Version: 2.3 Status: Final Author: Vanessa Forman Job Title: Head of Information Version / Amendment History Version Date Author Reason 1 September
More informationPersonal Identifiable Data Security Policy
Personal Identifiable Data Security Policy Number: THCCGCG43 Version: 01 Executive Summary This Policy defines the Security requirements for all Staff involved in handling Person Identifiable Data (PID)
More informationPage 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;
Page 1 National Organization of Alternative Programs 2014 NOAP Educational Conference HIPAA and Privacy Risks Ira J Rothman, CPHIMS, CIPP/US/IT/E/G Senior Vice President - Privacy Official March 26, 2014
More informationBUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT Please complete the following and return signed via Fax: 919-785-1205 via Mail: Aesthetic & Reconstructive Plastic Surgery, PLLC 2304 Wesvill Court Suite 360 Raleigh, NC 27607
More informationNHS Newcastle Gateshead Clinical Commissioning Group. Information Governance Strategy 2015/16
NHS Newcastle Gateshead Clinical Commissioning Group Information Governance Strategy 2015/16 Document Status Equality Impact Assessment Document Ratified/Approved By Approved No impact NHS Quality, Safety
More informationIP-PGN-14 Part of NTW(O)05 Incident Policy
Incident Policy Practice Guidance Note Information Governance Incident Reporting Management V01 Date Issued Planned Review PGN No: Issue 1 October 2014 October 2017 IP-PGN-14 Part of NTW(O)05 Incident
More information