Anonymisation Standard for Publishing Health and Social Care Data Specification
|
|
|
- Augustus Craig
- 9 years ago
- Views:
Transcription
1 Title Anonymisation Standard for Publishing Health and Social Care Data Specification (Process Standard) Document ID ISB1523 Amd 20/2010 Sponsor Phil Walker Status Final Developer Clare Sanderson & Malcolm Oswald Version 1.0 Author Malcolm Oswald Version Date 21/02/2013 Anonymisation Standard for Publishing Health and Social Care Data Specification Crown Copyright 2013
2 Amendment History: Version Date Amendment History /04/2012 First draft for comment by ISB. Previous drafts have been subject to considerable review (see front pages of: Drawing the line between identifying and non-identifying data) /05/2012 Amended specification and conformance criteria /06/2012 Amended following ISB Appraisal, NIGB review and Tech Office review /07/2012 Amended to make changes following minor comments from ISB reviewer /08/2012 Amended to reflect ISB Board comments, including merging the implementation guidance into this document /09/2012 Amended to reflect comments from ISB Domain Leads and others /10/2012 Version used for phase 2 testing having been amended to reflect feedback from phase 1 testing /11/2012 Changes made to reflect the results of phase 2 testing /12/2012 Changes made to reflect feedback from ISB appraisers /01/2013 Changes made to reflect further comments from ISB /02/2013 Publication copy Approvals and Reviews: Name Organisation & Role Version Review/ Approval Information Standards Managers Information Standards Management Service V0.1 V0.2 V0.3 R Stakeholder Groups Health and Social Care V0.2 R Appraisers Information Standards Board V0.2 R Phil Walker Department of Health Sponsor Head of IG Policy V0.1 V0.2 V0.3 R Clare Sanderson The Information Centre for Health and Social Care Lead Developer Executive Director of IG V0.1 V0.2 V0.3 R Phil Walker Department of Health Sponsor Head of IG Policy V0.9 A Clare Sanderson The Information Centre for Health and Social Care Lead Developer Executive Director of IG V0.9 A Technology Office NHS Connecting for Health Draft Submission A Crown Copyright 2013 Page 2 of 41
3 Karen Thomson (NIGB) Information Standards Board Information Centre Testers and other reviewers Information Standards Board Domain Lead and Appraisers Information Standards Board Information Standards Board National Information Governance Board - IG Lead NHS Connecting for Health Draft Submission Draft Submission Health and Social Care Information Centre v.05, v.06 R NHS Connecting for Health V0.7 and V0.8 NHS Connecting for Health V0.9 A NHS Connecting for Health V1.0 A R A R Crown Copyright 2013 Page 3 of 41
4 Glossary of Terms Term Aggregate data Anonymisation Caldicott Guardian Cell Confidential information Data controller Definition Data derived from records about more than one person, and expressed in summary form, such as statistical tables. Any processing that minimises the likelihood that a data set will identify individuals. A wide variety of anonymisation techniques can be used; some examples of such processing are explained in this specification. Also commonly referred to as de-identification. A senior person responsible for protecting the confidentiality of patient and service user information and enabling appropriate information sharing. Caldicott Guardians were mandated for NHS organisations by Health Service Circular HSC1999/012 and later for social care by Local Authority Circular LAC 2002/2. General practices are required by regulations to have a confidentiality lead 1. Note that a Caldicott Guardian is an individual, whereas a data controller is a legal person (invariably an organisation such as a general medical practice or foundation trust). An entry in a table of aggregate data. Information to which a common law duty of confidence applies. A person 2 who (either alone or jointly or in common with other persons) determines the purposes for which and the manner in which any personal data are, or are to be, processed 3. Data Data means information which (a) is being processed by means of equipment operating automatically in response to instructions 1 The definition provided in the glossary that forms part of the Information Governance Toolkit, available at: 2 Note that this is a legal person, and in the context of health and social care, this will be a legal entity such as a local authority, NHS trust, or general practice rather than an individual working for such a body. 3 The definition in the Data Protection Act 1998; see: Crown Copyright 2013 Page 4 of 41
5 given for that purpose, (b) is recorded with the intention that it should be processed by means of such equipment, (c) is recorded as part of a relevant filing system or with the intention that it should form part of a relevant filing system, (d) does not fall within paragraph (a), (b) or (c) but forms part of an accessible record as defined by section 68, or Data processor Direct identifier Disclose Duty of confidence Identifying data (e) is recorded information held by a public authority and does not fall within any of paragraphs (a) to (d) 4. Any person (other than an employee of the data controller) who processes the data on behalf of the data controller 5. Name, address, widely-used unique person or record identifier (notably National Insurance Number, NHS Number, Hospital Number), telephone number, address, and any other data item that on its own could uniquely identify the individual. To provide information to specific recipient(s). A duty of confidence arises when one person discloses information to another (e.g. patient to clinician) in circumstances where it is reasonable to expect that the information will be held in confidence. It a. is a legal obligation that is derived from case law; b. is a requirement established within professional codes of conduct; and c. must be included within NHS employment contracts as a specific requirement linked to disciplinary procedures 6. The same meaning as personal data, but extended to apply to dead, as well as living, people. 4 The definition in the Data Protection Act 1998; see: 5 The definition in the Data Protection Act 1998; see: 6 Definition taken from page 7 of NHS Code of Practice on Confidentiality, available at: Crown Copyright 2013 Page 5 of 41
6 Indirect identifier Individual-level data Information k-anonymity Non-identifying data Non-personal data A data item (including postal code, gender, date of birth, event date or a derivative of one of these items) that when used in combination with other items could reveal the identity of a person. Also referred to as quasi-identifier. Data that have not been aggregated 7 and that relate to an individual person, and/or to events about that person. The data may or may not reveal the identity of a person, and thus may or may not be identifying data. An example is a request for an investigation that accompanies a blood test, with NHS Number, date of birth, and details of the sample and tests required 8. See definition of data. Within this document, the two terms are used synonymously. A criterion to ensure that there are at least k records in a data set that have the same quasiidentifier values. For example, if the quasiidentifiers are age and gender, then it will ensure that there are at least k records with 45-year old females 9. Note that it is necessary to remove direct identifiers in order to satisfy k-anonymity. Data that are not identifying data (see definition above). Non-identifying data are always also nonpersonal data. Data that are not personal data. Non-personal data may still be identifying in relation to the deceased (see definition of identifying data and personal data ). 7 Note though that a record about an individual may contain aggregate counts (such as a data item of Number of hospital admissions for patient in In this particular example, the data would be identifying because of the presence of the NHS Number and date of birth. 9 The definition provided at page 47 of Best Practice Guidelines for Managing the Disclosure of De- Identified Health Information, available at: Crown Copyright 2013 Page 6 of 41
7 Personal data Data which relate to a living individual who can be identified (a) from those data, or (b) from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller, and includes any expression of opinion about the individual and any indication of the intentions of the data controller or any other person in respect of the individual 10. Pseudonymisation A technique that replaces identifiers with a pseudonym 11 that uniquely identifies a person. In practice, pseudonymisation is typically combined with other anonymisation techniques. Publish To disseminate to the public 12. Public authority Quasi-identifier Note that disseminate is sometimes given a meaning similar to that of disclose above, although its dictionary meaning used here is quite different: to spread abroad and to disperse throughout 13. A body defined under, and subject to, the Freedom of Information Act It includes government departments, local authorities, the NHS, state schools and police forces. A non-public authority, such as a company, carrying out health and social care activities on behalf of, and under contract to, a public authority may be required to assist the public authority in satisfying requests under the Freedom of Information Act. See entry for indirect identifier above. 10 The definition in the Data Protection Act 1998; see: 11 A pseudonym is a fictitious name or code. 12 A definition provided by Merriam-Webster Dictionary at: To Disseminate here means unrestricted distribution or availability, and the public includes any person or group of people.. 13 A definition provided by Merriam-Webster Dictionary at: 14 For a full definition, see Schedule 1 of the Freedom of Information Act at: Crown Copyright 2013 Page 7 of 41
8 Redact Re-identification Statistical disclosure control To censor or obscure (part of a text) for legal or security purposes 15. In the context of responding to Freedom of Information Act requests, redaction should be explicit and permanent, making clear that information has been withheld. The process of discovering the identity of individuals from a data set by using additional relevant information. Techniques for obscuring small numbers (e.g. less than 5 ) that appear in aggregate tables so as to prevent re-identification. 15 The definition provided by Oxford Dictionaries at: Crown Copyright 2013 Page 8 of 41
9 Contents 1 Overview Summary Related Documents Related Standards Contacts Specification Information Specification Conformance Criteria Implementation and Use Guidance Governance Supporting information Implementation guidance: standard de-identification processes for health and social care organisations Introduction Process: Publish non-identifying data Sub-process: Assess threat, risk and specify data de-identification Implementation guidance: standard de-identification plans Introduction Standard de-identification plans when re-identification risk is normal Plan 1: Where cells to be published relate to underlying population > 1,000 people, derive aggregate data without statistical disclosure control Plan 2: Where cells to be published relate to underlying population 1,000 people, derive aggregate data with statistical disclosure control Plan 3: Derive individual-level data to weak k-anonymity Standard de-identification when re-identification risk is high Plan 4: Where cells to be published relate to underlying population > 10,000 people, derive aggregate data without statistical disclosure control Plan 5: Where cells to be published relate to underlying population 10,000 people, derive aggregate data with statistical disclosure control Plan 6: Derive individual-level data to strong k-anonymity Implementation guidance: standard de-identification techniques Introduction De-identification techniques when deriving aggregate data Aggregation Crown Copyright 2013 Page 9 of 41
10 6.2.2 Statistical disclosure control De-identification techniques when deriving individual-level data Data Suppression k-anonymity ( strong and weak ) Reduction in detail in indirect identifiers (such as date of birth, postcode) Suppression of direct identifiers Crown Copyright 2013 Page 10 of 41
11 1 Overview 1.1 Summary Standard Standard Number ISB 1523 Standard Title Description Anonymisation Standard for Publishing Health and Social Care Data The law pulls in two opposite directions. Human Rights and Data Protection legislation, along with our domestic common law duty to respect confidentiality, require us to protect information that could identify an individual. The Freedom of Information Act requires public authorities to release information about their activities, and this message is reinforced by the government s transparency agenda. Although the law makes a clear distinction between identifying and nonidentifying data, where that line should be drawn may be far from clear in practice. This anonymisation standard for publishing health and social care data is needed in order to address these difficult issues. This process standard provides an agreed and standardised approach, grounded in the law, enabling organisations to: distinguish between identifying and non-identifying information, and deploy a standard approach and a set of standard tools to anonymise information to ensure that, as far as it is reasonably practicable to do so, information published does not identify individuals. Applies to The following persons or bodies must comply with this process standard: a. The Secretary of State (DH) b. The NHS Commissioning Board (once established) c. any public body which seeks to publish information relating to the provision of health services or of adult social care in England; d. any person commissioned (by a public body) to provide such health services or adult social care who seeks to publish information relating to them; e. any person registered as described in s20a of the Health & Social Care Act It relates to the activities of the above bodies when processing 16 health and social care data, whether held electronically or on paper, and includes any data for which they are responsible, including personal data processed on 16 This is the broad concept of processing used in the Data Protection Act,that means obtaining, recording or holding the information or data or carrying out any operation or set of operations on the information or data.. Crown Copyright 2013 Page 11 of 41
12 Release Release Number Amd 20/2010 their behalf by a data processor. There are certain specific requirements when publishing official statistics 17. Whilst broadly consistent with this standard, there are some specific principles and procedures in the Code of Practice for Official Statistics to be followed, and statisticians and others publishing official statistics should refer to, and apply, that code of practice, and the supporting guidance published by the Government Statistical Service 18. The Information Commissioner s Office (ICO) has confirmed that this specification is consistent with the ICO s Anonymisation Code of Practice. Release Title Initial Release Description Implementation Completion Date 30 April Related Documents This Specification should be read in conjunction with the following documents: Title Anonymisation standard for publishing health and social care data supporting guidance 1.3 Related Standards This Specification should be read in conjunction with the following standards: Standard No. Document Reference Title Web link ISB 1512 Amd 159/2010 Information Governance Framework ISB 0086 Amd 05/2011 Information Governance Toolkit /amd /index_html /amd /index_html/ ISB 1572 Amd 97/2010 Sensitive Data /dscn / The Anonymisation Standard fits within the Information Governance Framework. 17 Official statistics are defined in Section 6 of the Statistics and Registration Service Act Available at: Crown Copyright 2013 Page 12 of 41
13 1.4 Contacts Sponsor Name Organisation Address Developer Name Organisation Address Developer Name Organisation Address Implementation Manager Name Organisation Address Maintenance Manager Name Organisation Address Phil Walker Head of Information Governance Policy Department of Health Clare Sanderson Executive Director of Information Governance NHS Health & Social Care Information Centre or Malcolm Oswald Subject Matter Expert NHS Health & Social Care Information Centre or Dawn Foster Head of Information Governance Health & Social Care Information Centre Michael Goodson Information Governance Manager Health & Social Care Information Centre Crown Copyright 2013 Page 13 of 41
14 2 Specification The key words MUST, SHOULD and MAY are standard terms used in the information standards methodology, and follow the meanings set out in RFC-2119: MUST - This word, or the terms "REQUIRED" or "SHALL", means that the definition is an absolute requirement of the specification. SHOULD - This word, or the adjective "RECOMMENDED", means that there may exist valid reasons in particular circumstances to ignore a particular item, but the full implications must be understood and carefully weighed before choosing a different course. MAY - This word, or the adjective "OPTIONAL", means that an item is truly optional. 2.1 Information Specification # Requirement 1 All Health and Social Care bodies choosing or obliged by law to publish (electronically or on paper) information/data relating to, or derived from, personal identifiable records MUST anonymise information so that information published does not identify individuals. 2.2 Conformance Criteria This section describes the tests that can be measured to indicate that this process standard is being used correctly by an organisation (conformance criteria). These may be different depending upon the type of organisation, e.g. supplier, Trust, GP practice. The Information Governance Toolkit will be updated to reflect this standard and will be one means for measuring conformance. # Conformance Criteria 1 Health and Social Care bodies choosing or obliged by law to publish information/data relating to, or derived from, personal identifiable records MUST have regard to this process standard. 2 When publishing information after 1 April 2013, affected organisations MUST either: a) follow this standard; or b) follow alternative guidance of a similar standing. 3 If alternative guidance of a similar standing is used, affected organisations MUST record their reasons for choosing the alternative, and make their reasons available on request. 4 Whether this standard or alternative guidance is used, affected organisations MUST conduct, record, and make subsequently available on request, a risk assessment regarding the possibility that specific individuals might be identified from the published material either directly or indirectly through association of the published material with other information/data in or likely to be placed in the public domain. 5 Whether this standard or alternative guidance is used, affected organisations MUST record, carry out, and make subsequently available on request, an anonymisation plan, and SHOULD record their reasoning for choosing that plan. A spreadsheet for this purpose is provided and Crown Copyright 2013 Page 14 of 41
15 MAY be used. 6 Whether this standard or alternative guidance is used, affected organisations MUST, prior to publishing, confirm with the organisation s Caldicott Guardian or other responsible officer that the information to be published does not identify individuals, and this confirmation MUST be recorded and be available subsequently on request. 7 Where data previously published by the affected organisation are found to have led to confidential information about an individual being revealed, organisations SHOULD carry out an investigation into the incident and review their procedures for anonymising and publishing health and social care data. Any concerns, or suggested improvements, relating to this standard SHOULD be notified to the Health and Social Care Information Centre at: [email protected]. 8 Organisations using the standard may wish to conduct a periodic audit to check the process is being followed and that appropriate judgements are being made by staff using the standard.. Crown Copyright 2013 Page 15 of 41
16 3 Implementation and Use 3.1 Guidance Implementation Guidance is contained within sections Governance Governance (e.g. the role of the Caldicott Guardian) forms part of the implementation guidance set out in sections Supporting information It is recommended that the following document is read before applying this specification: Supporting Guidance: Drawing the line between identifying and nonidentifying data. Crown Copyright 2013 Page 16 of 41
17 4 Implementation guidance: standard anonymisation processes for health and social care organisations 4.1 Introduction The purpose of this standard is to assist, and give confidence to, health and social care organisations transforming data that identify individuals into data that are not identifying and fit for publishing. Identifying information that reveals something confidential about a person must not be published. Transforming identifying data into non-identifying data protects personal privacy, and enables published information to be used for public benefit. The anonymisation processes set out in this section are based as closely as possible on the relevant law described in the supporting guidance document Drawing the line between identifying and non-identifying data. In particular, the standard is based on conclusions drawn directly from the concept of personal data in the Data Protection Act, namely that: If there is little or no possibility that a person will be identified from data released to others, then those data are not personal data, and as defined in the guidance, non-identifying data 19 ; and Whether data are identifying depends not only on the intrinsic identifiability of the data, but on the context in which it is used, and specifically on the risk of additional information being used to reveal identity. That guidance document also contains a glossary, statements on scope, and scenarios illustrating the application of the anonymisation standard. Readers are advised to review the supporting guidance document on anonymisation before reading this document. Section 4 of this document contains a set of flowcharts, with supporting definitions, describing a standard process for publishing non-identifying data (see section 4.2). It draws on a sub-process entitled Assess risk and specify data anonymisation (see section 4.3). The processes and sub-process are each specified using a flowchart, followed by backing process and sub-process step descriptions. The processes provide a standard approach to anonymisation when publishing, including a set of standard anonymisation plans. The standard anonymisation plans are specified in section 5, and the standard anonymisation techniques on which the plans are built, are specified in section 6. As the context in which anonymisation is carried out, and the data that are used to derive non-identifying data, are so varied, one of the most important steps in the subprocess Assess risk and specify data anonymisation is Refine anonymisation plan and specify anonymisation. This step recognises the importance of adapting the anonymisation plan to the specific circumstances of each case. 19 Unlike personal data, the concept of identifying data includes data about the deceased. Crown Copyright 2013 Page 17 of 41
18 4.2 Process: Publish non-identifying data start Communicate how individuals records are used Identify nature of information to publish and data source(s) Process: Publish non-identifying data Key decision Process step Sub-process (see other flowchart) Flow of control Assess risk and specify data anonymisation no Derive nonidentifying data from data source(s) Review/test data provided are non-identifying no Confirmed as nonidentifying? yes Decide to publish? yes Publish End Crown Copyright 2013 Page 18 of 41
19 The table below describes the process steps that appear in the preceding flowchart. Step name Communicate how individuals records are used Identify nature of information to publish and data source(s) Assess risk and specify data anonymisatio n Derive nonidentifying data from data source(s) Review/test data provided are nonidentifying Process step description Provide information in an appropriate form to the public about how personal data from their records are being processed (including anonymisation processing). This could be done for example, through the organisation s website, or with local posters. Information provided should be kept up-to-date, and should explain clearly the general nature and purpose of processing carried out by the organisation, but need not describe specific processing carried out to produce a particular publication. It should explain what action people can take if they object to the way their records are being used. This step is necessary to meet the fair processing requirement in the Data Protection Act. Furthermore, surveys have shown that the public wants to know how their records are used. Similar principles apply when publishing information derived from personal data about staff. Consider the reasons or requirement to publish, what information ideally should be published in order to provide the greatest utility to the public and other potential users of the information, the structure of that information (e.g. if it should be broken down geographically or according to certain categories), and identify the data sources that would be required to produce it. See sub-process flowchart and descriptions to follow. Apply the anonymisation specification agreed with the Caldicott Guardian 20 (or confidentiality lead) for the organisation and thereby create the non-identifying data from the data sources. Review the data to be released, and ensure that: the anonymisation steps specified (if any) have been carried out accurately; the data being made available contains no information 20 Where the data relates to information other than patients, then the Senior Information Risk Owner should be consulted. See Crown Copyright 2013 Page 19 of 41
20 Step name Publish Process step description that is likely to reveal the identity of an individual once released; and record what testing has been done to ensure the data are non-identifying. Where the potential impact of revealing identity would be significant (as for instance with sensitive information about abortions), or where there is a significant likelihood that the data to be released will be subject to attack by people seeking to reveal personal identity, consider carrying out testing on the data set to check it does not reveal identity, making use of commonly available demographic data (such as the electoral roll, phone directories) as well as any specific data sources relevant to the nature of the information being published. If in doubt, consult the Caldicott Guardian or other responsible officer. Make available the non-identifying data to the intended audience. Once satisfied that the data to publish are non-identifying, that it is worth publishing (eg what can be published is still useful), and that there is authorisation to publish it, then publish the data. Publication may be in many different forms., Crown Copyright 2013 Page 20 of 41
21 4.3 Sub-process: Assess risk and specify data anonymisation start Sub-process: Assess risk and specify data anonymisation Assess threat level associated with data and its release Assess risk of extra information being used to try to reveal identity Key decision Process step Sub-process (see other flowchart) Flow of control Select anonymisation plan no Refine anonymisation plan and specify anonymisation Consult Caldicott Guardian / SIRO Specification accepted? yes End Crown Copyright 2013 Page 21 of 41
22 The table below describes the sub-process steps that appear in the preceding flowchart. Step name Assess threat level associated with data and its release Assess risk of extra information being used to try to reveal identity Process step description Assess the threat level as either normal or high, and record your reasoning. Amongst those that might be motivated to re-identify individuals from data sets that are intended to be nonidentifying, certain data are likely to be of much greater interest than others. Much of the activity carried out in health and social care is relatively mundane and of limited interest to others, and thus associated with normal threat. Few people would seek to re-identify individuals from figures for admissions to nursing homes or hospital medical wards. In general, health and social care data should be considered normal threat. However, specific cases will be high threat. The likely sensitivity of the data can be an indicator of high threat in some cases. Information on termination of pregnancies in Leeds is particularly sensitive and of interest to certain people, and thus more likely to be a target for re-identification, than information about hip operations in Leeds. Information published by a hospital that might reveal the reason that a celebrity was admitted to hospital might have commercial value. Some people may be motivated by the status gained in penetrating certain targets that ought to be particularly secure, such as the medical records of high-security prisoners, or a national register of sex offenders. A man seeking his ex-wife and children may be particularly motivated to discover their address in a women s refuge in Sheffield. Thus certain people are going to be motivated to try to re-identify individuals within a data set if the nature of the data is of particular interest or value to them, or if successful re-identification offers a certain status. Motivation is the major determinant of the threat level associated with the data and its release. Determine, given the nature of the information to be published, and the threat level, whether the risk of extra information being used to try to reveal identity is normal or high, and record your reasoning. Many techniques may be used by someone intent on discovering new information about one particular person, or any person, within the data set to be released 21. Numerous sources of information available now and in the future could conceivably be used, such as the electoral register, and social media sites. Thus it should be assumed that the means for re- 21 For useful guidance on potential methods, see chapter 9 of Security Engineering by Ross Anderson, available at: Crown Copyright 2013 Page 22 of 41
23 Step name Process step description identification may be there, whenever data about people are being published, whatever the specific nature of that data. However, you may have special cause to give extra protection to the identity of individuals where there is: a) a skewed distribution of prevalence in population; b) special knowledge about individuals; or c) known availability of especially relevant information These three factors are most easily explained through examples. a) Skewed distribution: Sickle cell anaemia, for example, is not evenly distributed across the population. It is especially prevalent in people (or their descendants) from parts of tropical and sub-tropical regions where malaria is, or was, common. As a result, it is very roughly ten times more likely to occur in people from certain ethnic groups. Therefore, especially for populations where there are few people from the ethnic groups prone to the disease, the additional knowledge of the skewed distribution sickle cell anaemia can assist in the re-identification of individuals from published data about the disease. For example, publishing the fact that one person registered with Anytown General Practice has the disease could be very revealing in an area where residents almost exclusively self-classify their ethnic group as White British. b) Special knowledge: Consider a scenario where a national newspaper has published an expose of the private life of a famous actor, revealing where his children go to school, the care home of his elderly parent, where he shops, and many other personal details. With so much information in the public domain, information published about (say) the prevalence of disease in the actor s area of residence would be particularly vulnerable to re-identification. For example, it may mean that it is possible to associate the actor or members of his family with a particular disease (thereby revealing new confidential information). c) Known availability of especially relevant information: you can never be sure that no information exists that could be used in conjunction with the data set you propose to publish to re-identify individuals. However, you may discover that particularly relevant information does exist. Imagine you plan to publish data broken down by care home, and by age range. For two of the care homes, there is only one resident of age Having searched the internet, you discover that the local hospital trust has published data on Crown Copyright 2013 Page 23 of 41
24 Step name Select anonymisatio n plan Process step description discharges of patients with dementia, broken down into the care home into which they were discharged, and by age range. These data could be used together to discover that the two year old patients in the two care homes have dementia having re-identified the two residents, someone could learn something confidential about them (that they have dementia). As a result, you may decide that the existing publication by the trust is especially relevant information that introduces a relatively high risk of reidentification. 22 If one of these three special factors (a, b or c) exists, assess the risk of extra information being used to try to reveal identity as high. If the threat level is assessed (in the previous step) as high, then assess the risk of extra information being used to try to reveal identity as high. Otherwise (i.e. if neither is high ), assess the risk of extra information being used to try to reveal identity as normal. The judgement may be difficult, and it is good practice to consult a colleague (or Caldicott Guardian see below). Note that the above advice provides a rule of thumb reidentification risk level. It is not possible to predict risk precisely. Where it is particularly important to assess risk as accurately as possible (e.g. because the data being released is particularly sensitive, or there is a particularly great benefit to be derived from releasing as much information as possible) then specialist computer software may be purchased to assist with the assessment of re-identification risk. Based on the assessed risk of extra information being used to try to reveal identity, choose an anonymisation plan to reduce the intrinsic identifiability of the data to be released to the desired level. Two tables are shown below. The first summarises a set of possible anonymisation plans where the risk of extra information being used to try to reveal identity is normal. These plans allow relatively more information to be released. The second table shows a summary of plans aimed at circumstances where the risk of extra information being used to try to reveal identity is high (thus allowing relatively little intrinsically identifiable information to be released). 22 For more information on this subject, see the Anonymisation Code of Practice from the Information Commissioner s Office. Crown Copyright 2013 Page 24 of 41
25 Step name Process step description The tables below say cells to be published relate to population. The concept of population here is taken from GSS/GSR Disclosure Control Policy for Tables Produced from Administrative Data Sources 23, which is part of the National Statistician s Guidance. It is best explained through example. For example, when reporting total abortions for Anytown, which has a total population of 100,000, the relevant population for the cell might be estimated at approximately 25,000 because males, young children and elderly women can be excluded (we know the cell only relates to the population of females of childbearing age). A breakdown of abortion by age group for Anytown would mean that the relevant population for each cell was much smaller, e.g. there might be only 1,500 females of aged However, suppose figures were broken down by ethnic group, and indicated that 5 women in Anytown who had had an abortion had self-classified as Irish. This is a special case, because the fact that a woman has had an abortion and her ethnic category (of Irish) both count as sensitive personal data 24, and so the relevant population should be the actual figure to be published in the cell in this case 5 (and thus statistical disclosure control is almost certainly necessary). 25 Although population can be difficult to assess (e.g. for a hospital), try to estimate how many possible people could this be?. Notes that K-anonymity without automated software is only feasible with small numbers of records, and even then it is prone to error. If K-anonymity software is not available, it is often preferable to publish data in aggregated format. Anonymisation plans to use where risk is normal Plan no Plan description 1 Where cells to be published relate to population > 1,000 people, derive aggregate data without statistical disclosure control. Risk is normal, aggregated data 2 Where cells to be published relate to population 1,000 people, derive aggregate data with 23 Available at: 24 What constitutes sensitive personal data is defined in the Data Protection Act. See: 25 See pages 7-9 of The exemption for personal information at: alist_guides/personal_information.ashx Crown Copyright 2013 Page 25 of 41
26 Step name Process step description statistical disclosure control Risk is normal, aggregated data 3 Derive individual-level data to weak k-anonymity 26 Risk is normal, individual-level data Anonymisation plans to use where risk is high Plan no Plan description 4 Where cells to be published relate to population > 10,000 people, derive aggregate data without statistical disclosure control Risk is high, aggregated data 5 Where cells to be published relate to population 10,000 people, derive aggregate data with statistical disclosure control Risks is high, aggregated data 6 Derive individual-level data to strong k-anonymity Risk is high, individual-level data By their nature, individual-level data are much more likely to reveal an individual's identity than aggregate data. The risk of identifying an individual increases as the number of data items increases, and the risk that some individual becomes identifiable increases with the number of individual-level records. Virtually any data item in an individual-level data set may be a source of "outliers" - values that are unusual or unique that can reveal the identity of an individual either when used on their own or in conjunction with other data items. In order to address these risks, when releasing data into the public domain, very strong controls (such as provided through k-anonymity see section 6.4.1) are necessary to prevent unique combinations of data items revealing a person s identity and ensure that the anonymisation processing results in nonidentifying data. To achieve the required k-anonymity level when releasing individual-level information into the public domain, it may be necessary to reduce the number of data items released and/or provide just a sample of records. Sampling has an added benefit in that an individual seeking to discover a person s identity from the data cannot be sure 26 For a definition of k-anonymity see the glossary. For more detail on the technique, see section 6.3. Crown Copyright 2013 Page 26 of 41
27 Step name Process step description whether that person is within the data set. Refine anonymisatio n plan and specify anonymisatio n Having chosen an anonymisation plan, refine the plan to fit the circumstances of the release, and specify the anonymisation to be carried out. Confirm the plan with colleagues where appropriate, and record the plan and your reasoning. The generic anonymisation sub-process steps described here for choosing a broad plan have to be practical and relatively easy to follow. The standard assessments on which the anonymisation plan is built are relatively simplistic e.g. assessments of high or normal. Therefore, the anonymisation plan chosen should be reviewed to ensure it can be expected to provide a non-identifying data set. Furthermore, the standard anonymisation plans can be adjusted (e.g. to set k-anonymity to 8, or to adjust the degree of statistical disclosure control). Having reviewed the standard plan and considered the circumstances and expected data to be output, the plan should be refined if necessary, and the anonymisation processing specified. In practice, trial and error may work best: apply the initial anonymisation plan to the data set and review the output to refine the plan. Sometimes judgements may have to be made about data items that identify a person but do not reveal confidential information. Data that reveal confidential information about an identifiable person are not publishable. Data that identify a person, but do not reveal anything confidential, are often publishable. For example, publishing identifiers of a health care professional or other members of staff does not necessarily reveal anything confidential, and so it may not be necessary to anonymise the data prior to publishing (e.g with k-anonymity), although in such cases, the decision (ultimately for the SIRO or Caldicott Guardian) must be justifiable in the public interest. If you are considering publishing identifying information about staff, see section 2.7 of the Implementation Guidance. Aggregate tables about a general practice may be publishable without obscuring small numbers despite the small population base if they reveal that one person in the practice has dementia, but no other information about the patient (as in the case of the Quality Outcomes Framework tables published in recent years). If in doubt about how much to publish, bear in mind that the impact of releasing too little information tends to be less damaging than releasing too much. In border-line cases where the consequences of re-identification would be significant Crown Copyright 2013 Page 27 of 41
28 Step name Consult Caldicott Guardian/SIR O Process step description because, for example, they might leave an individual open to damage or distress, it may be expedient to err on the side of caution and restrict the information published. The Information Commissioner has said that he will take potential impact into account when considering complaints made by people who have been re-identified from a published data set. More information can always be released later, whereas information released cannot be withdrawn. However, if too much information is omitted, the publication may no longer be useful. Consult the Caldicott Guardian, Senior Information Risk Owner (SIRO) 27 and/ or confidentiality lead for the organisation on the action to be taken, and the required anonymisation specification (if any), and record the outcomes. In a health and social care organisation without a Caldicott Guardian, another person with responsibility for information governance should be consulted. The Caldicott Guardian (or other responsible person) should consider the risk assessment and anonymisation specification, and be satisfied that data to be released are non-identifying data, and therefore that the risk of a person's identity being revealed from the data is insignificant. If the risk of re-identification is significant, then the anonymisation specification will require change. Consulting the Caldicott Guardian/SIRO is described as a relatively late step within this anonymisation process. In some circumstances, particularly where difficult judgements are needed at an earlier stage, staff may choose to also consult earlier in the process. For example, when planning to publish individual-level data, early discussion of potential sensitivities and risks may be helpful. 27 Where the data relates to information other than patients, then the Senior Information Risk Owner should be consulted. See Crown Copyright 2013 Page 28 of 41
29 5 Implementation guidance: standard anonymisation plans 5.1 Introduction A summary of the six standard anonymisation plans identified in section 4 are specified below, with one table for each of the standard anonymisation plans. These plans are drawn directly from the plans set out briefly in the sub-process description of Select anonymisation plan in section 4.3. The first three plans apply where the re-identification risk has been assessed as normal, and the final three plans apply when the risk has been assessed as high. Each table below lists the mandatory techniques that form part of the standard anonymisation plan. This specification of techniques may be qualified, or explained further, in a free-text comment at the bottom of each anonymisation plan table. No description of the techniques in each plan is given in the anonymisation plan tables below; for the specification of the techniques identified (such as k-anonymity, and statistical disclosure control ), see section 6. Some of the tables refer to underlying population see the step Select Anonymisation Plan in section 4.3 for an explanation of this concept. 5.2 Standard anonymisation plans when re-identification risk is normal Plan 1: Where cells to be published relate to underlying population > 1,000 people, derive aggregate data without statistical disclosure control Mandatory techniques Qualifying comment Aggregation This is identical to plan 4 below, except that this requires that no cell released relates to a population size of under 1,000 people. As a consequence, it results in information that is more intrinsically identifiable than with plan 4 (all other things being equal) Plan 2: Where cells to be published relate to underlying population 1,000 people, derive aggregate data with statistical disclosure control Mandatory techniques Qualifying comment Aggregation Statistical disclosure control This is identical to plan 5 below, except that this requires that no cell released relates to a Crown Copyright 2013 Page 29 of 41
30 population size of under 1,000 people. As a consequence, it results in information that is more intrinsically identifiable than with plan 5 (all other things being equal) Plan 3: Derive individual-level data to weak k-anonymity Mandatory techniques Suppression of direct identifiers Reduction in detail in indirect identifiers (such as date of birth, postcode) Weak k-anonymity Qualifying comment This is identical to plan 6 below, except that k- anonymity control is weaker. As a consequence, it results in information that is more intrinsically identifying than with plan 6 (all other things being equal). Weak k-anonymity is where: - K = 3 - the variables not controlled through k- anonymity must exclude: o any derivation of date of birth (such as age range) o gender o ethnic category o any derivation of postcode (such as area code) o event dates (such as hospital admission date, whereas hospital admission month and year is acceptable) o employer o occupation or staff group Note that in order to achieve k-anonymity, additional anonymisation techniques may be necessary Which techniques will depend on the circumstances of the case, and the judgement of those involved, as to which is likely to achieve the target level of k-anonymity with the smallest loss of value in data content. For this reason, a standard set of additional techniques on top of those listed is not specified. Crown Copyright 2013 Page 30 of 41
31 5.3 Standard anonymisation when re-identification risk is high Plan 4: Where cells to be published relate to underlying population > 10,000 people, derive aggregate data without statistical disclosure control Mandatory techniques Qualifying comment Aggregation This is identical to plan 1 above, except that this requires that no cell released relates to a population size of under 10,000 people. As a consequence, it results in information that is less intrinsically identifiable than with plan 1 (all other things being equal) in order to address the increased re-identification risk Plan 5: Where cells to be published relate to underlying population 10,000 people, derive aggregate data with statistical disclosure control Mandatory techniques Qualifying comment Aggregation Statistical disclosure control This is identical to plan 2 above, except that this requires that no cell released relates to a population size of under 10,000 people. As a consequence, it results in information that is less intrinsically identifiable than with plan 2 (all other things being equal) in order to address the increased re-identification risk Plan 6: Derive individual-level data to strong k-anonymity Mandatory techniques Suppression of direct identifiers Reduction in detail in indirect identifiers (such as date of birth, postcode) Strong k-anonymity Qualifying comment This is identical to plan 3 above, except that k- anonymity control is stronger. As a consequence, it results in information that is less intrinsically identifying than with plan 3 (all other things being equal), in order to address the higher re-identification risk. Crown Copyright 2013 Page 31 of 41
32 Strong k-anonymity is where: - K = 5 - all variables but one must be controlled through k-anonymity - the uncontrolled variable should not be full postcode, date of birth, or ethnic category 29. Note that in order to achieve k-anonymity, additional anonymisation techniques may be necessary The variables listed are excluded, and care should be taken before any other indirect identifier is chosen as the uncontrolled variable because indirect identifiers are more likely to risk re-identification. 30 Which techniques will depend on the circumstances of the case, and the judgement of those involved, as to which is likely to achieve the target level of k-anonymity with the smallest loss of value in data content. For this reason, a standard set of additional techniques on top of those listed is not specified. Crown Copyright 2013 Page 32 of 41
33 6 Implementation guidance: standard anonymisation techniques 6.1 Introduction Each of the six standard anonymisation plans specified in section 5 comprises a set of standard anonymisation techniques. Those techniques are specified here in section 6. Anonymisation plans 1, 2, 4 and 5 involve deriving aggregate data (see section 6.2), and plans 3 and 6 involve deriving individual-level data (see section 6.3). Each standard anonymisation technique in section 5 is described relatively briefly in a table setting out what transformation the technique is intended to achieve. This is followed by a more detailed description. Some of these standard techniques are complex and/or detailed, and most have been the subject of publications elsewhere. Wherever possible, existing authoritative published descriptions and specifications are selected and used here to provide the standard technique (to avoid needless reinvention). Each of the standard anonymisation techniques identified and described in this section appears as an element of one or more of the standard anonymisation plans set out in section 5. It is not intended to be a comprehensive set of possible anonymisation techniques; details of many alternative anonymisation techniques have been published (but these are not part of this standard). For each of the anonymisation techniques identified here as part of the standard, a table is provided which: Describes briefly the transformation achieved by the anonymisation technique; Any essential requirements of the technique if it is to meet the standard; Further information describing the technique, and/or a reference to further information about the technique. 6.2 Anonymisation techniques when deriving aggregate data Aggregation Transformation required Essential standard requirements Further information Input Processing Output Individual-level data Summarising groups of records into table(s) Aggregate data No cell in the table(s) output may relate to a single individual. None Crown Copyright 2013 Page 33 of 41
34 Further information (references) None Statistical disclosure control The single table below describes a number of related techniques, any of which may be used to transform small numbers (e.g. less than 5 ) appearing in cells within tables of aggregate data. Transformation required Essential standard requirements Further information Input Processing Output Aggregate data A process to change or remove small cell values (one of several possibilities see below) Aggregate data without small cell values No cell in the aggregate data output may be 5. Table Redesign Description Advantages Disadvantages Disguise unsafe cells, for example, by: - grouping categories within a table - aggregating to a higher level geography or for a larger population sub-group - aggregating tables across a number of years/months/quarters - rounding Original counts in the data are not damaged Easy to implement Detail in the table will be reduced May be policy or practical reasons for requiring a particular table design If unsafe cells remain in the output tabulation, further protection methods should be considered in order to disguise them. The recommended method for posttabular protection for most frequency tables is controlled rounding. In some cases, if the number of unsafe cells is low then cell suppression can be an alternative method. Controlled rounding and cell suppression can be Crown Copyright 2013 Page 34 of 41
35 implemented in the Tau-Argus software 31. Cell Modification cell suppression Description Advantages Disadvantages Unsafe cells are not published. They are suppressed and replaced by a special character, such as.. or X, to indicate a suppressed value. Such suppressions are called primary suppressions. To make sure that the primary suppressions cannot be derived by subtraction, it may be necessary to select additional cells for secondary suppression Original counts in the data that are not suppressed are not adjusted Can provide protection for zeros Most of the information about suppressed cells will be lost. Secondary suppressions will hide information in safe cells Information loss will be high if more than a few suppressions are required In order to protect any disclosive zeros, these will need to be suppressed. Does not protect against disclosure by differencing Complex to implement optimally if more than a few suppressions are required, and particularly complex for linked tables. Cell Modification rounding 31 Available at Crown Copyright 2013 Page 35 of 41
36 Description Advantages Disadvantages Rounding involves adjusting the values in all cells in a table to a specified base 32. This creates uncertainty about the real value for any cell while adding a small amount of distortion to the data. Counts are provided for all cells Provides protection for zeros Protects against disclosure by differencing and across linked tables Controlled rounding preserves the additivity of the table and can be applied to hierarchical data Cannot be used to protect cells that are determined unsafe by a rule based on the number of statistical units contributing to a cell Random rounding requires auditing; controlled rounding requires specialist software. Further information (references) Cell modification - Barnardisation Description Advantages Disadvantage s A post-tabular method for frequency tables where internal cells of every table are adjusted by +1, 0 or -1, according to probabilities Protects against disclosure by differencing High level of adjustment may be required in order to disguise all unsafe cells Will distort distributions in the data The further information directly above was extracted directly from section 5 ( Selecting disclosure control methods ) of the GSS/GSR Disclosure Control Policy for Tables Produced from Administrative Data Sources 33, 32 For more information about rounding and bases, see: 33 Available at: Crown Copyright 2013 Page 36 of 41
37 which is part of the National Statistician s guidance. More information is available in that document. 6.3 Anonymisation techniques when deriving individual-level data 6.4 Data Suppression Transformation required Essential standard requirements Further information Further information Input Processing Output Individual-level data Identifying a sample of records, or certain data items in all records, and withholding these from the output. Individual-level (but fewer) data Free-text data items, and human images, must be suppressed. No other fixed standard test, but data reduction must be sufficient to make a significant contribution to anonymisation. Variable Suppression - This technique involves the removal or withholding of a data variable s values (e.g. removing name, address, postcode from an output) - All other variables in the record, i.e., those that are not quasi-identifiers, remain untouched - It may not always be plausible to suppress some variables because that will reduce the utility of the data Record Suppression - If variable suppression and reduction in detail techniques do not adequately anonymise the data then the alternative is the removal and withholding of the data records that create a high re-id risk - However extensive suppression can introduce a high level of distortion in some types of analysis since the loss of records is not completely random and may reduce the usefulness The further information directly above was extracted directly from section 12.2 of Best Practice Guidelines Crown Copyright 2013 Page 37 of 41
38 (references) for Managing the Disclosure of De-Identified Health Information 34, published by the Canadian Institute for Health Information. Further information is also given in section 3.1 of Tools for De-Identification of Personal Health Information 35, published by the Pan Canadian Health Information Privacy (HIP) Group k-anonymity ( strong and weak ) Transformation required Essential standard requirements Input Processing Output Individual-level data Weak anonymity: - k = 3 Identify matching sets of records (see further information below) Individual-level data - the variables (i.e. data items) not controlled through k-anonymity must exclude: o any derivation of date of birth (such as age range) o gender o ethnic category o any derivation of postcode (such as area code) o event dates (such as hospital admission date, whereas hospital admission month and year is acceptable). o employer Strong anonymity: - k=5 o occupation or staff group - all variables but one must be controlled through k- 34 See: 35 See: Crown Copyright 2013 Page 38 of 41
39 Further information anonymity - the uncontrolled variable should not be full postcode, date of birth, or ethnic category 36. A data set provides k-anonymity for the data subjects represented if the information for each person contained in the data set cannot be distinguished from at least k-1 individuals whose information also appears in the data set. For example, a data set has 5-anonymity if, for every record in the data set that describe characteristics of a data subject, there are at least four other individuals also represented by records in the data set who share the same characteristics described by the record. The following record-level data set exhibits 3-anonymity: Example of K-Anonymity where K=3 Record no Age range Gender ICD-10 code 1 0 to 10 M F to 35 F F to 10 M F to 65 F F to 35 M F to 65 F F to 10 M F to 35 F F to 65 F F to 35 F F to 35 M F to 35 M F to 10 M F106 Typically, k-anonymity control is designed to operate on only a subset of variables in the data set for release (such as those related to postcode, gender and dates). Other variables, such as diagnosis and hospital admission date typically are not controlled. This is the approach taken 36 The variables listed are excluded, and care should be taken before any other indirect identifier is chosen as the uncontrolled variable because indirect identifiers are more likely to risk re-identification. Crown Copyright 2013 Page 39 of 41
40 Further information (references) here for weak k-anonymity. However, that leaves open the possibility that the set of data items outside the controlled group can reveal identity. For example, if diagnosis and hospital admission date are outside the control group, then a person who knows that their neighbour was admitted on a certain date, may be able to deduce from the district postcode, age range and gender that the only person that could be is his neighbour. He would then discover his neighbour s diagnosis. The risk posed from this is likely to be negligible when the value and interest is low, but when interest is high (e.g. when publishing HIV data), then strong k-anonymity is appropriate. With strong k-anonymity, a maximum of one data item is allowed outside the control group, and so the probability of a person s identity being revealed is nearly zero, and the chance of learning some new confidential information about a person is small. One reason why k-anonymity is chosen here as a standard is that it is implementable, and forms the underlying basis of a number of existing software products for protecting privacy. Some of the above explanation was extracted from section 2.5 of Tools for De-Identification of Personal Health Information 37, published by the Pan Canadian Health Information Privacy (HIP) Group. Further information on k-anonymity is also available in section 5 of that document, and in section 16 of Best Practice Guidelines for Managing the Disclosure of De-Identified Health Information 38, published by the Canadian Institute for Health Information, and in the HIPAA de-identification guidance from the USA 39. Many papers promoting and critically reviewing k- anonymity have been published in peer-reviewed academic journals See: 38 See: 39 See: 40 One article advocating k-anonymity control can be found at: An academic article identifying weaknesses of k-anonymity (and especially weak k-anonymity) can be found at: Crown Copyright 2013 Page 40 of 41
41 6.4.2 Reduction in detail in indirect identifiers (such as date of birth, postcode) Transformation required Essential standard requirements Further information Further information (references) Input Processing Output Individual-level data Identify, and withhold or transform indirect identifiers so they are less likely to reveal identity Individual-level data without indirect identifiers, or with indirect identifiers Post code truncated to either area code or district code 41. No date of birth (e.g. transform to age, year of birth, or 5- year age band). No event dates (e.g. transform admission date to admission year, or month and year). None None Suppression of direct identifiers Transformation required Essential standard requirements Further information Further information (references) Input Processing Output Individual-level data Identify and withhold direct identifiers Individual-level data without direct identifiers Suppression of name, address, widely-used unique person or record identifier (notably National Insurance Number, NHS Number, Hospital Number), telephone number, address, and any other data item that on its own could uniquely identify the individual. None None 41 For an explanation of area and district postcode, see: Note that the distribution of postcode elements is not uniform, and that there are very few individuals living in some districts. Therefore, particular care should be taken when publishing data about sparsely-populated geographical areas. Crown Copyright 2013 Page 41 of 41
Information Governance and Risk Stratification: Advice and Options for CCGs and GPs
Information Governance and Risk Stratification: Advice and Options for CCGs and GPs 1 NHS England INFORMATION READER BOX Directorate Medical Operations Patients and Information Nursing Policy Commissioning
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Issued by: Senior Information Risk Owner Policy Classification: Policy No: POLIG001 Information Governance Issue No: 1 Date Issued: 18/11/2013 Page No: 1 of 16 Review Date:
Information Governance Strategy
Information Governance Strategy To whom this document applies: All Trust staff, including agency and contractors Procedural Documents Approval Committee Issue Date: January 2010 Version 1 Document reference:
Policy: D9 Data Quality Policy
Policy: D9 Data Quality Policy Version: D9/02 Ratified by: Trust Management Team Date ratified: 16 th October 2013 Title of Author: Head of Knowledge Management Title of responsible Director Director of
Electronic Palliative Care Co-Ordination Systems: Information Governance Guidance
QIPP Digital Technology Electronic Palliative Care Co-Ordination Systems: Information Governance Guidance Author: Adam Hatherly Date: 26 th March 2013 Version: 1.1 Crown Copyright 2013 Page 1 of 19 Amendment
Subject Access Request (SAR) Procedure
Subject Access Request (SAR) Procedure East and North Hertfordshire Clinical Commissioning Group Page 1 of 16 DOCUMENT CONTROL SHEET Document Owner: Chief Finance Officer Document Author(s): Anne Ephgrave
Data Quality Policy SH NCP 2. Version: 5. Summary:
SH NCP 2 Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: The Trust provides a framework to ensure all data that is recorded by the Trust is accurate and complies to
Policies for: Information Governance Information Quality Information Management Information Security. Version Control Version: 0.1
Policies for: Information Governance Information Quality Information Management Information Security Approved by: None this version Date approved: Name of originator/author: Ade Oduntan, Mike Hellier,
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title
De-identification of Data using Pseudonyms (Pseudonymisation) Policy
De-identification of Data using Pseudonyms (Pseudonymisation) Policy Version: 2.0 Page 1 of 7 Partners in Care This is a controlled document. It should not be altered in any way without the express permission
Privacy Committee. Privacy and Open Data Guideline. Guideline. Of South Australia. Version 1
Privacy Committee Of South Australia Privacy and Open Data Guideline Guideline Version 1 Executive Officer Privacy Committee of South Australia c/o State Records of South Australia GPO Box 2343 ADELAIDE
Information Governance Strategy
Information Governance Strategy Document Status Draft Version: V2.1 DOCUMENT CHANGE HISTORY Initiated by Date Author Information Governance Requirements September 2007 Information Governance Group Version
Information Governance Policy
Information Governance Policy Reference: Information Governance Policy Date Approved: April 2013 Approving Body: Board of Trustees Implementation Date: April 2013 Version: 6 Supersedes: 5 Stakeholder groups
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Version: 3.2 Authorisation Committee: Date of Authorisation: May 2014 Ratification Committee Level 1 documents): Date of Ratification Level 1 documents): Signature of ratifying
Information Governance Strategy :
Item 11 Strategy Strategy : Date Issued: Date To Be Reviewed: VOY xx Annually 1 Policy Title: Strategy Supersedes: All previous Strategies 18/12/13: Initial draft Description of Amendments 19/12/13: Update
NHS DORSET CLINICAL COMMISSIONING GROUP GOVERNING BODY INFORMATION GOVERNANCE TOOLKIT REPORT
NHS DORSET CLINICAL COMMISSIONING GROUP GOVERNING BODY INFORMATION GOVERNANCE TOOLKIT REPORT 9.7 Date of the meeting 15/07/2015 Author Sponsoring Clinician Purpose of Report Recommendation J Green - Head
INFORMATION GOVERNANCE STRATEGY NO.CG02
INFORMATION GOVERNANCE STRATEGY NO.CG02 Applies to: All NHS LA employees, Non-Executive Directors, secondees and consultants, and/or any other parties who will carry out duties on behalf of the NHS LA.
INFORMATION GOVERNANCE STRATEGY
INFORMATION GOVERNANCE STRATEGY Page 1 of 10 Strategy Owner Valerie Penn, Head of Governance Strategy Author Caroline Law, Information Governance Project Manager Directorate Corporate Governance Ratifying
BEFORE USING THIS GUIDANCE, MAKE SURE YOU HAVE THE MOST UP TO DATE VERSION GUIDANCE 2 POLICY AREA: INFORMATION GOVERNANCE
GUIDANCE 1 TITLE: INFORMATION GOVERNANCE FRAMEWORK 2 POLICY AREA: INFORMATION GOVERNANCE 3 ACCOUNTABLE DIRECTOR FOR POLICY AREA: DIRECTOR OF QUALITY AND GOVERNANCE 4 GUIDANCE DRAFTED BY: INTEGRATED GOVERNANCE
Barnsley Clinical Commissioning Group. Information Governance Policy and Management Framework
Putting Barnsley People First Barnsley Clinical Commissioning Group Information Governance Policy and Management Framework Version: 1.1 Approved By: Governing Body Date Approved: 16 January 2014 Name of
NHS Waltham Forest Clinical Commissioning Group Information Governance Policy
NHS Waltham Forest Clinical Commissioning Group Information Governance Policy Author: Zeb Alam & David Pearce Version 3.0 Amendments to Version 2.1 Updates made in line with National Guidance and Legislation
IAPT Data Standard. Frequently Asked Questions
IAPT Data Standard Frequently Asked Questions Version 1.0 March 2012 IAPT FAQs 1.0-1 - Contents Section 1: About the IAPT Data Standard.. 3 Section 2: Who is responsible for doing what?. 5 Section 3: How
1.5 The Information Governance Policy should be read in conjunction with the Information Governance Strategy.
Title: Reference No: NHSNYYIG - 007 Owner: Author: INFORMATION GOVERNANCE POLICY Director of Standards First Issued On: September 2010 Latest Issue Date: February 2012 Operational Date: February 2012 Review
INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK
INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic
SUBJECT ACCESS REQUEST PROCEDURE
SUBJECT ACCESS REQUEST PROCEDURE Document History Document Reference: Document Purpose: IG31 This procedure sets out the responsibility for staff when receiving requests for information provided under
Data protection. Anonymisation: managing data protection risk code of practice
Data protection Anonymisation: managing data protection risk code of practice 2 xx Contents 3 Contents Information Commissioner s foreword 4 Appendix 1 Glossary 48 1. About this code 6 2. Anonymisation
Information Governance Policy
Information Governance Policy Information Governance Policy Issue Date: June 2014 Document Number: POL_1008 Prepared by: Information Governance Senior Manager Insert heading depending on Insert line heading
Privacy Impact Assessment: care.data
High quality care for all, now and for future generations Document Control Document Purpose Document Name Information Version 1.0 Publication Date 15/01/2014 Description Associated Documents Issued by
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Information Governance Policy_v2.0_060913_LP Page 1 of 14 Information Reader Box Directorate Purpose Document Purpose Document Name Author Corporate Governance Guidance Policy
Shropshire Community Health Service NHS Trust Policies, Procedures, Guidelines and Protocols
Shropshire Community Health Service NHS Trust Policies, Procedures, Guidelines and Protocols Title Trust Ref No 1340-29497 Local Ref (optional) Main points the document covers Who is the document aimed
Information Governance Plan
Information Governance Plan 2013 2015 1. Overview 1.1 Information is a vital asset, both in terms of the clinical management of individual patients and the efficient organisation of services and resources.
Information Governance Policy
Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact
Data Protection Policy
Data Protection Policy Version: V1 Ratified by: Operational Management Executive Committee Date ratified: 26 September 2013 Name and Title of originator/author(s): Chris Brady, FOI, Data Protection and
Consultation on the introduction of diversity succession planning for board appointments and the lowering of the 150 employees threshold for
Consultation on the introduction of diversity succession planning for board appointments and the lowering of the 150 employees threshold for publishing gender pay gap and equal pay statements etc. October
JOB DESCRIPTION. Information Governance Manager
JOB DESCRIPTION POST TITLE: Information Governance Manager DIRECTORATE: ACCOUNTABLE TO: BAND: LOCATION: CSS Head of Information Governance 8a CSS Job Purpose The Information Governance Manager will ensure
Information Governance Policy
Author: Susan Hall, Information Governance Manager Owner: Fiona Jamieson, Assistant Director of Healthcare Governance Publisher: Compliance Unit Date of first issue: February 2005 Version: 5 Date of version
Information Sharing Protocol
Information Sharing Protocol South Central PCTs, General Practices and Tribal Consulting Limited Commissioning Enablement Service (Analytics) Document Control Date Version Author Comment 08/02/10 0.1 A.
Data Protection Act. Conducting privacy impact assessments code of practice
Data Protection Act Conducting privacy impact assessments code of practice 1 Conducting privacy impact assessments code of practice Data Protection Act Contents Information Commissioner s foreword... 3
Information Governance Policy. 2 RESPONSIBLE PERSON: Steve Beeho, Head of Integrated Governance. All CCG-employed staff.
Information Governance Policy 1 SUMMARY This policy is intended to ensure that staff are fully aware of their Information Governance (IG) responsibilities, so that they can effectively manage and best
Use and verification of the NHS number for all active patients.
Title: Reference No: Owner: Author: Use and verification of the NHS number for all active patients. NHSNYYIG-004 Director of Standards Information Governance Team First Issued On: March 2008 Latest Issue
JOB DESCRIPTION. Contract Management and Business Intelligence
JOB DESCRIPTION DIRECTORATE: DEPARTMENT: JOB TITLE: Contract Management and Business Intelligence Business Intelligence Business Insight Manager BAND: 7 BASE: REPORTS TO: Various Business Intelligence
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Name of Policy Author: Name of Review/Development Body: Ratification Body: Ruth Drewett Information Governance Steering Group Committee Trust Board : April 2015 Review date:
Personal Data Handling and Sharing Policy
Personal Data Handling and Sharing Policy Originator Richard Gibson Date 20 June 2012 Verifier Lynda Oliver Date 20 June 2012 Reviewed Richard Gibson, Lynda Oliver Date July 2013 Contents Page 1. Introduction
Data protection. Anonymisation: managing data protection risk code of practice
Data protection Anonymisation: managing data protection risk code of practice 2 xx Contents 3 Contents Information Commissioner s foreword 4 Appendix 1 Glossary 48 1. About this code 6 2. Anonymisation
All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid.
Policy Type Information Governance Corporate Standing Operating Procedure Human Resources X Policy Name CCG IG03 Information Governance & Information Risk Policy Status Committee approved by Final Governance,
Accessing Personal Information on Patients and Staff:
Accessing Personal Information on Patients and Staff: A Framework for NHSScotland Purpose: Enabling access to personal and business information is a key part of the NHSScotland Information Assurance Strategy
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE
The Leeds Teaching Hospitals NHS Trust. Research & Development Department DATA PROTECTION IN RESEARCH GUIDANCE NOTES FOR RESEARCHERS
The Leeds Teaching Hospitals NHS Trust Research & Development Department DATA PROTECTION IN RESEARCH GUIDANCE NOTES FOR RESEARCHERS 1. Introduction The Research Governance Framework for Health & Social
The Care Record Guarantee Our Guarantee for NHS Care Records in England
The Care Record Guarantee Our Guarantee for NHS Care Records in England January 2011, version 5 Introduction In the National Health Service in England, we aim to provide you with the highest quality of
INFORMATION GOVERNANCE POLICY
ENFIELD CLINICAL COMMISSIONING GROUP INFORMATION GOVERNANCE POLICY PLEASE DESTROY ALL PREVIOUS VERSIONS OF THIS DOCUMENT Enfield CCG Information Governance Policy Information Governance Policy (Policy
Governance. Information. Bulletin. Welcome to the nineteenth edition of the information governance bulletin
Welcome to the nineteenth edition of the information governance bulletin Our regular bulletin about information governance and the work of the IG transition programme Publication Gateway Reference: 02465
Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3
Paper 9 Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3 Please ensure that all THREE pages of this contract are returned to: Information Governance Manager, Health Informatics, Chertsey House, St Peter
Data Sharing Protocol
Data Sharing Protocol Agreement for Sharing Data Between Partners of the South Dublin Childrens Services Committee Version 0.4 Final Draft June 2009 Contents 1 Preface...3 2 Introduction & Overview...3
Data Protection Breach Reporting Procedure
Central Bedfordshire Council www.centralbedfordshire.gov.uk Data Protection Breach Reporting Procedure October 2015 Security Classification: Not Protected 1 Approval History Version No Approved by Approval
Information Governance Strategy. Version No 2.0
Plymouth Community Healthcare CIC Information Governance Strategy Version No 2.0 Notice to staff using a paper copy of this guidance. The policies and procedures page of PCH Intranet holds the most recent
Information Management Policy CCG Policy Reference: IG 2 v4.1
Information Management Policy CCG Policy Reference: IG 2 v4.1 Document Title: Policy Information Management Document Status: Final Page 1 of 15 Issue date: Nov-2015 Review date: Nov-2016 Document control
The Manitowoc Company, Inc.
The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational
NIGB. Information Governance Untoward Incident Reporting and Management Advice for Local Authorities
Information Governance Untoward Incident Reporting and Management Advice for Local Authorities March 2013 Contents Page 1. The Role of the NIGB.....3 2. Introduction...4 3. Background Information...6 4.
Information Sharing Policy
Information Sharing Policy REFERENCE NUMBER IG 010 / 0v3 February 2013 VERSION V1.0 APPROVING COMMITTEE & DATE Clinical Executive Committee 5.2.13 REVIEW DUE DATE February 2016 West Lancashire CCG is committed
Child and Adult Services Subject Access Requests Guidance
Child and Adult Services Subject Access Requests Guidance This Guidance is not applicable to Access to Information requests about Adoption. For requests about Adoption please consult the Adoption and Children
REPORT OF: DIRECTOR OF DEMOCRATIC AND LEGAL SERVICES 13/358 WARDS AFFECTED: ALL
REPORT TO CABINET TO BE HELD ON 15 OCTOBER 2013 A ITEM Key Decision YES or NO Forward Plan Ref No Corporate Priority All Cabinet Portfolio Holder Cllr Jane Kenyon REPORT OF: DIRECTOR OF DEMOCRATIC AND
SOMERSET PARTNERSHIP NHS FOUNDATION TRUST RECORDS MANAGEMENT STRATEGY. Report to the Trust Board 22 September 2015. Information Governance Manager
SOMERSET PARTNERSHIP NHS FOUNDATION TRUST RECORDS MANAGEMENT STRATEGY Report to the Trust Board 22 September 2015 Sponsoring Director: Author: Purpose of the report: Key Issues and Recommendations: Director
Lancashire County Council Information Governance Framework
Appendix 'A' Lancashire County Council Information Governance Framework Introduction Information Governance provides a framework for bringing together all of the requirements, standards and best practice
Data protection compliance checklist
Data protection compliance checklist What is this checklist for? This checklist is drawn up on the basis of analysis of the relevant provisions of European law. Although European law aims at harmonizing
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Including the Information Governance Strategy Framework and associated Information Governance Procedures Last Review Date Approving Body N/A Governing Body Date of Approval
Council, 14 May 2015. Information Governance Report. Introduction
Council, 14 May 2015 Information Governance Report Introduction 1.1 The Information Governance function within the Secretariat Department is responsible for the HCPC s ongoing compliance with the Freedom
CORE SKILLS FRAMEWORK INFORMATION GOVERNANCE LESSON NOTES AND TIPS FOR A SUGGESTED APPROACH
CORE SKILLS FRAMEWORK INFORMATION GOVERNANCE LESSON NOTES AND TIPS FOR A SUGGESTED APPROACH These notes are designed to be used in conjunction with the core training PowerPoint slides. The purpose of the
Version Number Date Issued Review Date V1 25/01/2013 25/01/2013 25/01/2014. NHS North of Tyne Information Governance Manager Consultation
Northumberland, Newcastle North and East, Newcastle West, Gateshead, South Tyneside, Sunderland, North Durham, Durham Dales, Easington and Sedgefield, Darlington, Hartlepool and Stockton on Tees and South
How To Share Your Health Records With The National Health Service
HOW WE USE YOUR PERSONAL INFORMATION Information Leaflet Your Health. Our Priority. Page 2 of 9 Introduction This Leaflet explains why the NHS collects information about you and how it is used, your right
Policy Document Control Page
Policy Document Control Page Title Title: Information Governance Policy Version: 5 Reference Number: CO44 Keywords: Information Governance Supersedes Supersedes: Version 4 Description of Amendment(s):
Data Protection Policy
Issue Date: June 2014 Document Number: POL_1006 Prepared by: Information Governance Senior Manager Insert heading depending on Insert line heading length; please depending delete other on line length;
How To Ensure Information Security In Nhs.Org.Uk
Proforma: Information Policy Security & Corporate Policy Procedures Status: Approved Next Review Date: April 2017 Page 1 of 17 Issue Date: June 2014 Prepared by: Information Governance Senior Manager Status:
Information Management Policy
Title Information Management Policy Document ID Director Mark Reynolds Status FINAL Owner Neil McCrirrick Version 1.0 Author Deborah Raven Version Date 26 January 2011 Information Management Policy Crown
How to revalidate with the NMC Requirements for renewing your registration
How to revalidate with the NMC Requirements for renewing your registration CONTENTS WHAT DOES THIS DOCUMENT DO?...3 WHAT IS REVALIDATION?...5 CHECKLIST OF REQUIREMENTS AND SUPPORTING EVIDENCE... 7 THE
NHS Commissioning Board: Information governance policy
NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Version Version 1 Ratified By Date Ratified PROPOSED FOR APPROVAL 15/11/12 Author(s) Responsible Committee / Officers Date Issue November 2012 Review Date November 2013 Intended
Information Governance Framework and Strategy. November 2014
November 2014 Authorship : Committee Approved : Chris Wallace Information Governance Manager CCG Senior Management Team and Joint Trade Union Partnership Forum Approved Date : November 2014 Review Date
DATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
DATA PROTECTION POLICY
DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3
How To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
Information sharing. Advice for practitioners providing safeguarding services to children, young people, parents and carers
Information sharing Advice for practitioners providing safeguarding services to children, young people, parents and carers March 2015 Contents Summary 3 About this government advice 3 Who is this advice
INFORMATION GOVERNANCE HANDBOOK
INFORMATION GOVERNANCE HANDBOOK SECTION ONE Author Tracey Burrows Role Information Governance Manager (CSCSU) Date / Version February 2015 Version FINAL V1.0 Approved by IM&T Board Date 27 February 2015
