Privacy Tips for Providers and Suppliers

Size: px
Start display at page:

Download "Privacy Tips for Providers and Suppliers"

Transcription

1 Privacy Tips for Providers and Suppliers Privacy Tips for Suppliers It s important to constantly remind ourselves of the basic privacy principles and how these apply to the protection of personal information. There are 12 information privacy principles at the core of the Privacy Act, which can be summarised into the following key points using the PADLOCK acronym which are based on tips from the Privacy Commissioner. The information you collect must be connected to the function of your business or service delivery. P PURPOSE You must have a clear need for the information you collect and use. When requesting information from another source, be clear and specific about what you need and why. You should request that the sender includes a list of all documents attached to their communication and advise them if any of the documents are missing. If you cannot reasonably justify why you are holding a piece of information, delete or safely destroy it. Check regularly for any change in address or other contact details and update all related records. Any information NOT relating to the client should be immediately removed and relocated to the correct file or safely deleted or destroyed. A ACCURACY Information should be complete and correct. If any records appear unclear or contradictory, clarify directly with the client or immediate source of that information. Correct any mistakes promptly and ensure corrections to records are clearly documented as such, and signed and dated. Advise any recipients of incorrect information of such errors or corrections. When requesting information from another source, be clear and specific about what you need and why. D DATA MINIMISATION Collect and keep only what is necessary Remove and safely delete or destroy any duplicate information from client files. When reviewing client files, remove and safely delete or destroy any information that is irrelevant to the safe provision of services. Where records have been scanned and saved to an

2 electronic file, there is no need to retain the hard copy record (unless the quality of the scanned document is poor). L LIFECYCLE Only keep what is needed. Dispose of any information you don t need safely Be aware of the legislated timeframes for retention of health information (generally a minimum of 10 years, though this can be longer if specifically requested by the client or related to research data). Personal information must not be kept any longer than is needed for the purpose for which it was collected. For those providing episodic services for ACC (i.e. clinical assessors asked to provide an opinion based on review of other reports and documents), you should return or safely destroy all records once your report has been accepted by ACC. ACC will have copies of all records, should you need to access them again. Ensure computer systems allow electronic footprinting Ensure regular back-up of stored data O ONGOING RESPONSIBILITY Encourage proprivacy use of technologies now and in the future Ensure appropriate security measures are built into your system Ensure delegations allow appropriately restricted access of staff to certain parts of the system Ensure ongoing technical support and maintenance to protect against loss or corruption of data in the future Hard copy records should be kept in a secure, lockable area, preferably in a visible area away from client foottraffic. Areas containing personal information should ideally require security passes / codes to allow entry. C CONTROL Protect data at all times. This includes conducting verbal communications in a place and manner that would protect the client s privacy Electronic records should only be accessible by staff members who require that information to function in their role. Passwords should be required to access all information and should be changed regularly. All electronic records should be dated and electronically signed by the author. Use screen saver / screen lock programmes to ensure patients / clients cannot view other s people s records on unattended computers. When taking records away from the premises (i.e. when conducting home visits), all care should be taken to ensure information is secure (in a locked case or on a password-protected laptop or password-protected data stick) and that it remains in your immediate possession at all times.

3 If any part of the client record is to be left in the client s home, ensure it is accessible only by those who require it and contains only the information that is required. When sending information to other parties, you must first ensure it is accurate, relevant to the purpose for which it is being sent and relates only to the specific client; that the recipient s contact details are accurate; and that there is safe transfer (i.e. password protected documents, use of courier service and hand delivery, etc). You should clearly list all documents attached to any correspondence. Disposal of records should be done securely, whether through safe return to the owner, controlled shredding or burning, transfer to a new owner or appropriate removal from computerised records. K KNOWLEDGE Let your clients know what information is being collected and how it is being used The more sensitive the information, the more discussion may be needed with the client to ensure they understand how you intend to use it. If in doubt, it may be worth obtaining explicit written consent from the client for specific situations. Remember that the client can request access to their personal and clinical records at any time and you are obliged to provide them with this information. Keep your records clear, legible and objective at all times. There are simple ways that you can protect privacy: Develop a checklist that staff can use when receiving or sending information. When organising or copying client files, work on them one at a time do not work on multiple files concurrently. Work in a clear space where notes can t be mixed with other documents. Look at security settings for s (i.e. disable auto-populate address functions, set up an outbox, to allow a last check of unsent s, password protect documents, etc). Only attach documents to group s if you need everyone in that group to see those documents. Don t automatically reply to all when receiving a group if your response only relates to some of the potential recipients. Before forwarding s, ensure you remove any embedded documents that aren t a required part of the ongoing communication. If in doubt about someone s physical address, phone them and check. If using an address for the first time, send a test message and ask the person to confirm receipt. If leaving a voic message for a client, only leave your name and contact number and ask them to return your call.

4 In addition you may find it useful to: Have the key principles clearly visible in work areas where personal information is regularly handled. Consider how these suggestions might apply to you and look for other ways you might protect privacy in your particular work setting. All of the above are intended only as discussion topics for consideration and should not be regarded as a complete and definitive answer to this extensive and continually evolving subject. You know your business and your environment and you are ultimately responsible for ensuring the protection of your clients / patients privacy when handling their information. There is a great deal of information that can be accessed through The Office of the Privacy Commissioner Website: If you are in doubt, simply remember to only collect, keep and share what you actually need to collect, keep and share. Only keep the information for as long as you are likely to need it. If a breach does occur, be transparent and act promptly to advise those who may be affected.

5 The following Questions and Answers have been developed to support you to manage information relating to ACC clients. Question 1. What if each provider had a unique pin or password for documents that are sent to them? 2. Where are the main areas where providers are breaching privacy/going wrong? Answer If required, ACC can currently provide a password which is unique to a CD or document, rather than a generic one linked to a provider/supplier, because it provides a high level of security. However, this is a good idea and we will definitely give further consideration to this suggestion as our electronic communications processes develop. One of the recurring issues with providers is that inbound information, in particular ACC Injury Claim forms (ACC45), often contain incomplete or incorrect address information. This largely occurs with treating and lodging providers and results in ACC sending correspondence to an incorrect address. Providers should try to ensure they confirm the client s address before submitting a claim form. Another area is where providers use one template for multiple clients and not all the information relating to the previous client is removed before the template is sent to ACC. Providers should try to ensure they retain a clean unused template for each individual client. Where a provider is mobile and records are kept either on a mobile device or in the provider s home, the mobile device should be protected by secure password and only contain current information, (i.e. not used as a general storage device) Clinical records physically stored either at the client s or the provider s home should be stored securely in a locked cabinet until no longer required. 3. If a patient registration form is signed by a client then scanned and uploaded to an administration system, do you need to keep the original (paper) copy? What are our legislative requirements? It may be helpful for you to be guided by ACC s policy, which is to keep scanned documentation for 6 months, after which time it can be destroyed. Coles Medical Practice In New Zealand provides useful guidance that can also be used in non-medical practice around retention and storage of Health information that you may find useful. ACC s policy is to keep scanned documentation for 6 months, after which time it can be destroyed. 4. If you're running a clinic in schools, who signs the ACC45 for under 16s? The school A client can sign their own ACC45 if they are Gillick competent (that is if a medical practitioner or professional considers that the client can make their own decisions and understand the

6 may have a general 'authorisation' to act for the child but who signs the form? Currently nurses are doing it. 5. How should information be sent? What is ACC s recommended process? 6. How can I update my contact details with ACC 7. What password hints and tips for creating a safe password can you give us? 8. How long do we need to hold onto client information? ramifications of those decisions). Alternatively, a suitable adult from the school would suffice. Generally, how information is sent to ACC depends upon its sensitivity and the consequences for the client if it were to be disclosed unintentionally For example, if you are providing a brief update on a client s work trial, an is appropriate. If you are providing a report which contains health or other sensitive information, there would need to be a more secure method of delivery, such as courier or hand delivery. If you are a health provider submitting notes or reports to ACC, there are two secure methods that are acceptable to ACC: Healthlink or MMEX. For more information on these see the response to the question on Healthlink, at number 29 below To ensure that ACC s Communications get to you appropriately, You should advise ACC via at Health.Procurement@acc.co.nz of any change in your contact details as soon as possible ACC s advice to its staff is that complex passwords are the best and they should contain at least three characters from each of the following categories: UPPER CASE (A B C Z) Lower case (a b c.z) Numeric (012 9) Symbols # $). You should also choose passwords that cannot be easily guessed and use words that you wouldn t find in a dictionary. Information that is sent to you for the purposes of an assessment should not be retained. You should either securely destroy it or return it to ACC in an appropriate way. Any reports that you create and copy to ACC should be retained. The Health (Retention of Health Information) Regulations 1996 say that health agencies must keep health information for at least 10 years. ACC s own legislation, the Accident Compensation Act 2001, requires that ACC keeps every file for at least 10 years after the date of the last action recorded. ACC retains copies of all information sent to you; therefore it will still be available if you ever need to access it again. 9. Are ACC167 and ACC45 valid and legal? The current ACC167 and ACC45 are still legal. However, ACC has developed a new authority

7 10. We have a questionnaire that we need to complete on behalf of ACC asking questions such as are you a smoker? I do not feel that these questions are relevant to my treatment of this patient, can you please expand on why we have to ask such information? 11. We receive large whole PDF files from ACC, they have too much irrelevant information and are too big to save and difficult to manage. How do you propose we get just the relevant information from ACC in documents we can manage? 12. If a client,dhb or other treatment provider requires information urgently on a client, can we send it directly rather than having to go via ACC? What is the Policy on Suppliers/Providers sharing a patient s health information with other medical professionals in order to treat the patient? If ACC send information to a supplier/provider, what is our policy on resending the same information on? 13. How is inconsistency with how privacy is handled in ACC being managed? Issue over ACC not releasing information if a Supplier/Provider calls up with details form following the suggestions in two recent District Court decisions. The ACC6300 Authority to Collect Medical and Other Records form will soon be released for use on all new claims. We are not going to replace the ACC167 forms on all existing files, but we will do so if a client is not satisfied with their current consent and they request to sign the new form, or if we require new medical or other information related to the claim. An agency should only collect information for a legal purpose that is connected with one of its functions or activities. If you consider that specific questions are not relevant in the specific situation, or there is no legal purpose for the collection of that information, then do not request it from the client. ACC should only provide information that is relevant and necessary to disclose. Some providers prefer a comprehensive compilation of information, while others prefer a referral with only limited information. This will depend on their requirements, e.g. a home modification supplier will need more specific information about a client s injuries than a mental injury assessor, who may need to approach the client more holistically. As part of ACC s ongoing Privacy Programme, ACC will be looking to develop greater consistency in this area. In the meantime, if you receive information that you consider is superfluous, please contact the referring office. If a client or DHB requests information from you directly in a situation of urgency where an individual's life or health may be threatened, privacy legislation does enable you to forward it directly. However if ACC has provided you with information that another provider has requested, but their need for that information is unclear or does not appear related to the continued management of the covered injury, it is ACC's preference to deal with that provider directly. If in doubt, contact the client s case owner or return the information to ACC. We can then decide whether the information should be shared with another party. ACC has a suite of policies and operational procedures for the handling of personal information. In general, branch offices within ACC s Claims Management Network should all be adhering to the same processes. ACC acknowledges that there may be some variation in the way different business units operate, particularly with the heightened staff awareness of

8 of a client, but the dates are slightly out due to the clients not remembering the exact date. How do we overcome this issue? 14. If ACC wants information urgently, what are the guidelines within privacy policy about getting that information through? 15. What is the definition of a privacy officer for our suppliers? (ie if we need one, what would it involve) 16. Definition of written provided information that ACC sends us. Do we need to store it or, as ACC has this, can we dispose of it? If we do keep it, what are the time frames? privacy. As part of ACC s ongoing Privacy Programme, we will be looking to develop greater consistency in this area. When you call the Provider Helpline you will be asked for the client s name and date of birth. If you are unable to provide the exact date of injury, ACC will ask you for the approximate date of injury. It may also ask you other relevant questions such as the body region or injury cause. If you are able to provide that additional information, ACC should be able to provide you with the information you require. ACC usually asks for information to be provided within 10 days. There are no specific guidelines in the privacy policy about urgent information requests, however, if information is required within a shorter time frame, we should provide you with a reason why and assist you to pass on that information in the most secure way possible. Usually urgent requests are made only when absolutely necessary and your cooperation may help prevent situations from escalating unduly. Section 23 of the Privacy Act 1993 states that all agencies must have at least one privacy officer a person within the agency who knows about privacy. The legislation specifies that the responsibilities of a privacy officer include: the encouragement of compliance, by the agency, with the information privacy principles dealing with requests made to the agency pursuant to the Privacy Act working with the Privacy Commissioner in relation to investigations conducted under the Privacy Act in relation to the agency otherwise ensuring compliance by the agency with the provisions of the Privacy Act. The Office of the Privacy Commissioner has more information on privacy officers, which can be found at: Information that is sent to you for the purposes of an assessment should not be retained. You should either securely destroy it or return it to ACC in an appropriate way. Any reports that you create and copy to ACC should be retained. The Health (Retention of Health Information) Regulations 1996 say that health agencies must keep health information for at least 10 years. ACC s own legislation, the Accident Compensation Act 2001, requires that ACC keeps every file for at least 10 years after the date of the last action recorded. ACC retains copies of all information sent to you; therefore it will still be available if you ever need to access it again. ACC s policy is to keep scanned documentation for 6 months, after which time it can be

9 17. How does ACC identify Suppliers and Providers? What checks are in place to verify them? 18. How long are the ACC45 and the ACC167 forms valid, i.e. when the claim is done, do we need written consent to gather further info? 19. Is there a clear policy around if a client provides the wrong information, that the Supplier is indemnified. destroyed. Providers are generally individual employees or subcontractors who deliver a one-to-one service to the client e.g. a physiotherapist, occupational therapist or vocational rehabilitation consultant. Each provider has a unique reference number which identifies them as a provider. Suppliers (previously known as Vendors) are generally a practice or an organisation that delivers goods and/or services (treatment or rehabilitation) to ACC clients. Each Supplier has a reference number which identifies them as a Supplier. A Supplier may have a number of providers working within their practice or organisation. The first consent that ACC obtains is via the ACC45. If the claim transfers to a branch for management, then the client is required to complete an ACC167 (soon to be replaced by the new authorisation form ACC6300). A client may negotiate a time period for which the authorisation applies. However, in general the consent provided in the authorisation form applies for the whole period during which ACC provides assistance for the particular claim. There will also be opportunities for clients to create individual authorisation particular to their needs (as an alternative to signing the template authorisation form). ACC accepts that Suppliers and Providers are dependent on clients providing them with accurate and factual information. The privacy legislation requires that a reasonable attempt is made to ensure that the information is accurate. For example, if asked to determine a client s level of impairment from injury, you would be expected to perform your own objective assessment in addition to documenting the client s subjective history. However, if incorrect information is passed to ACC in good faith, then there is no penalty for Suppliers. Therefore, there is no need for an indemnification policy. 20. What is being done with return to sender mail If information is returned to ACC due to an invalid, insufficient, or out of date address, ACC will attempt to confirm the correct address. If that can be done, the intended recipient s contact details will be updated and the information resent. If the intended recipient s address cannot be verified, ACC will generally record it as not valid and won t resend the item. 21. Can we, as Suppliers, utilise ACC s privacy module for training, or can ACC provide something based on it? If you have received incorrectly addressed mail, please contact the provider helpline on or via at providerhelp@acc.co.nz ACC s privacy training module Stop, Think, Check, Do is an online module. ACC will investigate whether it is possible to provide access to the module in its current form. If that is not possible, we will be able to provide a physical copy of the module in PDF form (although obviously without the animation and sound of our version). You are welcome to adapt the

10 22. Healthlink where does it go? What is Healthlink and how do ACC use it? Increasing information coming into clinicians via Healthlink and ACC, feel at risk at the level of content. How do we manage this? 23. Is ACC going to start working on NHI numbers rather than Names and DOB, as this is a much more confidential way of accessing information, especially in an open plan GPs, for example? We need an NHI number to invoice electronically but not everyone has an NHI number, how does this work? What is the 0800 number to get the NHI number? 24. We would like some general privacy guidelines about what we should and should not do with patient information in s, i.e. what should be in the heading and content module for your staff. The website of the Office of the Privacy Commissioner also has a range of resources for training on privacy. If you are a health provider, Healthlink is a secure method of submitting notes and reports to ACC. You can use Healthlink to submit reports if you have a practice management system (PMS) that is able to send notes/reports in an RSD, Healthdoc or LAB format. To submit reports to ACC via Healthlink you will need to send notes/reports to ACC s EDI addresses, such as ACCSPECR. For further information on ACC EDI addresses, Healthlink and working online with ACC, go to: MMEx is an alternative method of submitting notes and reports to ACC if you don t have a PMS or a PMS Healthlink compatible system. MMEx is a secure mailbox account that lets you create an , attach notes/reports then them securely to ACC. If you would like to use this option, call the ACC ebusiness team ( ) who will be able to set you up with an account. As you will be sending information using a digital certificate, which verifies the sender and encrypts the information, it is secure. The National Health Index (NHI) is a database which assigns and maintains a unique identifier (the NHI number) for every recipient of health and disability supports in New Zealand. While the NHI number is a unique identifier for health and disability services, it is not unique to ACC. Therefore, ACC will continue to use the claim number when referring to our clients claims. However, the NHI is always useful as a secondary identifier along with a clients address, date of birth etc. An NHI number is required for electronic invoicing. If you have access to NOAH (NHI Online Access for Health) you will be able to obtain the client s NHI number. If you do not have access, you can contact the Ministry of Health. The Provider Helpline (0800 number) will not provide you with the client s NHI number. Any communication with ACC about a client is uploaded to the client s electronic claim file. If the client requests a copy of the file, they will be able to view these s. Therefore, all communication should be of a professional standard and written in the knowledge that it may be viewed by the client. The should only refer to information relevant to the

11 What information can we put in an about a claimant? management of the client s claim. As s tend to be an informal form of communication, if you are providing a lot of detailed information or viewpoints, you should consider whether a letter or report is more appropriate. It is ok to identify the client in the , and refer to their injury, treatment or rehabilitation in the main body of your message. If you have verified the address of the ACC staff member you are writing to, it is ok to put the clients name in the subject line. 25. What constitutes a privacy breach? It s not defined in the Privacy Act. 26. What be done with client/patient information if the provider stops practicing or dies? How would appropriate access continue for other agencies requiring access to that information The Privacy Commissioner states that a privacy breach occurs when there is unauthorised access to or collection, use, or disclosure of personal information. Such activity is unauthorised if it occurs in contravention of the Privacy Act 1993 (or applicable code of practice issued under the Act). Some of the most common privacy breaches happen when personal information of customers, patients, clients or employees is stolen, lost or mistakenly disclosed (e.g. a computer containing personal information is stolen or personal information is mistakenly ed to the wrong people). A privacy breach may also be a consequence of faulty business procedure or an operational break-down. ACC has developed its own definitions to ensure a consistent system for recording, monitoring and reporting privacy incidents. The definitions are as follows: Data breach: When personal information is disclosed outside ACC when it should not have been, e.g. by error, mistake or without legal authority. Near Miss: An identified action that would have led to a privacy breach but didn t because the information was not disclosed. Coles Medical can provide information of transferring information to another treatment provider Meeting all the requirements for the retention of patient records can be difficult, especially for sole practitioners. Before retiring, Practitioners should make prior arrangements for another practitioner to accept responsibility for the records; or arrange for patients to collect their own records. In the situation where arrangements have not been made for the retention of patient records and the Practitioner dies, the Executor of the Estate or the Power of Attorney should endeavour to return records to the patient (the patient s family if the patient is dead), or to another practitioner. 27. How can you rely on ACC s client contact ACC endeavours to ensure the information we hold is as up to date as possible however we

12 information being correct accept that suppliers and providers are dependent on clients providing them with accurate contact information. It is important to check with the client at every opportunity that information held is current.

13 Take the time to know your privacy principles The Privacy Act has 12 privacy principles for handling personal information. 10 use it only for the purpose you got it 11 only disclose it if you have a good reason 12 only use unique identifiers where it s clearly allowed 1 only collect personal information you really need 2 get it directly from the person wherever possible 9 dispose of it when it s no longer needed 8 take care that it s accurate before using it 7 fix it if the person thinks it s wrong 6 let the person see it if they want to 5 keep it secure 3 be open with people about what s going to be done with it 4 be fair about how you get it

14 P A D L O C K Purpose: Have a clear need for collecting and using personal information. Accuracy: Personal information should be correct and accurately processed. Fix any mistakes promptly. Data minimisation: Collect only what is necessary; keep only what is necessary. Lifecycle: Make smart choices about information use and flow while it is in your care. Dispose of information safely. Ongoing responsibility: Encourage pro-privacy use of technologies now and in the future. Control: Protect data at all times. Knowledge: Tell people why information is being collected, and how it is being used.

A common sense guide to the Data Protection Act 1998 for volunteers

A common sense guide to the Data Protection Act 1998 for volunteers A common sense guide to the Data Protection Act 1998 for volunteers Why is it necessary? The Data Protection Act 1998 is a law introduced to control the way information held about individuals is handled

More information

Code of Practice on Data Protection for the Insurance Sector

Code of Practice on Data Protection for the Insurance Sector Code of Practice on Data Protection for the Insurance Sector (Approved by the Data Protection Commissioner under Section 13 (2) of the Data Protection Acts, 1988 and 2003) Forward I am very happy to be

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

Quick guide to the employment practices code

Quick guide to the employment practices code Data protection Quick guide to the employment practices code Ideal for the small business Contents 3 Contents Section 1 About this guidance 4 Section 2 What is the Data Protection Act? 5 Section 3 Recruitment

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE

PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE ADOPTED ON 9 th January 2008 TABLE OF CONTENTS Page No. 1 Introduction...3 2 Glossary...3 3 Types of Personal Data held by Us...3 4 Obligations

More information

injury management practices

injury management practices audit guidelines injury management practices guidelines to understanding the audit standards for the injury management section of the acc partnership programme ACC2465 Printed September 2006 These guidelines

More information

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer:

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer: Secure Storage, Communication & Transportation of Personal Information Policy Version No: 3.0 Prepared By: Information Governance, IT Security & Health Records Effective From: 20/12/2010 Review Date: 20/12/2011

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review

More information

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011)

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011) Security Awareness A Supplier Guide/Employee Training Pack May 2011 (updated November 2011) Contents/Chapters 1. How do I identify a DWP asset 2. Delivering on behalf of DWP - Accessing DWP assets 3. How

More information

Information Handling Policy

Information Handling Policy Information Handling Policy 10 December 2015 Information Handling Policy 1. Who We Are 1.1 In this Information Handling Policy, references to we, our, us and ClearView are to ClearView Wealth Limited and

More information

Scottish Rowing Data Protection Policy

Scottish Rowing Data Protection Policy Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this

More information

Case Recording Practice Adults Services

Case Recording Practice Adults Services Case Recording Practice Adults Services Guidance on case recording practice and on document management Version: 3.3 Effective from: 1 st October 2014 Next review date: 1 st Nov 2015 Signed off by: Jenny

More information

The Manitowoc Company, Inc.

The Manitowoc Company, Inc. The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational

More information

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that

More information

Data Protection Policy

Data Protection Policy Data Protection Policy This policy applies to the national office of Special Olympics GB; athletes, volunteers, and paid staff its clubs and regions; all Special Olympics GB donors, sponsors, and supporters;

More information

CHAPTER 13 Medical records and patient access to information

CHAPTER 13 Medical records and patient access to information CHAPTER 13 Medical records and patient access to information Robert Stevens is an Auckland barrister and a consultant in the management of personal information and privacy. Cite this as Stevens R 2013.

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

DATA PROTECTION AND DATA STORAGE POLICY

DATA PROTECTION AND DATA STORAGE POLICY DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether

More information

ACC AUDIT GUIDELINES - INJURY MANAGEMENT PRACTICES

ACC AUDIT GUIDELINES - INJURY MANAGEMENT PRACTICES ACC AUDIT GUIDELINES - INJURY MANAGEMENT PRACTICES Guidelines to understanding the audit standards for the Injury Management Section of the ACC Partnership Programme Please note: There is a separate guideline

More information

Data Protection and Information Security Policy and Procedure

Data Protection and Information Security Policy and Procedure Data Protection and Information Security Policy and Procedure Document Detail Category: Data Protection Authorised By: Full Governing Body Author: School Business Manager Version: 1 Status: Approved May

More information

ADVISORY GUIDELINES FOR THE HEALTHCARE SECTOR 11 SEPTEMBER 2014

ADVISORY GUIDELINES FOR THE HEALTHCARE SECTOR 11 SEPTEMBER 2014 ADVISORY GUIDELINES FOR THE HEALTHCARE SECTOR 11 SEPTEMBER 2014 1 PART I... 4 1 Introduction... 4 PART II: APPLICATION OF THE DATA PROTECTION PROVISIONS TO SCENARIOS FACED IN THE HEALTHCARE SECTOR... 5

More information

Annual Continuing Education (ACE) (Print version) Information Privacy and I.T. Security and Compliance

Annual Continuing Education (ACE) (Print version) Information Privacy and I.T. Security and Compliance Annual Continuing Education (ACE) (Print version) Information Privacy and I.T. Security and Compliance Information Privacy and IT Security & Compliance The information in this module in addition to the

More information

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific

More information

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING Introduction and Policy Aim The Royal Borough of Windsor and Maidenhead (the Council) recognises the need to protect Council

More information

Findings from ICO audits and reviews of community healthcare providers. June 2013 to December 2014

Findings from ICO audits and reviews of community healthcare providers. June 2013 to December 2014 Findings from ICO audits and reviews of community healthcare providers June 2013 to December 2014 Introduction The Information Commissioner s Office (ICO) is the regulator responsible for ensuring that

More information

Internet and Phone Banking. Terms and Conditions and Important Information

Internet and Phone Banking. Terms and Conditions and Important Information Internet and Phone Banking Terms and Conditions and Important Information Effective Date: 20 March 2013 This booklet sets out terms and conditions for Bank of Melbourne Internet and Phone Banking, along

More information

Getting help and what to know if you ve been injured at work

Getting help and what to know if you ve been injured at work Getting help and what to know if you ve been injured at work Introduction If you ve been injured at work, this guide provides you with useful information to help you recover from your injury. Once you

More information

Photography and filming in schools Code of Practice

Photography and filming in schools Code of Practice Photography and filming in schools Code of Practice Data Protection compliance September 2010 Photography and filming in schools September 2010 1 Contents 1. About this code 3 2. Complying with the Data

More information

FastNet Business Terms and Conditions.

FastNet Business Terms and Conditions. FastNet Business Terms and Conditions. 31 August 2014 1. FastNet Business Internet Banking ( FastNet Business ) 1.1 These are the Terms and Conditions between you and us, which govern your use of FastNet

More information

Guidance on Requesting Personal Information.

Guidance on Requesting Personal Information. Guidance on Requesting Personal Information. The following is a guidance to help make sure you get everything you want and need from Vodafone, when you request your personal information. If you need help

More information

PRIVACY POLICY. comply with the Australian Privacy Principles ("APPs"); ensure that we manage your personal information openly and transparently;

PRIVACY POLICY. comply with the Australian Privacy Principles (APPs); ensure that we manage your personal information openly and transparently; PRIVACY POLICY Our Privacy Commitment Glo Light Pty Ltd A.C.N. 099 730 177 trading as "Lighting Partners Australia of 16 Palmer Parade, Cremorne, Victoria 3121, ( LPA ) is committed to managing your personal

More information

Privacy Policy. Federal Insurance Company, Singapore Branch Singapore Personal Data Protection Privacy Policy. 1. Introduction

Privacy Policy. Federal Insurance Company, Singapore Branch Singapore Personal Data Protection Privacy Policy. 1. Introduction Privacy Policy 1. Introduction Federal Insurance Company, Singapore Branch ( we, our or us ) recognise the importance of protecting the privacy and the rights of individuals in relation to their personal

More information

Applying the legislation

Applying the legislation Applying the legislation GUIDELINE Information Privacy Act 2009 Privacy breach management and notification A privacy breach occurs when there is a failure to comply with one or more of the privacy principles

More information

PACIFIC EXPLORATION & PRODUCTION CORPORATION (the Corporation )

PACIFIC EXPLORATION & PRODUCTION CORPORATION (the Corporation ) PRIVACY POLICY (Initially adopted by the Board of Directors on November 16, 2007) PACIFIC EXPLORATION & PRODUCTION CORPORATION (the Corporation ) The Corporation is committed to controlling the collection,

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

APPOMENSE HOPE FOR AFRICA PRIVACY POLICY

APPOMENSE HOPE FOR AFRICA PRIVACY POLICY APPOMENSE HOPE FOR AFRICA PRIVACY POLICY Appomense Hope for Africa respects your privacy Appomense Hope for Africa understands the importance of protecting personal information we receive from supporters

More information

MedTech32 RSD User Guide. New Zealand

MedTech32 RSD User Guide. New Zealand MedTech32 RSD User Guide New Zealand Date First Version 20 March 2002 Date Last Change 04 March 2009 Document Name RSD User Guide MedTech32 Document Version 1.2 Software Version MedTech32 version 15 Author

More information

Making a complaint in the independent healthcare sector. A guide for patients

Making a complaint in the independent healthcare sector. A guide for patients Contents 1. Introduction pages 3 5 2. Local Resolution Stage One pages 6 8 3. Complaints Review Stage Two page 9 4. Independent External Adjudication Stage Three pages 10 11 2 The Patients Association

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY DATA PROTECTION POLICY Document Control Information Title Data Protection Policy Version V1.0 Author Diana Watt Date Approved 21 February 2013 Review Date Annually, on the anniversary

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines

Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines (This document supersedes the document previously entitled MCFD Contractor Records Guidelines) Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines November

More information

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared; Page 1 National Organization of Alternative Programs 2014 NOAP Educational Conference HIPAA and Privacy Risks Ira J Rothman, CPHIMS, CIPP/US/IT/E/G Senior Vice President - Privacy Official March 26, 2014

More information

Casey State Bank Online Banking Agreement and Disclosure

Casey State Bank Online Banking Agreement and Disclosure Casey State Bank Online Banking Agreement and Disclosure Please carefully read this entire agreement and keep a copy for your records. By pressing the I ACCEPT button, you agree to the terms and conditions

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ("BA AGREEMENT") supplements and is made a part of any and all agreements entered into by and between The Regents of the University

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

Credit Union Code for the Protection of Personal Information

Credit Union Code for the Protection of Personal Information Introduction Canada is part of a global economy based on the creation, processing, and exchange of information. The technology underlying the information economy provides a number of benefits that improve

More information

Information Security Policy for Associates and Contractors

Information Security Policy for Associates and Contractors Policy for Associates and Contractors Version: 1.12 Status: Issued Date: 30 July 2015 Reference: 61418080 Location: Livelink Review cycle: Annual Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...

More information

Record Keeping. Guide to the Standard for Professional Practice. 2013 College of Physiotherapists of Ontario

Record Keeping. Guide to the Standard for Professional Practice. 2013 College of Physiotherapists of Ontario Record Keeping Guide to the Standard for Professional Practice 2013 College of Physiotherapists of Ontario March 7, 2013 Record Keeping Records tell a patient s story. The record should document for the

More information

DSHS CA Security For Providers

DSHS CA Security For Providers DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public

More information

Information Security Incident Management Policy September 2013

Information Security Incident Management Policy September 2013 Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective

More information

CONTRACT MANAGEMENT POLICY

CONTRACT MANAGEMENT POLICY CONTRACT MANAGEMENT POLICY Section Finance Approval Date 25/08/2014 Approved by Directorate Next Review Aug 2016 Responsibility Chief Operating Officer Key Evaluation Question 6 PURPOSE The purpose of

More information

USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY

USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY CONDITIONS OF USE FOR ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY Between: the Commonwealth of Australia, acting

More information

PRINCIPLE IV: THE SOCIAL WORK AND SOCIAL SERVICE WORK RECORD

PRINCIPLE IV: THE SOCIAL WORK AND SOCIAL SERVICE WORK RECORD PRINCIPLE IV: THE SOCIAL WORK AND SOCIAL SERVICE WORK RECORD The creation and maintenance of records by social workers and social service workers is an essential component of professional practice. The

More information

Information Services. Protecting information. It s everyone s responsibility

Information Services. Protecting information. It s everyone s responsibility Information Services Protecting information It s everyone s responsibility Protecting information >> Contents >> Contents Introduction - we are all responsible for protecting information 03 The golden

More information

This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business.

This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. FSA factsheet for All firms This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. It explains: What you should

More information

Psychologist s records: Management, ownership and access. APS Professional Practice

Psychologist s records: Management, ownership and access. APS Professional Practice Psychologist s records: Management, ownership and access APS Professional Practice October 2012 Copyright 2012 Psychologist s records: Management, ownership and access Table of Contents Executive summary...

More information

Direct Recruitment Privacy Policy

Direct Recruitment Privacy Policy Direct Recruitment Privacy Policy Direct Recruitment manages personal information in accordance with the Privacy Act 1988 and Australian Privacy Principles (APP). This policy applies to information collected

More information

Standard Terms of Engagement. and. Terms of Business

Standard Terms of Engagement. and. Terms of Business Standard Terms of Engagement and Terms of Business Contents 1. Standard Terms of Engagement of Keirs Carr... 4 1.1 Accounting Services... 4 Accounting Services... 4 Compilation of Financial Statements...

More information

Human Resources Policy documents. Data Protection Policy

Human Resources Policy documents. Data Protection Policy Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and

More information

Police Financial Services Limited Copyright exists in this document Privacy Policy 1

Police Financial Services Limited Copyright exists in this document Privacy Policy 1 Privacy January 2015 Policy Police Financial Services Limited ABN 33 087 651 661 ('we', 'us', 'our', BankVic ) is bound by the Australian Privacy Principles under the Privacy Act 1988 (Cth) (Privacy Act).

More information

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed

More information

Pacific Smiles Group Privacy Policy

Pacific Smiles Group Privacy Policy Pacific Smiles Group Privacy Policy Pacific Smiles Group Limited and its related bodies corporate (PSG, we, our, us) recognise the importance of protecting the privacy and the rights of individuals in

More information

Information Management Handbook for Schools. Information Management Handbook for Schools London Borough of Barnet

Information Management Handbook for Schools. Information Management Handbook for Schools London Borough of Barnet Information Management Handbook for Schools London Borough of Barnet Document Name Document Description Information Management Handbook for Schools This document is intended for use by Barnet Borough Schools.

More information

DATA PROTECTION CORPORATE POLICY

DATA PROTECTION CORPORATE POLICY DATA PROTECTION CORPORATE POLICY Information Management V1.1 03 July 2012 Not protectively marked This policy must be complied with fully by all Members, Officers Agents and Contractors of Plymouth City

More information

Data protection. Report on the data protection guidance we gave schools in 2012

Data protection. Report on the data protection guidance we gave schools in 2012 Data protection Report on the data protection guidance we gave schools in 2012 Contents 1. Background 2. Summary of recommendations 3. tification 4. Personal data 5. Fair processing 6. Information security

More information

Good Practice in Records Management and Information Security

Good Practice in Records Management and Information Security Good Practice in Records Management and Information Security BELB LJ Schools 2013 How Valuable are Records & Documents? Valuable only because of the information they contain. Usable if they can be accessed

More information

Application to access Chesters Trade

Application to access Chesters Trade Application to access Chesters Trade Please fill in all details below: Account Number Company Name Company Phone Number Fax Number Contact Name Mobile Number Email Address Please review the Terms of Use

More information

Data Protection Policy June 2014

Data Protection Policy June 2014 Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:

More information

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS 1 DISCLAIMER Please review your own documentation with your attorney. This information

More information

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September

More information

BERKELEY COLLEGE DATA SECURITY POLICY

BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data

More information

How To Share Your Health Records With The National Health Service

How To Share Your Health Records With The National Health Service HOW WE USE YOUR PERSONAL INFORMATION Information Leaflet Your Health. Our Priority. Page 2 of 9 Introduction This Leaflet explains why the NHS collects information about you and how it is used, your right

More information

Privacy and Security Resource Materials for Saskatchewan EMR Physicians: Guidelines, Samples and Templates. Reference Manual

Privacy and Security Resource Materials for Saskatchewan EMR Physicians: Guidelines, Samples and Templates. Reference Manual Privacy and Security Resource Materials for Saskatchewan EMR Physicians: Guidelines, Samples and Templates Guidelines on Requirements and Good Practices For Protecting Personal Health Information Disclaimer

More information

Data Security and Extranet

Data Security and Extranet Data Security and Extranet Derek Crabtree Schools ICT Support Manager derek.crabtree@merton.gov.uk Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:

More information

ONLINE EXPRESS INTERNET BANKING CUSTOMER AGREEMENT

ONLINE EXPRESS INTERNET BANKING CUSTOMER AGREEMENT ONLINE EXPRESS INTERNET BANKING CUSTOMER AGREEMENT This Agreement is entered into between Farmers Trust & Savings Bank (the "Bank") and any customer of the Bank who subscribes to the Bank s Online Express

More information

1. (a) Full name of proposer including trading names if any (if not a limited company include full names of partners) Date established

1. (a) Full name of proposer including trading names if any (if not a limited company include full names of partners) Date established Network Security ProPosal Form Important Please answer all questions from each section and complete in block capitals. Tick the appropriate boxes where necessary and supply any further information requested.

More information

ANZ Expense Manager TERMS AND CONDITIONS 03.10

ANZ Expense Manager TERMS AND CONDITIONS 03.10 ANZ Expense Manager TERMS AND CONDITIONS 03.10 Contents 1 Introduction 4 2 Defined Terms 4 2.1 Interpretation 7 2.2 Customer More Than One Person 8 3 Provision of ANZ Expense Manager 8 4 ANZ Expense Manager

More information

Mobility and Young London Annex 4: Sharing Information Securely

Mobility and Young London Annex 4: Sharing Information Securely Young London Matters April 2009 Government Office For London Riverwalk House 157-161 Millbank London SW1P 4RR For further information about Young London Matters contact: younglondonmatters@gol.gsi.gov.uk

More information

Internal Control Guide & Resources

Internal Control Guide & Resources Internal Control Guide & Resources Section 5- Internal Control Activities & Best Practices Managers must establish internal control activities that support the five internal control components discussed

More information

1.2 Scope This policy and guidance applies to all University staff, students and others who use or process any personal information.

1.2 Scope This policy and guidance applies to all University staff, students and others who use or process any personal information. MANCHESTER METROPOLITAN UNIVERSITY DATA PROTECTION POLICY This policy should be read in conjunction with the Data Protection Guidance, which is attached as: Appendix A Dealing with Personal Data Appendix

More information

INTERNATIONAL SOS. Data Protection Policy. Version 1.05

INTERNATIONAL SOS. Data Protection Policy. Version 1.05 INTERNATIONAL SOS Data Protection Policy Document Owner: LCIS Division Document Manager: Group General Counsel Effective: December 2008 Revised: 2015 All copyright in these materials are reserved to AEA

More information

Dublin City University

Dublin City University Dublin City University Data Protection Policy Data Protection Policy Contents Purpose... 1 Scope... 1 Data Protection Principles... 1 Disclosure of Personal Data... 2 Summary of Responsibilities... 3 Rights

More information

We are committed to keeping your information safe. We use appropriate security measures and technology to protect your personal information.

We are committed to keeping your information safe. We use appropriate security measures and technology to protect your personal information. Privacy at Focus Metals Pty Limited Privacy policy Focus Metals Pty Limited (ACN 007 788 150) (ABN 51 007 788 150) L8, 350 Collins, Melbourne Victoria Australia 3000 Email: admin@focusmetals.com.au Telephone:

More information

Understanding Your MyVedaScore Rating. An overview of what your VedaScore Rating means to you

Understanding Your MyVedaScore Rating. An overview of what your VedaScore Rating means to you Understanding Your MyVedaScore Rating An overview of what your VedaScore Rating means to you April 2012 Contents What is a VedaScore Rating?...2 On its own, does my VedaScore Rating determine whether I

More information

Everyone in the workplace has a legal duty to protect the privacy of information about individuals. AEP/BELB/LJ/2010 Awareness Session

Everyone in the workplace has a legal duty to protect the privacy of information about individuals. AEP/BELB/LJ/2010 Awareness Session Everyone in the workplace has a legal duty to protect the privacy of information about individuals AEP/BELB/LJ/2010 Awareness Session During 2007 alone, 36,989,300 people in the UK have had their private

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3

More information

Data and Information Security Policy

Data and Information Security Policy St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration

More information

Merthyr Tydfil County Borough Council. Data Protection Policy

Merthyr Tydfil County Borough Council. Data Protection Policy Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the

More information

Privacy and Security Standards

Privacy and Security Standards Page 1 of 19 Course 13 Topic: 01 Page: 01 Course Introduction 1 of 3 Introduction Text Description of Image or Animation Long Description: Animation. Welcome to the Course. The Department of Health & Human

More information

INFORMATION SHARING AGREEMENT. Multi-Disciplinary Team (MDT): Service Information Sharing

INFORMATION SHARING AGREEMENT. Multi-Disciplinary Team (MDT): Service Information Sharing INFORMATION SHARING AGREEMENT Multi-Disciplinary Team (MDT): Service Information Sharing SCOPE NAME OF LEAD Multi-Disciplinary Team (MDT) for high risk people: this agreement is for the patient and management

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Guide to completing this claim form

Guide to completing this claim form Credit Card Insurance Claim Form Guide to completing this claim form For each type of claim there are different requirements and different sections of this form that you need to complete. To help us process

More information

PRIVACY AND CREDIT REPORTING POLICY

PRIVACY AND CREDIT REPORTING POLICY R.A.C.V. Finance Limited PRIVACY AND CREDIT REPORTING POLICY Page 1 Contents 1. Introduction to RACV Finance Privacy and Credit Reporting Policy (the Policy ). 3 2. The Legislative Framework... 3 3. Types

More information

Safe Haven Procedure. Final. Date Issued March 2009 Review Date March 2010 NHS East Midland Employees. Safe Haven Procedure: v1.

Safe Haven Procedure. Final. Date Issued March 2009 Review Date March 2010 NHS East Midland Employees. Safe Haven Procedure: v1. Safe Haven Procedure Final Version 1.0 (Final) Ratified By Executive Team Originator/Author Fabian Henderson Date Issued March 2009 Review Date March 2010 Target NHS East Midland Employees Safe Haven Procedure:

More information