A Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail including Generic Mailboxes
|
|
- Roderick Logan
- 8 years ago
- Views:
Transcription
1 A Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail including Generic Mailboxes
2 Contents 1 Introduction 3 2 NHSmail Acceptable Use Policy 3 3 Objectives 4 4 General Principles 4 5 Caldicott Principles 5 6 Format for 5 7 Roles and Responsibilities 6 8 Relevant Documentation 10 9 Standard Operating Procedure (SOP) Development 10 2
3 1 Introduction NHSmail is a national and directory service, provided free of charge for NHS staff and developed specifically to meet BMA requirements for clinical between NHS organisations. In addition to having all of the facilities associated with a professionally managed local service, it has the facility of Generic Mailboxes, which for clinical services, supports patient identifiable data flows, and for non-clinical departments supports the transfer of sensitive information. The establishment of a secure service through NHSmail gives us the opportunity to use this service to send any sensitive information to other NHS colleagues. The NHSmail service uses encryption and other security measures to ensure that the information is protected in transmission, from the sender pressing the "send" button to the recipient opening the mail. The transmission of the information is only one part of the process, the steps taken before and after the transmission have to be clear and people's responsibilities have to be established to ensure that the security of this sensitive information is maintained throughout the process. All users agree to the terms and conditions of the Acceptable Use Policy upon registering their NHSmail account 2 NHSmail Acceptable Use Policy As part of the registration you must explicitly agree to abide by the Acceptable Use Policy (AUP). If you do not abide by the AUP then you may have your account suspended or closed. The NHSmail Team reserve the right to update the Acceptable Use Policy document as necessary. The Acceptable Use Policy can be accessed from within the NHSmail website by means of a link at the bottom of every page within the Tools view and the Folders view. A current copy is enclosed. Processes must be in place within the pharmacy to ensure that any changes made as detailed above are identified, communicated appropriately and acted upon when necessary. 3
4 3 Objectives The objectives of this document are to; 1. Define the purpose of sending sensitive information by 2. Define the roles and responsibilities of those involved 3. Provide a framework, which will ensure that the confidentiality of patient information is maintained. 4 General Principles The general principles which underpin the use of NHSmail are as follows: 1. The information will only be accessed by a restricted number of staff who have been made aware of the confidential nature of the data. 2. The staff will be given access to a minimum of information containing only information agreed in this document. 3. Patient identifiable information will be considered as strictly confidential. 4. Breaches of confidentiality will be considered as contravention of Caldicott Guidelines and the Data Protection Act There must be a Standard Operating Procedure (SOP) in place to cover all aspects of the management and use of with particular reference to maintenance of confidentiality. The maintenance of this SOP will be the responsibility of named Generic Mailbox Owner(s). 4
5 5 Caldicott Principles The following Caldicott Principles must be adhered to when handling patient identifiable and confidential information: Justify the purpose: every proposed use or transfer of patient identifiable information within or from another organisation should be clearly defined Do not use patient identifiable information unless it is absolutely necessary: patient identifiable information items should not be used unless there is no alternative. Use the minimum necessary patient identifiable information: where use of patient identifiable information is considered to be essential each individual item of information should be justified with the aim of reducing identification. Access to patient identifiable information should be restricted on a strict need to know basis: only those individuals who need access to patient identifiable information should have access to it and they should only have access to the information items they need to see. Everyone should be aware of their responsibilities: action should be taken to ensure that all staff are aware of their responsibilities and obligations to respect patient confidentiality. Understand and comply with the law: collection and every use of patient identifiable information must be lawful. 6 Format for The message must be identifiable for what it is, so that the recipient can identify it easily and take subsequent action. Sending Party: Message Title: Message Body: Attached Documents: All sending accounts used in community pharmacy must Specify a title to help identification e.g. " Prescriptions for collection from ABC Medical practice" Specify the purpose of the message and fully identify the sender name and contact details by means of an added standard signature. Describe the documentation that will be sent specifying the title and format of the documents to help identification e.g. "NHS Lothian ABC 5
6 7 Roles & Responsibilities 7.1 Personnel details/generic Mailbox (GM) access changes Those communicating and administering clinical workflows must have valid up-to-date directory entries that clearly describe role and function within the pharmacy. When the pharmacy GM was initially created, the details of all staff members authorised to have access was uploaded to the national NHSmail Directory. To enable updating of the NHSmail directory entries and to ensure pharmacy confidentiality, it is vital that any change to staff GM access is recorded and reported promptly. When a new member of staff joins the pharmacy they may require an NHSmail account and access to the pharmacy Generic Mailbox. When an existing member of staff leaves the pharmacy their access to the GM must be removed It is the responsibility of the GM owner to inform the health board LOA (Local Area Administrator) of all changes in a timely manner. Should there be changes to the GM owner it is the responsibility of the current GM owner to initiate all the changes required. The GM owner should contact NHS Lothian Local Authority Administrator (LOA) by directory.services@nhslothian.scot.nhs.uk and provide the following information New Member of Staff Full Name(including any middle initials) Job title - Position in Pharmacy Contractor Code Pharmacy Name Previous Contractor Code (if applicable) Previous Pharmacy name (if applicable) Staff member leaving Full Name(including any middle initials) Job title - Position in Pharmacy Contractor Code Pharmacy Name Remove from pharmacy GM Remove from Lothian directory (if applicable) Directory services operating hours are Monday Friday Changes will be processed the same day if received before noon and the next working day if received in the afternoon. 6
7 7.2 Access responsibility It is essential that all communications, including electronic mail in the pharmacy Generic Mailbox, are dealt with in a timely manner and acted upon as required. For this reason the GM must be checked at least three times daily spread across the working day. Nominated member(s) of staff should be allocated this task and at least one member of staff with this responsibility should be on duty throughout the pharmacy hours of business. NB. Staff authorised to access more than one pharmacy GM (e.g. locums and relief pharmacists), must ensure that they access the correct GM for the pharmacy in which they are working on that day. In extraordinary circumstances e.g. if no nominated member(s) of staff is on the pharmacy premises, clear instructions should be left to allow the Responsible pharmacist on duty to be able to access and use the locum account. The Locum Account log in and password must be stored securely and a documented process should be in place to ensure that if it has been used the NHS Lothian LOA is informed in order that a new password for the Locum account is issued. The LOA should be informed by directory.services@nhslothian.scot.nhs.uk on the next working day. Please provide the following information: Name of Pharmacy Contractor Code Lead Pharmacist Name and Pharmacy Address A letter will then be sent to the Lead Pharmacist/GM owner containing the new account password for the reset Locum account in a sealed envelope to be stored securely ready for use should further extraordinary circumstances occur. 7.3 IT security rules To ensure the security and confidentiality of GM data at all times, NHSmail personal passwords must not be shared. (see NHSmail Acceptable Use Policy. NB The section detail is subject to change therefore always access the most up to date version on-line from within the NHSmail website by means of the link at the bottom of every page within the Tools view and the Folders view.) 7
8 7.4 Sending As a Sender you must have processes to define How the information will be prepared and by whom When the information will be sent To whom the information will be sent How each outcome is dealt with i.e acknowledgement, lack of acknowledgement, incorrect recipient, failure of transmission Arrangements to cover times of absence. For the purposes of audit, it is important that users sending mail from the GM are identified appropriately. A signature including pharmacy address, phone and fax numbers must be included in outgoing messages as standard. The name of the message creator must also be added with Patient Identifiable Information NHSmail encrypts messages in transit, however content could be read by unauthorised personnel, before it is sent and/or after it has arrived at its destination. Procedures must be put in place to ensure the security of information while held on the pharmacy computer systems at both ends of the transmission. When sending patient identifiable information the Caldicott Principles must be considered (See Section 5 of this document) Clinical information should not be sent as an attachment unless a process has been agreed by the sender and the recipient. This process has to be agreed in advance of any communication. 8
9 7.5 Receiving As a Recipient you must have processes to define How acknowledgement of receipt will be done What is to be done with the information on receipt: print, store, copy To whom the information is to be made available following receipt How each outcome is dealt with i.e. need for acknowledgement, lack of receipt, incorrect receipt failure of transmission situations. Arrangements to cover times of absence Mail received into a Generic Mailbox must not remain there indefinitely i.e. opened mail should not be stored in the GM, it must be read and dealt with as appropriate. GM Owners must define a storage policy for mail which needs to be retained e.g. separate folders for different types of mail can be set up and actioned mail stored there. Items no longer required should be deleted, with the Deleted Items folder cleared regularly. All mail held in NHSmail counts towards the allocated storage capacity quota. GMs are allocated a 200Mb quota. Failure to manage this quota will result in inability to send or receive mail. is a method of communication, not a storage facility. NB Documents saved in the My Documents area of a PC are not encrypted therefore business related communication would be at risk in the event of a hard-drive theft Due to lack of encryption, NO patient identifiable or clinical information should be saved into the My Documents area of the PC In the event of a hard-drive failure, all documentation saved in My Documents would be lost if not backed up elsewhere All pharmacies should have a policy for the secure storage of confidential data and the storage of should be within this policy. 9
10 8 Relevant Documentation This framework has been drawn up taking into account the following Guidance documents; Caldicott Report as adopted by NHS Scotland. NHS Scotland Good Practice May Good-Practice-Guide-May-2012.doc.pdf NHS Scotland Information Security Policy %20Policy%20and%20Standards.htm#_Toc Standard Operating Procedure A Standard Operating Procedure (SOP) for the operation and management of the Generic Mailbox must be developed and NHS Lothian PCCO informed that this is in place and is operational. The GM owner has responsibility to ensure that this SOP is maintained and updated when any change is made to NHSmail or to processes within the pharmacy. Useful contacts Connection Issues: A problem with the pharmacy N3 connection will result in an inability to access the NHSmail web address. A check should be made to establish if other web sites can be accessed e.g. BBC, Google. If the pharmacy has lost Internet connection, a call should be raised with the epharmacy Helpdesk on specific issues contact : NHS Lothian ehealth Service Desk on Service-Desk.ehealth@nhslothian.scot.nhs.uk 10
Email Services Policy
Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages
More informationGuidance for sending and receiving an encrypted NHSmail e-mail
Contents Guidance for sending and receiving an encrypted NHSmail e-mail Introduction 2 Sending an encrypted e-mail to a VERIFIED e-mail address 2 Receiving an encrypted e-mail 4 Reply to and forward encrypted
More informationPolicy Document Control Page
Policy Document Control Page Title Title: Electronic Mail Policy Version: 5 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version
More informationBorough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments
Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments V8 Contents What is Encryption?...3 Why do I need to know about it?...3 How do I use it?...3 What
More informationPolicy Document Control Page. Updated to include new NHS mail encryption feature
Policy Document Control Page Title Title: Electronic Mail Policy Version: 6 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version
More informationSafe Haven Policy. Equality & Diversity Statement:
Title: Safe Haven Policy Reference No: 010/IT Owner: Deputy Chief Officer Author Information Governance Lead First Issued On: November 2012 Latest Issue Date: March 2015 Operational Date: March 2015 Review
More informationSafe Haven Procedure. Final. Date Issued March 2009 Review Date March 2010 NHS East Midland Employees. Safe Haven Procedure: v1.
Safe Haven Procedure Final Version 1.0 (Final) Ratified By Executive Team Originator/Author Fabian Henderson Date Issued March 2009 Review Date March 2010 Target NHS East Midland Employees Safe Haven Procedure:
More informationBest practice guidance for information security within Choose and Book May 2009
Best practice guidance for information security within Choose and Book May 2009 Best practice guidance for information security within Choose and Book This guidance has been prepared to help organisations
More informationGCSx Email Guide for Internal Users. How to send sensitive business and personal information securely
GCSx Email Guide for Internal Users How to send sensitive business and personal information securely Document control Description Version V.2 Created May 2013 GCSx Email Guide for Internal Users Status
More informationMobility and Young London Annex 4: Sharing Information Securely
Young London Matters April 2009 Government Office For London Riverwalk House 157-161 Millbank London SW1P 4RR For further information about Young London Matters contact: younglondonmatters@gol.gsi.gov.uk
More informationCONTACTING SERVICE USERS BY TEXT MESSAGES (SMS) POLICY
CONTACTING SERVICE USERS BY TEXT MESSAGES (SMS) POLICY POLICY NUMBER 098/Corporate POLICY VERSION 1 RATIFYING COMMITTEE Information Governance Group DATE RATIFIED May 2012 DATE OF EQUALITY & HUMAN RIGHTS
More informationRecipients Guide for Email Encryption Version 1.2
Recipients Guide for Email Encryption Version 1.2 Document Location n/a Copies can be requested from the IT Dept 01603 50 8622 Revision Previous Revision by Summary of Changes Version date revision date
More informationReceiving Secure Email Customer Support frequently asked questions
Registering a Secure Password Q. Where do I find the current Secure email guidance documentation? A. Published on Glasgow City Council website. Q. My organisation has its own email encryption tool, do
More informationEmail Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:
Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury
More informationSecure Mail Registration and Viewing Procedures
Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email
More informationPersonal Data Handling and Sharing Policy
Personal Data Handling and Sharing Policy Originator Richard Gibson Date 20 June 2012 Verifier Lynda Oliver Date 20 June 2012 Reviewed Richard Gibson, Lynda Oliver Date July 2013 Contents Page 1. Introduction
More informationSafe Haven Procedure for the Secure Transmission of Personally Identifiable Information
Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information Im&t directorate\policies\approved ig policiesprocedures.1 Index 1. Purpose... 3 2. Introduction... 3 3. Scope...
More informationIT Operations User Access Management Policies
1. Approval and Authorisation Completion of the following signature blocks signifies the review and approval of this Process (signed copy held in safe) Name Job Title Signature Date Authored by:-
More informationSecure Transfer of Information Guidance for staff
Secure Transfer of Information Guidance for staff Document number CCG.GOV.013.1.1 Version: 1.1 Ratified by: NHS Bury CCG Quality and Risk Committee Date ratified: 8 th January 2014 Name of originator /author
More informationPOLICY DOCUMENT. Policy on Mobile / Portable Computing Devices and Data Security. Release: Final Date Created: 3 March 2009
POLICY DOCUMENT Policy on Mobile / Portable Computing Devices and Data Security Release: Final Date Created: 3 March 2009 Owner: David Priest Compiled by: David Priest Document Reference: Page 1 of 8 Printed:
More informationAs a System user you need to be informed of the following issues that are governed by Trust policies and by law. Password Control Page 2
JAC MEDICINES MANAGEMENT CLINICAL DATA SYSTEM SECURITY DOCUMENT It is very important that information on JAC is kept secure from unauthorised access and that no one is able to use the system that has not
More informationPolicy Document Control Page
Policy Document Control Page Title Title: Policy for the electronic transfer of Person Identifiable Data - harmonised Version: 5 Reference Number: CO51 Supersedes Supersedes: 4 Description of Amendment(s):
More informationBOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy
BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy
More informationSecure Storage, Communication & Transportation of Personal Information Policy Disclaimer:
Secure Storage, Communication & Transportation of Personal Information Policy Version No: 3.0 Prepared By: Information Governance, IT Security & Health Records Effective From: 20/12/2010 Review Date: 20/12/2011
More informationInformation Governance
Information Governance Information for Patients Information Governance (IG) Contents: Identifying the IG Lead for the Practice. This identifies the main people responsible for Information Governance Policy.
More informationData Transfer Policy. Data Transfer Policy London Borough of Barnet
Data Transfer Policy Data Transfer Policy London Borough of Barnet Document Control POLICY NAME Data Transfer Policy Document Description Policy surrounding data transfers (electronic and paper based).
More informationAccessing Personal Information on Patients and Staff:
Accessing Personal Information on Patients and Staff: A Framework for NHSScotland Purpose: Enabling access to personal and business information is a key part of the NHSScotland Information Assurance Strategy
More informationEmail Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
More informationData Encryption Policy
Data Encryption Policy Please be aware that this printed version of the Policy may NOT be the latest version. Staff are reminded that they should always refer to the Intranet for the latest version. Purpose
More informationTrust Advantages and Disadvantages of Using Intranet
Policy No: OP17 Version: 6.0 Name of Policy: Internet, Intranet and Email Acceptable Use Policy Effective From: 04/08/2015 Date Ratified 04/03/2015 Ratified Health Informatics Assurance Committee Review
More informationNHSmail mobile configuration guide Apple iphone
Only the Apple iphone 3GS and iphone 4 support encryption at rest. The iphone 3G and iphone 2G will not connect to NHSmail NHSmail mobile configuration guide Apple iphone Version: V.6 Date: November 2011
More informationE-Mail, Calendar and Messaging Services Good Practice Guideline
E-Mail, Calendar and Messaging Services Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0017.01 Prog. Director Mark Ferrar Status
More information* NOTE - When accessing the digital version of this file, click on the page number to skip to that section of the document.
Health and Social Care E-mail Encryption Guide for Contractors Section Page 1. Introduction 1 2. Pre-requisites 2 3. Caveats 2 4. Recipient registering with the HSC Secure Email Service 3 5. Recipient
More informationEJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8
EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 External Users Decrypting Secure Messages The following sections describe how users external to EJGH receive and decrypt secure messages. Reading
More informationFDIC Secure Email Procedures for External Users April 23, 2010
FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving
More informationOxCCARE Information Governance Policy
OxCCARE Information Governance Policy Introduction: This document is intended to act as a practical guide to information governance (IG) for all research, audit, quality improvement and service evaluation
More informationRemote Data Extraction Policy and Procedure
Remote Data Extraction Policy and Procedure Prepared by PRIMIS June 2015 The University of Nottingham. All rights reserved. Contents 1. Introduction... 3 2. Purpose and scope... 3 3. Policy Statement...
More informationE Mail Encryption End User Guide
E Mail Encryption End User Guide TABLE OF CONTENTS Why Use Email Encryption... 2 What is a Registered Envelope... 2 Features & Benefits... 2 Security Policies... 2 How to Compose and Send an Encrypted
More informationName of responsible committee: Information Governance Board Date issued: 15 th April 09 Review date: 14 th April 11 Referenced Documents:
Storage and Transfer of Person Identifiable Information Policy Trust Wide Policy number: ULH-IM&T-AUP03 Version: 1.1 New or Replacement: New Approved by: Executive Board Date approved: 14 th April 09 Name
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationElectronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
More informationIntroduction to the NHS Information Governance Requirements
Introduction to the NHS Information Governance Requirements 2 Version April 2014 Information Governance ensures necessary safeguards for, and appropriate use of, patient and personal information. The widely
More informationHulme Hall Medical Group
Beacon Practice for Patient Online Hulme Hall Medical Group Fax and Emailing Handling Policy Written By: Joanne Revell Signed: Authorised by: Anna Webster Signed: Job Title: Practice Manager CQC Lead Effective
More informationEmail Encryption. Cisco Ironport. using. Click here to begin
Email Encryption using Cisco Ironport Click here to begin Contents Sending an encrypted email Receiving an encrypted email - Registering with Cisco - Opening the email (after registration) Replying to
More informationInformation governance
Information governance Staff handbook RDaSH 88 02 Information governance Introduction to information governance Overview 88 03 Information governance or IG - includes information security and confidentiality,
More informationUC Irvine Health Secure Mail Message Center
UC Irvine Health Secure Mail Message Center UC Irvine Health is committed to protecting the privacy of its member s information, especially their protected health information (PHI). UC Irvine Health is
More informationNHS Business Services Authority Registration Authority and Smartcard Management Procedure
NHS Business Services Authority Registration Authority and Smartcard Management Procedure NHS Business Services Authority Corporate Secretariat NHSBSAIS005 Issue Sheet Document reference Document location
More informationIG Toolkit Version 8. Information Security Assurance. Requirement 322. Detailed Guidance on Secure Transfers
IG Toolkit Version 8 Information Security Assurance Requirement 322 Detailed Guidance on Secure Transfers IG Toolkit Version 8 Requirement 322: Detailed guidance on secure transfers Page 1 of 7 All transfers
More informationyour hospitals, your health, our priority STANDARD OPERATING PROCEDURE: Safe Haven Procedure TW10-110 SOP 3 SOP NO: VERSION NO:
STANDARD OPERATING PROCEDURE: Safe Haven Procedure SOP NO: VERSION NO: APPROVING COMMITTEE: DATE THIS VERSION APPROVED: TW10-110 SOP 3 3 Information Governance Committee July 2013 RATIFYING COMMITTEE:
More informationE-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:
E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:
More informationWord Secure Messaging User Guide. Version 3.0
Word Secure Messaging User Guide Version 3.0 Copyright 2007-2013 WordSecure, LLC. All Rights Reserved. Page 1 of 7 1. Introduction Word Secure Messaging is a program that allows you to exchange encrypted
More informationNHS Information Governance: 2010/11 UPDATE
NHS Information Governance: 2010/11 UPDATE JANUARY 2011 Contents Outline of the Changes Quick reference to additional evidence requirements Guide to using the online Toolkit Frequently asked questions
More informationEncrypt and Send Email Guide for Internal Users. How to send business or personally sensitive emails securely
Encrypt and Send Email Guide for Internal Users How to send business or personally sensitive emails securely Document control Description Encrypt and Send Email Guide for Internal Users Version V.2 Created
More informationFacilities and Safety How-To Guide: Accessing and Using Your UCF Webmail Account
Launch Internet Explorer Click on the Internet Explorer icon at the bottom left of the computer screen. Go to the UCF Webmail Website 1. In the address bar at the top of the screen, type webmail.ucf.edu.
More informationCOVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access
More informationNHSmail and mobile devices overview
NHSmail and mobile devices overview Version: V.7 Date: May 2011 THIS INFORMATION IS FOR NHS STAFF AND IS NOT TO BE DISTRIBUTED OR COPIED OUTSIDE OF THE NHS Version 7 Crown Copyright, May 2011 Contents
More informationHoneywell Secure Email External User Guide August 2013
Honeywell Secure Email External User Guide August 2013 PAGE: 1 of 14 Chapter No Table of Content Page No 1 Introduction 3 2 Using the Honeywell Secure Email Interface 3 3 Sending an Encrypted Email to
More informationInformation Sharing Policy
Information Sharing Policy REFERENCE NUMBER IG 010 / 0v3 February 2013 VERSION V1.0 APPROVING COMMITTEE & DATE Clinical Executive Committee 5.2.13 REVIEW DUE DATE February 2016 West Lancashire CCG is committed
More informationYMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY
YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September
More informationSECURE Email User Guide
SECURE Email User Guide Receiving SECURE Email from Starion Financial Starion Financial is now offering an enhanced email encryption tool, IronPort PXE, which enables the email communication of sensitive
More informationHow To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
More informationOrbital ATK Secure Email: Receiving Encrypted Messages. Why Orbital ATK Secure Email? Initial Email: Orbital ATK Secure Email Notification
Orbital ATK Secure Email: Receiving Encrypted Messages This document is intended for Orbital ATK Employees, Partners & Clients as an introduction & instructional user guide for Orbital ATK Secure Email.
More informationHuman Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
More informationThe aim of this package is to act as online support for all staff that requires Information Governance (IG) training.
Information Governance e-learning User Guide The aim of this package is to act as online support for all staff that requires Information Governance (IG) training. Contents Page Title 2 Overview 2 Modules
More informationPolicy Document Control Page
Policy Document Control Page Title Title: Data Protection Policy Version: 3 Reference Number: CO59 Keywords: Data, access, principles, protection, Act. Data Subject, Information Supersedes Supersedes:
More informationNHS Mail User Guide Guidance on the use of NHSmail for new users AJ O'connell (Sussex HIS) 05/11/2012 V1_4
NHS Mail User Guide Guidance on the use of NHSmail for new users AJ O'connell (Sussex HIS) 05/11/2012 V1_4 NHS Mail User Guide Information Link: www.nhs.net NHS mail is an Encrypted Email system used by
More information2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
More informationNHS Mail Basic Training Guide
Royal Derby Hospital 2011 Education, Training and Development I.T. Training Department NHS Mail Basic Training Guide Version 3.1 ND 05/11 No amendments should be made to the document without the Authors
More informationHow To Send An Encrypted Email To The State From The Outside (Public)
Section 1. How to Send an Encrypted E-mail from the Private Network/State Employee The following conditions must be true to send an encrypted e-mail using Proofpoint e-mail encryption: Your State Agency
More informationAcceptable Use Policy
Acceptable Use Policy Recommending Committee: Approving Committee: Information Governance Steering Group Patient Safety & Experience Council Signature: Designation: Chief Executive Date: Version Number:
More informationUsing Your New Webmail
Using Your New Webmail Table of Contents Composing a New Message... 2 Adding Attachments to a Message... 4 Inserting a Hyperlink... 6 Searching For Messages... 8 Downloading Email from a POP3 Account...
More informationEmployer s Reference Manual Chapter 19. Public School Employees Retirement System. Employers Reference Manual Chapter 19 Revised: 2/26/2015 i
Employer s Reference Manual Chapter 19 Public School Employees Retirement System 5 N. 5th Street Harrisburg PA 17101 1905 Phone 1.866.353.1844 Fax 717.772.3860 Email ContactESC@state.pa.us www.psers.state.pa.us
More informationINFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE
More informationEmail Policy. Information Steering Group. Version Author Date Reason for review 0.0 Andrew Thomas July 2013 0.1 Neil Taylor August 2013
Email Policy Author(s) Andrew Thomas Version 1.0 Version Date 21 August 2013 Implementation/approval Date 14 August 2013 Review Date August 2014 Review Body Information Steering Group Policy Reference
More informationPolicies & Procedures
Policies & Procedures Author: Department of Health Records Owner: Head of Health Records Policy Name: Access to CHI 24 Policy No: HRECS/PP/40 Release Date: November 2015 (Version 1.3) Review Date: November
More informationInformatics Policy. Information Governance. Network Account and Password Management Policy
Informatics Policy Information Governance Policy Ref: 3589 Document Title Author/Contact Document Reference 3589 Document Control Network Account Management and Password Policy Pauline Nordoff-Tate, Information
More informationFile Dropbox Service
Information Services What is it? The dropbox service provides a means of sending and receiving very large files. Information Services recommends that you do not send files larger than 5MB via e-mail because
More informationNHSmail mobile configuration guide Android mobile devices
NHSmail mobile configuration guide Android mobile devices Version: V.6 Date: September 2011 THIS INFORMATION IS FOR NHS STAFF AND IS NOT TO BE DISTRIBUTED OR COPIED OUTSIDE OF THE NHS Version 6.0 Crown
More informationOutlook Operating Instructions. Internal Desktop Access
Outlook Operating Instructions Internal Desktop Access OUTLOOK OPERATING INSTRUCTIONS (INTERNAL DESKTOP ACCESS) FREQUENTLY ASKED QUESTIONS & ANSWERS Q: How do I check my email while on campus? A: Click
More informationINFORMATION SECURITY POLICY
INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment
More informationEmailing and Texting with Patients
Emailing and Texting with Patients Trust Board Meeting - Part 1 Item: 8.4 25 September 2013 Enclosure: I Purpose of the Report: This paper explores the use of email and texting in certain forms of communication
More informationA Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2
More informationNASH PKI Certificate for Healthcare Provider Organisations renewal confirmation
NASH PKI Certificate for Healthcare Provider Organisations renewal confirmation Please send your completed renewal confirmation to: Department of Human Services Fax number: 1800 890 698 Number of pages
More informationVersion: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
More informationMSI Secure Mail Tutorial. Table of Contents
Posted 1/12/12 Table of Contents 1 - INTRODUCTION... 1-1 INTRODUCTION... 1-1 Summary... 1-1 Why Secure Mail?... 1-1 Which Emails Must Be Encrypted?... 1-2 Receiving Email from MSI... 1-2 Sending Email
More informationStewart Secure Email User Guide. March 13, 2015
Stewart Secure Email User Guide March 13, 2015 Table of Contents Introduction... 1 What is secure email?... 1 Why secure email?... 1 What is personal, non-public information?... 1 How is my data protected?...
More informationInformation Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
More informationHow To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
More informationUsing the PeaceHealth Secure E-mail System
1 PeaceHealth is using a Secure E-mail System that allows for secure E-mail communications between individuals with a PeaceHealth E-mail address and individuals with E-mail addresses outside the PeaceHealth
More informationInformation Governance Performance Manager. Important Note: The Intranet version of this document is the only version that is maintained.
Document Summary DOCUMENT NUMBER DATE RATIFIED POL/002/004 14 October DATE IMPLEMENTED October 2013 NEXT REVIEW DATE October 2015 ACCOUNTABLE DIRECTOR POLICY AUTHOR Director of Business Development Information
More informationUSE OF PERSONAL MOBILE DEVICES POLICY
Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014
More informationNY&H CSU Service Specification IMT Service SAMPLE ONLY
SAMPLE IT SERVICE SPECIFICATION IG, NHS Mail Support, Clinical Safety (ISB160) and R.A. services North Yorkshire & Humber Commissioning Support Unit DATE: 23 September 2014 AUTHOR: STATUS: Doug Scott For
More informationS-Doc User Guide. Instructions on using the Secure Document Online Courier with the CAAT Pension Plan. September 2012
S-Doc User Guide Instructions on using the Secure Document Online Courier with the CAAT Pension Plan Secure solution provided by Accellion September 2012 S E C U R E C O L L A B O R A T I O N U S E R G
More information1) Important browser information New 2) Why is my browser so slow? 3) How can I view more than one screen without the other disappearing?
Known/Unresolved issues: Browser Scan to e-mail Creating Help Desk tickets for the scan-to-email issue is no longer necessary. A member of MIS will follow up with each office to determine scan-to-email
More informationInformation Security Incident Management Policy
Information Security Incident Management Policy Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT Policy & Regulation
More informationInstructions for Secure Email Cisco Registered Envelope Service (CRES)
Instructions for Secure Email Cisco Registered Envelope Service (CRES) Please read the official Cisco Guidance on the Cisco Registered Envelope Service And Frequently Asked Questions A courtesy attempt
More informationGeneral Register Office for Scotland information about Scotland s people. Paper NHSCR GB 1/08. NHSCR Scotland Information Governance Standards
General Register Office for Scotland information about Scotland s people Paper NHSCR GB 1/08 NHSCR Scotland Information Governance s This is a draft on which the Board s comments would be welcome. Contents
More informationGetting Started ONLINE APPLICATION. Access the online certification application system
Online Application This instruction guide is for currently certified firms seeking renewal and firms applying for the first time. The information presented is drawn from example scenarios and may not exactly
More informationUsing the Web email service
Using the Web email service This booklet describes the web based email service used by Sandwell schools. The web based email service was introduced in January 2005 to replace an earlier webmail system.
More informationELECTRONIC COMMUNICATIONS & INTERNET ACCEPTABLE USE POLICY Document Reference
ELECTRONIC COMMUNICATIONS & INTERNET ACCEPTABLE USE POLICY Document Reference Electronic Communications and Internet Acceptable Use Policy P010 Version Number V4.13 Author/Lead Job Title Director s Name
More information