Business Continuity Access to Personally Stored Corporate Electronic Data (CED) Policy



Similar documents
Mobile Phone and Remote Access Policy

SMS Text Messaging to Service Users Policy

Protocol and Procedure for Accessing External Legal Advice

Adoption Record Keeping Protocol

Standard Operating Procedure for Management of Controlled Drugs within Louth Urgent Care Centre

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK

NHS Commissioning Board: Information governance policy

Information Governance Policy

Type of change. V02 Review Feb 13. V02.1 Update Jun 14 Section 6 NPSAS Alerts

USE OF PERSONAL MOBILE DEVICES POLICY

All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid.

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK

Job Description. Information Governance & Health Records Manager

INFORMATION GOVERNANCE STRATEGY

Grievance and Disputes Policy and Procedure. Document Title. Date Issued/Approved: 10 August Date Valid From: 21 December 2015

South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy

Information Governance Strategy 2015/16

Best Practice Policy

INFORMATION RISK MANAGEMENT POLICY

IS INFORMATION SECURITY POLICY

Information Governance Strategy

NOTTINGHAM UNIVERSITY HOSPITALS NHS TRUST POLICIES AND PROCEDURES MANAGEMENT OF ATTENDANCE AND SICKNESS ABSENCE POLICY. Documentation Control

NHS FORTH VALLEY Information Governance Remote Working Guidance

Information Governance Policy

Change Management Policy

Policy Document Control Page

Information Governance Policy

Version Number Date Issued Review Date V1 25/01/ /01/ /01/2014. NHS North of Tyne Information Governance Manager Consultation

Information Governance Policy

Information Governance Policy

How To Protect Your Personal Information At A College

Information Governance Strategy. Version No 2.0

INFORMATION GOVERNANCE POLICY

Policy: D9 Data Quality Policy

RISK MANAGEMENT STRATEGY

INFORMATION GOVERNANCE POLICY

Bulk Data Transfer Guidelines

SICKNESS ABSENCE POLICY. Version:

Information Governance Policy

Guidance on Leases and other Agreements V4.0

NHS Newcastle Gateshead Clinical Commissioning Group. Information Governance Strategy 2015/16

INFORMATION GOVERNANCE POLICY

Gloucestershire Hospitals

Data Quality Policy SH NCP 2. Version: 5. Summary:

Usage Policy Document Profile Box

Safe Haven Policy. Equality & Diversity Statement:

POLICY FOR HANDLING OF CLINICAL NEGLIGENCE CLAIMS

RECORD KEEPING IN HEALTHCARE RECORDS POLICY

How To Ensure Network Security

Information Management Policy CCG Policy Reference: IG 2 v4.1

Version: Date adopted: publication: Review date: September Expiry date: March Target audience: All staff

PS 172 Protective Monitoring Policy

Information Governance Policy

Policy: Remote Working and Mobile Devices Policy

CCG: IG06: Records Management Policy and Strategy

Financial Procedures

NHS North Durham Clinical Commissioning Group. Information Governance Strategy 2015/16

Policies, Procedures & Guidelines

DOCUMENT CONTROL PAGE. Health and Safety Policy Statement

Information Security and Governance Policy

How To Ensure Information Security In Nhs.Org.Uk

Equality and Diversity Policy. Deputy Director of HR Version Number: V.2.00 Date: 27/01/11

Data Protection Policy

DATA PROTECTION AND DATA STORAGE POLICY

CORPORATE POLICY & PROCEDURE NO. 7 INFORMATION GOVERNANCE POLICY. December 2014

MANAGEMENT OF PERSONAL FILES POLICY

Bring Your Own Device (BYOD) Policy

Information Governance Framework

MOORLAND SURGICAL SUPPLIES LTD INFORMATION GOVERNANCE POLICY

Diagnostic Testing Procedures for Ophthalmic Science

Supporting staff involved in a stressful or traumatic incident, complaint or claim.

Network Security Policy

JOB DESCRIPTION. Assistant Director of Technology and Telecommunications

Overpayments, Underpayment & Incorrect Payments Policy

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY

CONTRACTS REVIEW FOR INFORMATION GOVERNANCE COMPLIANCE PROCEDURE

The Newcastle upon Tyne Hospitals NHS Foundation Trust. Occupational Health Records Management and Retention Operational Policy

Information Governance Policy

The Newcastle upon Tyne Hospitals NHS Foundation Trust

Information Governance Policy

Freedom of Information Policy Version 6.0

NHS Hartlepool and Stockton-on-Tees Clinical Commissioning Group. Information Governance Strategy 2015/16

Barnsley Clinical Commissioning Group. Information Governance Policy and Management Framework

Application for Approval of Overseas Inspection Agency for Pressure Vessels

NHS North Somerset Clinical Commissioning Group

Information Governance Strategy

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

INFORMATION MANAGEMENT & TECHNOLOGY SECURITY POLICY

An Approach to Records Management Audit

Supporting Staff Involved in a Traumatic Incident, Complaint or Claim Policy

INFORMATION SECURITY POLICY

Managing Performance Policy

NHS Business Services Authority Information Governance Policy

Policy: Accessing Legal Advice

Information Governance Framework and Strategy. November 2014

INFORMATION GOVERNANCE POLICY & FRAMEWORK

Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:

Transcription:

Business Continuity Access to Personally Stored Corporate Electronic Data (CED) Policy Reference No: Version: 2 Ratified by: P_IG_05 LCHS Trust Board Date ratified: 16 th December 2014 Name of originator/author: Name of approving committee/responsible individual: Date issued: December 2014 Review date: November 2016 Target audience: Distributed via: Kaz Scott, Information Governance Manager Information Governance Sub Committee Trust Staff Website / Intranet 1

Lincolnshire Community Health Services NHS Trust Business Continuity Access to Personally Stored Corporate Electronic Data (CED) Policy Version Control Sheet Version Section/Para/ Appendix 1 Original CG001 Version/Description of Amendments New Policy rebranded to reflect organisational change IT changed to ICT throughout and minor revisions to dissemination & page numbers. EIA and NHSLA monitoring added 2 Minor amendments to reflect organisational change and full version change due to policy review date. Updated EIA. 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Date Oct 2012 Nov 2014 Author/Amended by Jim Sutherland Kaz Scott Kaz Scott 2

Lincolnshire Community Health Services NHS Trust Business Continuity Access to Personally Stored Corporate Electronic Data (CED) Policy Contents i. Version control sheet ii. Policy statement Introduction 5 Sharing Corporate Electronic Data (CED) 5 Responsibility 5 Business Continuity 6 Non-availability or corrupt data 6 Procedure 6 - The requesting Officer 6 - The authorising Officer 7 - The accepting ICT Manager 7 Page Appendix 1 Request & Authorisation Form - (CED) 8-9 Appendix 2 Equality Analysis 10 Appendix 3 NHSLA Monitoring 11 3

Lincolnshire Community Health Services NHS Trust Business Continuity Access to Personally Stored Corporate Electronic Data (CED) Policy Policy Statement Background For the purpose of this policy the phrase Corporate Electronic Data (CED) is defined as: All data, or information files, created on Trust computer software applications or computer systems. This includes data files created with any software product, such as Microsoft Outlook and Word, or any other PC/laptop based application program AND all networked systems, such as patient information or financial systems. All data, or information files, stored on any Trust computer hardware or networked system or storage media, which includes PC or laptop hard drives and personal or shared network file storage areas. All data, or information files, electronically communicated through Trust computer network systems. This includes both the internal and external transmission and reception of e-mail together with any attachments. Statement All staff are to comply with the Corporate Electronic Data Policy and the associated procedures to ensure essential business continuity. Responsibilities It is every member of staff s responsibility to ensure that CED that needs to be shared is made available at the appropriate time and to the appropriate individual or staff group. Line managers are responsible for ensuring their staff make suitable arrangements, where appropriate, to make CED available to either specific individuals or staff groups prior to embarking on training courses or annual leave with the intention of maintaining business continuity during their absence. Training Information Governance Training is provided to all staff at induction and through specific training opportunities in accordance with the Trust training programme. Dissemination The policy will be disseminated via the Intranet to all staff. Managers will be expected to discuss the policy with staff at team meetings and the policy will also be available on the Organisation s website. 4

1. Introduction 1.1 For the purpose of this policy the phrase Corporate Electronic Data (CED) is defined as: a. All data, or information files, created on Trust computer software applications or computer systems. This includes data files created with any software product, such as Microsoft Outlook and Word, or any other PC/laptop based application program AND all networked systems, such as patient information or financial systems. b. All data, or information files, stored on any Trust computer hardware or networked system or storage media, which includes PC or laptop hard drives and personal or shared network file storage areas. c. All data, or information files, electronically communicated through Trust computer network systems. This includes both the internal and external transmission and reception of e-mail together with any attachments. 1.2 The word owner in relation to an electronic file is used extensively in information technology and is defined as either the file creator of an exclusively owned or stored file or the last person, in a group of owners, to access a data file stored in a shared network file directory. Despite the implications of file ownership, staff members are advised that all Corporate Electronic Data (CED) they produce during the course of their employment remains the sole property of the employing organisation. 2.0 Sharing Corporate Electronic Data (CED) Computer Networks offer the facility for the sharing of CED, which is commonplace, desirable and essential to business activity. However, the method and degree of CED sharing is governed by the need to know principle, organisational policies and compliance with statutory obligations such as the Data Protection Act 1998 (DPA). Therefore, certain CED will demand varying degrees of higher protection by restrictive or exclusive access. The ICT Manager and the ICT team will create and control access to all networked CED, according to specified business need. This process is already regulated and accountable under the Computer Use Policy, codes of conduct and contracts of employment. 3.0 Responsibility 3.1 It is every member of staff s responsibility to ensure that CED that needs to be shared is made available at the appropriate time and to the appropriate individual or staff group. 3.2 Line managers are responsible for ensuring their staff makes suitable arrangements, where appropriate, to make CED available to either specific individuals or staff groups prior to embarking on training courses or annual leave with the intention of maintaining business continuity during their absence. 5

4.0 Business Continuity By exception, and only to facilitate essential business continuity, there may be a requirement for senior management to access CED, which has been stored exclusively in staff s personal data areas or hard drives and become unavailable due to their absence through unforeseen circumstances. Whilst technology exists to enable duly authorised ICT specialists to access and/or make available most CED files, performing such a task on a staff member s personal computer or network data storage area, without their express permission or knowledge, should not be undertaken lightly. Strict guidelines must be followed that comply with The Regulation of Investigatory Powers Act 2000 (RIPA), and the rights and freedoms of individuals under the Human Rights Act 1998 and other legislation. Therefore, in the event that the maintenance of essential business continuity necessitates ICT staff to access, or give access to, otherwise unavailable CED files stored on an individual s personal user account or hard drive; only the Chief Executive or an Executive Director may authorise such an action. 5.0 Non-availability or corrupt data Whilst the ICT specialist team will endeavour to comply with the request, it must be recognised and accepted that non-availability, corruption, password protection or encryption of the requested CED may make it impossible to comply. ICT skills and/or the purchase of specialist hardware or software, with the inherent time delay, may enable the required access but it must be stressed that dependency should not be placed on the ICT department for a satisfactory outcome on every occasion. 6.0 Procedure Without exception the following procedure must be adhered to: 6.1 The requesting officer, (who must be at least a line manager), should: a. Complete a Request & Authorisation for Business Continuity Access to Personally Stored Corporate Electronic Data (CED) form (Appendix 1) in full by: i ii iii iv v Stating the location of the file/s Network Drive/Folder or Laptop Identify the file/s with full path and filename, if known Where filenames cannot be given, provide a known unique and identifiable portion of text from the required file. Give the ICT Specialist any other assistance as may be required in finding the relevant data file/s. Where access is required to an entire folder or sub-folder, state in days, the duration of such an access request. b. Give full justification for the request. c. Obtain appropriate authorisation from the Chief Executive or an Executive Director. d. Ensure the request form is delivered to the Head of ICT. 6

6.2 The authorising officer should: a. Be completely satisfied that the request is genuine and purposeful to maintain essential business continuity. b. Be prepared to account for their personal actions, if subsequently required to by the respective organisations Board, other legal body or court of law. c. Ensure the data owner/s is/are advised of the actions undertaken and the justification at the first opportunity. d. Be prepared to deal with all possible and coincidental ramifications of such actions. 6.3.1 The accepting ICT Manager or deputy should: a. Only initiate any action on receipt of a correctly completed and authorised form. b. Ensure expedition of the request as soon as possible with all actions and any difficulties, including non-availability or corruption of data being recorded on the request form s action log. c. Accessed data files are not to be amended or modified in any way. Where access is granted to data files requiring modification, copies of the original files will be placed on the storage media, specified by the requesting officer, PRIOR to any modification being undertaken. Only relocated copies of original files may be modified. d. Strictly enforce a policy of non-disclosure or alteration of any user Passwords. e. If a password is discovered and used to enable a positive outcome, the action should be guardedly recorded on the action log and specifically reported to the ICT Manager who must then personally advise the data owner at the earliest opportunity. f. On completion, photo copy the form, file the original and ensure a copy is sent to the authorising officer for retention. 7

Appendix 1 Request & Authorisation for Business Continuity Access to Personally Stored Corporate Electronic Data (CED) The Business Continuity - Access to Personally Stored Corporate Electronic Data (CED) Policy contains the definitions and mandatory procedures for this process. As this request is for access to CED stored in a member of staff s personal network data storage area, PC/laptop hard drive or storage media, the requesting officer must be as specific as possible. Accessed data files are not to be amended or modified in any way. Where access is granted to data files requiring modification, copies of the original files will be placed on the storage media, specified by the requesting officer, PRIOR to any modification being undertaken. Only relocated copies of original files may be modified. Request To: The ICT Manager, ICT Department (Site Location) Please enable access for: (Staff member for whom access is to be granted) To CED owned by... (Staff member whose files are to be accessed) For the purpose of (Justification Criteria)... The required data is stored on: (Tick the appropriate box) The Network The owners PC The owners laptop Storage Media Specify the data required: (Word document or Excel Spreadsheet plus filename ; etc)... The file/s can be found at: (If known).. A filename cannot be provided but the required file contains the following unique text:.. The located file/s should be copied to: A secure network folder (e.g. :\folderp or encrypted external media:.. (Full path to be given This should NOT be a shared area and should afford equivalent security to the owners storage area if in any doubt, advice or assistance should be sought from the ICT Specialist allocated this request). Directory Access Where business continuity necessitates access to an entire directory or sub-directory, specify: Directory or sub-directory name Duration.. (Hours / Days). (Hours / Days) (This will be monitored and the facility revoked after the specified duration) 8

Requesting Officer (Line Manager (minimum)) I have read and acknowledge my responsibilities under the Business Continuity Access to Personally Stored Corporate Electronic Data (CED) Policy. Signature Date... Name. Title:... Dept Authorisation I have read and acknowledge my responsibilities under the Business Continuity Access to Personally Stored Corporate Electronic Data (CED) Policy. I am satisfied that this action is required to maintain essential business continuity, is appropriately justified and is therefore duly authorised. Signature Date... Name. Title Acknowledgement by the ICT Manager or Deputy This request form was processed by: Name:...Title: Signature:.Date: Time: ICT Specialist s Action Log (All actions and difficulties, including non-availability or corrupt data, must be recorded in narrative form clearly stating the time of action and any subsequent consequences. The log must include the specifically requested filename/s, the full paths of both where files were found and where they were copied. Where access is given to an entire directory or sub-directory, the path, access and revoke times must also be included.) Conclusion I am satisfied that all possible actions have been completed, as recorded above and accordingly advised the requesting officer on (date).. and (time).. Signature: Date: Time:.. ICT Manager I advised the data owner (if applicable.) of the reported password breach on (date). at (time) Signature: Date: A photocopy of this completed form is to be sent to the authorising office and the requesting officer for retention and the original retained by the ICT Manager for audit purposes. 9

Appendix 2 Equality Analysis A. B. C. D. Briefly give an outline of the key objectives of the policy; what it s intended outcome is and who the intended beneficiaries are expected to be Does the policy have an impact on patients, carers or staff, or the wider community that we have links with? Please give details Is there is any evidence that the policy\service relates to an area with known inequalities? Please give details Will/Does the implementation of the policy\service result in different impacts for protected characteristics? To provide clear and effective management and accountability structures, governance processes, documented policies and procedures, a comprehensive IG training programme and adequate resources to manage and embed Information Governance throughout the Organisation. All Staff and Service Users No No Disability Sexual Orientation Sex Gender Reassignment Race Marriage/Civil Partnership Maternity/Pregnancy Age Religion or Belief Carers Yes If you have answered Yes to any of the questions then you are required to carry out a full Equality Analysis which should be approved by the Equality and Human Rights Lead please go to section 2 The above named policy has been considered and does not require a full equality analysis Equality Analysis Carried out by: Kaz Scott Date: 13 th Nov 2014 No 10

Appendix 3 NHSLA Monitoring Minimum requirement to be monitored Process for monitoring e.g. audit Responsible individuals/ group/ committee Frequency of monitoring/audit Responsible individuals/ group/ committee (multidisciplinary) for review of results Responsible individuals/ group/ committee for development of action plan Responsible individuals/ group/ committee for monitoring of action plan IG Toolkit Standards Review / Audit / Reports IG Manager Annual IG Manager / IGSC IG Manager / IGSC IG Manager / IGSC 11