Service Level Agreement between Leicestershire Youth Offending Service & Leicester City Youth Offending Service and Leicester College



Similar documents
Data and Information Sharing Protocol and Agreement for Agencies Working with Children and Young People

DATA PROTECTION POLICY

How To Protect Your Personal Information At A College

(4) THAMES VALLEY POLICE of Oxford Road, Kidlington, OX5 2NX ("Police Force"),

How To Deal With Abuse In A School

London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY

Disclosable under FOIA 2000: Yes Author: T/CI Nick Barker Force / Organisation: BTP Date Created: May 2009 Telephone:

DBS Policy for Work Placement Students Disclosure & Barring Services (DBS)

SAFEGUARDING CHILDREN AND CHILD PROTECTION POLICY

Police Officers who Commit Domestic Violence-Related Criminal Offences 1

Information Governance Policy

Guidelines for Information Sharing related to the Youth Criminal Justice Act (2003)

Information sharing. Advice for practitioners providing safeguarding services to children, young people, parents and carers

Scottish Rowing Data Protection Policy

OBJECTS AND REASONS. (a) the regulation of the collection, keeping, processing, use or dissemination of personal data;

Dealing with Allegations of Abuse Against Staff in Schools. Practice Guidance

Employment Policies, Procedures & Guidelines for Schools

DATA PROTECTION POLICY

Data Protection Policy

Recruitment, Selection & Disclosure Policy and Procedure

Merthyr Tydfil County Borough Council. Data Protection Policy

Disclosure of Criminal Convictions Code of Practice

Education Department Policy

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY

Dublin City University

Nursing Agencies. Minimum Standards

John Leggott College. Data Protection Policy. Introduction

ERRANT CONDUCT AND POOR PERFORMANCE BY EXTERNAL ADVOCATES CPS GUIDANCE TO CHAIRS OF JOINT ADVOCATE SELECTION COMMITTEES

Information Governance Policy

Disciplinary and Performance Management Policy & Procedure October 2010

Employment Policies, Procedures & Guidelines for Schools

NEWMAN UNIVERSITY DISCIPLINARY POLICY AND PROCEDURE

Those seeking admission as solicitors under the Admission Regulations, fulfilling the duties under section 3 of the Solicitors Act 1974;

INVESTIGATING COMPLAINTS AND ALLEGATIONS AGAINST EMPLOYEES POLICY AND PROCEDURE

Policy and Procedure for approving, monitoring and reviewing personal data processing agreements

Statutory Disclosure Guidance. Second edition August 2015

DATA PROTECTION ACT 1998 COUNCIL POLICY

Reporting of Suspected or Actual Child Abuse and Neglect

NHS England Complaints Policy

USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY

Disciplinary and Dismissals Policy

2. The Aims of a Dual Diagnosis Accommodation Based Support Service

Staff DBS Checks and Employing Exoffenders:

Mental Health (Care and Treatment) (Scotland) Bill

Information Governance Framework. June 2015

8 July 2015 CRIMINAL JUSTICE (Victims of Crime) BILL 2015 GENERAL SCHEME CONTENTS PART 1 PRELIMINARY. PART 2 Information for Victims

NETHERAVON ALL SAINTS CE PRIMARY SCHOOL

DATA PROTECTION POLICY

Policy Document Control Page

Guidance on health and character

Compulsory Drug Treatment Correctional Centre Act 2004 No 42

THE CHILD PROTECTION (AMENDMENT) BILL (No. XXXIX of 2008) Explanatory Memorandum

Derbyshire Constabulary STREET BAIL GUIDANCE POLICY REFERENCE 05/005. This guidance is suitable for Public Disclosure

Data Protection Act a more detailed guide

Human Resources and Data Protection

Employment Manual REHABILITATION OF OFFENDERS AND SELF DISCLOSURE POLICY

Queensland State Emergency Service Operations Doctrine

Queensland DRUG REHABILITATION (COURT DIVERSION) ACT 2000

Information Circular

Caedmon College Whitby

Statement on CQC s roles and responsibilities for safeguarding children and adults

technical factsheet 176

JOB DESCRIPTION. 1.1 Provide referral processes for service users by providing the appropriate information and assessment details.

Departmental Directive on the Management of Information in the Student Record and Other Records Pertaining to Students

Data Protection Policy

DATA PROTECTION POLICY

2 Procedure prior to registration on University of Hertfordshire programmes

Little Marlow Parish Council Registration Number for ICO Z

So the security measures you put in place should seek to ensure that:

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

Appendix A. Call-off Terms and Conditions for the Provision of Services

SANDYMOOR SCHOOL GUIDANCE ON ACCESS TO STUDENT RECORDS

The Manitowoc Company, Inc.

Level 3 Certificate in Community Justice ( )

How To Get A Job In A Police Station

Corporate ICT & Data Management. Data Protection Policy

Department of Social Work, Social Care and Youth and Community Studies

Working Together to Safeguard Children

Data Protection Policy

DATA PROTECTION POLICY

DECISIONS ON CONTROLLED SUBSTANCE LICENCES

Data Protection Policy June 2014

Human Resources Policy documents. Data Protection Policy

Joint electronic monitoring protocol

Witness Protection Act 1995 No 87

PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE

DISCIPLINARY PROCEDURE

Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015

Information Sharing Policy

SUMMARY INFORMATION ON PROBATION IN ENGLAND AND WALES

Community Remedy. Introduction

College Policies and Procedures. Code of Student Conduct for South Essex College students in University of Essex Residential Accommodation

SEN15-P69b 24 June University Ordinances

THIS GUIDANCE APPLIES FROM 10 MARCH 2014

Data Protection Policy

The Fostering Network 2006 Managing Allegations and Serious Concerns About Foster Carers Practice: a guide for fostering services.

7. MY RIGHTS IN DEALING WITH CRIMINAL LAW AND THE GARDAÍ

Data Protection Policy

Disclosure and Barring Service (DBS) Policy for Schools Based Staff

Transcription:

Service Level Agreement between Leicestershire Youth Offending Service & Leicester City Youth Offending Service and Leicester College 2014 Page 1 of 29

Index Page 1. Policy Statements and Purpose of this Service Level Agreement 3 2. Legal Basis for Information Sharing 3 3. Principles 3 3.1 Named Contacts 3 4. Data 4 4.1 What data is it necessary to share? 4 4.2 How long is data retained? 4 4.2a Type and content of data that is shared 5-7 4.3-4.5 Information can be shared in the following circumstances 8 5. Self-referrals 8 5.1 Referrals by partnership agencies 8 6. Responsibilities of and 8-9 6.1 Responsibilities of Leicester College 9 6.2 Responsibilities of staff attending Risk Assessments 9 6.3 How will you keep a record of what information has been shared? 10 6.4 How is this information going to be shared? 10 6.5 Who will have access to this data and what may they use it for 10 6.6 Timescales 10 6.7 How secure is the data 10-11 6.8 Further Use of Information 11 7. Breach of confidentiality 11 8. Indemnity 12 9. Individuals who cannot be covered by the Indemnity 12 10. Review of Service Level Agreements 12 11. Closure/termination of the SLA 12 12. Requests for Disclosure of Information received under this SLA 12-13 13. Appropriate Signatories 13 14. Terminology 13 15. Appropriate Signatories 14 Appendix A: Definitions of Risk 15 Appendix B: Legislation 16-20 Appendix C: Declaration of Previous Convictions Form 21 Appendix D: Agency Risk Reference 22-24 Appendix E: Learner Risk Assessment Information (Leicester College) 25-26 Appendix F: Learner Interview Information 27-28 Contact Details 29 Page 2 of 29

1. Policy Statements and Purpose of this Service Level Agreement The above organisations, Leicester City Youth Offending Service () and Leicestershire Youth Offending Service () have agreed to working to the terms of this protocol for information sharing to assist joint working in the area of Employment, and Education. Information is shared to: Assist in reducing the likelihood of re-offending by young people Ensure young people are successfully integrated in to mainstream provision Ensure young people receive the level of support most appropriate to their needs; Assist young people moving to education or employment on transition from custody to the community Identify and provide support to young people who are not in education, training and employment (NEET); Protect those that might be at risk of harm to themselves or others Minimise the risk of harm to the Community and Leicester College 2. Legal Basis for Information Sharing This SLA has been developed to achieve the objectives as set out in Section 1. It is the intention that all aspects of information sharing relating to this Agreement shall comply with relevant legislation that protects personal data. The relevant legislation is outlined in the attached Legislation Appendix B, Page 16-20. 3. Principles The responsibilities of the individual partners will be respected Both partners share an aim of working towards social inclusion and equality Public Protection and safety will be paramount Health and Safety principles will be adhered to Information held will include only what is necessary for the management of the scheme In all cases partners will comply with Data Protection legislation and the law regarding confidentiality Cases will be looked at by a case by case basis Young people will be informed by the partner s how their data is used/stored/shared and retained. Each partner will provide a named contact which is the key contact for all matters relating to the SLA, and as part of the Risk Assessment procedure. 3.1 Named contacts Leicester College: Sophie Strevens-Robinson, (Risk Assessment Manager) sophie.robinson@leicester.college.cjsm.net (0116 224 2225) Leicester Youth Offending Service: Andrew Betts, (14-19 Co-ordinator) andrew.betts@leicester.gcsx.gov.uk.cjsm.net (0116) 454 4600) Page 3 of 29

Leicestershire Youth Offending Service: Navdeep Cozens-Patel (Manager) Navdeep.Cozens-Patel@leics.gov.uk (01455 636068) 4. Data 4.1 What data is it necessary to share? The information shared should be proportionate and should be the minimum amount needed to achieve the purpose identified in Section 1. The following information is likely to be shared: Educational needs of individual offenders Integrated Intervention Plan (IIP) Risk of Serious Harm (ROSH) Vulnerability Management Plan (VMP) Information concerning the assessment and management of risks presented by individual offenders Known pending matters, including pending court proceedings Documents covered under Leicester College s Risk Assessment Policy: o Declaration of Previous Convictions Form o Risk Reference o Secure emails Any other information about the offender relevant to the management of the scheme. This will include case discussions between partners to ensure the objectives of the scheme are being met Information for tracking purposes re: progress, attendance, and retention Information on whether individuals have been suspended or expelled The partner s may also agree to use information to apply for funding to support the scheme. Aggregated data from the scheme will be used to monitor the progress of the scheme. The type of information that will be shared is detailed in the following table 4.2a including Leicester College Declaration of Previous Convictions form and Risk Reference (attached Appendices C and D): 4.2. How long is data retained? Leicester College retains information as part of its Risk Assessment Policy for 10 years. Partners will process all information in accordance with the Rehabilitation of Offenders Act, and Data Protection, also refer to Appendix B: Legislation. / as per their individual retention schedules. Page 4 of 29

4.2a Type and content of data that is shared. Data Set Who from Who to Why Which Organisation owns the information Frequency of Sharing How will information be shared How long will data be held for Name D.O.B Young Person s Address & Postcode will include whether LAC Contact Number Gender Offending History, including known pending matters and court proceedings. Offence details; Declaration of Previous Convictions. EBD/Disabilities/ Mental Health/ Substance use,, Identification Identification Identification Identification Identification Protection of public and self, emotional and support needs Protection of public and self Protection of public and self, emotional and support needs Leicester College On referral Referral forms sent, hand delivered or encrypted email/ secure email On referral Referral forms sent, hand delivered or encrypted email/ secure email On referral or if young person s address changes On referral or if young person s contact number changes Referral forms sent, hand delivered or encrypted email/ secure email Referral forms sent, hand delivered or encrypted email/ secure email On referral Referral forms sent, hand delivered or encrypted email/ secure email On referral or if young person reoffends whilst working with the training provider On referral or if young person reoffends whilst working with the training provider On referral or if known at a later point whilst under supervision Attached onto referral form, face to face meetings, encrypted email/secure email Attached onto referral form, face to face meetings, encrypted email/secure email Attached onto referral form, face to face meetings, encrypted email/secure email Leicester College 10 years retention Leicester College 10 years retention Leicester College 10 years retention Leicester College 10 years retention Leicester College 10 years retention Leicester College 10 years retention Leicester College 10 years retention Leicester College 10 years retention,, as per retention schedule Page 5 of 29

Data Set Who from Who to Why Which Organisation owns the information Frequency of Sharing How will information be shared How long will data be held for Learning progress reports To keep educational records up to date Throughout the work with the young person Face to face, by telephone, or provided via secure email, as per retention schedule Attendance records *Qualifications gained if known. *Leicester College will not readily have this information available. Information about risk to self and others To keep educational records up to date and to ensure the young person is attending To keep educational records up to date Protection of public and self, emotional and support needs, & Throughout the work with the young person At the end of the work with the training provider As required Face to face, telephone or encrypted document/secure email Face to face, telephone or encrypted document/secure email Telephone or face to face/secure email, as per retention schedule, as per retention schedule Leicester College 10 years retention,, as per retention schedule Language Educational and employment needs Information from the Asset Assessment (specific information determined by the referral) Supervision details, engagement, attendance/ breaches, revocation for good progress, referrals to other departments/ agencies. To ensure appropriate provision is in place To provide historical education information and current up to date education provision Protection of public and self To provide historical supervision information and current up to date supervision provision., &, &, &, & On referral Referral form Leicester College 10 years retention As required Face to face, Leicester College 10 telephone or secure years retention, email, as per retention On referral if required On referral or if young person s circumstance changes Meetings one to one contact Attached onto referral form, face to face meetings, encrypted email/secure email schedule Leicester College 10 years retention Leicester College 10 years retention,, as per retention schedule Page 6 of 29

Data Set Who from Who to Why Which Organisation owns the information Frequency of Sharing How will information be shared How long will data be held for Family Situation (E.g. who they live with, any access restrictions etc.) LAC Names of workers managing the cases. Other agencies involved in the support/management of the young person Protection of public and self Ensure training provider has a worker to contact and report to, &, & On referral or if young person s circumstance changes On referral and if worker changes Meetings with training provider, telephone or referral form Referral form, meetings, one to one contact, telephone Leicester College 10 years retention,, as per retention schedule Leicester College 10 years retention Page 7 of 29

4.3. Information can be shared in the following circumstances: referrals by YOS staff referrals by Leicester College Risk Assessment Team matters relating to safeguarding raised by either partners self-referrals referrals from/ to partnership agencies 4.4. For each young person a Leicester College Declaration of Previous Convictions form (Appendix C) must be completed and signed by the prospective learner or referrer. A Leicester College Risk Reference (Appendix D), and any accompanying support / risk information also refer to 4.1; will be provided by the referring agency prior to a Risk Assessment. 4.5. The named contact in Leicester College will ensure that a decision is made within one month (there may be instances where this is longer but a member of the College s Risk Assessment Team will liaise with YOS) of receiving the referral, and communicate this to YOS. When Conditions are attached to a young person s place at the College, YOS will be copied in to this correspondence, and will subsequently be informed of any compliance issues. 5. Self-referrals If Leicester College staff discovers that a young person is known to YOS, they will contact the supervising officer under section 4.2a of the Protocol to start the process of obtaining risk information. The College will write to the learner to complete a Declaration of Previous Convictions form, if this has not yet been supplied by YOS. A learner may already be on a course, an expected response from YOS would be within 5 working days. 5.1 Referrals by partnership agencies Referrals will be processed in line with this protocol. If the young person is currently open to YOS, It may be necessary to contact YOS first. 6. Responsibilities of YOS and Refer to Appendix A: Definitions of Risk To flag applications, and that have been assessed as, or are presenting as high risk of serious of harm high risk of vulnerability, and those with a high risk of re-offending ), and including those that have non-associations with other learners at Leicester College: Leicester College actively promotes equality of opportunity for all and welcomes applications from a wide range of learners. Leicester College has a legal responsibility known as Duty of Care as part of our safeguarding responsibilities to provide all learners, with special consideration to our vulnerable and young learners with a safe and positive environment. Leicester College is not a specialist educational provider therefore, does not have the required premises, curriculum, security or specialist staff to facilitate and support those that either present as, or are assessed as a high risk of serious harm either to themselves or to others. To submit comprehensive referrals, including the ROSH/VMP/IIP including all supporting information on known behavioural issues, substance misuse, mental health, previous known schooling see bullet 4 To ensure that any known risk that could put the safety of learners and staff at risk is disclosed at the earliest opportunity to the authorised contact Page 8 of 29

To ensure that any or staff attending a Risk Assessment with a young person, support that young person at the Interview, disclosing to the College s named contact: all known information pertaining to the young person s background; harm related behaviour mental health schooling family child protection matters peers substance misuse health/medication that could affect the young person at college risk/ risk of harm level of engagement including additional voluntary work breaches intelligence and any concerns or concerns or incidents of misconduct YOS staff are also responsible for disclosing pending matters and court dates. To respond to enquiries within 5 working days To respond to urgent enquiries within 24hrs (safeguarding/ undisclosed conviction/s) To offer ongoing support to the institution while the young person is subject to supervision To keep confidential information received from Leicester College on a need to know Liaise only with the Risk Assessment Team (R.A.T), and refer any queries from Leicester College back to the R.A.T Requests for attendance and progression must come through the R.A.T 6.1 Responsibilities of Leicester College To provide a named contact (Sophie Strevens-Robinson) for referrals To review each case on a case by case basis Will provide the key contact with dates and times of Risk Assessment Interviews, attendance, and outcomes To keep information received on a need to know as part of risk management or support To respond to referrals within 5 working days To respond to urgent enquiries within 24hrs (safeguarding) To keep information securely and on a need to know (covered by the Risk Assessment Policy) To provide attendance and progression details to YOS when formally requested in writing To provide details on suspensions and exclusions of YOS clients To provide details on any Risk Assessment Conditions, or restrictions that have been attached to a young person s place at College To provide details of those that are referred for support. i.e. cc on letters (named contact Andrew Betts) 6.2 Responsibilities of staff attending Risk Assessments Risk Assessments are structured to encourage open conversations around a young person attending the College who have convictions and support needs. The Assessment is informal and relaxed; aiming to ensure that a young person feels comfortable, and is aware why they are there. In addition to reviewing the offending, also included is support that the College can offer. Following an Assessment, the young person can be referred on to one of the support teams, or for a disability ssessment. Prior to a young person attending a Risk Assessment, they receive two pieces of key information from us. Appendix E Information to Learners is sent to every learner going through the process. Learners attending a Risk Assessment are sent an additional Information sheet Appendix F What to Expect at the Risk Assessment. Page 9 of 29

YOS staff attending a Risk Assessment with a young person are required to provide full disclosure on the young person prior to the Risk Assessment (Refer to Point 6, Responsibilities of /). If this information is not provided, the Risk Assessment can be postponed until it has been received. Staff accompanying a young person are responsible for encouraging participation in the Risk Assessment; the young person should understand why they need a Risk Assessment. 6.3 How will you keep a record of what information has been shared? and will keep copies of referral forms and any additional information that is supplied to the provider, or submitted from the provider. Information will be processed and stored in accordance with Data Protection and confidentiality requirements as detailed in this SLA. Information on what is being shared, and with who will be recorded on the YOS Care works database. Leicester College as per College retention requirements will keep all information for 10 years. Each learner has a confidential file; all learners will have a record on a confidential secure Risk Assessment database; files will be kept in a non-portable and locked cabinet with restricted access. All learners disclosing, or previously known to the RAT are tracked on the main learner College database (EBS), by the RAT using secure codes. After 10 years, files are destroyed; records are removed from the database and EBS. 6.4 How is this information going to be shared? The information will be shared on a strict basis to named contacts at meetings with providers, face to face contact with the young people and parent/carers, and also via secure email and encrypted document with a password. There may be occasions where risk management of a young person in college requires certain information to be shared with support, tutors, and security; this is covered under the current Risk Assessment Policy. See also table 4.2a for more information. 6.5 Who will have access to this data and what may they use it for? The Risk Assessment Team at the training provider, and / for the purposes outlined in Section 1. Refer to Leicester College Policy and Procedure Student Risk Assessment for more details. 6.6 Timescales All information is shared on an ongoing basis by request to meet the needs outlined in Section 1 6.7 How secure is the data? Each partner signing this SLA agrees to adhere to the agreed standards of security below: Partners will be responsible for ensuring that the information will be used only for the purposes described in the SLA Partners shall ensure that they comply with all legislation as detailed in the attached Legislation Appendix, which includes: Data Protection legislation and the Human Rights Act, and the Common Law Duty of Confidentiality. Page 10 of 29

Partners will be able to hold their own databases, files and systems and records for the scheme. The databases, files, systems and records should comply with Data Protection legislation and all items under Appendix B, should be covered under a working Policy, should comply with retention policies Young people at the training provider will receive written information on how their information is handled, shared, stored and retained. See also Appendices E and F Partners recognize that any breach of confidentiality will seriously undermine the aims of the scheme, as well as render partners liable for breach of the law. Partners will ensure that all computer systems that contain personal data be password-protected. The level of security should depend on the type of data held, but ensure that only those who need to use the data have access. Partners will ensure that procedures and processes relating to this process are covered under a current Policy Partners will not disclose personal data to anyone other than the Data Subject unless they have the Data Subject s consent, or it is a registered disclosure, required by law, or permitted by a Data Protection Act 1998 exemption. If there is a security breach in which information received by either partner under this SLA is compromised, then the other partner should be notified at the earliest opportunity via the post holder identified in Section 7. 6.8 Further Use of Information The partners will only use the information for purposes defined in the SLA. For any further use not defined in this SLA, all parties must agree, in which case the details will be documented as a dated addendum to this SLA. 7. Breach of confidentiality An individual s right to confidentiality is a fundamental principle of this SLA. Staff should only have access to Risk Assessment information on a justifiable and proportionate basis, in order for them to perform their duties, in connection with the delivery of service by the training provider. This is weighed against known risk, and public protection which is paramount to the success of the Scheme. Every member of staff is under an obligation to protect confidentiality. All staff should be trained and fully aware of their responsibilities for the security and confidentiality of person identifiable information and they should follow the procedures and standards that have been agreed and incorporated within this SLA. s will ensure that young people will be informed in writing how their data is used, stored, and retained. All parties to this SLA are responsible for ensuring that their organisation and security measures protect the lawful use of information shared under this SLA. Any disclosure of information by an employee which is done in bad faith or for motives of personal gain will be treated as a serious matter and will be subject to formal investigation. All parties will make it a condition of employment that employees will abide by their rules and policies in relation to the protection and use of confidential information. This condition should be written into employment contracts and any failure by an individual to follow the policy should be dealt with in accordance with that organisation s disciplinary procedures. Page 11 of 29

Any misuse, suspected or otherwise, of information MUST be reported to all parties signed up to this Agreement as soon as is practicable. Each organisation will be accountable for any misuse of information by their employee. Major breaches may result in the SLA being temporarily suspended or withdrawn completely. All parties are reminded to abide by the principles of the Data Protection Act 1998 and the offences laid down at sections 55 and 61 of the Act. In the event of a breach the partner should be immediately notified. Complaints and alleged breach of this SLA should be dealt with by utilising any established organisational policies and procedures for breaches and complaints made in relation to appropriate legislation in connection with the agreed information exchange and data processing. 8. Indemnity Each organisation will keep each of the other organisation fully indemnified against any and all costs, expenses and claims arising out of any breach of this agreement and in particular, but without limitation, the unauthorised or unlawful access, loss, theft, use, destruction or disclosure by the offending organisation or its sub-contractors, employees, agents or any other person within the control of the offending organisation of any data obtained in connection with this SLA. 9. Individuals who cannot be covered by the Indemnity The parties to this SLA understand that in keeping with Government initiatives to invite a wider spectrum of society to assist the relevant authorities to implement the Crime and Disorder Act 2000, it is likely that there will be individuals present at certain meetings who are not employed by an organisation and therefore are not in a position to sign this SLA due to the liability of the indemnity. 10. Review of Service Level Agreements The Service Level Agreement will be reviewed annually to ensure that it remains fit for Signatories will be required to re-sign this SLA following each annual review. purpose. 11. Closure/termination of the SLA Any partner organisation can suspend this SLA for 45 days if security has been seriously breached. This should be in writing and be evidenced. Any suspension will be subject to a Risk Assessment and Resolution meeting, the panel of which will be made up of the signatories of this Agreement, or their nominated representative; this meeting to take place within 14 days of any suspension. Termination of this Service Level Agreement should be in writing to all other Partner Organisations giving at least 30 days notice. 12. Requests for Disclosure of Information received under this SLA All recorded information held by public sector agencies is subject to the provisions of the Freedom of Information Act 2000 and the Data Protection Act 1998. While there is no requirement to consult Page 12 of 29

with third parties under FOIA, the parties to this SLA will consult the party from whom the information originated and will consider their views to inform the decision making process. 13. Appropriate Signatories Each organisation should identify who is the most appropriate post holder within their agency to sign the SLA having taken account of their organisational policy and the fact that the signatory must have delegated responsibility to commit their organisation to the indemnity. It is the responsibility of the individuals identified below to ensure that copies of the SLA are made available as necessary to ensure adherence to the SLA. 14. Terminology SLA Partners Scheme Young Person LAC Risk Assessment Declaration Form Risk Reference Secure Email Service Level Agreement Leicester College / and and YOS Risk Assessment process Offender/ applicant/client Looked After Child, in care Leicester City Youth Offending Service Leicestershire Youth Offending Service Leicester College s process for assessing learners who have unspent convictions, or spent and unspent where DBS is required as part of the course. A Risk Assessment will also include support needs and referrals to support teams where required. Conditions of Entry to a learner place can be applied following a Risk Assessment. Learners are monitored and if the return are re-contacted and in some instances may need to be re-assessed. Extensive liaison with Agencies are part of the process Leicester College applicant formal declaration of convictions Leicester College s Agency reference form which is required for every active client of YOS applying to the College. See page 19. and Agency are to use secure email when emailing information on a young person. YOS and Leicester College s Risk Assessment Manager and Risk Assessment Administrator have secure email. Other staff in the College do not have access to secure email. 15. Appropriate Signatories I confirm that this SLA has been prepared in consultation with each signatory organisation. Page 13 of 29

Name: Role: Sophie Strevens-Robinson Risk Assessment Manager Signature: : Leicester College Date: Name: Role: Derrick Kabuubi Team Manager Signature: Division: For Service: Leicester City Youth Offending Service Date: Name: Role: Head of Service Signature: Organisation: Leicestershire Youth Offending Service Date: 16: Key Contact Details Name: Derrick Kabuubi Name: Sophie Strevens-Robinson Role: Operational Manager Role: Risk Assessment Manager Service: Leicester City Youth Offending Service Service: Leicester College Secure email address: derrick.kabuubi@leicester.gcsx.gov.uk.cjsm.net sophie.robinson@leicester.college.cjsm.net Telephone: 0116 454 4600 Telephone: 0116 224 2225 Page 14 of 29

Appendix A: Risk of Harm Definition. Taken from YOS Asset Risk The probability that an event or behaviour carrying the possibility of an adverse or negative outcome will occur. Risk Concerns: o o How likely the event is Its potential impact Risk estimates are based on information but are affected by circumstances, beliefs and feelings. Risk of Harm Harm is defined as behaviour(s) that could hurt another person or persons. This can either be physical hurt or emotional hurt. Using the term Risk of Harm enables the necessary attention to be given to those offenders for whom lower impact/severity harmful behaviour is probable (HMIP July 2012 report on Leicester City YOS). Risk of Harm describes work to protect the public, primarily using restrictive interventions, to keep to a minimum the individuals opportunity to behave in a way that is a Risk of Harm to others. The impact of the harmful behaviour does not need to be significant but needs to be acknowledged as part of every Asset. Risk of Serious Harm The risk of serious harm indicators and ROSH assessment is concerned with offences that are assessed as having a serious impact. The YJB define it as death or injury (either physical or psychological) which is life threatening and/or traumatic and from which recovery is expected to be difficult, incomplete or impossible. Risk of Vulnerability The possibility that the young person might be harmed in some way, either because of their own behaviour or through the actions of others or omissions of others Levels of Risk: Low: No significant, current indicators of risk or harm Medium: there are identifiable indicators of harm. The offender has the potential to cause harm but is unlikely to do so unless there is a change in circumstances, for example, failure to take medication, loss of accommodation, relationship breakdown, drug or alcohol misuse. High: there are identifiable indicators of risk of harm. The potential event could happen at any time and the impact would be serious. Very high: there is imminent risk of harm. The potential event us more likely than not to happen imminently and the impact would be serious. Page 15 of 29

Appendix B: Legislation THE DATA PROTECTION ACT 1998 Data Protection legislation governs the standards for the processing of personal data including the collection, use of and disclosure of such information. The legislation requires that data controllers meet certain obligations. It also gives individuals or data subjects certain rights with regard to their own personal data. The main standard for processing personal data is compliance with the eight data protection principles summarised as follows: i) All personal data will be obtained and processed fairly and lawfully. ii) Personal data will be held only for the purposes specified. iii) Only personal data will be held which are adequate, relevant and not excessive in relation to the purpose for which the data are held. iv) Steps will be taken to ensure that personal data are accurate and where necessary, kept up to date. v) Personal data will be held for no longer than is necessary. vi) Individuals will be allowed access to information held about them and, where appropriate, permitted to correct or erase it. vii) Procedures will be implemented to put in place security measures to prevent unauthorised or accidental access to, alteration, disclosure, or loss and destruction of, information. viii) Personal data shall not be transferred to countries outside the European Economic area except in limited circumstances The most significant principle is the first principle which states that personal data shall be processed fairly and lawfully and shall not be processed unless at least one Schedule 2 condition and in the case of sensitive personal data, at least one Schedule 3 condition is also met. The type of information being disclosed for the purposes of this sharing agreement will almost always be sensitive personal data which means that at least one of both Schedule 2 and Schedule 3 conditions must be satisfied. Even in the event that the prevention and detection of crime exemption (Section 29 Data Protection Act) is being relied upon, or other power such as S.115 Crime and Disorder Act, Schedules 2 and 3 conditions must still be satisfied. Data Protection Act 1998 (Principle 1) Schedules 2 and 3. The most relevant schedules are: The processing is however likely to be necessary for compliance with any legal obligation (3), such as the Police Acts and the Local Government Act 2000. It is likely that the most relevant condition will be that the processing is necessary for the exercise of any other functions of a public nature exercised in the public interest by any person (5)(d). The legitimate interests (6) condition may be appropriate but cases are likely to arise whereby a service user could clearly challenge this, depending upon the circumstances. The most relevant conditions in Schedule 3 are s3 and s7. Section 3. The processing is necessary (a) in order to protect the vital interests of the data subject, or another person, in a case where: (i) consent cannot be given by, or (ii) on behalf of the data subject, or the data controller cannot Page 16 of 29

reasonably be expected to obtain the consent of the data subject, or (b) in order to protect the vital interests of another person, in a case where consent by or on behalf of the data subject has been unreasonably withheld. Section 7. (1) Processing is necessary: (a) for the administration of justice, (b) for the exercise of any functions conferred on any person by or under an enactment. Although the aforementioned conditions are likely to apply to any or all of the variable circumstances, it is likely that for the purposes of this sharing agreement one of the additional conditions specified in secondary legislation (Processing of Sensitive Data Order 2000) may also apply : Data Protection (Processing of Sensitive Personal Data) Order 2000 The Order lists additional circumstances in which sensitive personal data may be processed. For example, it covers processing for the purposes of the prevention or detection of any unlawful act, where seeking the consent of the data subject would prejudice those purposes. It also covers processing required to discharge functions involving the provision of services such as confidential counselling and advice where the subject s consent has not been obtained. In each of the examples above processing would have to be in the substantial public interest. This could mean, for example, that processing is necessary to protect public safety or to protect vulnerable people. THE HUMAN RIGHTS ACT 1998 The UK Human Rights Act 1998 gives further effect in domestic law to Articles of the European Convention on Human Rights (ECHR). The Act requires all domestic law be compatible with the Convention Articles and places a legal obligation on all public authorities to act in a manner compatible with the convention. Should a public authority fail to act in such a manner then legal action can be taken under Section 7 of the Act. Article 8 of the Act states that: Everyone has the right to respect for his private and family life, his home and his correspondence and that there shall be no interference by a public authority with this right except as in accordance with the law. As this sharing of information will be for the purposes of one of the following legitimate aims: In the interests of national security. Public Safety. Economic wellbeing of the country. The prevention of crime and disorder. The protection of health or morals. The protection of the rights or freedoms of others. Freedom of Information Act 2000 Information held by or on behalf of a public authority may be disclosed to a party requesting it except where a statutory exemption applies. For example, personal data is normally exempt under the Act (but may be disclosable under DPA 1998); as is information provided under a duty of confidence. COMMON LAW DUTY OF CONFIDENTIALITY The duty of confidence falls within common law as opposed to statutory law and derives from cases considered by the courts. There are generally three categories of exception to the duty of confidence: Where there is a legal compulsion to disclose. Where there is an overriding duty to the public. Page 17 of 29

Where the individual to whom the information relates consented. Partners should consider which of these conditions are the most relevant ones for the purposes of this sharing agreement. The guidance from the Information Commissioner states that because such decisions to disclose in the public interest involves the exercise of judgement it is important that they are taken at an appropriate level and that procedures are developed for taking those decisions. The partners to this agreement should document within this agreement how this duty will be maintained, e.g. need to know, The Children Act 2004 Section 10 of the Act places a duty on each children s services authority to make arrangements to promote co-operation between itself and relevant partner agencies to improve the well-being of children in their area in relation to: Physical and mental health, and emotional well-being; Protection from harm and neglect; Education, training and recreation; Making a positive contribution to society; Social and economic well-being. The relevant partners must cooperate with the local authority to make arrangement to improve children s wellbeing. The relevant partners are: district councils; the police; the Probation Service; youth offending teams (YOTs); strategic health authorities and primary care trusts; Connexions; the Learning and Skills Council. This statutory guidance for section 10 states that good information sharing is key to successful collaborative working and that arrangements under section 10 of the Act should ensure that information is shared for strategic planning purposes and to support effective service delivery. It also states that these arrangements should cover issues such as improving the understanding of the legal framework and developing better information sharing practice between and within organisations. Section 11 of the Act places a duty on key people and bodies to make arrangements to ensure that their functions are discharged with regard to the need to safeguard and promote the welfare of children. The key people and bodies are: local authorities (including district councils); the police; the Probation Service; bodies within the National Health Service (NHS); Connexions; YOTs; governors/directors of prisons and young offender institutions; directors of secure training centres; the British Transport Police. The section 11 duty does not give agencies any new functions, nor does it override their existing functions, it simply requires them to: carry out their existing functions in a way that takes into account the need to safeguard and promote the welfare of children; In order to safeguard and promote the welfare of children, arrangements should ensure that: all staff in contact with children understand what to do and the most effective ways of sharing information if they believe a child and family may require targeted or specialist services in order to achieve their optimal outcomes; Page 18 of 29

all staff in contact with children understand what to do and when to share information if they believe that a child may be in need, including those children suffering or at risk of significant harm Crime and Disorder Act 1998 Section 17 applies to a local authority (as defined by the Local Government Act 1972); a joint authority; a police authority; a national park authority; and the Broads Authority. As amended by the Greater London Authority Act 1999 it applies to the London Fire and Emergency Planning Authority from July 2000 and to all fire and rescue authorities with effect from April 2003, by virtue of an amendment in the Police Reform Act 2002. It recognises that these key authorities have responsibility for the provision of a wide and varied range of services to and within the community. In carrying out these functions, section 17 places a duty on them to do all they can to reasonably prevent crime and disorder in their area. The purpose of this section is simple: the level of crime and its impact is influenced by the decisions and activities taken in the day to day business of local bodies and organslations. Section 17 is aimed at giving the vital work of crime and disorder reduction a focus across a wide range of local services that influence and impact upon community safety and putting it at the heart of local decision making. Section 17 is a key consideration for these agencies in their work in crime and disorder reduction partnerships, drug action teams, YOTs, children s trusts and local safeguarding children boards. Section 37 sets out that the principal aim of the youth justice system is to prevent offending by children and young people and requires everyone carrying out youth justice functions to have regard to that aim. Section 39(5) sets out the statutory membership of YOTs reflecting their responsibilities both as a criminal justice agency and a children s service. The membership consists of the following: at least one probation officer; at least one police officer; at least one person nominated by a health authority; at least one person with experience in education; at least one person with experience of social work in relation to children. YOTs have a statutory duty to coordinate the provision of youth justice services including advising courts, supervising community interventions and sentences, and working with secure establishments in respect of young people serving custodial sentences and also in the latter category of a children s service. As YOTs are multi-agency teams, members will also need to be aware of the need to safeguard and promote the welfare of children that relates to their constituent agency. Section 115 provides any person with a power but not an obligation to disclose information to responsible public bodies (e.g. police, local and health authorities) and with cooperating bodies (e.g. domestic violence support groups, victim support groups) participating in the formulation and implementation of the local crime and disorder strategy. The police have an important and general common law power to share information to prevent, detect and reduce crime. However, some other public organisations that collect information may not have had the power previously to share it with the police and others. Section 115 clearly sets out the power of any organisation to share information with the police authorities, local authority (including parish and community councils), Probation Service and health authority (or anyone acting on their behalf) for the purposes of the Act. This ensures that information may be shared for a range of purposes covered by the Act, for example for the functions of the crime and disorder reduction partnerships and YOTs, the compilation of reports on parenting orders, anti-social behaviour orders, sex offender orders and drug testing orders. Page 19 of 29

We have the appropriate Data Protection Registration notification with the Information Commissioner, which will be kept up to date and we will share data in accordance with the provisions of this. Each partner organisation should be able to identify their lawful basis to share this information. This lawful basis may come from common law, statute or legal precedence, which may be supported by Home Office guidance, professional/executive bodies, e.g. Dept of Health, Association of Chief Police Officers, Dept of Education, etc. This will enable partners to defend a challenge with regard to the Data Protection Act 1998 and/or the Human Rights Act 1998. It is also important to ensure that any partner/individual who receives information and holds and processes such information is able to identify a paragraph in Schedule 2 of the Data Protection Act 1998 to ensure that the processing is fair and lawful. If the information is sensitive information a paragraph in Schedule 3 will also need to be identified. Page 20 of 29

Appendix C: Declaration of Previous Convictions Form Page 21 of 29

Appendix D: Agency Risk Reference LEICESTER COLLEGE Student Risk Assessment Agency Risk Reference Form Full Name: Date of Birth: The above person has either attended a Risk Assessment, or is scheduled to attend a Risk Assessment, and has given us consent to obtain this information. This information will be used as part of the Risk Assessment process, and to help support the learner in their studies, if they are cleared to attend. Offending History and Risk Level Is the client current: Yes No Date of first contact: Last contact: Please provide details and dates of offence/s and conviction/s and any pending charges/ convictions: Please indicate the *level of Risk of harm at the time when you were in contact with the client: *complete a level for all categories* Category Low Medium High Very High Young people Vulnerable adults Specified adults Staff Self Public Risk of re-offending: LOW / MEDIUM / HIGH (please circle) If Medium / High / Very High, please detail why, and attach ROSH / VMP Is your client subject to a SOPO: Yes No If YES please submit/attach all details Are any relevant to this type of provision? If so, send a secure email detailing these to: Sophie.robinson@leicestercollege.cjsm.net Are they a looked after child; Yes No Page 22 of 29

Please provide the name / contact details of Social Worker / Key Worker and name of Home Is/was your client: MAPPA MAPPOM N/A Please provide the Category and Level and MAPPA contact details of PPT. Mental Health and Substance Misuse Are/were there Mental Health factors that need taking into account: Yes No What are/were these: Are/were there any substance misuse: Yes No What are /were these: Supervision and Orders What work is being /was covered in their supervision: How often do/did you see them: Weekly Fortnightly Monthly 2 Monthly Daily What will / did the supervision cover? Has / did the client successfully complete all Orders/Supervision: Yes No Ongoing Has / did the client respond positively to the supervision: Always Often Sometimes Rarely Never Based on your assessments and the information available to you, is your client safe to be in an aged 14+ College with Nurseries and vulnerable learners, and do you support their application on this basis? If they have a SOPO, or any restrictions, contact the Risk Assessment Manager, Sophie Strevens-Robinson. Page 23 of 29

YES, according to all information available to me, they are safe to be at Leicester College. NO, according to all information available to me, they are not safe to attend Leicester College. If No, please detail why they are not, or contact the Risk Assessment Manager Based on your knowledge of the client, do you know of any support needs you feel we could assist with; E.g. Counselling, Mental Health, Learning Mentor, Careers Advice, DSLAbility support Please provide any additional details that you feel are relevant to this applicant. Form Completed by: Name: Position: Organisation: If there is any additional information you wish to provide, please continue on another sheet, or contact the Risk Assessment Team. Page 24 of 29

Appendix E: Learner Risk Assessment Information RISK ASSESSMENTS Leicester College has a legal obligation known as Duty of Care to do everything that is reasonable to protect learners, staff and visitors from potential harm, and to ensure that support needs for learners are met. Risk Assessment is part of the College s Safeguarding framework; it is an important part of the Admissions, process, and for all prospective learners at Leicester College. The purpose of Risk Assessment is to identify and assess any learner whose known behaviour and criminal record indicates that they may be a risk to other learners, staff, themselves, visitors or the College environment. The process also helps to identify learners who could benefit from support whilst they are at College, and we have a range of support for our learners from Mentoring to Counselling. Risk Assessments are one way in which the College works to provide a safe, supported and inclusive environment for all people within the College. Why do I need to declare? As part of the College s Risk Assessment and Disclosure and Barring (DBS) procedures, applicants/ learners are required to declare if they have an *unspent criminal record, including any pending court cases, if they are on Bail, or if they are charged with any criminal offence either at application stage or during their course. *Learners are also required to disclose spent and unspent convictions (that aren t protected ) if their course involves a work placement with young and or vulnerable people, and will need to have a Disclosure and Barring Service (DBS) check as part of their course requirements. Learners who do not declare may be removed from their course and not allowed to come back. What information do I need to give you? Once you declare on the College s application form, at enrolment, or to a member of staff we will write to you with a Declaration of Previous Convictions form. You must complete the form and post it back. See the points below for what we need: We need details of your convictions, for example; Caution; Youth Rehabilitation Order; Supervision, Custodial; ISS- Intensive Supervision; Community Service. If you are not sure what conviction/s you have, write what you think you have, or check with us. If you have several convictions, you will need to write each one, you may need to continue on the back of the form if the box is not big enough. We need the dates you committed the offences, and the date/s of when you were convicted or sentenced. Don t forget, if you have a DBS Check, you will need to tell us about * spent and unspent criminal records *see below. *The Amendments to the Exceptions Order 1975 (2013) provide that certain spent convictions and cautions are 'protected', and are not subject to disclosure, and therefore cannot be taken into account. Guidance and criteria on the filtering of these cautions and convictions can be found on the Governments Disclosure and Barring Service website. The Risk Assessment Team will only take in to account convictions and cautions that aren t protected. We also need the name and contact number of your Probation Offender Manager or Youth Offending Worker, Public Protection Officer or, any other external agency that are working with you, or have been working with. If we have seen you before and your conviction/s is not spent, we will send you a Have you Re-Offended letter, which has a small form to complete. You must fill this in and send it back. Or if you are enrolled and have not declared that you have conviction/s, you may be told that you cannot come to College until you have been risk assessed. Page 25 of 29