Data Protection Session

Slides:



Advertisements
Similar presentations
Data Security Breach Code of Practice. Data Security Concerns Exponential growth in personal data holdings Increased outsourcing 3 rd countries cloud.
Advertisements

HIPAA Training. What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) was enacted in It provides the ability to transfer.
Information Governance
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
Data Protection Recruitment Process
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection for Church of Scotland Congregations
2 Private versus public. 2 Lesson objectives By the end of the session, you will: understand how you might unintentionally disclose personal data; define.
This document is designed to provide you with a summary of do’s and don’ts when mentoring. This document is not to be read in isolation but in conjunction.
Practical Information Management
Handling information 14 Standard.
Chpter8: Using responsibly. Step 1: Keep personal to a minimum  Keep personal messages sent from your work account short and few in number,
HIPAA PRIVACY AND SECURITY AWARENESS.
Electronic Use Policies.   Social Media  Internet.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
Information Governance Policies. Business Support and Corporate Information Resources Team… Working to create a knowledge led organisation Information.
Data Protection Act & Freedom of Information Simon Mansell Corporate Governance and Information Team.
Data Protection Act ‘ What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
Introduction to Information Governance (IG) Mark Scallan – Head of IG/Data Protection Officer Angela Kaye – IG Officer.
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Angela McKinnon Child health lead Aberdeenshire CHP NHS Grampian Jan 2015.
Data protection—training materials [Name and details of speaker]
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Whistleblowing: Raising and escalating concerns Professor Kay Caldwell – 28 th January 2016.
Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Values and Planning Codes of Practice and Policies Lecturer Nikki Hardman.
ISMS Information Security Management System
Tony Sheppard Mobile Guardian
Unit 5 Understand how to work in partnership
COMP3357 Managing Cyber Risk
GDPR Awareness and Training Workshop
SIMS Reporting Enhancement supporting GDPR
Taken from Irwin Mitchell 2017
Handout 3: Written communication methods
Handout 3: Written communication methods
An Introduction to Public Records Office of the General Counsel
GENERAL DATA PROTECTION REGULATION (GDPR)
Reporting personal data breaches to the ICO
GDPR and paper records Why it’s not all cyber and fines Gary Shipsey
INFORMATION GOVERNANCE
New Data Protection Legislation
The new data protection rules
General Data Protection Regulations
Information for Patients Please return to reception
Finham Primary School – GDPR Practice Guidelines
How we use Your Health Records
D3 Confidentiality.
How we’ll prepare for the General Data Protection Regulation (GDPR)
Information management and communication
Health and Safety! By jack Hughes.
INFORMATION GOVERNANCE
COMP3357 Managing Cyber Risk
General Data Protection Regulations 2018
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
HIPAA Overview.
Understanding Data Protection
Outlook and Shared Drives
The ICO: New Powers and Penalties
Managing data breaches
Data Protection What can I do? GDPR Principles General Data Protection
Handling Information Securely
Handling information 14 Standard.
GDPR what do we need to do?
Privacy and Security Basics Training
Presentation transcript:

Data Protection Session This Presentation provides guidance on existing policies that outline the council’s current position in regard to information security and data handling

Background – why this session? As an organisation Information Security is something that is taken seriously On a day to day basis social care services deal with highly sensitive and confidential information, this puts you at more risk of a possible data breach, due to the nature of your work

Data Breaches A neighbouring authority have previously had occurrences where personal and sensitive data has been shared inappropriately and illegally One of these incurred a fine from the ICO of £80,000, with subsequent fines being anywhere up to £500,000 ICO - Information Commissioners Office and it is the UK’s independent authority set up to uphold information rights in the public interest promoting openness by public bodies and data privacy for individuals

Printer mistake led to information being sent to wrong recipient Plymouth City Council fined £60,000 by the ICO The information included “highly sensitive” personal information about two parents and four children A social worker used a printer which lead to papers being mixed up and the information being sent to another family An independent audit determined human error as the cause, as well as a failure in the “levels of checks in order to ensure the documents were being sent to the correct recipient”

ICO Verdict “It would be too easy to consider this is a simple human error. The reality is that this incident happened because not enough care was being taken within the organisation when handling vulnerable people’s sensitive information. The distress this incident will have caused the people involved is obvious, and the penalty we have issued today reflects that.” As well as fines, people have been dismissed from placements for data breaches involving inappropriate disclosure and access of information

What steps can you take to reduce the risk of breach? Follow any action plans/processes that have been put in place by your team, e.g: Address checking. Private and confidential Protective Marking. Checking content of email / letter are correct. If you are sending any High Risk Information double check the details are correct.

Steps to Take, continued Do not store anything on your laptop, i.e. My Documents or Desktop – If you need to use the desktop to save a document for a visit make sure that it is deleted as soon as possible and make the documents anonymous until saved onto the network. Only look up information on Mosaic for cases relevant to you. You will be challenged on any inappropriate access.

Steps to Take, continued Keep your desk clear of any sensitive or confidential information when you are not using it. Carry out one task at a time, if you try to complete multiple tasks, involving sending letters to different families / organisations these can get mixed up. If you are in any doubt that something is not right do not send the information, until you have checked it is correct.

Follow the action plans put in place by your team. Keep data secure. Summary Follow the action plans put in place by your team. Keep data secure. Double check any High Risk information before sending. Do not store data on your desktop. Carry out one task at a time. If you have any doubts over accuracy, check them. If you are unsure, seek advice. Disciplinary action may be taken if users fail to observe core Data Security guidelines.

IT’S OUR RESPONSIBILITY We need customer and employee personal data to run our business successfully. We are trusted to look after this essential information. Each and every student social worker has a responsibility to comply with the appropriate Data Protection Laws. Think Privacy.