RCGP RSC network of GP practices

Slides:



Advertisements
Similar presentations
HCQ P MEDICARES HEALTH CARE QUALITY IMPROVEMENT PROGRAM QualityNet Exchange Dennis Stricker Director, Information Systems Group Office of Clinical Standards.
Advertisements

Enabling Secure Internet Access with ISA Server
The VPN-Alyzer When Collecting SNMP and Netflow isnt practical.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Introducing K12Planet.com What is K12Planet.com? Who can access it? Is it secure? What do I need to use it? Can I control the information I see?
EUropean Best Information through Regional Outcomes in Diabetes Privacy and Disease Registries Technical Aspects Peter Beck JOANNEUM RESEARCH, Austria.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
HIPAA Data Security PCF Data Security Update May 1 st, 2015.
November 2009 Secure Data Transmission May 2014 What are Secure Methods of Transmission? Encrypted Services Encrypted Memory Sticks Fax Secure.
1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the.
CEDARS Validations Review and address data quality errors.
Your storage on the ground; Your files in the cloud.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Green Computing Sharing files to reduce printing.
Privacy and Information Management ICT Guidelines.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
OARN Database UPDATE – SEPTEMBER We’re Live – and Testing  The site is up and running in Google’s data centers:  The site has been secured: 
The solarmuri web-data server: Contains general information about our project Allows us to easily exchange data, images,
Secure . is a means of exchanging digital messages from an author to one or more recipients – it is instant with no delay or postal costs.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Eurostat November 2015 Eurostat Unit B3 – IT and standards for data and metadata exchange SDMX IT Tools Test Client Jean-Francois LEBLANC Christian SEBASTIAN.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Networking Network Classification, by there: 3 Security And Communications software.
#InnovateIT. WEBROLE.0.CONTOSO.CLOUDAPP.NET
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
Query Health Abstract Model Diagrams. Query Network Community of participants that agree to interact with each other. There will be many networks; requestors.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
From The Foundation Stage Forum. Has been running for 12 years Inspiration for Tapestry Over 45,000 members Discussions Resources Support The Foundation.
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
Stage 2 DATA SUBMISSIONS AND TRANSFERS 1www.ihpa.gov.au.
Yahoo is the one of the topmost “internal portal” on the web that is used for  Homepage customization  Search s  Search as a World Wide Web 
Types of computers Module 1.10 AS identifies and distinguishes between computer types and associated software. AS identifies the main hardware.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
The Parent Portal Version 3.0 Last Updated on 14/10/2016.
«My future profession»
Working at a Small-to-Medium Business or ISP – Chapter 8
Enabling Secure Internet Access with TMG
Employee clicks on fake
Information Security Seminar
FTP - File Transfer Protocol
What is Tapestry? An Online learning journal system.
HealthPathways Dr Linda Kohler GP Clinical Editor, HealthPathways
The Parent Portal Version 3.1 Last Updated on 24/04/2017.
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Internet Protocol Mr. Paulk.
HP Support tells you how to password protect your PC.
Accessing & Using NetStorage
Internet safety By DAGAS YACMAS team.
SharePoint Security for the Site Owner
Introduction to Networks
Web Servers / Deployment
REDCap and Data Governance
Securing Windows 7 Lesson 10.
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
The Parent Portal Version 3.1 Last Updated on 24/04/2017.
Presented by: Faisal Mohamed & Mohamed Dabour
laituri.local Network diagrams
Data Security Awareness
Why SIMOP monitor? Knowing what should be done for SIMOP
Introduction to the PACS Security
IT Office hours – 1 Data Sharing 101
WPIC Department of Psychiatry Office of Academic Computing
Burnham & Berrow Medical Centre supports the Royal College of General Practitioners and the National Association for Patient Participations’ campaign to.
Net Report Statistics Dashboard Summary
Presentation transcript:

RCGP RSC network of GP practices Clinical Informatics and Health outcomes Research Group: Generic Data flow diagram RCGP RSC network of GP practices Data collection using MIQUEST NHS Digital Pseudonymised data is collected on-site using encrypted external drives or laptops Web-transfer or upload of large encrypted and password protected data files by third party provider Pseudonymised data - downloaded from NHS Digital on-line portal Server within the dedicated secure network of the Research Group Data collection in other specific projects Pseudonymised data is collected on-site using encrypted devices or transferred between NHSmail accounts Out-put only reports, graphs & aggregated tables (data is retained and disposed of in line with University Research Data Management Guidelines) NHS Project funders Other Project funders Participating GP practices Last up-dated: 02/01/18 Author: Dr Tom Chan Version 1.1

Data flow analysis Generic data flow diagram All major inbound and outbound data flows are represented in the diagram Major inbound data sources are: NHS Digital RCGP RSC (Royal college of General Practitioners, Research and Surveillance Centre) On-site data collection using MIQUEST (Morbidity Information QUery and Export SynTax) Ad hoc data transfer from study participants Outbound data are in the form of reports, publications, graphs and/or aggregated tables Secure network of the Research Group The Research Group’s dedicated secure network is diagrammatically represented in the Surrey Secure Network The secure network is sited behind a firewall within the University’s network, all in-bounded connections are block, but out-bounded connections are allowed All staff members of the research group working within the team base work from secure workstations or secure laptops with encrypted drive