WCCIS Information Governance

Slides:



Advertisements
Similar presentations
Business Case Template for Significant In-Housing of CSS CSS Market Development Team, Feb 2014.
Advertisements

Process and Procedure Documentation. Agenda Why document processes and procedures? What is process and procedure documentation? Who creates and uses this.
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
Supportive Services for Veteran Families (SSVF) Data Bigger Picture Updated 5/22/14.
Pennsylvania’s Protection From Abuse Database
1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.
HIPAA PRIVACY AND SECURITY AWARENESS.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
Kevin Casady Hanna Short BJ Rollinson.  Centralized and Structured collection of data stored in a computer system  An electronic filing system  Easy.
Change Management Programme. Vision of the union as an organising union ● Establish a change management team ● Agree a vision ● Agree an organising budget.
General Awareness Training Security Awareness Module 3 Take Action! Where To Go for Help.
ALEX STEWART INTERNATIONAL’S CODE OF PROFESSIONAL CONDUCT.
“ Jericho / UT Austin Pilot” Privacy with Dynamic Patient Review April 23, 2013 Presented by: David Staggs, JD, CISSP Jericho Systems Corporation.
EU Data Protection IT Governance view Ger O’Mahony 12 th October 2011.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Health Delivery Services May 29, Eastern Massachusetts Healthcare Initiative Policy Work Group Session 2 May 29, 2009.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
1 PARCC Data Privacy & Security Policy December 2013.
Agenda Background Scenarios Existing Data No Existing Data Search Q & A The User is Presented with the Log In screen to Access the Auction Application.
Project Management Process
Slide number 1 Annex H Review Of Nursing In The Community Proposed Activities to End March 2007 Kevin Martin Eugenio Grandi.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
Information Sharing & Corporate Governance Dave Parsons, Information Governance Manager, City of Cardiff Council.
Information Sharing for Integrated Care A 5 Step Blueprint.
HIPAA Requirements for Computer-based Patient Record Systems and the CPR Selection Toolkit Caroline Samuels MD
The Evolving IG Lead Role Phil Walker IGA. The IG Lead Role I am constantly surprised by the breadth and variety of work undertaken by IG Leads, but there.
Sharing Personal Information Programme Wales Accord on the Sharing of Personal Information (WASPI) for organisations involved in the protection, safety,
‘Spread the Word’ training session Andy Liebow Programme Administrator Avon Chlamydia Screening Programme.
UK e-Health Week-20 April 2016 Child Protection – Information Sharing (CP-IS) Val Nugent SRO CP-IS NHS England Cathy Sheehan Clinical Lead CP-IS NHS England.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Managed IT Services JND Consulting Group LLC
Information Sharing Gateway Kevin Whittaker University Hospitals of Morecambe Bay NHS FT On behalf of Lancs & Cumbria IG Group.
Roland Gilbert BSc MRICS; Prince 2 Practitioner
Data Protection Regulation
Health Insurance Portability and Accountability Act of 1996
Policy Development Milan Adams.
Registering for patient access
Overview of Structure General Data Protection Regulation (GDPR)
Learning objective Understand how to safeguard children in relation to legislation, frameworks, policies and procedures. Identify current.
Open Science Grid Consortium Meeting
Information Sharing for Integrated care A 5 Step Blueprint
Technology in care homes -
An Evidence Based Project : Title of Your Project Goes Here
Key Information Summary (KIS)
JUYI Joining Up Your Information
Information Sharing Gateway
Move this to online module slides 11-56
Security Awareness Training: System Owners
IS4550 Security Policies and Implementation Unit 5 User Policies
EHRs and HIPAA: Steps to Maintain Privacy and Security of Patient Data
HRMS Security Auditor HRMS Implementation Project.
MyHR and Data Protection
Lessons from Homicide and Domestic Violence
User Requirements To System Requirements
Interpreting Privacy Principles: Chaos or Consistency?
Privacy Act 1993 EIT, Author Gay Robertson, 2017.
How can we make AFMs aware of online programmes
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
HIPAA Policy & Procedure Strategies
ICHN Annual Conference
Confidentiality Agreement
Signing in for Patient Access
Working together to support patients with long-term conditions
WebCast on Draft Cyber Security Standard 1300 October 18, 2004
Process and Procedure Documentation
Update on Professional Learning: Salary Days
Presentation transcript:

WCCIS Information Governance

Information Risks There are three key information risks identified with the implementation of WCCIS: Breach of Personal Information Abuse of the information held

Known issues Information search brings back information not required for search purposes Information in the Patient Summary Screen

Summary Screen The Summary Screen is accessible from the ‘search return’ screen. Summary screen is accessible to all practitioners regardless of security boundary

Draft security model

Plan to mitigate risks Inter Authority Agreement Data Disclosure Agreement IG and Consent will be part of End User Training All Staff have to agree Access Agreements before passwords are provided Security Model to be Tested Run IG Testing of the system (to identify non compliance) Work with National IG team and National WCCIS Programme