Quick Guide to Undertaking an Information Governance Compliant Clinical Audit Project Wendy Harrison and Heather Sharp NHS Bradford and Airedale.

Slides:



Advertisements
Similar presentations
NIGB Legal requirements for use of personal data in research OnCore UK / NRES Training workshop Ethical Principles relating to consent for use of samples.
Advertisements

NATIONAL INFORMATION GOVERNANCE BOARD
Organise Workplace Information
Records Management and the NHS Code of Practice (Foundation) Information Governance Policy Team NHS Connecting for Health.
Information Governance An Introduction. Information Governance Outline What is Information Governance What initiatives does IG cover.
Introduction to Information Governance (IG)
Records Management and the NHS Code of Practice (Foundation) Information Governance Policy Team NHS Connecting for Health.
Information Governance Peter McKenzie Information Governance Manager NHS Tayside
Information Governance. “ensuring the confidentiality, accuracy and availability of patient information” Why Information Governance?
Corporate Records Management (Practitioner) Information Governance Policy Team NHS Connecting for Health.
Principle 1 Principle 1 Processed fairly and lawfully + only with a legitimate basis There should be no surprises, so … inform data subjects why you are.
Health Records Management Practitioner
Information Governance – Who Cares? Alistair Stewart Information Governance Co-ordinator.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Confidentiality & Records Management. What is Information Governance? What is Records Management?
Data Protection.
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
Data Protection Recruitment Process
DATA PROTECTION AND PATIENT CONFIDENTIALITY IN RESEARCH Nic Drew Data Protection Manager University Hospital of Wales   
Audiences NI Data Protection Workshop
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
The Legal Framework Can you work out which slide each bullet point should go on?!
Data Protection for Church of Scotland Congregations
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Practical Information Management
Information Governance Jym Bates Head of Information Assurance.
Implementation of Security and Confidentiality in GP Practices.
Health & Social Care Apprenticeships & Diploma
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
The Data Protection Act 1998 The Eight Principles.
Privacy and Information Management ICT Guidelines.
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
Data Protection Act ‘ What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Local Government Reform and Compliance with the DPA Ken Macdonald Assistant Commissioner (Scotland & Northern Ireland) Information Commissioner’s Office.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Data Protection for Church of Scotland Congregations.
CALDICOTT PRESENTATION. History Caldicott report published in 1997 and implemented in 1999 Inquiry chaired by Dame Fiona Caldicott.
Your health record How the local NHS uses and protects the information held about you Other ways that your records may be used Your local NHS services.
Information Systems Unit 3.
Personal data protection in research projects
INFORMATION GOVERNANCE AND CONFIDENTIALITY Information Governance Facilitator.
Data Protection and research Rachael Maguire Records Manager.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Scientific data storage: How are computers involved in the following?
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Information Governance A refresher for all staff who have previously gone through the full course.
Data Protection and Confidentiality
General Data Protection Regulation
Data Protection & Freedom of Information- An Introduction
Security of People, Property and Information
G.D.P.R General Data Protection Regulations
Data Protection principles
Information for Patients Please return to reception
Recording Clinical Data
How we use Your Health Records
D3 Confidentiality.
GDPR Quiz Today’s trainer: Click here to use Kahoot! 1
Recording Clinical Data
Recording Clinical Data
HIPAA Overview.
Understanding Data Protection
Introduction to the PACS Security
Presentation transcript:

Quick Guide to Undertaking an Information Governance Compliant Clinical Audit Project Wendy Harrison and Heather Sharp NHS Bradford and Airedale

Contents 1 Aims of the guide 2 Laws affecting the use of confidential information in clinical audit 3 Informing patients 4 Justifying the use of patient information in clinical audit 5 The use of patient identifiable information for clinical audit 6 Access to information for clinical audit 7 Transferring clinical audit data 8 Information security do’s, don’ts and how to’s 9 Storage/retention/disposal of clinical audit data 10 Secondary uses of clinical audit data 11 Information Governance checklist

1 Aim of this Guide This guide is a condensed version of key messages from the HQIP Clinical Audit and Information Governance Guide This ‘quick guide’ is designed to be a pocket-sized reminder of the key areas of information governance which apply to clinical audit projects

What is information governance? What is information governance all about? Information Governance is a framework for handling personal information in a confidential and secure manner to appropriate ethical and quality standards, in a modern health service so It’s basically common sense – think of any information you handle as if it were your own. How would you expect your information to be handled or accessed?

2 What laws affect the use of information? There are laws protecting how we handle information and these include: The Data Protection Act 1998 Criminal Justice and Immigration Act 2008 The Freedom of Information Act 2000 Access to Health Records Act 1990 (Deceased records) Human Rights Act 1998 Computer Misuse Act 1990 Section 251 of the NHS Act 2006 specifically relates to the use of information (with strict controls) for clinical audit purposes

Always bear in mind the eight Data Protection Act principles which require that personal data must — Be processed fairly and lawfully Be obtained or processed for specific lawful purposes Be adequate, relevant and not excessive Be accurate and kept up to date Not be kept for longer than necessary Be processed in accordance with rights of data subjects Be kept secure Not be transferred outside the European Economic Area (EEA) unless there is adequate protection

3 Informing patients about clinical audits Although explicit consent is not required patients should be informed about how their information could be used in the NHS including the potential use of their information for clinical audit. In order to assist with this, an example patient information leaflet is available on the HQIP website. The leaflet aims to help patients understand why we might need to use their information for clinical audit There may be some occasions where although consent is not a requirement it may be good practice e.g. the involvement of children, palliative care, mental health topics

4 Justifying your use of patient data To help ensure that you have justified the use of the data for your clinical audit project, consider: Has the project been prioritised as part of an annual clinical audit programme? (more guidance is available in the HQIP Clinical Audit Guidance Tools) Have the key stakeholders been agreed and the project lead or sponsor identified? Have all staff involved had appropriate information governance training and have confidentiality clauses written into their contracts?

4 Justifying your use of patient data Always follow the six Caldicott Principles — 1 Justify the purpose(s) of using confidential information 2 Only use when absolutely necessary 3 Use the minimum that is required 4 Access should be on a strict need-to-know basis 5 Everyone must understand their responsibilities 6 Understand and comply with the law

The use of patient identifiable information for clinical audit Patient identifiable data vs anonymised data — Historically there has been some misunderstanding around the difference between patient identifiable data and anonymised/psuedonymised data In general terms, patient identifiable data is data that can be directly linked back to a living individual. This can be directly by including sufficient details such as name, address, sex, date of birth, postcode, phone number, condition, medication etc. or by use of a key such as the NHS number or your own local key. In both cases the data can be linked back to a single living individual

5 The use of patient identifiable information for clinical audit Patient identifiable data vs anonymised data — Processing of patient identifiable data is subject to the provisions of the Data Protection Act It is a common misconception that data is anonymous if the recipient does not have access to the key. it must be noted that ANY data associated with a unique key which refers to a single living individual is patient identifiable data and are subject to the Data Protection Act

6 Access to information for clinical audit When thinking about information governance issues it is important to consider who will require access to the information and what level of access they will require. Consider the following groups of people Clinical staff – will need access to all data Clinical audit team – could require access to all data Administrative staff – should only need access to anonymised data Ensure that you assess the levels of access for different staff groups in the planning stages and ensure appropriate access controls are in place i.e. only those who need to have access to clinical audit data, should have access. A mechanism for removing access to the data should also be in place for staff who leave the organisation.

7 Transferring clinical audit data It is your responsibility to ensure the safety of the data you are using for your clinical audit. You must adhere to your organisation’s procedures for secure data handling and seek assurance that the receiving person/team/organisation is aware of their responsibilities to handle and store data securely. You should also seek assurance that clinical audit data will not be given to or be accessible to anyone not involved with the clinical audit project. Consider creating a log to record all transfers of clinical audit data

Example Clinical Audit Transfer Log

8 Information security do’s When handling clinical audit information YOU MUST ALWAYS — Protect your team’s/network’s files and folders by ensuring that permissions are up-to-date and only those who need access have access Seek assurance that those who need access to the clinical audit data are aware of their information governance responsibilities Give passwords/access to those members of staff who need it for the clinical audit Operate a clear desk policy — lock paper information away when you’re not using it Secure your workstation when absent from your desk by activating a password protected screen saver or using Ctrl-Alt-Del-Lock workstation if your network supports this

8 Information security do’s When handling clinical audit information YOU MUST ALWAYS — Ensure that databases are password protected, even if the information is anonymised/pseudo-anonymised Encrypt data so that if information needs to be stored on portable media (i.e. disk, CD, USB) or emailed to someone else, you know it is secure Log the retention period for the audit data, so that it can be destroyed when no longer required Destroy clinical audit data in line with your organisation’s procedures, i.e. in a confidential manner

8 Information security don'ts When handling clinical audit information YOU MUST NEVER — Leave patient notes/audit data unattended on your desk Transfer data by any method, without ensuring it is being done so securely Include patient details in your audit proforma unless you have the patient’s consent Save information to your local ‘c’ drive as if your pc fails you will lose your data Input information into a database without anonymising/ pseudo-anonymising it

8 Information security don'ts When handling clinical audit information YOU MUST NEVER — Create databases without ensuring they are password protected Email audit data without winzipping and encrypting it first Keep data forms, databases etc for longer than necessary Breach legal requirements or be ignorant of the legal requirements that affect you Pass any data used in your audit to anyone who does not have a legitimate right to use the information (i.e. third parties inside or outside of your organisation)

Guidance on creating passwords A secure password should contain a combination of upper and lower case letters, numbers and characters. It should be random and not be able to be easily guessed by those who do not require access to the information. A good way to create a password is to link it to a phrase i.e. The diabetes clinical audit takes place in March 09 - your password would then be TdcatpiM09 or you could use your current favourite song You should always mix your phrases to ensure that the logic behind them is not easily identifiable and your passwords easily guessed

9 Storage/retention and disposal of clinical audit data Clinical audit data should be stored securely throughout the clinical audit process You should refer to your organisation’s local procedures for retention timescales on clinical audit data collection sheets (proformas) but the DH Records Management NHS Code of Practice requires that clinical audit records must be kept securely for a minimum period of 5 years after a clinical audit has been completed The code does not further define records, therefore, you should always follow your own organisation’s retention policy regarding the documentation created and collated throughout your clinical audit project. The data should be kept for no longer than the agreed period and should be destroyed confidentially after this time

9 Storage/retention and disposal of clinical audit data TIP: Create a log of all projects undertaken by your team/office/department, which shows who has guardianship of the clinical audit data and reports, their contact details, location of the data, retention period and ultimately when and how it was destroyed Ensure that contact details are updated when guardians leave or if the clinical audit data is removed to another site. Your organisation may have a central register for clinical audit projects, which should incorporate these details

financial audit and other management activities 10 Secondary uses of clinical audit data Patient information should not be used for any other purpose than that for which you have collected it. Although you may want to use the summarised, anonymised clinical audit results to support other quality improvement work you must not give or allow anyone access to the raw clinical audit data without checking whether the team/individual has a legitimate right to access it This includes you; you can not use the raw clinical audit data you have collected for other projects and especially NOT for research purposes Healthcare purposes is defined as all activities that directly contribute to the diagnosis, care and treatment of an individual and the audit/assurance of the quality of the healthcare provided. They do not include research, teaching, financial audit and other management activities

11 IG checklist — consider the following — Have you registered your clinical audit project with your organisation’s clinical audit team? Will you be using patient identifiable information throughout your audit (if yes, you may need patient consent and/or the approval of your Caldicott Guardian/Information Governance Lead)? Will you need to anonymise or pseudonymise your data? Are clinical audit patient information leaflets generally available in your organisation? Are those who have access to the data aware of their IG responsibilities?

11 IG checklist — consider the following — Have you considered any ethical issues (third party access)? Who has access to the clinical audit data and at what level (identifiable or anonymised)? How will you securely transfer any clinical audit data? Can you consider creating a log of any transfers of information which will be happening throughout the project? Where will you store the clinical audit data? Is this a secure area? What is the level of security on any electronic/paper records of your clinical audit data?

11 IG checklist — consider the following — Have you created a password to protect any electronic data? Have you informed those staff who need access to the data what the password is? Who will be the named guardian/owner of the clinical audit data? Have you created a log of clinical audit projects containing the ‘guardian/owner’ of the data? Have you identified the retention period and destruction date for the data? Are you using any of the other HQIP clinical audit products?

Quick Guide to Undertaking an Information Governance Compliant Clinical Audit Project Wendy Harrison and Heather Sharp NHS Bradford and Airedale