Information Governance Jym Bates Head of Information Assurance.

Slides:



Advertisements
Similar presentations
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Advertisements

HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Confidentiality & Records Management. What is Information Governance? What is Records Management?
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Training prepared by Geoff Webb Information Security & Governance Consultant Data Protection isn’t a choice, it’s the law What all CPH staff must do 17/07/2013.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
IT Security Essentials Ian Lazerwitz, Information Security Officer.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
3 Is there something I should know? Exercising our rights.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
10 Essential Security Measures PA Turnpike Commission.
DATA PROTECTION AND PATIENT CONFIDENTIALITY IN RESEARCH Nic Drew Data Protection Manager University Hospital of Wales   
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
The Legal Framework Can you work out which slide each bullet point should go on?!
Data Protection for Church of Scotland Congregations
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Administrative Practices Outcome 1
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
General Purpose Packages
Handling information 14 Standard.
Health & Social Care Apprenticeships & Diploma
1.1 System Performance Security Module 1 Version 5.
Privacy and Information Management ICT Guidelines.
Discussion Peggy Beeley, MD 2/11/14 Mitigating Medical Malpractice Risks Through Documentation.
University Health Care Computer Systems Fellows, Residents, & Interns.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Data Protection for Church of Scotland Congregations.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
Information Systems Unit 3.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
INFORMATION GOVERNANCE AND CONFIDENTIALITY Information Governance Facilitator.
Data Protection and research Rachael Maguire Records Manager.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Computer Security Sample security policy Dr Alexei Vernitski.
Scientific data storage: How are computers involved in the following?
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Handling Personal Data
Administrative Practices Outcome 1
Unit 7 – Organisational Systems Security
Information management and communication
How it affects policies and procedures
Understanding Data Protection
Communicating in the IT Industry
G061 - Network Security.
Handling information 14 Standard.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Information Governance Jym Bates Head of Information Assurance

What Is Information Governance? Data Protection Data Protection Freedom Of Information Freedom Of Information Information Security Information Security

Relevant Policies Data Protection Act 1998 (and subsequent Special Information Notices) Data Protection Act 1998 (and subsequent Special Information Notices) Human Rights Act 1998 Human Rights Act 1998 Access to Health Records act 1990 (where not superseded by the Data Protection Act 1998) Access to Health Records act 1990 (where not superseded by the Data Protection Act 1998) Computer Misuse Act 1990 Computer Misuse Act 1990 Copyright, Designs and Patents Act 1988 (as amended by the Copyright, Designs and Patents Act 1988 (as amended by the Copyright (Computer Programs) Regulations 1992). Copyright (Computer Programs) Regulations 1992). Crime & Disorder Act 1998 Crime & Disorder Act 1998 Electronic Communications Act 2000 Electronic Communications Act 2000 Regulation of Investigatory Powers Act 2000 (& Lawful Business Regulation of Investigatory Powers Act 2000 (& Lawful Business Practice Regulations 2000 Practice Regulations 2000 Freedom of Information Act 2000 Freedom of Information Act 2000 Gender Recognition Act 2004 Gender Recognition Act 2004

Ownership of s Ownership of s Addressing s Addressing s Personal s Personal s Freedom of information Freedom of information Attachments Attachments Spam Spam Why it occursWhy it occurs Actions to takeActions to take

Internet Use Personal access Personal access Out of working hoursOut of working hours Monitoring - Disciplinary Action Monitoring - Disciplinary Action Not to be viewed Not to be viewed Adult/Sexually explicit topicAdult/Sexually explicit topic HackingHacking Alcohol & TobaccoAlcohol & Tobacco SpywareSpyware Intolerance & HateIntolerance & Hate Criminal ActivityCriminal Activity GamblingGambling Personals & DatingPersonals & Dating Tasteless & OffensiveTasteless & Offensive Glamour & Intimate ApparelGlamour & Intimate Apparel Illegal DrugsIllegal Drugs ViolenceViolence WeaponsWeapons Streaming Media DownloadsStreaming Media Downloads ChatChat

Data Protection Act Security of Person Identifiable Information (PII) Security of Person Identifiable Information (PII) Confidentiality Confidentiality Storage Storage Transfer Transfer

Principles of the Data Protection Act Fairly and lawfully processed Fairly and lawfully processed Processed for limited purposes Processed for limited purposes Adequate, relevant and not excessive Adequate, relevant and not excessive Accurate and up to date Accurate and up to date Not kept for longer than is necessary Not kept for longer than is necessary Processed in line with your rights Processed in line with your rights Secure Secure Not transferred to other countries without adequate protection Not transferred to other countries without adequate protection

Confidentiality Security risks Security risks Not following the clear desk policyNot following the clear desk policy Not logging off a PC when it is not being usedNot logging off a PC when it is not being used Talk e.g. the canteenTalk e.g. the canteen Telephone conversations e.g. open wardTelephone conversations e.g. open ward Patients seeing their own notesPatients seeing their own notes

Storage of PII - Electronic PII must not be stored on: - PII must not be stored on: - Unencrypted laptopsUnencrypted laptops Non Biometric USB memory sticksNon Biometric USB memory sticks CDROM / DVD unless encryptedCDROM / DVD unless encrypted External hard drives unless encryptedExternal hard drives unless encrypted Any home PCAny home PC Any PC not on central storageAny PC not on central storage

Storage of PII - Paper Medical notes must be held in Medical Records, in a locked office or in a locked notes trolley Medical notes must be held in Medical Records, in a locked office or in a locked notes trolley Any PII should always be locked in a filing cabinet or desk drawer unless it is in a secure office Any PII should always be locked in a filing cabinet or desk drawer unless it is in a secure office

Transfer of PII – Electronic Whenever possible PII should not be transferred Whenever possible PII should not be transferred should not be used unless it is encrypted should not be used unless it is encrypted PII should only be uploaded to secure web sites PII should only be uploaded to secure web sites For support please contact ISC Help Desk For support please contact ISC Help Desk

Transfer of PII – Paper / Letters Whenever possible PII should not be transferred Whenever possible PII should not be transferred Ensure that the correct information is being sent to the correct person Ensure that the correct information is being sent to the correct person Any letters containing PII should be clearly addressed ‘Private & Confidential’ and only this & the contact details should be visible Any letters containing PII should be clearly addressed ‘Private & Confidential’ and only this & the contact details should be visible Requests for tests etc must always be sealed in an envelope Requests for tests etc must always be sealed in an envelope Use of Fax Machines should be discouraged Use of Fax Machines should be discouraged

Transfer of PII – Medical Notes The location of medical records should always be entered on the PAS tracking system The location of medical records should always be entered on the PAS tracking system Medical records must always be sealed in an envelope Medical records must always be sealed in an envelope Staff should not ferry casenotes to other locations in their cars Staff should not ferry casenotes to other locations in their cars

Viruses A virus is a malicious code that can affect an individual PC or entire network A virus is a malicious code that can affect an individual PC or entire network The Trust has a comprehensive virus scanning and damage control system that starts up when a PC is turned on The Trust has a comprehensive virus scanning and damage control system that starts up when a PC is turned on Major sources are: - Major sources are: - Unsolicited sUnsolicited s Unlicensed softwareUnlicensed software

Passwords You must never let anyone use the password to your PC or any software you use You must never let anyone use the password to your PC or any software you use Do not keep lists of your passwords Do not keep lists of your passwords Regularly change your password Regularly change your password Passwords must contain at least one number, one lowercase letter and one uppercase letter. Passwords must contain at least one number, one lowercase letter and one uppercase letter.

Unlicensed Software The only software allowed on Trust PCs are the systems purchased by the trust The only software allowed on Trust PCs are the systems purchased by the trust You are not allowed to load any software onto a Trust PC You are not allowed to load any software onto a Trust PC Please contact ISC Help Desk if you require a programme for your work Please contact ISC Help Desk if you require a programme for your work

PII and Audit / Research Always review the need for PII. Could you just use an allocated patient identifier Always review the need for PII. Could you just use an allocated patient identifier The NHS number with no further PII is acceptableThe NHS number with no further PII is acceptable Do not pull off PII from a system unless you are allowed to do so. Do not pull off PII from a system unless you are allowed to do so. Requests for reports should go through ISC Help Desk or individual Business Information SpecialistsRequests for reports should go through ISC Help Desk or individual Business Information Specialists

Guidance Check the Trust’s Information Governance Policies on Synapse in Check the Trust’s Information Governance Policies on Synapse in xxxx.xxx.xx Telephone Telephone ( ) 62601( ) 62601