INFORMATION GOVERNANCE AND CONFIDENTIALITY Information Governance Facilitator.

Slides:



Advertisements
Similar presentations
NATIONAL INFORMATION GOVERNANCE BOARD
Advertisements

Information Governance An Introduction. Information Governance Outline What is Information Governance What initiatives does IG cover.
Introduction to Information Governance (IG)
Information Governance Peter McKenzie Information Governance Manager NHS Tayside
Principle 1 Principle 1 Processed fairly and lawfully + only with a legitimate basis There should be no surprises, so … inform data subjects why you are.
Information Governance – Who Cares? Alistair Stewart Information Governance Co-ordinator.
Quick Guide to Undertaking an Information Governance Compliant Clinical Audit Project Wendy Harrison and Heather Sharp NHS Bradford and Airedale.
Data Protection Information Management / Jody McKenzie.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Confidentiality & Records Management. What is Information Governance? What is Records Management?
Data Protection.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
How to Find Your Way Around… SEPT - MANDATORY TRAINING 1. You can play the PowerPoint, and find the Test here EXAMPLE COURSE.
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
Data Protection & Freedom of Information The Practical Implications of Data Protection and Freedom of Information Caroline Dominey Data Protection Officer.
Information Governance
Towards a Freedom of Information Law in Qatar Fahad bin Mohammed Al Attiya Executive Chairman, Qatar National Food Security Programme.
Data Protection Act Description The Data Protection Act controls how your personal information can be used and protects from the misuse of your.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
Data Protection Act. Lesson Objectives To understand the data protection act.
FORCE INFORMATION MANAGEMENT. INFORMATION MANAGEMENT Aim: To provide students with an awareness of the Force Information Management and legislation that.
1 25 October EPFL Conference Data Protection in Intergovernmental Organizations Workshop 7 February 2013 K. Ernst S. Lüders C. Viala.
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
Data Protection for Church of Scotland Congregations
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Practical Information Management
HSC Diploma and Apprenticeships Principles of communication in adult social care settings 301.
Implementation of Security and Confidentiality in GP Practices.
Handling information 14 Standard.
Health & Social Care Apprenticeships & Diploma
Public rights of access to information Grisilda Ponniah, Corporate Information Governance Manager Mary Elliott, FOI Officer Legal & Democratic Services.
Data Protection, Freedom of Information and Information/Records Management.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
How to Find Your Way Around… 1. You can play the PowerPoint, and find the Test here EXAMPLE COURSE.
Data Protection STFC Presentation to PPD Senior Staff 26/11/2009 FoI/DP team.
Data Protection Act AS Module Heathcote Ch. 12.
Data Protection Act & Freedom of Information Simon Mansell Corporate Governance and Information Team.
DATA PROTECTION ACT 1998 Became law on 1 March 2000 Only applies to the use of personal data, that is data which relates to an identifiable living individual,
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Data Protection for Church of Scotland Congregations.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
CALDICOTT PRESENTATION. History Caldicott report published in 1997 and implemented in 1999 Inquiry chaired by Dame Fiona Caldicott.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
Data Protection - Rights & Responsibilities Information Commissioner’s Office Orkney Practice Forum 4 th July 2007.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
Introduction to Information Governance (IG) Mark Scallan – Head of IG/Data Protection Officer Angela Kaye – IG Officer.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Data Protection and research Rachael Maguire Records Manager.
DATA PROTECTION ACT (DPA). WHAT IS THE DATA PROTECTION ACT?  The Data Protection Act The Data Protection Act (DPA) gives individuals the right.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
The Freedom of Information Act and UCL Compliance Rosamund Cummings UCL FOI Officer
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Session 11 Data protection. 1 Contents Part 1: Introduction Part 2: Applicability and responsibility Part 3: Our procedures on data protection Part 4:
DATA PROTECTION AND RUNNING A COMPLIANT PUB WATCH SCHEME Nigel Connor Head of Legal –JD Wetherspoon PLC.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Level 1 – All staff involved in routine access to information IG Presentation Ver3 Jan2015 EIG01-01N Information Governance.
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.
Information Governance A refresher for all staff who have previously gone through the full course.
Data Protection and Confidentiality
Data Protection and Running a Compliant Pub Watch SCHeme
Data Protection principles
Unit 1 Effective Communication in Health and Social Care
Legal and Ethical Issues
Recording Clinical Data
D3 Confidentiality.
Handling information 14 Standard.
Presentation transcript:

INFORMATION GOVERNANCE AND CONFIDENTIALITY Information Governance Facilitator

What is Information Governance?  Information Governance (IG) ensures that information (personal or corporate) is dealt with in a legal and ethical manner.  Every member of staff handles information on a day-to-day basis, so you need to make sure you comply with the legislation.

Why is Information Governance Important ?  If you don’t comply with the legislation you will more than likely have committed a criminal offence  You can be held legally responsible.

INFORMATION GOVERNANCE PERSONAL INFORMATION DATA PROTECTION ACT CORPORATE INFORMATION FREEDOM OF INFORMATION ACT USING & TRANSFERRING PATIENT INFORMATION CALDICOTT REPORT PROTECTING & STORING INFORMATION SECURITY RECORDING INFORMATION RECORDS MANAGEMENT What Does IG Cover?

Personal Information  Is covered by the Data Protection Act  Includes patient and staff information  Paper and computerised records  Penalties for breaching confidentiality

Main Points - Data Protection Personal information should be:  Processed fairly and lawfully  Adequate, relevant & not excessive  Accurate & up-to-date  Not kept longer than is necessary  Kept secure

The Data Protection Act is Not a Barrier to Sharing Information. When can I use and share patient information?  When it is necessary for the provision of a patient’s health care. Other reasons to share or disclose personal information:  When the law requires  To prevent harm to the patient or to others (eg suicide or murder)  In the overriding public interest All other uses and disclosures require consent from the individual

Rights of Individuals  Right to see their records  Right to object to inaccurate entries  Right to request that inaccurate data is corrected  Right to compensation

Corporate Information  Under the FOI Act, anyone can request recorded information held by the PCT  Reports, accounts, policies, correspondence (inc. s)  Requests may be from the Press, Political Parties, Pressure Groups or individuals  20 working days to produce information if it is not exempt  FOI Publication schemes

Using and Transferring Patient Information  The Caldicott Report reviewed the use and transfer of patient- identifiable information  6 Caldicott principles  Recommended that every Trust have a Caldicott Guardian

The 6 Caldicott Principles  Justify the purpose(s) for using confidential information  Only use it when absolutely necessary  Use the minimum that is required  Access should be on a strict need-to-know basis  Everyone must understand his or her responsibilities  Understand and comply with the law

Information Security  Physical and access controls  Notes/screens not left on view  Password protection  Transfer of records by post  Telephone enquiries  Fax machines  Overheard conversations

Records Management  Records Management Policy (includes storage, retention, archiving and destruction of records)  Archiving – Make sure you store and archive records correctly (can they be traced if they are needed at some point in the future?)

Who is Responsible for Information Governance? WE ALL ARE