Download presentation
Presentation is loading. Please wait.
Published byStephany Harris Modified over 6 years ago
1
EU Data Protection Legislation Managing The Security of Medical Data
Presenter: Hugh Jones
2
Context Social Technological Medical Commercial Historical
3
Personal Data means …… data relating to a living individual
who is or can be identified either directly from the data itself or from the data in conjunction with other information that is in, or is likely to come into, the possession of the Data Controller Article 29 Working Party Definition
4
Sensitive Personal Data
means personal data relating to the Data Subject, namely - their racial or ethnic origin their political opinions their religious or philosophical beliefs whether the Data Subject is a member of a trade union, Information relating to their physical or mental health The condition (orientation) or sexual life of the Data Subject Information on the commission or alleged commission of any offence by the Data Subject Data on any proceedings for an offence committed by the Data Subject
5
The Data Protection Rules
The DP Characters 1. Acquire Fairly 2. Specified Purpose 3. Compatible Processing 4. Keep Safe 5. Keep Accurate 6. Adequate Processing 7. Retain / Destroy 8. Allow Access
6
The “Squeeze” Regulatory Society Peers Competitors The Data Controller
7
Data Protection and ‘the Brand’
8
The enemy within… 70% of breaches are caused by the deliberate, non-malicious actions of staff “That’s the way we have always done it” “I don’t know what we do it that way” “To think creatively, we must be able to look afresh at what we normally take for granted” – George Keller “Complacency is nothing but an awesome trigger of mediocrity and failure” Ernest Agyemang Yeboah
9
Key Principles – very subjective
Fundamental, but not an absolute right Expectation of lawful processing Right to be left alone “Fairness” of acquisition “Appropriateness” of processing “Adequacy” of Security “Quality” based on operational need “Proportionality” of processing “Necessity” of retention schedule
10
Minimum standard of transparency
What is “Fair”? Identity of the Data Controller or third party The purpose(s) for processing, with reference to legislation Intended recipient(s) or categories of recipients Existence of the right of access to one’s data Contact details for the Data Controller Any other information which will make the processing fair
11
Strategies for Meeting Regulatory Pressure
Not just with ODPC! HSE, HIQA, JCI, International Standards Other consumer protection organisations Proactive data management programme Privacy Impact Assessments Relationship Management Positive Profile Evidence of a ‘culture of compliance’
12
Peers and ‘Competitors’
Pressure of maintaining Competitive Advantage Cost of damage to brand, reputation Cost of competitive response Majority of breaches are self-inflicted The patient is most vulnerable when you meet them You are most vulnerable immediately post- incident
13
Strategies for Peers/Competitors
Evidence of Best Practice data management Adoption of Standards Regular oversight and governance Proven data quality – complete and up-to-date Sound analysis of data – quality diagnostics Accurate, mature decision-making Visible signs of data security – virtual and physical Well-tested Incident Management solution Appropriate, timely data destruction programme
14
Changing Societal Profile
Increased awareness of rights Increased concern for data security Increased media attention to breaches Increasing concern re. profiling, intrusion Increasing incidence of access requests Data being used as a ‘weapon’
15
Strategies for Social Pressure
Clear, transparent language in correspondence Constructive expectation management Consistent Fair Processing Notice Regular, beneficial communication Balanced Relationship Management Responsive to requests for clarity, assistance
16
Data Security Considerations
Data Security Policy Information Security strategy Security in proportion to value, volume Physical and Environmental Security Communications and Operations Management Appropriate Access Controls, Authorisation levels Business Continuity Management Disaster Recovery Compliance with standards
17
Where to start? Appropriate Processes and Procedures
Encryption of hardware Timely Monitoring Service Level Agreements Staff training Mandatory Breach Notification process Adoption of Relevant Standards HIQA JCI PCI DSS ISO 27001
18
Accountability Role of Data Controller Role of Data Processor
Primary point of compliance Responsible for staff awareness Role of Data Processor Mandatory contract in place Role of Data Protection Officer Dedicated role within the organisation Not necessarily an employee Individual accountability of Board members
19
Revision of Key Roles Must be able to demonstrate compliance processing Evidence of Privacy by Design or by Default Possibility of Processor being a ‘Joint Controller’ Obligations for non-EU based Data Controller Required clauses for Data Processor Contract Control over sub-contracting
20
So why comply with the Legislation?
‘It’s the law of the land!’ Protection of brand Avoid risk to reputation Protection of trust Patients Employees Suppliers and Contractors Enables better decision-making Makes good business sense Delivers business value
21
Sytorus Ltd. – who we are Data Protection Consultancy – Training Introductory level training for all staff DPO Primer Certification Modular training on individual topics Enterprise Data Protection Assessments Privacy Impact Assessments Interim Data Protection Officer Liaison with national DP Agencies/Commissioner
22
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.