Download presentation
Presentation is loading. Please wait.
1
Information Governance
Pauline Nordoff-Tate – Information Assurance Manager Dr. Andrew Loughney– Caldicott Guardian David Walliker – Senior Information Risk Owner (SIRO)
2
What is Information Governance and Data Security?
Good information underpins good care. Patient and service user safety is supported when the confidentiality of personal information is maintained, its integrity is protected against loss or damage and the information is accessible by those who are authorised. Everyone who uses health and care services should be able to trust that their personal sensitive information is protected. People should be assured that those involved in their care, and in running and improving the services, are using such information appropriately and respecting patient choices where allowed. Information Governance
3
What is Information Governance and Data Security?
Information Governance is about how Health & Social care organisations and their employees must handle sensitive information. Technology and systems must be designed with privacy in mind to ensure that safe and effective use of information that does not pose an unacceptable risk to our hospital or our patients. We all have a duty to protect public information in a safe and secure manner Information Governance
4
General Data Protection Regulations
(GDPR) On 25th May 2018 the General Data Protection Regulation (GDPR) came into force, this was designed to modernise laws and protect the personal information of individuals. As well as putting new obligations on organisations collecting personal data, GDPR also gives individuals a lot more power to access the information held about them. One of the biggest and most talked about elements of GDPR has been the increase in the level of fines that can be imposed on organisations that have serious breaches. These fine can now be up to €20 million which has increased from £500,000 Information Governance
5
The Six Principles of the General Data Protection Regulations
All data shall be processed lawfully, fairly and in a transparent manner. All data shall be processed for specified, explicit and legitimate purposes. All data shall be adequate, relevant necessary for it purpose. All data shall be accurate. All data shall be not be kept for any longer than is necessary. All data shall be processed to ensure security against unauthorised or unlawful processing and against loss, destruction and damage. Information Governance
6
Types of Information In a hospital setting we come into contact with various types of personal information about people. It is important to be able to identify these different types of information so that they can be appropriately protected when they are used and shared. The two categories of information and examples are identified below: Personal Data Name D.O.B Address RQ6 Number NHS Number Sensitive Data Race or Ethnic Origin Religion Sexual Orientation Medical History Trade Union Membership Information Governance
7
The Caldicott Principles
The Caldicott principles must be used when accessing and using Patient Identifiable Information (PII) or confidential information and which must be maintained by all healthcare organisations. Justify the purpose of using confidential information Only use it when absolutely necessary Use the minimum information required Allow access on a strict need-to-know basis Always understand your responsibility Understand and comply with the law The duty to share information can be as important as the duty to protect patient confidentiality Information Governance
8
Incident Reporting (Datix)
All incidents should be reported on the Trust Incident reporting system (Datix) on the Staff Intranet. Report incidents on Datix within 48 hours. Personal data should not be included on the Datix. If advice is needed when completing an Information Governance incident, contact the IG Team (ext: 3671) Information Governance
9
Cyber & Data Security Malware
Malicious software (Malware) can reside on your computer and evade detection, making it easier for someone to be active on your system without you noticing. Malware can make computers run slowly or perform in unusual ways. If you suspect that your computer is not performing as it normally does, contact the IT department on 5499. Computer Security You should lock your PC or device as soon as you stop using it. All mobile phones, laptops, PCs and tablets whether personal or not, should have a password set. If you see a colleague’s device open and unlocked, lock it for them and gently remind them to do so in future. Tip: Press the Windows key + L on your keyboard to quickly lock your laptop or PC. Information Governance
10
Password Management Password Security Tips:
It is important to use strong passwords on all of your devices to prevent unauthorised access. You should also use different passwords for personal and work related accounts. Passwords should not be written down on sticky notes or bits of paper. Password Security Tips: Use separate words, Capital letters and add numbers or symbols Change passwords on a regular basis (90 days or less) Avoid using personal dates or names Tip: Example Strong Password: Fan5Crisps!Dog Information Governance
11
Forward suspicious emails to:
Phishing Phishing is the biggest and easiest form of social engineering. Criminals use phishing s and websites to scam people on a regular basis. They are hoping that users will click on fake links to sites or open attachments so that they can steal data or install malicious software. The aim of phishing s is to force users to make a mistake for, example, by imitating a legitimate company’s s or by creating a time-limited or pressurised situation. Common Phishing Identifiers: Misspellings - custmers Generic and not user focused – Dear Customer Link or file to download Time pressure – must be done in 24hours Forward suspicious s to: Information Governance
12
Social Engineering & Tailgating
Social Engineering involves phone calls from people pretending to be someone else to gain information. A Social Engineer might call and pretend to be a fellow employee, for example from the IT dept. or a supplier. Tailgating involves someone following another person/people through a door into a restricted area. Authorised people should have an ID badge on display Information Governance
13
Social Media Revealing any information about your organisation on social media can be valuable to a social engineer. Criminals can use the information available on social media for social engineering. The data from social media can be used to find out what department the person works in, other people they work with and most likely where the person lives. Information Governance
14
Usage Staff must not send any Personal Identifiable Data (PID) or Commercially Sensitive Data insecurely. s sent within the trust (internal) are automatically secure but external addresses are not. Should you need to send information to external recipients you will need to encrypt your s. Information Governance
15
Email Usage RLBUHT – RLBUHT – Secure
Staff must not send out any Personal Identifiable Data (PID) or commercially sensitive data insecurely. Here are some of do’s and don’ts RLBUHT – RLBUHT – Secure RLBUHT – another Trust – NOT Secure RLBUHT – NHS.net Mail (vice versa) – NOT Secure NHS.net Mail – NHS.net Mail – Secure NHS.net Mail – following domains: .gsi.gov.uk; gse.gov.uk; gsx.gov.uk; pnn.police.uk; csjm.net; scn.gov.uk; gcsx.gov.uk; mod.uk Information Governance
16
PGP – Email Encryption Within Outlook select Tags
Select Sensitivity Drop-down Change Normal to Confidential Select Close Send as normal Recipient gets re-directed to RLBUHT portal Recipient enters passphrase. Information Governance
17
Information Security –
A Serious Matter The Trust has systems in place for monitoring and auditing access and their use of by staff. and Internet monitoring (Data Loss Prevention & Websense). Failure to comply with legal obligations or organisational policy & guidelines could mean disciplinary and legal action being taken. Information Governance
18
Subject Access Requests
Individuals have the right to access personal and sensitive information stored and processed in any form Patients can request access to their health record without cost and within one month. Staff can request access to their personal record without cost and within one month. Any requests should be sent to Tip: Staff should not view their own medical records or patients unless they are involved in their care. Information Governance
19
What is a Freedom of Information (FOI) Request
A request for official information held by Public Bodies such as hospital trusts. Public have a right to access/ view all non-personal public authority information. Purpose is to promote openness & accountability. Requests must be made in writing. There are Exemptions. Law requires that any FOI request must receive a response within 20 working days. All FOI requests should be sent to the FOI Team as soon as they are received. Information Governance
20
James Forshaw - Information Security Officer – EXT 3671
Daniel Kay - Information Security Officer – EXT 3671
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.