The Reporting of Serious IG Incidents Policy

Policy No:
IG11
Version:
1.0
Name of Policy:
The Reporting of Serious IG Incidents Policy
Effective From:
02/06/2015
Date Ratified
Ratified
Review Date
Sponsor
Expiry Date
Withdrawn Date
07/05/2015
Health Informatics Assurance Group (HIAG)
01/05/2017
Director of Finance and Informatics
06/05/2018
Unless this copy has been taken directly from the Trust intranet site (Pandora) there is no assurance that
this is the most up to date version
This policy supersedes all previous issues.
The Reporting of Serious IG Incidents Policy v1
1
Version Control
Version
1.0
Release
Author/Reviewer
Ratified
Date
by/Authorised by
02/06/2015
Marie Galloway,
Information
Governance Officer
Health
Informatics
Assurance Group
(HIAG)
The Reporting of Serious IG Incidents Policy v1
07/05/2015
Changes
(Please Identify
Page No.)
New Policy
following HSCIC
Guidance
2
Contents
Section
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
Page
Introduction .................................................................................................................................. 4
Purpose ......................................................................................................................................... 4
Scope ............................................................................................................................................ 4
Information Assets ....................................................................................................................... 5
Definitions .................................................................................................................................... 5
Duties and Responsibilities........................................................................................................... 5
What is a Serious IG Incident........................................................................................................ 6
Adverse Effects of Data Breaches................................................................................................. 7
Initial Reporting ............................................................................................................................ 7
On-Call Arrangements .................................................................................................................. 7
Hosted Organisations ................................................................................................................... 8
Informing Data Subjects ............................................................................................................... 8
Assessing the Severity of an IG Incident....................................................................................... 8
Near Misses .................................................................................................................................. 10
The Management and Reporting of IG Incidents ........................................................................ 10
15.1. Logging an IG Incident ..................................................................................................... 10
15.2 Incidents Categorised 0-1 ................................................................................................ 10
15.3 Incidents Categorised 2 and Above ................................................................................. 10
15.4 Final Reporting, Closure and Lesson Learned Activity .................................................... 11
External Reporting ........................................................................................................................ 12
Reporting and Publishing Details.................................................................................................. 12
Financial Penalties ........................................................................................................................ 13
Training ......................................................................................................................................... 13
Implementation ........................................................................................................................... 13
Distribution ................................................................................................................................... 13
Equality and Diversity ................................................................................................................... 13
Monitoring and Compliance of the Policy .................................................................................... 14
Reference Material ...................................................................................................................... 14
Associated Documentation .......................................................................................................... 15
APPENDICES
Appendix 1: Examples of Potential Data Breaches.................................................................................... 16
Appendix 2: IG SIRI Process ....................................................................................................................... 19
Appendix 3: Examples to Demonstrate the IG SIRI Severity Assessment Score ....................................... 20
Appendix 4: IG SIRI Investigation Checklist Report ................................................................................... 22
Appendix 5: Action Plan to Mitigate Risks Involved in the IG SIRI ............................................................ 25
Appendix 6: Useful Contacts for Potential IG SIRIs ................................................................................... 26
The Reporting of Serious IG Incidents Policy v1
3
The Reporting of Serious IG Incidents Policy
1.
Introduction
From June 2013 all organisations that process health and adult social care personal data must
report all serious information governance incidents assessed at a level 2 or more via by the HSCIC
IG Toolkit Reporting Tool to the Department of Health (DH), the Information Commissioner’s Office
(ICO) and other regulators.
The purpose of this Policy is therefore to set out a clear process for the reporting of all Information
Governance Serious Incidents Requiring Investigation (IG SIRI) which occur in the Trust and to
ensure appropriate actions are taken in terms of communication and follow up action plans with
the SIRO and IG Lead, where appropriate.
Local clinical and corporate incidents will still continue to be reported using local procedures and
management tools (e.g. the Strategic Executive Information System - STEIS) as outlined in the
Incident/Near-Miss Reporting and Investigation Policy (including Serious Incidents) but any possible
notification of any serious IG SIRIs for the attention of the ICO and the DoH will pursue this Policy
with immediate effect.
The process is a reflection of the Health and Social Care Information Centre (HSCIC) “Checklist
Guidance for Reporting, Managing and Investigating Information Governance Serious Incidents
Requiring Investigation”, June 2014 v3.
2.
Purpose
The Trust is committed to improving its programme of risk management and incident reporting.
Reporting incidents is an integral part of clinical and corporate governance. This Policy will help:•
Support the Trust’s Risk Management Programme where risks are identified, reported
through the appropriate channels and are investigated and assessed with subsequent
actions carried out.
•
Ensure the management of IG SIRIs conforms to consistent and agreed processes and
procedures as set out by our legal and regulatory obligations. This including the reporting of
near misses and actual IG SIRIs.
•
To ensure appropriate action is taken to prevent damage to patients, staff and the
reputation of the Trust and any other third party or organisation.
•
Assist in the safeguarding of the Trust’s Information Assets and information flows.
•
To embed a culture of openness for reporting incidents.
•
To identify issues and lessons learned from each SIRI so that these can be communicated to
staff and policies updated as and when necessary to ensure there is no reoccurrence of the
incident.
3.
Scope
This policy applies to:•
The Trusts administrative and business activities that are considered to be information
governance or data security related.
•
To all staff employed within the Trust regardless of status i.e. permanent, temporary,
volunteer or casual/agency staff. All staff are expected to be aware of this Policy and to
understand their responsibilities in following this guidance.
•
Any form of media including both electronic and paper records.
The Reporting of Serious IG Incidents Policy v1
4
4.
Information Assets
Information assets come in many guises. The following list is therefore an illustrative of what is a
typical asset:-
•
•
•
•
5.
Personal Information Content
Databases and data files
Back up data and archived data
Audit data (containing personal
identifiers)
Paper records (for e.g. patient/staff
notes and records
Definitions
Abbreviation
DPA
DoH
HSCIC
ICO
IAO
IAA
NHS
SI
SIRI
SIRO
6.
•
Software/Hardware
Computing hardware including PCs,
Laptops, PDA, iPhones, iPads and
removable media
Description
Data Protection Act 1998
Department of Health
Health and Social Care Information Centre
Information Commissioner’s Office
Information Asset Owner
Information Asset Administrator
National Health Service
Serious Incident
Serious Incident Requiring Investigation
Senior Information Risk Officer
Duties and Responsibilities
Job Title
Chief Executive Officer
(CEO)
The Senior Information
Risk Officer (SIRO)
Caldicott Guardian
Description
The Chief Executive is responsible for ensuring that the Trust has an
appropriate framework in place that complies with the Trust legal
and statutory obligations.
The Director of Finance and Informatics is the Trust’s appointed
SIRO. The SIRO will:• Take ownership of the Trust’s risk management and incident
management framework.
• Ensure all information risks and assessments arising from
any IG SIRI incidents are identified and managed
appropriately.
• Support the IAOs/IAAs in ensuring that any information risks
arising from any incidents have been mitigated for the
future.
• Advise the Chief Executive and any other relevant Trust
Boards and accounting officers on the information risks and
internal controls of the Trust.
• Lead and foster a culture of openness that values and
protects the integrity and confidentiality of information
successfully for the benefit of our customers and
stakeholders.
The Trust’s Medical Director (Caldicott Guardian) will assist with all
IG SIRIs for all information governance assurance purposes.
The Reporting of Serious IG Incidents Policy v1
5
Job Title
Deputy Director of
Informatics
Information Governance
Officer
Service Leads/Line
Managers
Description
Overall responsibility for the IG Incident Reporting framework lies
with the Deputy Director of Informatics who has delegated the
management and implementation of this framework to the IG
Officer.
The Trust’s Information Governance Officer is responsible for the coordination, investigation and assessment of any potential IG SIRIs
and for the provision of guidance and advice on the application of
this policy and the IG Toolkit Incident Reporting Tool. All serious IG
incidents will be reported by the IG Officer via the IG Toolkit Incident
Reporting System.
All line managers are responsible for communicating this policy to
their teams/staff and ensuring that staff attend all IG training
events.
This will ensure that policies such as these applicable to all service
areas are implemented appropriately and staff understand their
responsibilities in respect of dealing with IG SIRIs.
Line managers are also responsible for monitoring compliance with
this guideline for e.g. undertaking ad hoc audits to check for
inappropriate disclosures, records left out, abuse of passwords etc.
when necessary.
7.
What is a Serious IG Incident
There is no simple definition of what constitutes a serious IG incident. What may at first appear to
be of trivial nature may, on further investigation, be a serious incident.
As a guide incidents are normally classified as either a breach in confidentiality or a breach in data
security. The common theme being that there has been:•
A failure to meet the actual requirements of the Data Protection Act 1998, the Caldicott
Principles and the Common Law of Confidentiality.
•
An unlawful disclosure of/or misuse of confidential information and the recording or
sharing of data to inappropriate parties which is considered an invasion of a person’s
privacy for e.g. a piece of paper identifying a patient found in a back lane or high street.
Some common examples are listed below.
Breaches of Confidentiality
•
Accessing unauthorised computer systems fraudently or using/sharing other employee
logins, passwords, smart cards etc.
•
Disclosing confidential information to individuals who have no legitimate right of access e.g.
bogus callers, individuals not involved in the service delivery.
•
Sending a fax or email to the wrong person or organisation.
•
Discussing patient information in a public open area where the conversation can be
overhead by third parties.
•
The ability to see and read patient/staff records in an office or an employee’s car.
•
The loss of paper files and computer print outs.
Breaches of Data Security
•
The loss of mobile/hardware devices due to crime or an individual’s carelessness for e.g.
laptops, cd’s, memory sticks, mobiles, IPADS etc.
•
Sending emails containing personal details to unsecure email addresses.
The Reporting of Serious IG Incidents Policy v1
6
Conversely, when lost data is protected for e.g. by appropriate encryption there is no data breach
so long as the personal data cannot be accessed (though there may be clinical safety implications
that require the incident to be reported down a different route).
This is not an exhaustive list and should only be used as a guide. More examples are provided in
Appendix 1. If in doubt, staff should speak to their line manager or the IG Team in the first instance
for further advice.
8.
Adverse Effects of Data Breaches
Personal data breaches are those that have significant adverse effects on those involved in serious
IG incidents. An adverse impact can be defined as any of the following:•
A threat to a person’s safety or privacy of an individual
•
Identify theft – credit ratings affected
•
Financial losses for e.g. loss of employment
•
Unwarranted distress and damage to an individual
From the Trust’s point of view such a serious incident may cause:•
Embarrassment and negative publicity
•
A potential monetary fine or enforcement notice issued by the Information Commissioner’s
Office (i.e. the ICO) of up to £500,000 per serious offence
•
Disruption to business practices
9.
Initial Reporting
Whenever a suspected IG SIRI incident has occurred it is imperative staff report the incident to their
line manager (i.e. the IAO) and follow the Trust’s Incident/Near-Miss Reporting and Investigation
Policy (including Serious Incidents) reporting the details of the incident into the Trust’s Incident
Reporting System, Datix. This checklist guidance should be used by all staff managing IG SIRIs.
Although most incidents will be applicable to near misses”, staff are encouraged to report these
misses in order to help us identify procedural framework issues and to disseminate lessons learnt
to other departments.
More serious IG SIRIs must be reported informally to key staff for e.g. the SIRO, Caldicott Guardian,
Deputy Director of Informatics, Communication Team and the IG Officer (unless already informed)
so that they are forewarned and are in a position to deal with any enquiries from any third parties.
Early notification and preparation is key to dealing with IG SIRIs. Where an IG SIRI incident occurs
out of hours, current on-call arrangements will need to be followed to ensure that the correct
contacts are notified.
(Please refer to Appendix 2 for a graphic summary of the IG SIRI Process).
10.
On-Call Arrangements
For incidents out of hours the arrangements to be followed are as follows:•
The member of staff must contact the Senior Manager On-Call of any suspected IG SIRI.
•
On verification of the incident and its severity, the On-Call Manager must then contact the
Director On-Call.
•
The Director on call should (where an incident is of national or regional media interest or
where it is involves particularly sensitive data, including high volumes of personal data that
potentially may cause significant detriment or distress to individuals), inform the Corporate
Management Team, the Head of Communications, and the Deputy Director of Informatics.
•
Details of the above appropriate contacts listed above are outlined in Appendix 6.
The Reporting of Serious IG Incidents Policy v1
7
11.
Hosted Organisations
For any teams/departments which are hosted by Gateshead Health NHS Trust (for e.g. where the
Trust provides the IT network), it is imperative that this local policy is adhered to and the incident
reported to the relevant roles as stipulated in section 10.
12.
Informing Data Subjects
Consideration should always be given to informing the data subjects/individuals concerned when
personable identifiable information about them has been lost or inappropriately placed in the
public domain. Where there is any risk of identity theft or unwarranted distress it is strongly
recommended that this is done appropriately in writing.
13.
Assessing the Severity of an IG Incident
All IG SIRI’s categories are determined by the context, scale and sensitivity of the incident.
The primary factors for assessing the severity level of any incident is indicated by the:•
Numbers of individuals (i.e. data subjects) affected by the incident
•
Potential for media interest
•
Reputational damage of the Trust
Incidents that usually warrant a higher rating include:•
Potential litigation
•
If the incident has been reported to a statutory body for e.g. the ICO
•
The potential for unwarranted distress or damage to the individual(s)
•
Financial damage to the individual(s)
The sensitivity of the information may raise or lower the categorisation of an incident. An incident
may have characteristics that both cancel each other out. For the purpose of the IG SIRI incidents
sensitivity factors may be:•
Low – this will reduce the base of the categorisation
•
Medium – has no effect on the base categorisation
•
High – increase the base categorisation
The steps to take in working through this exercise are as follows:Step 1: Baseline Assessment
Any incident will need to have a baseline assessment which will allow the final score to be
identified. To establish the baseline the incident must be scored using the table below:
The Reporting of Serious IG Incidents Policy v1
8
Where the numbers of individuals that are potentially impacted by an incident are unknown, a
sensible view must always be taken of the worst scenario to make an informative assessment of the
SIRI Level. All SIRI’s are considered potentially serious but the number of individuals that potentially
may suffer distress, harm or any other detriment is a big deciding factor in working out the IG level
incident score.
Step 2: Sensitivity Scoring
Next you must score the sensitivity characteristics of the information inappropriately disclosed
which may increase or reduce the baseline score.
As more information becomes available, the SIRI level may need to be reassessed to reflect the true
value of the information risk.
If the likelihood of media interest was initially assessed as minor but was then changed due to
unforeseen circumstances (for e.g. a relevant FOI request or specific journalist interest) the IG SIRI
level would need to be revised quickly to reflect this with all key bodies notified. Note that
informing the data subjects is likely to put an incident into the public/media domain too.
The Reporting of Serious IG Incidents Policy v1
9
Where the adjusted score indicates that the incident is a level 2 or more, the incident will be need
to be reported to the ICO and the DoH automatically via the IGTK Incidents Reporting Tool. This is
done by the Trust’s IG Officer.
Step 3: Indicated IG SIRI Score
The IG SIRI score levels are indicated below:Level
0
1
2 and
above
Description of the Type of Incident
A near miss / non-event.
Confirmed as an IG SIRI but there is no need to report the
incident to a statutory body for e.g. the ICO, DH and other
central bodies.
Confirmed as an IG SIRI that must be reported to the ICO,
DoH and other central bodies.
Reportable to a
Statutory Body
Not reportable
Not reportable
Reportable
Please refer to Appendix 3 for examples of how to score serious IG incidents).
14.
Near Misses
If an incident is found to have neither occurred or the severity of the category has been reduced
due to factors that were not planned for the incident this may be recorded as a “near miss”. This
will allow the Trust to undertake a lessons learned exercise and to put into place appropriate
actions.
Diligent employees should always question procedures, protocols and events that they consider
could cause damage, harm, distress, or non-compliance of national guidance or brings the Trust’s
name into disrepute. This will help the Trust to minimise any disruption to business practices.
15.
The Management and Reporting of IG Incidents
15.1.
Logging an IG Incident
Upon receiving the Datix notification the IG Officer will assess the IG incident using the
HSCIC guidance to determine if the severity score has been applied correctly. (Appendix 2)
15.2
Incidents Categorised 0-1
For incidents that are scored 0 -1, the relevant senior member of staff in the department
where the breach has occurred will be the appointed investigator. The Trust’s IG Team will
provide support and guidance and any relevant training where required. It will be an
integral part of the action plan that any action taken minimises:•
Any potential adverse effects of those affected by the incident.
•
Reduces the SIRI risk of the incident happening again in the near future. It is worth
pointing out that where the same repetitive incidents are occurring there is the
potential for the Information Commissioner’s Office to fine the Trust for not taking
appropriate action even at level 1 ratings.
15.3
Incidents Categorised 2 and Above
For incidents that score 2 and above the IG Officer will:-
The Reporting of Serious IG Incidents Policy v1
10
•
•
•
•
•
•
•
•
•
•
15.4
Inform the Trust’s SIRO, Caldicott Guardian and Deputy Director of Informatics in
the first instance before it is officially reported to any statutory body (unless this
has already been done).
Report the incident to the HSCIC via the online IG Toolkit Reporting Incident Tool
within 24 hours of the event occurring. The reporting tool will require the following
details:o
Date and time of the location, including a factual description of the incident
o
Breach type
o
Details of the Trust’s incident management arrangements
o
The type of disclosure – theft, accidental loss, unauthorised disclosure,
procedural failure etc.
o
The number of individuals and records involved
o
The format of the information and whether the data was encrypted
o
If the SIRI is already in the public domain and whether media interest exists
o
If any legal implications exist
Co-ordinate the investigation across all relevant department boundaries within 5
working days.
Engage with appropriate managers and specialists to instigate a Root Cause
Analysis of the incident using the IG SIRI Reporting Checklist Report template in
Appendix 4.
Ensure all interviews, findings and the content of evidence is reviewed,
documented and reported to appropriate senior line management and preserved
for future retrieval.
Maintain an audit trail of events and evidence supporting decisions taken during
the investigation.
Inform the data subjects (e.g. patients, service users, staff), especially whether
there is potential for identity theft or unwarranted distress which can be avoided or
mitigated if the data subject is notified of the incident.
Draw up an action plan (see Appendix 5) in conjunction with the appropriate
service line to institute any recovery plans and instigate measures to prevent
recurrence.
Invoke staff disciplinary procedures, where necessary, if staff are in serious breach
of the Trust’s IT and Information Security Policy or any IG Policy framework.
Identify any lessons learnt to be reflected in any policy/procedure revisions.
Final Reporting, Closure and Lesson Learned Activity
It will be the responsibility of the IG Officer to:•
To set an appropriate timescale for completing and finalising the investigation and
action plan.
•
To produce a final report for senior staff and the Trust’s Steering Groups /
Committees / Boards for e.g. the Health Informatics Assurance Group (HIAG) and
the Health Informatics Strategy Group (HISG).
•
To determine who is responsible for disseminating the lessons learnt during the
investigation.
•
Close the SIRI. The HSCIC Guidance states it is reasonable to expect cases to be
closed within 3 months. This must only be when all aspects, including any
disciplinary action against staff are settled and complete.
•
Inform the Trust Board’s responsibilities of external reporting requirements
regarding IG SIRIs.
All actions taken to mitigate any risks pending a SIRI Incident must also be reflected in any
risk registers and business continuity arrangements.
The Reporting of Serious IG Incidents Policy v1
11
16.
External Reporting
AII severity incidents reported via the IG Toolkit Incident Reporting Tool will trigger an automated
notification email to the Department of Health, Health and Social Care Information Centre and the
Information Commissioner's Office, and any other appropriate regulators in the first instance.
IG SIRIs marked as ‘open’, ‘withdrawn’ or ‘duplicate’ are not published. Only those closed are
published quarterly by the Health and Social Care Information Centre (HSCIC). It is therefore
integral to the investigation that all information collected and recorded is reliable, accurate and up
to date and does not include any information that would not normally be released under the
Freedom of Information Act 2000. Trust staff are reminded that aspects of these records are
published into the public domain following closure.
Such records can be reopened on the IGTK Incident Reporting Tool where proceedings need to be
updated.
The decision to inform other regulators must also be taken where the circumstances of the
incident, for e.g. where there are risks to patient safety under the Care of the Trust are affected for
e.g. the NHS England Patient Safety Division may need to be informed if this is the case.
17.
Reporting and Publishing Details
Any incident of a serious IG nature with a level 2 rating or more must be reported in the Trust’s
Annual Reports and Governance Statements as significant control issues. These reports must be
published via the Trust’s website. The Board will observe the following publication principles:•
All public statements made in relation to any incident will be consistent with those released
under the Freedom of Information Act 2000 and published in Annual Reports and
Statements.
•
Information will not be released where it is not considered suitable for e.g. where the
incident is sub judice and cannot be reported publicly due to pending legal proceedings
Incidents will need to be reported at an individual level regardless of their open or closed status as
in the demonstrated example below:Table 1: Level 2 Incidents
SUMMARY OF SERIOUS INCIDENTS REQUIRING INVESTIGATIONS INVOLVING PERSONAL DATA AS
REPORTED TO THE INFORMATION COMMISSIONER’S OFFICE IN (FINANCIAL YEAR)
Date of Incident
Nature of
Nature of Data
Number of Data
Notification
(month/year)
Incident
Involved
Subjects
Steps
Potentially
Affected
April 2015
Further Action on
Information Risk
50 clinical files
Name, address,
50 people
Informed the
lost
clinical notes
ICO
The Trust will continue to monitor and assess its information risks, in lights of
the events noted above, in order to identify and address any weaknesses and
ensure continuous improvement of its systems.
The member of staff responsible for this incident has been (please add action).
Details of all level 1 IG incidents must be aggregated and reported in the SIRO and Annual Reports
using the following format below:-
The Reporting of Serious IG Incidents Policy v1
12
Table 2: Level 1 Incidents
SUMMARY OF OTHER PERSONAL DATA RELATED INCIDENTS IN (FINANCIAL
YEAR)
Category
Breach
Total
A
Corruption or inability to recover electronic data
B
Disclosed in error
C
Lost in transit
D
Lost or stolen hardware
E
Lost or stolen paperwork
F
Non-secure disposal–hardware
G
Non-secure disposal–paperwork
H
Uploaded to website in error
I
Technical security failings (including hacking)
J
Unauthorised access/disclosure
Incidents rated at a severity rating of 0 will not need to be reflected in any report or statement.
18.
Financial Penalties
Staff are reminded of the enforcement powers of the Information Commissioner’s Office (ICO). The
ICO now has the power to issue monetary fines of up to £500,000 for serious breaches of the Data
Protection Act 1998 and the Privacy and Electronic Communications Regulations. Data controllers
have the right to appeal against a monetary penalty to the First-tier Tribunal (Information Rights)
but this does not mean that the fine will be overturned.
19.
Training
All staff will continue to be informed about the importance of reporting information governance
related incidents via the Trust’s mandatory training programme. A variety of media such as
handouts, staff newsletters, emails and bespoke training sessions will also support this. Lessons
learned will be fed back into future training to encourage further participation and to demonstrate
the value of reporting incidents and near misses to IT, the IG Team and relevant committees.
20.
Implementation
All staff are required to comply with the requirements of this Policy; failure to do so may result in
disciplinary action. This policy is implemented in conjunction with the Trust’s Policy for the
Development, Management and Authorisation of Policies and Procedures.
21.
Distribution
This policy will be distributed by the Information Governance Team via the staff intranet at
www.qegateshead.nhs.uk.
22.
Equality and Diversity
The Trust is committed to ensuring that, as far as is reasonably practicable, that the way we deliver
our services does not affect or discriminate individuals on any equality or diversity grounds
(protected characteristics under the Equality Act 2010). An equality analysis was undertaken for
this policy and it was concluded that no individuals were affected by this policy.
The Reporting of Serious IG Incidents Policy v1
13
23.
Monitoring and Compliance of the Policy
Responsibility for this Policy rests with the Information Governance Team. The performance of this
Policy will be monitored by our auditing requirements and will be updated to reflect changes in
national guidance, case law and the Trust’s reporting structure, whenever necessary.
Standard/Process/Issue
Staff compliance of
reporting serious IG
incidents
Numbers and types of
serious IG Incidents
occurring
Completion of IG
training
Completion of
appropriate action
plans to prevent
incident reoccurrence
Internal and External
Audit Feedback
IG complaints from
service users
Enforcement
Method
Datix and quarterly
reports to the HIAG
Numbers, location,
severity, type of
incidents,
reoccurrence etc.
No. of staff attending
training sessions
monitored by O&D /
HIAG
Action plans are
implemented and
monitored regularly
by teams/depts.
Recommendations
from audits to feed
back into the process
No. of complaints
received from
patients and staff
about the use or
misuse of their data
Enforcement notices,
fines and enquiries
from formal bodies
Monitoring and Audit
By
HIAG
IG
HIAG
Officer
Frequency
Every 6 months
IG
Officer
HIAG
As and when
necessary
O&D
and IG
Officer
HIAG
Quarterly
IG
Officer
HIAG
As and when
necessary
IG
Officer
HIAG
Quarterly
IG
Officer /
Health
Records
Mgr.
IG
Officer/
Security
Mgr.
HIAG
Ongoing
HIAG
Ongoing
The Information Governance Officer will produce annually and bi-monthly reports presented to the
Health Informatics Assurance Group (HIAG) to demonstrate compliance with this policy.
24.
Reference Material
•
Checklist Guidance for Reporting, Managing and Investigating Information Governance
Serious Incidents Requiring Investigation: Health and Social Care Information Centre
(HSCIC) June 2014 v3:
https://www.igt.hscic.gov.uk/resources/IGIncidentsChecklistGuidance.pdf
•
Notification of Data Security Breaches to the Information Commissioner’s Office, July 2012,
V1:
https://ico.org.uk/media/for-organisations/documents/1536/breach_reporting.pdf
•
The ICO Guide to Data Protection:
https://ico.org.uk/for-organisations/guide-to-data-protection/
The Reporting of Serious IG Incidents Policy v1
14
25.
Associated Documentation
IG01 - Information Governance Strategy
IG06 - Confidentiality and Data Protection Policy
OP06 - IT and Information Security Policy
RM04 - Incident/Near-Miss Reporting and Investigation Policy (including Serious Incidents)
The Reporting of Serious IG Incidents Policy v1
15
Appendix 1: Examples of Potential Data Breaches
Type of Breach
Unauthorised
Access/Disclosure
Disclosed in Error
Loss of
Hardware/Software
Loss of Paperwork
Examples Covered by this Definition
This category covers:• Accessing a person’s record inappropriately e.g. viewing your own
health record or family members, neighbours, friends etc. of which
the person has no legitimate right of access;
• Sharing or writing down passwords and not locking them away;
• Using other employee’s user’s IT accounts, login IDs and swipe cards
for access e.g. Smart Card etc.;
• Leaving confidential/sensitive files out;
• Giving out inappropriate personal data over the telephone;
• Positioning PC screens where information could be viewed by the
public;
Example 1 - An employee with access to a centralised database on Medway
accesses her daughter’s boyfriend’s records to ascertain if he has any
medical conditions for e.g. GUM data. The employee has no legitimate
business need to view the documentation and is not authorised to do so.
The staff employee is in breach of the Trust’s IT and Information Security
Policy invoking staff disciplinary procedures.
This category covers any information which has been disclosed to or sent to
an incorrect and unauthorised party or organisation. Examples include:• Letters and correspondence sent to the wrong person;
• Sending personal identifiable data externally by insecure email (i.e.
not using a NHSmail account to another NHSmail account or a ghnt
account to another ghnt account) and not using a password
protected attachment when appropriate;
• Inclusion of letters and information relating to other data subjects
in error;
• Failure to redact personal information that is being supplied to third
parties;
• Verbal disclosures made in error;
• Emails and faxes being sent to the wrong person or organisation;
• Mail merging errors which have led to incorrect individuals receiving
personal data;
This covers the loss or theft of personal data losses on portable devices such
as:• Laptops/Tablets;
• Ipads/Ipods;
• Mobile phones containing personal data;
• Memory cards;
• Hard drives/servers;
• Any mobile device containing personal data;
The loss or theft can take place on or off the Trust’s premises. For example
the theft of a laptop from an employee’s home or car, or a loss of a portable
device whilst travelling on public transport would be covered by this
category. Unencrypted devices are a particular risk to the Trust.
This refers to any loss or stolen data in paper format which would be
considered personal data for e.g.:• Medical files;
• Letters;
• Rotas;
The Reporting of Serious IG Incidents Policy v1
16
The Altering and
Corruption of Data
Non Secure Disposal of
Paperwork
Lost in Transit
Inappropriate Disclosures
on Media
Non Secure Disposal of
Hardware
• Ward handover sheets;
• Employee records;
• Work diaries (if it contains personal data about individuals);
The loss can take place on the Trust’s premises or from an employee’s home
or car or whilst travelling on public transport for e.g. the bus or train etc.
This category covers the avoidable or foreseeable corruption and tampering
of data which can have quantifiable consequences for the affected
individuals concerned for e.g. the disruption of care or adverse clinical
outcomes. Examples include:• Staff altering or changing data in patient/staff records;
• The corruption of a file which renders the data inaccessible;
• The inability of a person to recover a file due to its format
being obsolete or access controls not being accessible for e.g.
the loss of a password or encryption key;
The failure to not return confidential paperwork back to work premises or
to dispose of personal data inappropriately can cause catastrophic
consequences for the Trust. Examples include:• Personal data disposed in normal waste bins;
• Personal data/files taken to recycling banks for disposal;
• Data sent to landfill for recycling purposes. (This would include
refuse mix up’s in which personal data is placed in the general
waste);
• Failure to use confidential bins on site;
• The failure of contractors to remove and destroy personal data
securely;
This is the loss of any data for e.g. CD’s, tapes, DVD’s, paper records or
portable media whilst in transit from one business area to another location.
It may include:• Data lost by a courier;
• Data lost in the general post for e.g. internal post or Royal
Mail;
• Data lost whilst on site but in situ between premises/buildings
or departments;
• Data lost whilst being hand delivered, whether that be by an
employee, a contractor or another third party acting behalf of the
Trust;
It does not however include work taken home by a member of staff for the
purposes of homeworking or similar.
This category relates to personal data uploaded onto websites and social
media which is not considered appropriate or has not been consented to by
the individual(s) concerned. Examples include:• The failure to acquire a person’s consent to upload personal data to
website pages etc.;
• The failure to redact personal data from any upload;
• Uploading incorrect information;
• Failure to adhere to the principles of the Data Protection Act 1998.
The failure to not abide by appropriate security standards when disposing of
assets that contain personal data. Examples include:• The failure to securely wipe hardware drives prior to destruction or
removal;
• The failure to destroy hardware in line with appropriate industry
standards;
• The resale of equipment with personal data still left on the device;
The Reporting of Serious IG Incidents Policy v1
17
Technical Failures
Other
This category concentrates on technical measures that the Trust should take
to prevent an IG incident from occurring. Examples include:• Failure to secure systems from inappropriate/malicious access;
• Failure to build website/access portals to appropriate technical
standards;
• The storage of data alongside other personal identifiers which is in
defiance of industry best practice;
• Failure to protect internal file sources from accidental /
unwarranted access (for example failure to secure shared file
spaces);
• Failure to implement appropriate controls for remote system access
for employees (for example when working from home).
With respect to successful hacking attempts, the ICO’s interest would be to
determine whether the Trust had adequate technical security controls in
place to mitigate the risk of it happening.
This category is designed to capture other issues that do not cover the
forementioned:• The failure to decommission a former premises by removing
personal data appropriately;
• The sale or recycling of office equipment such as filing cabinets)
later found to contain personal data;
• Inadequate controls around physical employee access to data
leading to the insecure storage of files (for example the failure to
implement a clear desk policy or a lack of secure cabinets).
• Failure to put adequate measures in place for the transfer of
personal data overseas;
• The unfair processing of personal data;
• Failure to maintain adequate and relevant records.
The Reporting of Serious IG Incidents Policy v1
18
Appendix 2: IG SIRI Process
The Reporting of Serious IG Incidents Policy v1
19
Appendix 3: Examples to Demonstrate the IG SIRI Severity Assessment Score
Example 1
Baseline scale factor
Sensitivity factors
A member of staff has access to digital health records as per her job role.
Her daughter has recently started dating an older man. The employee has
been caught accessing his records, including 5 members of this family.
The main record included a reference to a recent STD.
0
+1 Detailed information at risk e.g. clinical/care case notes, social care
+1 High risk confidential information
+1 Failure to implement, enforce or follow appropriate organisational or
technical safeguards to protect information
+1 Individuals affected are likely to suffer substantial damage or distress,
including significant embarrassment or detriment
Final scale point 4 so this is a level 2 reportable SIRI
Example 2
A ward handover sheet containing sensitive personal details of 15
patients from a mental health inpatient ward was found by a member of
the public and handed back into the Trust. The gentleman who found the
handover sheet said that he found it on the road outside his house. The
sheet contained the patient's full name, hospital number and a brief
description of their current condition.
Baseline scale factor
1
Sensitivity factors
+1 High risk confidential information
+1 Failure to implement, enforce or follow appropriate organisational or
technical safeguards to protect information
Final scale point 3 so this is a level 2 reportable SIRI
Example 3
A member of staff reports that the complete paper health records of two
of his patients have been inadvertently disposed of. He was working on
the records at home when the envelope they were in was thrown into
the recycling bin by accident. The bin has been emptied. The clinician
works for the Child and Adolescent Mental Health Service.
Baseline scale factor
0
Sensitivity factors
+1 High risk confidential information
+1 Failure to implement, enforce or follow appropriate organisational or
technical safeguards to protect information
Final scale point 2 so this is a level 2 reportable SIRI
Example 4
Information about a child and the circumstances of an associated child
protection plan has been faxed to the wrong address.
Baseline scale factor
0
Sensitivity factors
-1 No clinical data at risk
+1 Sensitive information
+1 Information may cause distress
Final scale point 3 so this is a level 2 reportable SIRI
Example 5
Subsequent to incident 4, the same error is made again and the recipient
this time informs the Trust she has complained to the ICO.
Baseline scale factor
Sensitivity factors
0
-1 No clinical data at risk
The Reporting of Serious IG Incidents Policy v1
20
+1 Sensitive information
+1 Information may cause distress
+1 Repeat incident
+1 Complaint to ICO
Final scale point 3 so this is a level 2 reportable SIRI
Example 6
Two diaries containing information relating to the care of 240 midwifery
patients were stolen from a nurse’s car.
Baseline scale factor
2
Sensitivity factors
0 Limited clinical information
Final scale point 2 so this is a level 2 reportable SIRI
Example 7
An imaging system supplier has been extracting PID. A range of data
items including names and some clinical data and images have been
transferred to the USA but are held securely. No third party has received
any data.
Baseline scale factor
3
Sensitivity factors
-1 Limited demographic data
0 Limited clinical information
-1 Data held securely
+1 Sensitive images
+1 Data sent to USA deemed newsworthy
Final scale point 3 so this is a level 2 reportable SIRI
Example 8
It is discovered that a patient’s medical records are lost following the
submission of a subject access request.
Baseline scale factor
0
Sensitivity factors
+1 Detailed information at risk
+1 Patient distressed
+1 Patient compliant to the ICO
Final scale point 3 so this is a level 2 reportable SIRI
The Reporting of Serious IG Incidents Policy v1
21
Appendix 4: IG SIRI Investigation Checklist Report
This checklist will form the basis of the IG SIRI internal investigation:Req.
Actions to be Taken
No.
Type of Incident
1.
Breach type i.e. theft, accidental loss,
inappropriate disclosure, procedural failure
etc.
Information Provided
Please provide details of the incident.
2.
Breach type category (i.e. is it a patient
confidentiality or data security breach).
Details of the Incident
3.
Name of the patient(s) involved (if applicable).
4
Patient’s address (if applicable).
5.
Date, time and location of the incident.
6.
7.
Date the incident was reported via Datix.
Staff employee who reported the incident.
Please provide staff contact details.
8.
Service/Department affected by the incident.
9.
Name of IAO for the department.
10.
Name of IAA for the department.
11.
The number of patients/service
users/staff (individual data subjects)
involved.
12.
The data sets (i.e. information) lost, tampered
or disclosed in error.
13.
The number of records involved.
14.
The format of the records (paper or
digital).
Data Security
15.
If digital format, was the device or hardware
encrypted or not encrypted.
16.
Where applicable was the device
password and login protected. Please confirm
the password was not enclosed with the
device.
17.
Is the actual data recoverable for e.g. was
the device backed up and can the data be
The Reporting of Serious IG Incidents Policy v1
22
18.
19.
recovered.
Can the data be wiped from the device
centrally?
What steps have been or will be taken to
recover records/data (if applicable).
Risk Management
20.
Whether there are any consequent risks
of the incident (e.g. patient safety,
continuity of treatment etc.) and how
these will be managed.
21.
Is the IG SIRI is in the public domain?
22.
Are the media (press etc.) involved or is there
the potential for media interest?
23.
Will the SIRI damage the reputation of an
individual, a work-team, the Trust, an
organisation or the Health or Adult
Social Care Sector (HSCIC)?
24.
Are there any legal implications to consider?
Reporting
25.
Has the incident been reported to the ICO, the
DoH, the HSCIC or any other statutory body?
This must be done within 24 hours of the event
occurring.
26.
What is the initial assessment of the severity
level of the IG SIRI (see the section 12 of the
policy to calculate this).
27.
Have the following Trust roles been informed
of the incident regardless of whether it is
formally or informally:• The Information Governance Lead
• The IT and Information Security
Manager
• Head of IT
• Health Records Manager
• The SIRO
• The Caldicott Guardian
• The Deputy Director of Informatics
• Head of Information and Data Quality
• The relevant service IAO and IAA
• The IT Help Desk
• The Communications Manager (where
media interest exists)
• Security Manager/Specialist
28.
Have the data subjects involved in the breach
been informed formally?
29.
If the incident is a crime has it been reported to
the Police and what is the crime report
number/reference? All crime incidents must be
The Reporting of Serious IG Incidents Policy v1
23
reported to the Police within 24 hours of any
incident occurring.
30.
Was the investigation completed within 5
working days as expected by the HSCIC?
Staff Issues
31.
What type of staff were involved in the
incident i.e. permanent, contractors, casual
staff.
32.
If casual or contract, did the individual(s)
receive the appropriate training during their
induction process?
33.
If the incident was serious was immediate
action taken, including whether to suspend
staff pending the results of an investigation?
34.
Have any staff contracts been terminated?
Contracts/Suppliers
35.
Were any contractors/suppliers involved in the
incident
36.
Is the service covered by an agreement?
37.
Were any risk assessments undertaken prior to
the agreement being made with the
contractor/supplier?
38.
Where appropriate, has the contract been
suspended or terminated?
Lessons Learned
39.
Has an action plan been drawn up for the
relevant IAO/IAA to ensure the area does not
incur the repeated SIRI incident?
40.
Have the lessons learned been identified and
highlighted in any reporting or improvement
plans?
Any further comments relevant to the incident should be stipulated in the box below:-
__________________________________________________________________
For Office Use Only
SIRI Investigator:………………………………………….. Signature: …………………………......
Job Title: …………………………………………………….
Date: …………………………………….
Department:………………………………………………………………………………………….............
The Reporting of Serious IG Incidents Policy v1
24
Appendix 5: Action Plan to Mitigate Risks Involved in the IG SIRI
Information Risk
The Reporting of Serious IG Incidents Policy v1
Control
Action Required
Issues
25
Appendix 6:
Useful Contacts for Potential IG SIRIs
Role
Information Governance Lead
Health Records Manager
IT and Information Security Manager and IT
Help Desk
Head of Information and Data Quality
Head of IT
Deputy Director of Informatics
Head of Risk Management
SIRO
Caldicott Guardian
Communication Team
The Reporting of Serious IG Incidents Policy v1
Name of Person
Marie Galloway
Mark Smith
Derek Prudhoe
Ext.
(0191 445 +
Ext.)
5680
2161
2397
Michelle Conroy
Mhairi Rooney
Nick Black
Sue Winn
John Maddison
Keith Godfrey
Ross Wigham
3230
2552
6204
2338
6101
5637
6120
26