Information governance Staff handbook RDaSH 02 88 Information governance Introduction to information governance Overview 03 88 Information governance – or IG - includes information security and confidentiality, the Data Protection Act and the Freedom of Information Act. It is of great importance within the Trust’s agenda and is supported by the Trust’s Board of Directors. This handbook will guide you through each of these areas and the way we comply locally and will help you to attain a high level of compliance with the Trust policies and procedures as well as with the laws concerning the handling of personidentifiable data (PID). www.rdash.nhs.uk Introduction to information governance 04 88 Information governance toolkit Through a well defined framework, IG ensures that PID is handled with appropriate confidentiality and security and is compliant with information laws. The IG management framework ensures high quality in: • IG assurance • Confidentiality and data protection assurance • Information security assurance • Clinical information assurance • Secondary use assurance • Corporate information management The framework brings together the requirements, standards and best practices that apply to the handling of information. Information governance The Rotherham Doncaster and South Humber NHS Foundation Trust has a comprehensive IG programme documented in the IG toolkit framework that is managed by the IG Steering Group and co-ordinated by the IG Manager. Introduction to information governance 05 88 Information governance structure Accounting Officer (Chief Executive) SIRO (Executive Director of Business Assurance) Caldicott Guardian (Executive Medical Director) Head of Corporate Governance Information Governance Manager Information Governance Security Specialist Information Governance Officer Information Asset Owners Admin Officer Information Asset Administrators www.rdash.nhs.uk Roles and responsibilities 06 88 Accounting Officer The Trust’s Accounting Officer is the Chief Executive, who has overall responsibility for ensuring that information risks are assessed and mitigated to an acceptable level. Information risks are handled in a similar way to other risks, such as those that are financial, legal and reputational. Reference to the management of information risk and associated IG practice is now required in the Annual Governance Statement, which the accounting officer is required to sign annually. Senior Information Risk Owner (SIRO) The SIRO is the Executive Director of Business Assurance, who has lead responsibility for the Trust’s information risks and provides a focus for the management of information risk at Board of Directors level. The SIRO is the chair of the IG Steering Group. Information governance Roles and responsibilities IG Steering Group The IG Steering Group co-ordinates IG strategies and policies across the Trust to ensure consistently high standards of compliance with information handling, in accordance with statutory and legal requirements and the IG toolkit. The group also supports the Trust’s objectives in the delivery of high quality patient care. 07 88 Caldicott Guardian The Caldicott Guardian is the Trust’s Executive Medical Director, who has overall responsibility for protecting the confidentiality of PID. The Caldicott Guardian plays a key role in ensuring that the Trust adheres to the highest standards for handling PID and adheres to the Caldicott management principles. It is the responsibility of the Caldicott Guardian to feedback any IG issues to the senior leadership team and the IG Steering Group. www.rdash.nhs.uk Roles and responsibilities 08 88 Information governance team The IG team is responsible for ensuring that IG is implemented throughout the Trust. The team’s responsibilities include: • completing the interim and annual IG Toolkit assessments; • investigating incidents; • providing IG training; • handling requests for information made under the Access to Health Records, Data Protection and Freedom of Information Acts and also the Environmental Information Regulations; • giving advice and assistance in respect of data protection, information security, information sharing and freedom of information Information governance Roles and responsibilities Information Asset Owners (IAOs) The SIRO is supported by departmental IAOs, who are senior managers involved in running the relevant service. Their role is to understand what information is held, what is added, what is removed, how information is moved, who has access to it and why. 09 88 IAOs must understand and address risks to the information assets that they ‘own’ and provide assurance to the SIRO on the security and use of the assets. IAOs are responsible for information asset registers for their service or directorate and are supported by information asset administrators (IAAs). A list of Trust IAOs and IAAs is available from the IG Team. www.rdash.nhs.uk Information security 10 88 Sending secure mail The tables below summarises which emails are secure and which are not. Note that it is the email address that affects the security, not the physical location. From: @rdash.nhs.uk @doncasterpct.nhs.uk @rdash.nhs.uk Y Y To: @doncasterpct.nhs.uk @gp-c86****.nhs.uk Y Y Y Y @gp-c86****.nhs.uk Y Y Y NHSmail N N N Other NHS N N N Non NHS N N N Unsecure emails should have encryption applied: refer to the IT awareness guide for details of how to do this http://nww.intranet.rdash.nhs.uk/ wp-content/uploads/2012/08/IT-AwarenessGuide1.doc Information governance Information security Encrypted portable devices The most common device is a memory stick, also known as a pen drive, thumb drive, USB stick, etc; which connects to the USB port of a computer and is used to store information. They have a large memory capacity so pose a considerable security risk if lost, stolen or abused. Thousands of memory sticks are lost or stolen every year resulting in the loss of huge amounts of confidential and sensitive data. Only approved, encrypted memory sticks issued by the IT Team can be used to store Trust information: the use of any other memory stick is strictly prohibited. When a memory stick is issued it must only be used in accordance with the usage described on the application form, which can be accessed via the following link: http://nww.intranet.rdash.nhs. uk/support-services/informationtechnology/informatics-forms/ 11 88 Trust memory sticks must only be connected to Trust PCs or laptops: they must never be connected to personally-owned equipment unless: • Using the memory stick for coursework, providing it does not hold any Trust information, or, • Delivering training on a non-Trust PC or laptop. www.rdash.nhs.uk Information security 12 88 Internet and email use All staff must observe the rules of acceptable use, which include the following: • No member of staff is permitted to transmit, access, display or download offensive material, including hostile text or images relating to gender, ethnicity, race, sexual orientation, religious or political convictions when using Trust facilities; • No Trust information may be e-mailed, copied or uploaded to a website, blog, cloud storage or any other form of storage except where it has been approved by the IT team; • Staff must not introduce inappropriate material to any Trust equipment or network, e.g.: material that is sexually explicit, racially offensive, homophobic or otherwise unlawfully discriminatory; • Internet and e-mail use is subject to UK law and the Trust’s policies and any misuse will be dealt with appropriately; Information governance • The use of internet and e-mail is monitored for compliance, security and network management reasons in line with central government guidelines and local policies; • The Trust has the final decision on what constitutes inappropriate use and offensive material and reserves the right to determine the suitability of any usage, which, if found to be illegal or in breach of Trust policies, will lead to disciplinary proceedings and may lead to dismissal and criminal prosecution. Information security Transporting data off-site 1. If physical movement is unavoidable, all papers, electronic storage devices or any other media containing PID must be transported in a lockable container or bag that is securely closed and marked ‘confidential’. 2. Where there is a not a regular transfer, a risk assessment must be conducted and authorisation be obtained from the IAO first. 3. Information that is taken off-site must be recorded together with the reason it was removed and where it was taken. 4. Electronic media transported between sites and organisations must be encrypted, preferably by using encrypted files on CD or DVD that is packaged and clearly labelled to ensure it is handled correctly and sent using Recorded Delivery. Passwords must be transported separately. 13 88 5. Never leave PID unattended or on view in vehicles. 6. If information is to be returned, ensure it is done so as soon as possible. Patient Info www.rdash.nhs.uk Information security 14 88 Posting PID Internal mail Opening Incoming Mail Use a new, robust envelope – not an internal mail envelope; marked ‘private and confidential’. Mail marked ‘confidential’ or ‘private and confidential’ or similar should only be opened by the addressee, unless authority has been delegated and recorded. Clearly print the name and address of the recipient on the front and the sender on the reverse. Always acknowledge safe receipt. External Mail Sensitive information and PID sent to other organisations should be done using recorded delivery or Trust recognised courier and safe receipt must always be confirmed. Routine correspondence and letters, such as those sent to patients, must be correctly addressed and show the recipient’s full name: these items should be sent by standard first or second class post. Information governance Information security Reporting an IG incident Reporting incidents is the responsibility of all staff, temporary and permanent. Rapid investigation of incidents improves complaints management and allows early communication with the people involved. By identifying weaknesses in processes and procedures, reporting aims to prevent future incidents and helps to develop and improve service. Many incidents occur due to lack of training so reporting them assists in showing areas of the Trust where staff training needs to be improved. Any suspected breach of information security involving the confidentiality, integrity or availability of data must be reported using the process detailed below. Examples of information governance incidents include: 15 88 • Loss of staff ID badge • Loss of a patient or staff record • PID not being transported in the appropriate manner • PID being lost in the post • PID found on display, e.g.: on a printer, photocopier, monitor, etc. • Loss of a USB stick • Loss or theft of a laptop All teams have access to the Trust’s Incident Reporting Policy and guidance for completing an IR1 form is available on the Intranet. For further information please contact the IG Team on 01302 796189. Reporting an Incident On the intranet homepage, select ‘Safeguard (IR1)’ from the quick links in the bottom, right-hand corner. www.rdash.nhs.uk Information security 16 88 Information sharing agreements (ISAs) An information sharing agreement is a signed ratified document between the Trust and a third party that sets out: • The need to, and reasons for, sharing the data • The information that will be shared • Confirmation of the law that allows the information to be shared • How the information will be shared • Who the parties to the agreement are • Any necessary security requirements. Information governance Information security Information security K: drive policy All Trust workstations (desktop PCs and laptops) require a username and password to be entered before information can be accessed. When a workstation is left, always press ‘Ctrl’ + ‘Alt’ + ‘Delete’ to lock it so that no-one else can access it. Folders can be created that are only accessible by defined groups or certain individuals, which is useful for work that is to be shared in teams, departments or services. Never share your passwords. Clear c: drive policy No data is to be stored on a PC or laptop C: drive, regardless of whether it includes PID or not: if the computer crashes or is stolen then you will have lost your work. U: drive policy Access to an U: or ‘home’ drive is personal to every user and should be used for storing information that does not need to be shared. 17 88 Ensure PID is saved to a folder with restricted access otherwise it can be shared Trust-wide. Instructions for requesting new folders are included in the IT awareness guide, which is available via the following link: http://nww.intranet.rdash.nhs.uk/ wp-content/uploads/2012/08/ITAwareness-Guide1.doc Transferring confidential electronic records internally Best practice is to create a restricted folder in which to save the records that only the sender and recipient can access. www.rdash.nhs.uk Legislative and other regulatory requirements 18 Data protection and the common law duty of confidentiality The common law duty of confidentiality prohibits the disclosure of information that was provided in confidence unless there is a statutory requirement to do so, such as by court order, it can be justified in the public interest or the provider consents to it. Information governance Legislative and other regulatory requirements Caldicott principle guidelines The Caldicott management principles must be used when dealing with PID. They are: 1. Justify the purpose – all use of PID must be clearly defined and reviewed by the Caldicott Guardian; any proposed new use must be discussed with the Caldicott Guardian 2. Only use PID when it is absolutely necessary to do so – this includes within and between staff members, teams, wards, etc. as well as in transfers between the Trust and other organisations: PID must only be included if it is essential for the specified purpose of the transfer 3. Use the minimum necessary PID – if using PID is essential, the inclusion of every individual item of PID must be justified so the minimum amount is transferred or accessible as required for a specified purpose 4. Only make PID available on a strict need-to-know basis – only individuals with a justified purpose for needing access to PID should have access to it, and they should only have access to the parts of the PID that they need: this may mean introducing access controls or splitting information to restrict access 19 88 5. Be aware of your responsibilities – everyone who handles PID must be appropriately trained in respect of patient confidentiality, with annual refresher training 6. Understand and comply with the law – every use of PID must be lawful: the IG Team and Caldicott Guardian are responsible for ensuring that legal requirements are met and provide advice and assistance to staff. 7. The duty to share PID can be as important as the duty to protect it – All staff and workers within the health and care system must be aware that the duty to safeguard children or vulnerable adults may mean PID should be shared, if it is in the public interest to do so, even without consent. Relevant confidential PID held by health and social care organisations should be shared among the registered and regulated health and social care professionals who have a legitimate relationship with the individual. www.rdash.nhs.uk Legislative and other regulatory requirements 20 88 Data Protection Act 1998 There are eight principles of good practice within the Data Protection Act: these are often referred to as the ‘data protection principles’. Principle 1 - personal data shall be processed fairly and lawfully • There is a requirement to make the general public aware of why the NHS needs information about them, how it is used and to whom it may be disclosed • There should be no surprises: inform data subjects why you are collecting their information, what you are going to do with it and who you may share it with • Remember to be open and transparent about what will be done with information used in research projects Principle 2 – personal data shall be obtained for one or more specified and lawful purposes and shall not be further processed in any manner that is incompatible with that purpose/ those purposes • Only use personal data for the purpose(s) for which it was obtained • A database is any collection of personal data that can be processed by automated means, for example, patient records, staff records, prescription details and research information • Personal data held on Maracis, TPP SystmOne or any other patient administration system must only be used for healthcare purposes • Ensure patients know who will be involved in their care and that they may need access to their information • Only share information outside your team, ward, department or service if you are certain it is necessary and appropriate to do so. All new requests to share information outside the Trust must be referred to the IG Team • Always be open, honest and clear. • If in doubt, check with the IG Team. Information governance Legislative and other regulatory requirements Principle 3 – personal data shall be adequate, relevant and not excessive for the purpose(s) for which it is processed Principle 5 – personal data processed for any purpose(s) shall not be kept for longer than is necessary for the purpose(s) • Only collect and keep information you require: it is not acceptable to hold information without a firm view as to how it will be used • Follow the records retention guidelines, which are available under ‘General Policies’ on the Intranet • Never collect information “just in case …” • Explain abbreviations • Use clear, legible writing • Stick to the facts and avoid personal opinions and comments. Principle 4 – personal data shall be accurate and up to date • Take care when inputting information to ensure accuracy • Check existing records thoroughly before creating new ones to avoid duplication • Check patient details at every contact, e.g.: address and telephone number. 21 88 • Ensure regular housekeeping/ spring cleaning of information • Do not keep information “just in case …” • Follow the guidelines for disposal, which are included in the records retention guidelines. Principle 6 – personal data shall be processed in accordance with the rights of the data subject • Right to subject access • Right to prevent processing likely to cause harm or distress • Right to prevent processing for the purposes of direct marketing • Right in relation to automated decision-making www.rdash.nhs.uk Legislative and other regulatory requirements 22 88 • Right to take action for compensation if the data subject suffers damage • Right to take action to rectify, block, erase or destroy inaccurate data • Right to make a request to the Information Commissioner’s Office (ICO) for an assessment to be made as to whether any provision of the Data Protection Act has been contravened. Principle 7 – appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data • Follow the Trust’s security and confidentiality procedures • Ensure the security of confidential faxes by using safe haven fax machines and checking receipt Information governance • Always keep confidential papers locked away when not in use • Ensure confidential conversations cannot be overheard • Never share your passwords • Ensure confidential information is transported securely • Be aware of confidentiality contracts with third parties. Principle 8 – data must not be transferred outside the European Economic Area (EEA) without adequate protection. If data needs to be transferred outside the EEA please contact the IG Team for guidance. Access to records What is a subject access request? The Data Protection Act allows all living individuals a right of access to information that an organisation may hold about them: requesting access to this sort of information is known as a subject access request. Access encompasses: • A right to obtain a copy of the record in permanent form • A right to view a record without obtaining a copy • A right to have information explained where necessary. How do I know if I’ve received a subject access request? 23 A request does not have to state ‘subject access request’ or ‘access to records request’ or mention the Data Protection Act: it must be in writing, state who the data subject is, state what information is being requested and include the appropriate consent to access the information. If the request is being made directly by a patient, or by a person acting on behalf of a patient, proof of identity will also be required. What should I do if I receive a subject access request? All papers should be forwarded immediately to the IG team by post or fax. It is essential that this is done on receipt as there is a legal time scale for compliance, which starts when the request is received by the Trust, not when it is sent onto the IG team, so delays will compromise the time available for processing the request. The team will then contact the relevant individuals to advise what needs to happen and the legal deadline for completion. The IG team are based at Woodfield House, Tickhill Road Hospital, Balby, Doncaster. www.rdash.nhs.uk Access to records 24 88 Do I have to release the requested records? How long do I have to respond to a request? An appropriate medical professional must consider requests for patients and what level of access should be granted. Typically, the Trust will provide the requested information unless: The Data Protection Act allows 40 working days to provide a response: this starts when all information that is required to process the request is received. • The record contains third party information where the third party is not a medical professional and has not given their consent to the information being disclosed; • Access to all or part of the record would cause harm to the physical or mental wellbeing of the patient or another person. unless original records are explicitly requested by the General Medical Council An HR professional must consider requests for staff records. Only copy records are to be provided to the IG team and requestor. Information governance What if the patient is deceased? The Data Protection Act does not cover deceased individuals; however, the Access to Health Records Act 1990 allows a right of access to deceased patients’ records to certain individuals. For further information refer to the Access to Health Records policy, which is held under information governance policies on the intranet. Freedom of Information What is the Freedom of Information act? The Freedom of Information Act 2000 gives the general public a right of access to information held by the Trust. This Act gives the public a right of access to information held by Trust. There are some exemptions but, typically, we have to provide requested information unless there is a good reason not to. If we refuse a request or withhold the requested information the applicant has a right to appeal to the information commissioner, who is appointed by parliament to ensure the Act is complied with. 25 88 Who can request information under the Act? Anybody can make a request: competitors, potential suppliers, journalists, patients, staff and any other member of the public, whether they are connected to the Trust or not. When a request is made there is no requirement for the applicant to tell us why they are making the request, and we have no to right to ask. The Act applies to all information held by the Trust, in paper or electronic form. Note that scraps of paper with rough notes or comments on are just as releasable as letters, memos and emails. If an email forms part of a decision-making process it needs to be filed electronically or printed and kept in a file. All letters, memos, emails, notes and comments must be written in a way that a member of the public could read and understand them. Good records management means that we can easily determine whether we hold the requested information and where it can be located. www.rdash.nhs.uk Freedom of Information 26 88 What information is covered by the Act? The Act applies to all information held by the Trust, in paper or electronic form. Note that scraps of paper with rough notes or comments on are just as releasable as letters, memos and emails. If an email forms part of a decision-making process it needs to be filed electronically or printed and kept in a file. All letters, memos, emails, notes and comments must be written in a way that a member of the public could read and understand them. Good records management means that we can easily determine whether we hold the requested information and where it can be located. Information governance What about information created prior to the Act coming into force? The Act is retrospective and covers all information, including that which was created and held by the Trust prior to the Act coming into force in 2000. How is an FOI request made? A request must be in writing, which includes email; and it must include the name of the applicant, which can be an organisation, and an address for correspondence, which includes an email address. Freedom of Information What should I do if I receive a request? All requests must be sent immediately to the IG Team: it is important that this is done immediately as legally the Trust has 20 working days to respond, which starts the day after the request is received by the Trust. Copyright If copyright is held by the Trust then the material can be licensed for reuse for a charge. 27 88 If another party holds copyright the Trust cannot licence re-use of the material. Images and videos of services users and staff In addition, the Open Government Licence (OGL) provides a simple set of terms and conditions enabling the free re-use of public sector information. Images are capable of being personal data as people can be recognised and identified by others who know them. Under the OGL the Trust has the authority to license material for re-use as long as the source of the information is acknowledged. The data protection principles must be applied in the same way as they are applied to electronic or paperbased personal data. www.rdash.nhs.uk Further information 28 88 Where can I find more information? IG team contact details More information on FOI and what it means for you can be found: Sue Meakin, IG Manager T: 01302 796189 M: 07909 880396 • On the Ministry of Justice website http://www.justice.gov.uk/ • On the Information Commissioner’s website http://www.ico.gov.uk/ • On the Trust’s publication scheme on the Intranet http://www.rdash.nhs.uk/ information-for-the-public/ freedom-of-information/foipublication-scheme/ • From the IG team. Information governance Steve Massen, IG Security Specialist T: 01302 796385 M: 07584 889382 Rachael Smith, IG Officer T: 01302 796756 M: 07775 012253 Sue Hales, Admin Officer T: 01302 796338 Woodfield House Trust Headquarters Tickhill Road Hospital Doncaster DN4 8QN Further information Top tips 29 88 Forward any requests for specific information to the IG Team. Maintain and weed your paper and electronic files so they only contain necessary information. Only keep information for as long as it is needed or for the required retention period. Review your filing practices: all filing should be in a logical and common system agreed within your department or directorate. All staff in departments should be able to access each other’s filing systems in the absence of a member of staff. If an FOI request is made it is not acceptable to give staff absence as a reason for exceeding the 20 day deadline. Ensure electronic documents have footers on that easily identifies where they are held. Follow the Safe Haven policy and remember that emails are classed as official records that the public has a right of access to. The sender has very little control over an email once it has been sent so be mindful of the content. www.rdash.nhs.uk 30 88 Information governance 88 31 In G Secu www.rdash.nhs.uk Contact details Information Governance Business Assurance Trust Headquarters Woodfield House Tickhill Road Hospital Doncaster DN4 8QN DP7120/9772/05.13
© Copyright 2026 Paperzz