Information Asset Owners and Administrators

INFORMATION ASSET REGISTER
HANDBOOK
(IA Owners and IA Administrators)
(Information Asset Management)
Page 1 of 11
J:\Care Services\Governance\9. Policies\4. Information Governance Policies\SH IG 21 - Information Risk Management Policy\Information Asset Register
Handbook v2 9 2016 01 05.doc
CONTENTS
WHY DO WE NEED AN INFORMATION ASSET REGISTER?
3
LINKS TO DATA PROTECTION
3
INFORMATION ASSET OWNER
4
INFORMATION ASSET ADMINISTRATOR
6
WHAT IS AN INFORMATION ASSET
7
COMPLETING THE INFORMATION ASSET MANAGEMENT TOOL
7
THE RISK ASSESSMENT TOOL AND HOW TO USE IT
10
WHO DO I CONTACT IF I HAVE ANY QUESTIONS ABOUT COMPLETING THE
SPREADSHEETS?
111
WHERE SHOULD I SEND THE COMPLETED ASSET REGISTER?
111
Page 2 of 11
J:\Care Services\Governance\9. Policies\4. Information Governance Policies\SH IG 21 - Information Risk Management Policy\Information Asset Register
Handbook v2 9 2016 01 05.doc
Why do we need an Information Asset Register?
The Information Risk Management (IRM) Policy has been created to ensure that the Trust meets the
requirements of the Department of Health Information Governance policies and standards on managing
information assets.
This states that
• All NHS organisations need a clear Information Risk Management Policy
And that
•
Information Risk Management should be a fundamental component of the organisations overall
business risk management framework
Key aspects of the Information Risk Management Policy:
•
•
•
•
•
Provides support for the organisations business aims and objectives
Defines how our Trust and its delivery partners will manage its Information Risk
Identifies how risk management effectiveness is assessed and measured
Defines IRM escalation points and mechanisms
Identifies accountability, roles & responsibilities for staff
Compliance requirements of the National Policy ‘NHS Information Risk Management’ (NHS Connecting for
Health, Digital Information Authority; January 2009 Guidance) is to have knowledge of:
• What information assets we have
• Where they are
• What they hold
• How they are used
• Identify risks
The way to do this is for our Trust to have a register of all information assets as well as a review and update
programme in place. This will require ownership and regular administration hence, the creation of Information
Asset Owner and Administrator roles.
Links to Data Protection
Information Risk Management has direct links to the requirements of the Data Protection Act 1998 (DPA 1998).
Southern Health NHS Foundation Trust’s Asset Register implementation and review programme is linked to
the Data Protection and Data Custodian Framework.
Therefore, The Trust made a Board decision for Data Custodians (within the meaning of the DPA 1998) to
become our Trust Information Asset Owners thus, merging the two roles.
Page 3 of 11
J:\Care Services\Governance\9. Policies\4. Information Governance Policies\SH IG 21 - Information Risk Management Policy\Information Asset Register
Handbook v2 9 2016 01 05.doc
INFORMATION ASSET OWNER
Role and Responsibilities
Responsible to: Senior Information Risk Owner / Line Manager
Summary
The Information Asset Owner (IAO) is a senior member of staff who is the nominated owner for one or more
identified information assets within the service/Trust. IAOs will work closely with other IAOs of the Trust to
ensure there is comprehensive asset ownership and clear understanding of responsibilities and
accountabilities, especially where information assets are shared by multiple services. IAOs will support the
SIRO in their overall information risk management function as defined in Trust policy.
The IAO will also undertake the role of Data Custodian, as required by the Data Protection Act 1998.
The IAO will document, understand and monitor:




What information assets are held, and for what purpose
How information is created, amended or added to over time
Who has access to the information and why
Understand and address the risk to the asset, providing assurance to the SIRO
Key responsibilities
1.
Identify and document the scope and importance of all information assets they own. This will
include identifying all information necessary in order to respond to incidents or recover from a
disaster affecting the information asset.
2.
Take ownership of their local asset control, risk assessment and management processes for the
information assets they own. This includes the identification, review and prioritisation of perceived
risks and oversight of actions agreed to mitigate those risks.
3.
Provide support to the SIRO to maintain their awareness of the risks to all information assets that
are owned by the Trust, and for report those risks as appropriate.
4.
Ensure that staff and relevant others are aware of and comply with expected information
governance and Data Protection working practices for the effective use of information assets:

Promote Data Protection & Caldicott Principles on an ongoing basis, including distributing posters,
communicating articles and giving local briefings

Promote local induction and ensure that all new starters, before they access any information
system, are given instruction on the Data Protection Act and Caldicott, as part of their first day/week
induction programme.

Ensure that all new staff attend the Corporate Induction session as soon as they are able

Ensure that all staff have access to current information on Data Protection Act and Caldicott
requirements

Ensure that all staff are aware of the Data Custodian/IAO for their area and the contact details for
the relevant Information Security Team
Page 4 of 11
J:\Care Services\Governance\9. Policies\4. Information Governance Policies\SH IG 21 - Information Risk Management Policy\Information Asset Register
Handbook v2 9 2016 01 05.doc

Ensure that all staff know the procedure for reporting information and IT security incidents
5.
Provide a focal point for the resolution and/or discussion of risk issues affecting their information
assets
6.
Ensure that the Organisation’s requirements for information incident identification, reporting,
management and response apply to the information assets they own; including ensuring completion
of Data Flow Mapping exercises when required.
7.
To ensure (via IAA) that the service’s RA Sponsors and Agents list is regularly reviewed and up
dated – reporting to the RA Co-Ordinator as appropriate.
8.
To attend information risk management training as required to ensure skills, capabilities, and any
new national requirements are kept up to date.
9.
To supervise and delegate tasks to the Information Asset Administrator.
Page 5 of 11
J:\Care Services\Governance\9. Policies\4. Information Governance Policies\SH IG 21 - Information Risk Management Policy\Information Asset Register
Handbook v2 9 2016 01 05.doc
INFORMATION ASSET ADMINISTRATOR
Role and Responsibilities
Responsible to: Information Asset Owner
Summary
The Information Asset Administrator’s (IAA) primary role is to support the IAO to fulfill their responsibilities.
IAAs will ensure that policies and procedures are followed, recognise actual or potential security incidents,
consult with their IAO on incident management and ensure that information asset registers are accurate and up
to date.
Key responsibilities
Detailed responsibilities will be in agreement with the IAO – but would include:
1.
Maintenance of Information Asset Registers
2.
Ensuring compliance with Data Protection Act – data sharing agreements within the local area
3.
Ensuring information handling procedures are fit for purpose and are properly applied
4.
Under the direction of their IAO, ensuring that personal information is not unlawfully exploited
5.
Recognising new information handling requirements (e.g. a new type of information arises) and that
the IAO is consulted over appropriate procedures – e.g. completing/updating information mapping
flows
6.
Recognising potential or actual security incidents and consulting with the IAO
7.
Reporting to the IAO on current state of local information handling
8.
Ensuring that local information handling constraints (e.g. limits on who can have access to the
assets) are applied, referring any difficulties to the IAO
9.
Act as first port of call for local managers/staff seeking advice on the handling of information
10.
Under the direction of IAO, ensuring that information is securely destroyed at the end of the
designation retention period
Page 6 of 11
J:\Care Services\Governance\9. Policies\4. Information Governance Policies\SH IG 21 - Information Risk Management Policy\Information Asset Register
Handbook v2 9 2016 01 05.doc
What is an Information Asset
An Information Asset is Service User, Staff or Corporate information / data, processed by us and is held in an
electronic or hard copy/manual format.
Examples of information you may have in your area:
 Electronic Patient records e.g. OpenRiO primary electronic record, eCAMIS record,
 Paper health records, OpenRiO secondary record
 Audit records
 Paper records and reports including service user and staff records
 Contracts and agreements
 Business continuity plans
 Images i.e. photographs, X-rays, MRIs,
 Manuals and training materials
 Research Information
 Investigations i.e. IMR, CIR
 Voicemail / answer phone message / message pads
 CCTV recordings
 Staff files; sickness, employment details, appraisal, leave, etc.
 Business meeting minutes/notes, including Board minutes/reports
 Clinical meeting notes
 Multi Agency Risk Area Consortium (MARAC) information
 Whiteboard
 Back-up and archive data
 Building plans
 Travel claims
 Revalidation documentation
 Birth Books
 Ward Admissions & Discharges Book
 Inventories
 Tenders
Completing the Information Asset Management Tool
The Information Asset tool is an excel spreadsheet. It is a combination of both an information asset register
and a data protection compliance checklist.
You will need to record the name of the service and team to whom the information assets relate to. As well as
recording who the Information Asset Owner is (IAO) and the Information Asset Administrator (IAA).
If you are covering more than one area you will need to use the existing register but use the additional tabs
along the bottom of the spreadsheet to create each area.
Please see example as shown below:
Page 7 of 11
J:\Care Services\Governance\9. Policies\4. Information Governance Policies\SH IG 21 - Information Risk Management Policy\Information Asset Register
Handbook v2 9 2016 01 05.doc
If this is the first time an Information Asset Management Tool for this service/team has been completed then
please record the date in the ‘date this register is modified’ field.
If this is a review/update/amendment of your initial completed document, please complete the ‘Date this
register is modified’ field. In addition to entering this date you will need to ensure that the next review/risk
assessment date field on the register is also filled in with a review date, this will reflect that a review has taken
place and will provide evidence to the IGTK.
This form must be updated when a new asset is added to the tool OR when an existing information asset is
amended. Once the spreadsheet has been reviewed/ updated/ amended please use the ‘Save As’ function,
and name your sheet in the following format:
e.g. Division (CORP, AMH, LD, TQ21, ISD…, CHILDRENS) Team Name, Version & Date
CORPORATE - Information Assurance Team v2 20.07.15
Enter the name of the asset at the top and across question 1 and then simply work down the questions for
each different information asset type – refer to the documented example within the IA management tool.
Page 8 of 11
J:\Care Services\Governance\9. Policies\4. Information Governance Policies\SH IG 21 - Information Risk Management Policy\Information Asset Register
Handbook v2 9 2016 01 05.doc
INFORMATION ASSET MANAGEMENT TOOL
Name of Service,site and team/s:
Information Asset Owner:
Information Asset Administrator:
Date this register is modified:
What Information/ Data do you have?
1
2
Enter as free text in appropriate column
Example:
Personnel Records
How is the information held?
From the drop down menu select: Yes or No
If this information is electronic, where is it stored?
From the drop down menu select: Yes or No
If you know the name of the drive/shared folder please state
3
Electronic
Hard Copy/ Manual
Local "C" Drive
Removable Drives:
e.g. DVDs, SD Cards &
Datasticks
Sharepoint
Network Drives: e.g.
Departmental Drive,
Home drive
Dictaphones
Database System
Enter as free text in appropriate column
4
5
6
7
8
9
10
11
12
13
14
15
16
Does the information contain Person Identifiable Data?
e.g. name, address, DOB, photograph, dental impressions, x rays/images that can identify a person?
From the drop down menu select: Yes or No
Does the information contain Sensitive Data?
e.g. ethnicity, physical or mental health details, religion, diseases, sexual
orientation, financial details, sickness/ disciplinary/ appraisal record, trade
union membership - that tells us something about the person?
From the drop down menu select: Yes or No
If yes to Question 4b, please state what sort of Personal Sensitive
Information.
e.g. Looked after/ adoption, ethnicity, physical or mental health details,
safeguarding (childrens), religion, diseases, sexual orientation, security
access (keycodes) etc.
Enter as free text in appropriate column
Does the information contain Corporate Sensitive Data?
e.g .contract tender, budget details - commercially sensitive information.
From the drop down menu select: Yes or No
If the information is in hardcopy/paper format, do you store your documents,
On-site / off- site / both?
Enter as free text On site or off site, in appropriate column
If off- site, with which archive company?
e.g. PHS Records Management , Box-It
Enter as free text in appropriate column
If stored On-site , where is it located?
e.g. Managers Offices, Admin Offices, Ward office, Consultation Room,
Personally held (like an HCP diary)
Enter as free text in appropriate column
How is the (on- site) information protected against inappropriate access?
e.g. Password protected log-on, limited access to local drives, password
protection of sensitive folders, smartcards, filing cabinets locked, office
access limited: alarm + pinpad access code.
Enter as free text in appropriate column
Please confirm whether the IAO risked assessed the asset within this
register? If no, please name the person who did?
Enter as free text in appropriate column
What is the level of risk regarding inappropriate access to the information
asset? (refer to the risk level tool)
Enter the result as free text in appropriate column
Your asset should be reviewed in accordance with the frequency determined
by the level of risk i.e. annually, 6 monthly or monthly.
Please set a date for the next review?
Enter as free text in appropriate column
What do you consider to be your main information asset risk?
Yes
Yes
No
Yes
Yes
Corporate Services Information
Governance
No
RiO
Other
Yes
Yes
Sickness,
Disciplinary,
N.O.K. Details,
Financial Details,
Employment Contract
No
Both
Box-it
Manager's Office
Locked in 4 drawer
filing cabinet
A.Sessor
10
Annually
Annually
Annually
01/05/2014
Paper records not
locked away at all
times, use of offices
by staff from other
sites
Page 9 of 11
J:\Care Services\Governance\9. Policies\4. Information Governance Policies\SH IG 21 - Information Risk Management Policy\Information Asset Register
Handbook v2 9 2016 01 05.doc
The Risk Assessment Tool and How to use it
Having identified our information assets we then need to identify what information risks exist, for example:
 Inappropriate access
 Damage to the information asset
 Loss of information
 Inaccessibility to the information
and the likelihood of any of the above occurring.
The risk assessment matrix below is the preferred method to do this and must be embedded within all
services, departments and teams across the Trust.
Severity Level:



High (8-10)
Medium (5-7)
Low (1- 4)
Likelihood:





1 – 2 Very unlikely
3 – 4 Unlikely
5 – 6 Occasionally
7 – 8 Likely
9 –10 Always
Scenario 1
Medics recording discharge summaries onto a tape dicta phone which has no protection. Medic records service
user full name, DOB (PID) + clinical information including medication, diagnosis. This happens on a regular
basis.
Severity:
You may consider this to be very high because of the PID and personal sensitive information e.g. 10.
Likelihood:
You may consider, the information is recorded on a regular basis on an unprotected device/media and can
easily be lost, accessed by unauthorised person/s e.g. 10.
Risk score is: 100 so the risk will need to be reassessed monthly.
Scenario 2
Ward lists which contain Person Identifiable Data (PID), filed into a ring binder, stored on shelf in a room
unlocked when occupied, and locked when not occupied.
Severity:
You may consider this to be high because of the PID e.g. 5.
Likelihood:
You may consider that the room is occupied throughout the day, and locked when not occupied thus making this
middle of the likelihood range e.g. 5.
Risk score is: 25 so the risk will need to be reassessed 6 monthly.
Scenario 3
An administrator accesses the Trust’s network via a desktop computer, on site, to create and store service user
appointment letters into a protected folder held on a network shared drive (not C drive).
Severity:
You may consider this to be high because of the PID e.g. 7.
Likelihood:
You may consider this to be very unlikely as to access to the building is limited, access to the IT network is with
Page 10 of 11
J:\Care Services\Governance\9. Policies\4. Information Governance Policies\SH IG 21 - Information Risk Management Policy\Information Asset Register
Handbook v2 9 2016 01 05.doc
a password and network account and the folder is protected so access is restricted e.g. 1.
Risk score is: 7 so the risk will need to be reassessed annually.
Who do I contact if I have any Questions about
completing the spreadsheets?
Please contact either your local Information Governance Lead or
The Information Assurance Team and ask to speak with:
Sharon France, Information Governance Manager
Donna Woolley, Information Governance Facilitator
Karen Watts, Information Governance Facilitator
Telephone IG Team: 01962 763931
Where should I send the completed Asset Register?
Please return the completed Asset Register compliance tool to the Information Assurance Team by
NHSmail to: [email protected]
Page 11 of 11
J:\Care Services\Governance\9. Policies\4. Information Governance Policies\SH IG 21 - Information Risk Management Policy\Information Asset Register
Handbook v2 9 2016 01 05.doc