Unit 1: Information Governance - Blackpool Teaching Hospitals NHS

Unit 1: Information Governance
Refresher Module Guidance and Assessment
LEARNING OUTCOMES
When you have completed this unit you should:
1) have revised and updated knowledge of information governance issues at this Trust
2) continue to:
 understand the importance of providing a confidential and secure healthcare service
 handle information safely and securely
 comply with data protection and freedom of information legislation
 include IG in everyday practices (including patient care)
3) be able to recognise a breach of confidentiality or information security
4) have accessed and completed the appropriate annual mandatory Information Governance
module
WHAT IS INFORMATION GOVERNANCE?
Information Governance is a term which describes the way we „process‟ or handle information. It
covers personal information (that is, relating to patients/service users and employees) and also
corporate information (for example, financial and accounting records).
INTRODUCTION
All staff, both clinical and non-clinical, , including agency, locum, temporary, volunteers, students
etc. must complete and pass a prescribed Information Governance training module every year.
The training module, which includes a short multiple-choice assessment test, is also accessible
through a national on-line e-learning tool. This particular module provides revision and updates,
including specific training for this Trust surrounding IG.
HOW DOES IG AFFECT YOU?
Information Governance applies to all employees.
Information should be safeguarded, yet available in the right place, at the right time in order for
staff to be able to care for patients. There are lots of different aspects of IG, including
confidentiality, Data Protection, Freedom of Information Act (2000), good record keeping and
information security. They all contribute towards supporting the provision of safe and high quality
patient care.
-------------------------------------------------------------------------------------------------------------------------------CONFIDENTIALITY
All staff working for Blackpool Teaching Hospitals NHS Foundation Trust including volunteers,
students, agency and temporary staff have a duty to protect and maintain the confidentiality of
patients and other personal information.
Make sure that you still understand your responsibilities and speak to your line manager if you
have any doubts.
You are asked to „sign up‟ to the Confidentiality Code of Conduct each year, through the appraisal
process. It is your responsibility to ensure that all confidential information is held securely. If you
do not have an appraisal, you should contact the IG team to sign up annually.
The duty of confidentiality is written into employment contracts. Any breach of confidentiality of
information gained, whether directly or indirectly, in the course of work is a disciplinary offence that
could result in dismissal.
Just because we are „all signed up‟, it doesn‟t mean that we can hear or see information about
anyone just because we may have the ability to access it. We should only access information
necessary for our job role and never anymore.
Page 1 of 10
Please see the incident section below for more information on how different types of information
can affect an untoward incident.
CALDICOTT
Following a second review of how patient information is used carried out in 2013, Caldicott2 reenforces the six existing Caldicott principles for the security of patient information and adds a
seventh:
1. Justify the purpose (use) for using confidential information
2. Don‟t use personal data unless it is absolutely necessary
3. Use the minimum amount necessary of personal or confidential data
4. Access to this data should be on a strict need-to-know basis*
5. Everyone with access to this data should be aware of their responsibilities
6. Comply with the law
7. The duty to share information can be as important as the duty to protect patient
confidentiality**
Every NHS organisation still has a senior clinician, nominated to act as a champion for the uses of
patient information. Here at Blackpool Teaching Hospitals NHS Foundation Trust, our Caldicott
Guardian is Professor Mark O‟Donnell.
*You should not access ANY information unless you are directly involved in that patient‟s care or
you have a legitimate reason to access their information for example audits. You are not permitted
to access information for yourself, colleagues, family or friends. This is classed as unauthorised
access to information and by doing so you are breaching the Computer Misuse Act 1990. This will
result in disciplinary action.
INFORMATION SHARING
**The Department of Health has produced some guidance around the need to share for direct
health care. If you need to share with other NHS or non NHS providers for purposes other than
this, you may need to consider whether you will need additional approval from the IG team before
releasing any information.
THE DATA PROTECTION ACT 1998
UK law in the form of the Data Protection Act 1998 (DPA) governs how organisations may use
personal information (about living people), including how they obtain, store, share, transport or
dispose of it.
Within organisations, staff should inform patients why their information is collected and recorded,
what is collected, who might see this personal confidential information and their rights.
What are these rights?
The DPA provides the public with rights; for example rights to access information held about them.
These are known as Subject Access Requests and are facilitated by the Data Access Team. The
Data Access Team also process requests for information.
Patients have other rights, including rights to compensation and rights to prevent information being
processed about them. There are more, these are just a few.
Those staff directly involved in patient care should include this in their process. For example, a
patient should be able to review who they previously consented to share information with at their
last visit, and be given the option to revise it.
Staff should also be informed about how their information is used. You can ask the IG
department for more information about this.
Page 2 of 10
THE FREEDOM OF INFORMATION ACT 2000 / ENVIRONMENTAL INFORMATION
REGULATIONS 2004
The FOIA 2000 came into force on 1st January 2005 and works alongside the EIR 2004 which
was already providing a means of access to environmental information associated with public
bodies.
FOI gives the public the right to request information from public authorities. When asked for
information, we have a duty to respond within 20 working days to written information requests. It
also obligates public authorities to publish certain information about their activities. Some
examples are:
 Who we are and what we do
 What we spend and how we spend it
 What our priorities are and how we are doing in relation to them
 How we make decisions
 Our policies and procedures
 The Services we Offer
Annual training is provided to staff involved in the FOI process across the Trust. If you are asked
to provide information for an FOI request, please do so as soon as possible. If you are not sure
what the requestor is asking for, or have any questions, please liaise with the FOI lead straight
away. It is possible for the request to be clarified in further detail before the Trust responds,
providing the Trust has adhered to the FOI process within a timely manner.
RECORDS MANAGEMENT/ GOOD RECORD KEEPING
Good record keeping (including clinical record keeping) contributes to providing patients with safe
and high quality care. Information should be made available in the right place, at the right time.
Poor quality information is bad for patient care, bad for funding and bad for reputation, e.g.





Incomplete, inadequately analysed data can lead to serious failures in service.
Poor demographic data results in duplicate and confused entries on patient record systems.
Confused patient identity numbers can lead to the wrong patient being treated.
Inadequate records lead to poorly planned care.
Poor data results in poor commissioning, monitoring, planning and financing of services.
DISCLOSURE OF INFORMATION
Personal information shared in confidence should not be used or disclosed further without the
consent of the individual.
Exceptions to the requirement for consent are rare and limited to legal requirements to disclose
information, e.g. by Acts of Parliament or court orders; disclosures permitted by regulations made
under section 251 of the NHS Act 2006, (previously known as section 60 of the Health and Social
Care Act 2001), or where there is a public interest or justification for breaching confidentiality such
as a serious crime, including murder, rape or child abuse.
The Data Access Team, in IG facilitate requests for information. Please seek advice from your line
manager or the Data Access Team before disclosing information to anyone if you are unsure.
INFORMATION SYSTEM MANAGEMENT
It is especially important to seek Information Governance advice at the outset of any new project
or process (including upgrades to equipment or software) or when you plan changes to systems.
Screening process– complete the necessary documentation for your new project or system
You need to consider Privacy Impact Assessments where person identifiable information is used
Submit to Information Governance Team once the above is completed
Page 3 of 10
The project or system will need to be taken to the Health Informatics Project Board (HIPB) for
approval
Ensure any change in process to an existing system are revised and approved as above
Make sure you have a system administrator identified before the project/system is taken to HIPB
Sharing information stored on your system with a third party? Contact the IG Helpdesk for advice
before sharing
INFORMATION SECURITY
Conversations - Please ensure that you find a quiet area to have a confidential conversation.
Never discuss these conversations in public places or where you can be overheard. Remember –
access to information is on a strict need to know basis
No sharing – You must not share login credentials/access cards under any circumstances. For
example, your smart card is issued to you for access to the systems you have permission to use.
They must not be shared with your colleagues, ever. Remember to remove your SMART card
from the PC and lock your computer when you leave it.
Passwords - Choose a secure password that is memorable only to you - and keep it secret. It is a
breach of Trust policy to share your password with colleagues. Your password is for you and you
alone. DO NOT write your password down anywhere.
You should change your password often. If you need to send encrypted removable media, do not
attach the password to the device, always send it separately.
Removable Media and Encryption
All laptops, memory sticks and other portable IT data (e.g. USB sticks, CDs and DVDs) used in the
Trust must be encrypted and encryption keys (passwords) must never be transported with the data
they are designed to protect. Staff must not use any USB stick other than those supplied by the
Trust.
Fines up to £500,000 can be imposed for the loss or theft of patient data on an unencrypted laptop
The same fine can apply if the encryption key (password) is not applied properly to protect the
data.
Encryption does not protect against financial penalties or patient trust.
Mobile Devices - Make sure all mobile devices, including laptops and Blackberry‟s, are locked
away securely when not in use. Do not leave devices in your car overnight.
Please refer to the Mobile Computing Equipment Management (Mobile Devices and Media) Policy
CORP-POL-513 if you would like to request to use your own device or for further information.
Medical Photography - You must not use iPhones or Blackberry‟s to take clinical photographs. The
Department of Medical Photography and Illustration is the first point of contact for any imaging
needed throughout the Trust.
Please refer to the Photography and Video Recordings of Patients: Confidentiality, Consent,
Storage and Copyright procedure.
Disposal of Confidential Information
Paper-based person identifiable or Trust sensitive information must be disposed of confidentially
(using confidential waste bins) and not in the normal rubbish. Some examples are:
 Character references of unsuccessful job applicants
 Patients‟ appointment lists
 A list of patient‟s who took hospital transport the previous week
 A ward handover sheet
Page 4 of 10
Removable media containing person identifiable or Trust sensitive information must be disposed
of confidentially (using other methods – further information is available from the IT Department)
and not in the normal rubbish. Some examples are:
 Cassette tapes once used for dictating letters to patients
 A CD with no markings found in an old cabinet
Transporting/ Sending Information - When you are sending any paper-based records, you should
know that it is your responsibility to ensure that they reach their intended destination safely and
securely.
You should also familiarise yourself with the Transportation of Person Identifiable information and
Trust sensitive information in paper form, electronic devices and dictation tapes procedure.
Fax – If you are faxing, please ensure that you ring the recipient, double check the fax number,
always use a cover sheet and check to make sure the fax has been received. Only fax when
absolutely necessary and send all correspondence via secure email instead.
Email – The Trust provides a send secure email solution for all Trust (bfw) email account holders.
If you work in an acute and some community settings you will have the ability to use the send
secure button available on your Microsoft email facility. If you do not have this option or are using
any mobile device which is not supported by Microsoft and you want to send an encrypted email
please type [secure] in square brackets in the subject line before sending your email.
Things to remember:
 Always double check the recipient before sending any emails, especially those containing
person identifiable or Trust sensitive information- there are lots of duplicate names on the
address book
 Password protect information, or a document in addition where necessary
 Test emails should be sent where the address has not been used before
 Send secure must be used when sending patient identifiable or Trust sensitive information
outside of the Trust
 The minimum amount of information necessary should always be used
 No person identifiable information should be in the subject line
 Be aware - emails can be disclosable to the person they are written about
 Contact the IG helpdesk for advice if you are unsure
Post – When sending information in the post, please remember to confirm the address of the
recipient, seal the information in a robust envelope, when appropriate, send the information by
recorded delivery or tracked post and where possible, ask the recipient to confirm receipt. Please
refer to the Transportation/sending information part of this document for more information when
sending health records in the post.
SOCIAL MEDIA/ NETWORKING
Take care when using social networking sites. The importance of this cannot be over-emphasized.
As an employee of the Trust, when using social media for personal use please:
 Be aware that staff have a duty of care to protect the confidentiality of personal information
relating to any individual (including patients, staff and visitors). This is in accordance with
the Trusts Confidentiality Code of Conduct Policy (CORP/POL/107) and Guidance
(CORP/GUID/140). Any breach of confidentiality, including through social media, will be
dealt with via the Trust Disciplinary Procedure (see Section 7).
Page 5 of 10

Do not post derogatory comments/photographs/videos about patients/staff/visitors etc.
remember, be professional in your role and maintain professional boundaries. (Even when
you are not at work, the same rules must be followed)
 Never share confidential or sensitive information.
 Know that staff must not share information about patients without explicit
consent (refer to CORP/PROC/102, Consent to Examination or Treatment).
 Help to reduce risk of confidential information being added to social media accidentally,
understand that no photographs or videos of workspaces / computer screens, where person
identifiable information may be on view, may be used unless all such information has been
removed before the picture is taken.
For more information, please read the Social Networking Policy CORP-POL-220
Off sick? Be mindful of how some things being posted on a social media site may look to others or
your employer.
In short, please make sure that if you use social media, you maintain professional boundaries, do
not post inappropriate messages/ photographs onto social networking sites and maintain
confidentiality at all times.
INFORMATION GOVERNANCE/ INFORMATION SECURITY INCIDENTS
Any breach or near miss must be reported. Tell your line manager as soon as possible what has
gone wrong. You will need to use the on-line untoward incident reporting system. Look out for the
Information Governance updates which contain important updates including lessons learned.
Managers will need to investigate any potential information security or confidentiality breach.
Please liaise with the IG team for further assistance.
TRAINING
Please ensure that you have been given the appropriate training and own login details before
logging into any system to access confidential information. You must NOT look up information
under a login that is not your own, or if you have not been trained, even if you are asked to do so.
(Please refer to the Confidentiality and Caldicott section for more details.)
Managers must not agree for staff to use other staff login credentials etc. Managers must ensure
that all staff being brought into the organisation receive information governance training at the first
opportunity (on the first day of work OR prior to employment OR before being granted access to
any person identifiable or Trust sensitive information, including paper and electronic information).
Please contact the IG team who will be happy to arrange assistance with this training.
Managers should also ensure that staff remain up to date with this training and that all staff
understand their responsibilities for the duties themselves and their carry out. This includes
ensuring that processes are in place to assist staff when handling information.
Further data protection training in addition to mandatory training is offered to all employees by the
IG team. More information about information governance and guidance is available through the IG
intranet pages.
INFORMATION GOVERNANCE ADVICE AND SUPPORT
Your Information Governance team can provide advice and support on:
 Corporate or health records management
 Data protection and confidentiality
 Information security
 Freedom of Information
 Data access enquires
You can contact the Information Governance
[email protected]
Page 6 of 10
Helpdesk
(01253)
953057
or
email
Unit 1: Information Governance Assessment
The Refresher Module
Question 1
Which of the following statements about Caldicott are true?
Highlight three options
a) Caldicott2 was carried out during 2013
b) There are 10 Caldicott Principles
c) Every NHS Trust should appoint a „Caldicott Guardian‟ to act as the conscience for the uses of
patient information
d) Principle 4 states that “Access to information should be on a strict need-to-know basis”
e) Caldicott does not exist
Question 2
Mary, your colleague is awaiting some test results. She approaches you to ask you to look them
up on the system. She knows you have access to this information, but you are not directly involved
in her care and only work in the department where the results are processed. What should you
do?
Highlight one option
a) Look them up – you have access and Mary has just given you consent to do so
b) Tell her to go through the appropriate processes in order to get her results e.g ring the
secretary/GP surgery
c)
Tell her your login details and let her look herself
d) Look but only tell her if the result is something she will want to hear
Question 3
Staff should inform patients about why their information is collected and recorded, what is
collected, who might see this personal confidential information and their rights. True or False?
Highlight one option
a) True
b) False
Question 4
The Data Protection Act 1998 provides the public with rights.
Highlight three options
a) Rights of access to information held about them (also known as Subject Access Requests)
b) Rights to prevent information being processed about them
c)
Rights to compensations
d) Rights to access to any record about anyone
Question 5
What is the name of the department that facilitates requests for information such as Subject
Access Requests?
Highlight one option
a) Information Team
b) Data Access Team
c)
Data Information Team
d) Data Team
Page 7 of 10
Question 6
Under the Freedom of Information Act 2000, public authorities are obligated to publish certain
information about their activities. Which of these fall under the FOI Act?
Highlight three options
a) Who we are and what we do
b) What we spend and how we spend it
c) Patient and staff information
d) How we make decisions
Question 7
What are the possible consequences of failing to protect confidential information?
Highlight three options
a) A loss of patient trust
b) NHS organisations being fined up to £500,000
c) Critical media coverage
d) Faster and lawful sharing of information
e) No consequences- as long as there is a complete copy to refer to
Question 8
If you or your area/ team are looking at a new project/system or are making a change to an
existing project/ system, what steps should you take?
Highlight one option
a) Complete the necessary documentation
b) Consider Privacy Impact Assessments
c) Submit documents to the IG team
d) Identify a system administrator
e) All of the above
Question 9
Which of the following things should you remember when setting a password?
Highlight three options
a) Use a friend‟s name or a birthday date that you will not forget
b) Change it regularly as a precaution against someone else finding it out over time
c) Keep it as secret as you would your bank account PIN
d) Never post it with an encrypted CD it gives access to
e) Write it down in reverse order so no-one can guess it
Question 10
The major cause of security breaches in the NHS is the losses and thefts of IT equipment holding
staff or patient data. Which of these statements are correct?
Highlight four options
a) All NHS laptops and other portable IT data (e.g. USB sticks, CDs , DVDs) must be encrypted
b) Encryption keys (passwords) must never be transported with the data they are designed to
protect
c)
Fines up to £500,000 can be imposed for the loss or theft of patient data on an unencrypted
laptop
d) The same fine can apply if the encryption key (password) is not applied properly to protect
the data
e) Encryption protects against financial penalties
f)
Encryption protects against loss of patient trust in the NHS
Page 8 of 10
Question 11
What should you remember when sending an email?
Highlight one option
a) Check the recipient is correct
b) Use send secure encryption facility when sending emails outside of the Trust
c) Confirm the information within the email is the minimum about necessary
d) Be professional and remember that emails can be disclosable to the person they are written
about under law
e) All of the above
Question 12
Which of the following does the Trust Social Media Policy include?
Highlight three options
a) Staff have a duty of care to protect the confidentiality of personal information relating to any
individual (including patients, staff and visitors)
b) Any breach of confidentiality, including through social media, will be dealt with via the Trust
Disciplinary Procedure
c) The policy only applies when staff are physically at work
d) Staff must not share information about patients without explicit consent
Please check that you have chosen the correct amount of options for each question as some
questions require more than one answer.
Page 9 of 10
Unit 1:
Information Governance Completion Statement
PLEASE only sign and return when you are satisfied that your staff member has completed the relevant
mandatory units and correctly answered questions.
A PHOTOCOPY of this completion statement ONLY, MUST be sent to Learning and Development. This is for
input on to the Trusts Central Training Data Base (OLM) as evidence that your staff member has completed
the Mandatory Training Unit.
A further copy should be placed in your staff members personal development file.
This is to confirm the Mandatory Training Guidance has been read and understood and that the
Assessment has been completed by:
Surname: (Block Capitals)
……………………………………………………………………………………………………………………
Forename: (Block Capitals)
……………………………………………………………………………………………………………………
Job Title: …………………………………………………………………………………………………………
Department/Ward:……………………………………………………………………………………………
Division/Directorate:…………………………………………………………………………………………
Date Completed: (This must be within 12 weeks of receipt……………………………….
Staff Signature: …………………………………………………………………………………………………
Manager: (Print name)….……………………………………………………………………………………
Manager:( Signature) …………………..……………………………………………………………………
Return a copy to Learning and Development, Blackpool Teaching Hospitals, Learning and
Development Department, 42 whinney Heys Road, Blackpool, FY3 8NR
An electronic copy can be emailed to: [email protected]
Date Sent: …………………………………………
VERSION 5 - November 2015
Page 10 of 10