Information Governance and Code of Conduct

Size: px
Start display at page:

Download "Information Governance and Code of Conduct"

Transcription

1 This document is also available in other languages and formats upon request Information Governance and Code of Conduct For further information and guidance contact the Information Governance team: Tel: ext / NH588 December 2014

2 Information Governance Information Governance (IG) sits alongside Clinical Governance, Corporate Governance and Research Governance. It addresses the way an organisation handles information, particularly in relation to personal and sensitive information about patients, clients and employees. Notes All relevant information regarding IG can be found on: The Trust s Information Governance site: The Health and Social Care Information Centre: Your head of healthcare is the IG lead for your establishment and will be able to guide you to relevant information or contacts as required. IG training IG training is mandatory and has to be completed yearly. The compliance measures for updates are on a fiscal year (April to March). As such you should complete your training in April to May. This will give you compliance for the year. The Mandatory IG Training modules can be accessed via If you have any queries regarding the mandatory IG training or your IG training tool account, please contact IGSupport@nottshc.nhs.uk. If you are unable to complete the mandatory IG training via the e-learning method, please contact IGSupport@nottshc.nhs.uk or a member of the IG team. 2 23

3 Notes All staff are bound by NHS IG policies. The overarching policy is: Policy 7.0 Confidentiality and Information Governance. The main IG policy is: Policy 7.15: Information Governance Policy and Procedure. However you should be familiar with all the policies under 7.0 for further information visit the Trust website and search: Our Policies and Procedures Section 7 - Confidentiality and Information Governance Subject Access Requests Patients have the right to request access to their medical records. This is covered in: Policy 7.09: Access to Information (access as highlighted above), and Patient information leaflet, About Your Information (this leaflet should be available in all clinical areas) Access can either be: Formal (where a written request to obtain a copy of a record is submitted) Informal (where information is shared between a patient and their healthcare/social care professional care on a day-to-day basis) Third parties can request access to a patient s information. However the patient will need to authorise this. The only occasions where patient authorisation is not required are as follows: if there are child protection issues if the information is to be used for anonymous research when a court order has been produced if the patient no longer has the capacity to authorise the request 22 3

4 Confidentiality All Nursing and Midwifery Council (NMC) registered staff must adhere to The NMC Code of Practice. This can be found at Clinical staff with no professional registration should adhere to the Professional Conduct Guide. An electronic copy of this document is available on the Learning and Development area of the Trust Intranet. Post/courier A paper envelope or brown paper should be used for internal transportation with the addressee details clearly written. Private and confidential should be stamped onto the envelope and any other addresses should be deleted if using internal transit envelopes. To send confidential information by post externally: Use a tamper proof envelope for confidential information if couriered outside of the Trust transport system All staff must adhere to the Trust policy for confidentiality; 7.04: Safe and Secure Handling of Confidential Information Policy. Access via the Trust website by searching: Our Policies and Procedures Section 7 - Confidentiality and Information Governance Safe and Secure Handling of Confidential Information Further Reading Caldicott Due to increasing concerns about levels of confidentiality in and between NHS organisations, the Caldicott Committee, chaired by Dame Fiona Caldicott, was established by the Chief Medical Officer in The aim -to review the flow of patient identifiable information in the NHS. The Committee published its report in December 1997 and the NHS Executive adopted its recommendations in January Clearly label the package with the addressee details. You must include the full name and designation of the intended recipient as well as the full postal address and post code. Clearly label a return address on the reverse of the package Ensure the security of the package by either using clear polythene around the outside of the package or Sellotape to secure edges Special Delivery must be used when using the royal mail services or other external couriers. It is important to follow the above instructions when sending out information by post or courier. 4 21

5 When receiving a request for information, always ask or verify the contact number using a switchboard wherever possible. Confirm this number with the requester and then ring them back using the number provided, never give the information direct. When the requester is the patient or has delegated authority to the information, then ask for confirmation such as date of birth, appointment details, GP details or address. The responsibility of releasing information lies with the person releasing the information. Therefore, if there is a breach in data protection and confidentially, that person will be subject to relevant disciplinary action. Faxes Fax machine/s should be situated in a secure area where casual passers by cannot see the contents of incoming/outgoing faxes Only send patient identifiable information by fax when absolutely necessary and only to safe haven fax machines. Use of fax machines for transfer of identifiable information must not be common practice The fax telephone number should be verified with the recipient. Ideally pre-programme number/s into the fax machine to avoid misdialling. If there is any doubt DO NOT send the document by fax transmission A separate telephone call to the recipient should be made to confirm receipt and a confirmation sheet obtained from the fax machine indicating the transmission was successful Received faxed documents, which contain personal information, must be stored in a secure environment The responsibility for the correct dispatch of all fax messages is with the sender Use a fax cover sheet that clearly states a confidentiality statement and the name of the recipient/s. Following a request from the Secretary of State for Health, Dame Fiona Caldicott carried out a review of information sharing to ensure an appropriate balance between the protection of patient information and the use and sharing of information to improve patient care. The findings were published in a report in April 2013: Information: To Share or Not to Share The report identified principles of good practice and recommended regular review of information flow in order to maintain good practice. Caldicott now forms part of the NHS IG Framework, which facilitates a standard based approach to information sharing. The Trust s Caldicott Guardian is Dean Howells, Executive Director of Nursing, Quality and Patient Experience. The purpose of Caldicott The Caldicott principles aim to ensure the highest levels of confidentiality and security for patient identifiable information held in the NHS. Caldicott covers a number of areas of concern, ranging from keeping patients aware of what the NHS does with their information, to making sure NHS staff know about their responsibilities and good practice. And also ensuring that individual organisations have good security measures in place on their computer systems so that patient information is not easily accessible by unauthorised users. The Seven Caldicott Principles 1. Justify the purpose(s) Every proposed use or transfer of personal confidential data within or from an organisation should be clearly defined, scrutinised and documented, with continuing uses regularly reviewed, by an appropriate guardian. 2. Don t use personal confidential data unless it is absolutely necessary Personal confidential data items should not be included unless it is essential for the specified purpose(s) of that flow. The need for patients to be identified should be considered at each stage of satisfying the purpose(s). 20 5

6 3. Use the minimum necessary personal confidential data Where use of personal confidential data is considered to be essential, the inclusion of each individual item of data should be considered and justified so that the minimum amount of personal confidential data is transferred or accessible as is necessary for a given function to be carried out. 4. Access to personal confidential data should be on a strict need-to -know basis Only those individuals who need access to personal confidential data should have access to it, and they should only have access to the data items that they need to see. This may mean introducing access controls or splitting data flows where one data flow is used for several purposes. 5. Everyone with access to personal confidential data should be aware of their responsibilities Action should be taken to ensure that those handling personal confidential data both clinical and non-clinical staff are made fully aware of their responsibilities and obligations to respect patient confidentiality. 6. Comply with the law Every use of personal confidential data must be lawful. Someone in each organisation handling personal confidential data should be responsible for ensuring that the organisation complies with legal requirements. 7. The duty to share information can be as important as the duty to protect patient confidentiality. Health and social care professionals should have the confidence to share information in the best interests of their patients within the framework set out by these principles. They should be supported by the policies of their employers, regulators and professional bodies. Best practice includes: Screens should not be left unattended with information on display Where possible lock the computer screen for short periods of time Log off systems that are no longer required or if you leave the area for a period of time Position screens to prohibit unauthorised viewing of the information on screen Do not use floppy disc/memory sticks from unknown sources (virus protection) Only install authorised software and do not download information from the internet unless you are sure that it is virus free. Mobile computing Trust mobile devices are encrypted, password protected and security applied as per the IT Security Policy. Verbal communications including telephone calls Where requests for information are received from external organisations, the appropriate delegated person should be informed. For guidance on this, look at the Trust s Corporate Records Policy which can be found on the Trust s website by searching: Our Policies and Procedures Section 7 - Confidentiality and Information Governance Corporate Records Policy Before the information is released, verification should be established that the person requesting that information has the right to do so. Before releasing any information, make sure the person requesting it has the right to do so. 6 19

7 Computer security Confidential s The Trust provides an encrypted system that allows you to choose to send secure, password protected s to external addresses. The outgoing will have the body text and any attachments encrypted and a password will be automatically generated by the system. This password then needs to be communicated to the recipient by a separate medium, such as a telephone. Passwords should not be sent via under any circumstances. By marking an as confidential, the system will automatically encrypt the when going to external addresses. Replying to an incoming that has been marked confidential would also automatically encrypt the reply. The encrypted system allows you to comply with the Trust's / Internet General (7.14) and Safe and Secure Handling of Confidential Information (7.04) policies. s sent to multiple recipients will generate a separate password for each recipient. Data Protection Act 1998 An Introduction to the Data Protection Act 1998 The Data Protection Act (DPA) 1998 came into force on 1 March It covers personal data and sensitive personal data, for example, information about living individuals. The Act replaces the Data Protection Act 1984 and repeals the Access to Medical records 1990 (which now only applies to deceased patients). Notification Notification is a statutory requirement and every organisation that processes personal information must notify the Information Commissioner s Office (ICO). Only organisations that hold paper records and do not use computers to process data are exempt from this rule although they can choose to notify the Information Commissioner s Office voluntarily. Guidance on using encrypted s is available on the IT Security area of the Trust Intranet under the page. Patient Information NHSMail is the preferred method of sending patient data, please ensure the Trust Safe Haven procedures are followed. All staff should ensure they familiarise themselves with the Trust s IT Security policy noting their responsibilities. This can be found on the Trust website by searching: Our Policies and Procedures Section 7 - Confidentiality and Information Governance Information Technology Acceptable Use Policy and Procedure 18 7

8 IG Code of Conduct What is confidentiality? A duty of confidence arises when one person discloses information to another in circumstances where it is reasonable to expect that the information will be held in confidence. For example, a service user to healthcare worker, or an employee to their manager. Information is considered confidential if it can be related in any way to a specific individual. The main areas of concern are relate to service user and staff records as well as information that has not been fully anonymised. For example an NHS number, even in the absence of other personal information, is not considered anonymous because it is still possible to trace that individual from the NHS number. Confidential information will be found in a variety of formats including paper, computerised (including portable devices such as laptops mobile phones and tablets), visual and other versions of information storage media such as digital images and photographs. In addition, it covers oral communications including the use of the telephone (including mobiles) and general conversation. Confidential Information Person-identifiable data (PID) or person-identifiable information is any item of data concerning a person that, if used singly or in conjunction with other data items, could lead to identification of that person. This type of information includes: Name Address dates of birth gender photographs and clinical images, Telephone and contact details NHS number Hospital number or other service user number Staff payroll number 8 17

9 Further reading - useful web based resources Confidentiality Code of Practice Confidentiality and disclosure of information: General Medical Services (GMS) Data Protection Act search: Department of Health: Policy and Guidance Freedom of Information Act search: Freedom of Information Act 2000 Information Commissioner s Office Department of Health security articles and useful documents Department of Health - Records Management NHS Code of Practice PublicationsPolicyAndGuidance/DH_

10 The Freedom of Information Act 2000 (FOI) What is the Freedom of Information Act? This Act gives the public a right of access to any files or information held by the Trust. There are some exemptions, but the general rule is that we have to provide the information unless we can show that there is a good, public interest, reason not to. If we refuse a request, the applicant has a right of appeal to the Information Commissioner, who is appointed by Parliament to ensure that the Act is complied with. Who can apply for information under the Act? Anybody can make a request under the Act; including commercial companies, journalists, patients and the public. They have the right to ask for any information they would like and there is no need for them to tell us why they want it. What information does the Act cover? It applies to any information held by the Trust, in any form electronic and/or paper. If your files contain scraps of paper with rough notes or comments, these are just as disclosable as official letters and memos. s have to be treated in the same way if an forms part of a decision making process, this also needs to be disclosed. To find our more about good practice regarding s visit the Trust Website and search : Our Policies and Procedures Section 7 - Confidentiality and Information Governance /Internet Policy Remember: you must write everything, including s, in a way that you would not mind them being read by members of the public and the press. Therefore, under common law, a health or social care professional wishing to disclose a patient s/client s personal information to anyone outside the team providing care should first seek the consent of that patient/client. Where this is not possible, an organisation may be able to rely on disclosure being in the overriding safeguarding interest of the individual or others or in the public interest. However, whether a disclosure is in the public interest is not a decision to be taken lightly. Solid justification is required before individual rights are set aside and specialist or legal advice should be sought before the information is disclosed. Any decision to disclose should be fully documented. Disclosures required by court order should be referred to the organisation s legal advisors as promptly as possible so that any necessary representations can be made to the court, for example to limit the information requested. If a disclosure is made which is not permitted under common law, the patient/ client could possibly bring a legal action, not only against the organisation, but also against the individual responsible for the breach. Common law is a form of law based on previous court cases decided by judges. The Act is fully retrospective. This means that it applies to all information, including that created prior to the Act coming into force. It does not apply to requests to see personal data, including health records. These are covered by the Data Protection Act 1998 and the Access to Health Records Act 1990 (if the request is to see the health records of a deceased patient)

11 Common Law Duty of Confidentiality Common law is not written out in one document like an Act of Parliament. It is a form of law based on previous court cases decided by judges; hence, it is also referred to as judge-made or case law. The law is applied by reference to those previous cases, so common law is also said to be based on precedent. The general position is that if information is given in circumstances where it is expected that a duty of confidence applies, that information cannot normally be disclosed without the information provider s consent. In practice, this means that all patient/client information, whether held on paper, computer, visually or audio recorded, or held in the memory of the professional, must not normally be disclosed without their consent. It is irrelevant how old the patient/client is, or what the state of his/her mental health is; the duty still applies. Three circumstances that make the disclosure of confidential information lawful are: where the individual to whom the information relates has consented where disclosure is necessary to safeguard the individual or others, or is in the public interest where there is a legal duty to do so, for example a court order. How is an FOI request made? Requests have to be made in writing (an counts as a written request) and must be directed to the FOI lead or to foi@nottshc.nhs.uk. We have a maximum of 20 working days to confirm whether or not we have the information requested, subject to exemptions, to provide a copy. What should I do if I receive a request? Send it immediately to the FOI lead as the clock starts ticking on the 20 days as soon as the request is received. Access to Health Records Act 1990 As previously explained, patients' rights of access to health records are now governed by the provisions of the Data Protection Act The Access to Health Records Act 1990, which previously provided a right of access to non-computerised health records, has largely been repealed. However, one part of the Act that is still in force gives certain rights of access to the records of deceased patients. Access to a patient s records after death The duty of confidentiality remains after a patient has died. Under the Access to Health Records Act 1990, the personal representative of the deceased and people who may have a claim arising from the patient s death are permitted access to the records. This applies to information provided after November 1991 and disclosure should be limited to that which is relevant to the claim in question. The records should not be disclosed if it is thought that they may cause mental or physical harm to anyone if they contain third party information or if the deceased gave the information on the understanding that it would remain private. Further reading: Access the Trust s 7.09 Access to Information Policy on the Trust website by searching: Our Policies and Procedures Section 7 - Confidentiality and Information Governance Access to Information Policy 14 11

12 Subject Access Request (SAR) What is a subject access request? A subject access request (SAR) is a written request made by, or on behalf, of an individual for the information he or she is entitled to ask for under Section 7 of the Data Protection Act 1998 (DPA). The request does not have to be in any particular form. Nor does it have to include the words subject access or make any reference to the DPA. Indeed, a request may be a valid SAR even if it refers to other legislation, such as the Freedom of Information Act (FOIA). Formal requirements A SAR must be made in writing. The Trust has forms which can be used and they assist us in identifying and locating the information requested. However, we can not insist that the form is used. The law states that the requests must be dealt with within 40 days. However, the Department of Health require the NHS to complete requests within 21 days. For further guidance please speak to your Information Governance Team or igsupport@nottshc.nhs.uk. An ed or faxed request is as valid as one sent in hard copy. You should also note the following points when considering validity: You do not need to respond to a request made orally but, depending on the circumstances, it might be reasonable to do so (as long as you are satisfied about the person s identity). It is also good practice to explain to the individual how to make a valid request, rather than ignoring them. Requesters do not have to tell you their reason for making the request or what they intend to do with the information. Although it may help you to find the relevant information if they do explain the purpose of the request. If you receive a request for access to information, contact your Information Governance Team for advice and guidance on handling the request. Further reading: Access the Trust s 7.09 Access to Information Policy on the Trust website by searching: Our Policies and Procedures Section 7 - Confidentiality and Information Governance Access to Information Policy An individual has the right to request information held about them. The request, known as a SAR, must be made in writing

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Castle View Primary School Data Protection Policy

Castle View Primary School Data Protection Policy Castle View Primary School Data Protection Policy Aims The Headteacher and Governors of the school intend to comply fully with the requirements and principles of the Data Protection Act 1998. All staff

More information

ICO Information Request Handling Procedures

ICO Information Request Handling Procedures s 1. Introduction It is important to remember that the Information Commissioners Office (ICO) is subject to all the legislation it regulates. All requests for information to the ICO need to be handled

More information

Policy General Policy GP20

Policy General Policy GP20 Email Policy General Policy GP20 Applies to All employees Committee for Approval Quality and Governance Committee Date of Approval September 2012 Review Date June 2014 Name of Lead Manager Head of Technology

More information

Data Subject Access Request Procedure. Page 1 KubeNet Data Subject Access Request Procedure KN-SOP

Data Subject Access Request Procedure. Page 1 KubeNet Data Subject Access Request Procedure KN-SOP Data Subject Access Request Procedure Page 1 Table of contents 1. Scope, Purpose and Users... 3 2. Reference Documents... 3 3. Data Subject Access Request ( DSAR )... 3 4. The Rights of a Data Subject...

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

Data Protection Policy

Data Protection Policy Page 1 of 6 General Statement The Local Governing Bodies of the academies have overall responsibility for ensuring that records are maintained, including security and access arrangements, in accordance

More information

Access Rights and Responsibilities. A guide for Individuals and Organisations

Access Rights and Responsibilities. A guide for Individuals and Organisations Access Rights and Responsibilities A guide for Individuals and Organisations This guide is aimed at both individuals and organisations. It is designed to bring individuals through the process of making

More information

A Homeopath Registered Homeopath

A Homeopath Registered Homeopath A Homeopath Registered Homeopath DATA PROTECTION POLICY Scope of the policy This policy applies to the work of homeopath A Homeopath (hereafter referred to as AH ). The policy sets out the requirements

More information

Procedures for responding to requests for personal data to support Data Protection Policy

Procedures for responding to requests for personal data to support Data Protection Policy Procedures for responding to requests for personal data to support Data Protection Policy Heriot-Watt Procedures for responding to requests for personal data; to support Data Protection Policy HERIOT-WATT

More information

INFORMATION GOVERNANCE. Caldicott Approval Procedure

INFORMATION GOVERNANCE. Caldicott Approval Procedure NHS TAYSIDE INFORMATION GOVERNANCE Caldicott Approval Procedure Author: Peter McKenzie Review Group: Information Governance Group Review Date: September 2010 Last Update: September 2009 Document : NHST-ISC-CAP

More information

DCU Guide to Subject Access Requests. Under Irish Data Protection Legislation

DCU Guide to Subject Access Requests. Under Irish Data Protection Legislation DCU Guide to Subject Access Requests Under Irish Data Protection Legislation Context Under section 4 of the Irish Data Protection Acts 1988 & 2003 an individual, on making a written request to DCU, may

More information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Introduction The purpose of this document is to provide a concise policy regarding the data protection obligations of Youth Work Ireland. Youth Work Ireland is a data controller

More information

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests.

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests. 1 Introduction 1.1 Article 15 of the General Data Protection Regulations (GDPR) provides individuals (Data Subjects) with the right to access personal information so that they are fully informed of the

More information

BODY CORPORATE REGISTRATION Application form

BODY CORPORATE REGISTRATION Application form General Optical Council BODY CORPORATE REGISTRATION Application form Please read the attached guidance notes and complete the form in full. This form is for body corporates who wish to join the General

More information

Patient Access to Medical Records/Subject to Access - Information Leaflet

Patient Access to Medical Records/Subject to Access - Information Leaflet Patient Access to Medical Records/Subject to Access - Information Leaflet The General Data Protection Regulation (GDPR) gives every living person, or an authorised representative, the right to apply for

More information

UWC International Data Protection Policy

UWC International Data Protection Policy UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY 1 Your Data Protection Responsibilities DATA PROTECTION POLICY 1.1 Everyone has rights with regard to how their personal data is handled. Personal data is any information that a person can be identified

More information

PRIVACY NOTICE VOLUNTEER INFORMATION. Liverpool Women s NHS Foundation Trust

PRIVACY NOTICE VOLUNTEER INFORMATION. Liverpool Women s NHS Foundation Trust PRIVACY NOTICE VOLUNTEER INFORMATION Liverpool Women s NHS Foundation Trust Introduction This document summarises who we are, what information we hold about you, what we will do with the information we

More information

St Bernard s Primary School Data Protection Policy

St Bernard s Primary School Data Protection Policy St Bernard s Primary School Data Protection Policy St Bernard s RC Primary School, A Voluntary Academy Approved by Governors: 11.11.2015 Review date: Autumn 2016 St Bernard s Data Protection Policy General

More information

Data Subject Access Request

Data Subject Access Request Data Subject Access Request DATA PROTECTION ACT 1998 Version: 10.0 Approval Status: Approved Document Owner: Graham Feek Classification: Internal Review Date: 03/07/2017 Effective from: 1 July 2015 Table

More information

BRIDGEWATER SURGERIES. Privacy Notice

BRIDGEWATER SURGERIES. Privacy Notice BRIDGEWATER SURGERIES Privacy Notice We understand how important it is to keep your personal information safe and secure and we take this very seriously. We have taken steps to make sure your personal

More information

Guardian Electrical Compliance Ltd DATA PROTECTION GDPR REGULATIONS POLICY

Guardian Electrical Compliance Ltd DATA PROTECTION GDPR REGULATIONS POLICY 1. Statement of Policy (Guardian) needs to collect and use certain types of information about the Individuals or Service Users with whom they come into contact in order to carry on our work. This personal

More information

DATA SUBJECT ACCESS REQUEST PROCEDURE

DATA SUBJECT ACCESS REQUEST PROCEDURE DATA SUBJECT ACCESS REQUEST PROCEDURE DATA PROTECTION ACT 1998 This procedure seeks to ensure that the Transport Executive receives and processes Data Subject Access Requests in accordance with the Data

More information

Heavers Farm Primary School DATA PROTECTION AND INFORMATION MANAGEMENT POLICY Updated 2017

Heavers Farm Primary School DATA PROTECTION AND INFORMATION MANAGEMENT POLICY Updated 2017 Heavers Farm Primary School DATA PROTECTION AND INFORMATION MANAGEMENT POLICY Updated 2017 Introduction The Data Protection Act 1998 (the Act) is the primary legislation in the United Kingdom, which regulates

More information

UWTSD Group Data Protection Policy

UWTSD Group Data Protection Policy UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful

More information

Patient Access to Medical Records

Patient Access to Medical Records Patient Access to Medical Records Information Leaflet Access to Health Records The General Data Protection Regulation 2018 gives every living person, or an authorised representative, the right to apply

More information

Safe Haven and Information Sharing Policy

Safe Haven and Information Sharing Policy Safe Haven and Information Sharing Policy Reference No: Version: 3 Ratified by: P_IG_17 LCHS Trust Board Date ratified: 9 th January 2018 Name of originator/author: Name of approving committee/responsible

More information

Maritime Union of Australia. Privacy Policy 2014

Maritime Union of Australia. Privacy Policy 2014 Maritime Union of Australia Privacy Policy 2014 Introduction The Maritime Union of Australia (Union) is the Union representing persons employed in diving, ferries, offshore oil and gas, port services,

More information

Data Subject Access Request Form

Data Subject Access Request Form Please read the Guidance Notes which accompany this form before completing the form. Please complete the form in block capitals. Please submit your completed request form as a secure email attachment to

More information

This policy also applies to personal information about you that the Federation collects from any other third party.

This policy also applies to personal information about you that the Federation collects from any other third party. ANMF Policy Privacy The Australian Nursing and Midwifery Federation (the Federation) is an organisation of employees (ie a trade union) registered under Commonwealth industrial laws. The Federation is

More information

Policy Objectives (the Association) Privacy Act APPs Policy Application ACTU The Police Association Website

Policy Objectives (the Association) Privacy Act APPs Policy Application ACTU The Police Association Website Privacy Policy 1. Policy Objectives 1.1 The Police Association Victoria (the Association) is the organisation representing sworn police officers at all ranks, protective services officers, police reservists

More information

Compliance & HIPAA Annual Education

Compliance & HIPAA Annual Education Compliance & HIPAA Annual Education 1 The purpose of this education is to UPDATE The purpose and of this education REFRESH is to UPDATE your and REFRESH understanding understanding of: of: Aultman s Compliance

More information

Data Protection Policy

Data Protection Policy The Worshipful Company of Framework Knitters Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act 1998 (DPA) [UK] For information on this

More information

SAFE USE OF MOBILE PHONES AT WORK POLICY

SAFE USE OF MOBILE PHONES AT WORK POLICY SAFE USE OF MOBILE PHONES AT WORK POLICY Links to Lone Working Policy, Personal Safety Guidance, Lone Working Guidance, Information Governance Policy Document Type General Policy Unique Identifier GP31

More information

DATA PROTECTION POLICY THE HOLST GROUP

DATA PROTECTION POLICY THE HOLST GROUP DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller

More information

Privacy notice. Last updated: 25 May 2018

Privacy notice. Last updated: 25 May 2018 Privacy notice Last updated: 25 May 2018 www.courtprice.co.uk ('Website') is provided by Courtprice Limited ('we'/'us'/'our'). In doing so, we may be in a position to receive and process personal information

More information

Date Approved: Board of Directors on 7 July 2016

Date Approved: Board of Directors on 7 July 2016 Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory

More information

Pathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke

Pathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke Prepared by: M Franklin Issued: May 2018 Pathways Community Interest Company Review due: May 2020 Pathways CIC Privacy Policy Version 0.3 Approved by: Yvonne Clarke Approval date: 21.05.2018 Pathways CIC

More information

Freedom of Information and Protection of Privacy (FOIPOP)

Freedom of Information and Protection of Privacy (FOIPOP) Freedom of Information and Protection of Privacy (FOIPOP) No.: 6700 PR1 Policy Reference: 6700 Category: FOIPOP Department Responsible: Records Management and Privacy Current Approved Date: 2008 Sep 30

More information

Procedure for Handling Third Party Requests to Access Data on eportfolio

Procedure for Handling Third Party Requests to Access Data on eportfolio Procedure for Handling Third Party Requests to Access Data on eportfolio IGPRO03-3rd Party access to eportfolio v1.0 DRAFT Information Systems Corporate Services Division March 2016 Revision History Version

More information

Comments, Concerns, Compliments and Complaints

Comments, Concerns, Compliments and Complaints i If you need your information in another language or medium (audio, large print, etc) please contact Customer Care on 0800 374 208 or send an email to: customercare@ salisbury.nhs.uk You are entitled

More information

Badminton England - Data protection Guidance for clubs and counties.

Badminton England - Data protection Guidance for clubs and counties. Badminton England - Data protection Guidance for clubs and counties. This leaflet is intended to provide general guidance for clubs and counties with respect to data protection. It does not however capture

More information

It s still very important that you take some steps to help keep up security when you re online:

It s still very important that you take some steps to help keep up security when you re online: PRIVACY & SECURITY The protection and privacy of your personal information is a priority to us. Privacy & Security The protection and privacy of your personal information is a priority to us. This means

More information

Data Protection. Policy

Data Protection. Policy Data Protection Policy Policy adopted: April 2016 Policy review date: April 2018 OAT Model Policy 1 Contents 1. Policy statement and principles... 3 1.1 Policy aims and principles... 3 1.2 Data protection

More information

Part B of this Policy sets out the rights that all individuals have in relation to the collection and use of your personal information

Part B of this Policy sets out the rights that all individuals have in relation to the collection and use of your personal information Date: 15 Feb 2018 Issue No: 1 Page: 1 of 15 Site: UK Kingspan Insulation Limited ("Kingspan") has issued this Data Protection Policy for its customers. The term customer refers to those that receive a

More information

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your). Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations

More information

SOUTHFIELD SCHOOL PROCEDURE FOR RECEIVING AND RESPONDING TO SUBJECT ACCESS REQUESTS

SOUTHFIELD SCHOOL PROCEDURE FOR RECEIVING AND RESPONDING TO SUBJECT ACCESS REQUESTS PROCEDURE FOR RECEIVING AND RESPONDING TO SUBJECT ACCESS REQUESTS 1. Policy Statement 1.1. All Data Subjects have rights of access to their personal data. This document sets out the procedure to be followed

More information

Made In Hackney Data Protection Policy Last Updated:

Made In Hackney Data Protection Policy Last Updated: Made In Hackney Data Protection Policy Last Updated: 16.05.2018 Definitions Charity GDPR Responsible Person Register of Systems Made In Hackney (MIH), a registered charity. means the General Data Protection

More information

Shaw Privacy Policy. 1- Our commitment to you

Shaw Privacy Policy. 1- Our commitment to you Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of

More information

About Us. Privacy Policy v1.3 Released 11/08/2017

About Us. Privacy Policy v1.3 Released 11/08/2017 Privacy Policy v1.3 Released 11/08/2017 About Us THIS PRIVACY POLICY, OUR VIEWER TERMS (hellopupil.com/viewerterms) AND HEALTH & SAFETY GUIDANCE (hellopupil.com/advice) COLLECTIVELY FORM THE TERMS GOVERNING

More information

Element Finance Solutions Ltd Data Protection Policy

Element Finance Solutions Ltd Data Protection Policy Element Finance Solutions Ltd Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Statutory Notifications

Statutory Notifications Registration under the Health and Social Care Act 2008 Statutory Notifications Guidance for registered providers and managers of NHS GP and other primary medical services May 2013 Statutory notifications

More information

Data Subject Access Request Form (GDPR)

Data Subject Access Request Form (GDPR) Data Subject Access Request Form (GDPR) Data Subject Access Request Form Article 15 of the EU General Data Protection Regulation (Regulation (EU) 2016/679) (GDPR) grants you the right to access your personal

More information

Data Encryption Policy

Data Encryption Policy Data Encryption Policy Document Control Sheet Q Pulse Reference Number Version Number Document Author Lead Executive Director Sponsor Ratifying Committee POL-F-IMT-2 V02 Information Governance Manager

More information

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Contract Services Europe

Contract Services Europe Contract Services Europe Procedure for Handling of Page 1 of 10 1. INTRODUCTION This procedure document supplements the data request and subject access request (SAR) provisions set out in DPS Contract

More information

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number ASHBY CONCERT BAND PRIVACY POLICY The privacy and security of your personal information is extremely important to us. This privacy policy explains how and why we use your personal data. We will keep this

More information

Data Protection Policy

Data Protection Policy Introduction In order to; provide education, training, assessment and qualifications to its customers and clients, promote its services, maintain its own accounts and records and support and manage its

More information

Exercising Your Data Access Rights under the Personal Data (Privacy) Ordinance (Frequently Asked Questions and Answers)

Exercising Your Data Access Rights under the Personal Data (Privacy) Ordinance (Frequently Asked Questions and Answers) Leaflet Exercising Your Data Access Rights under the Personal Data (Privacy) Ordinance (Frequently Asked Questions and Answers) Under the Personal Data (Privacy) Ordinance (the Ordinance ), an individual

More information

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2 NWQ Capital Management Pty Ltd Privacy Policy March 2017 Page 1 of 8 Privacy and Spam Policy NWQ Capital Management Pty Ltd s Commitment NWQ Capital Management Pty Ltd (NWQ) is committed to providing you

More information

Liechtenstein. General I Data Protection Laws. Contributed by Wanger Advokaturbüro. National Legislation. National Regulatory Authority.

Liechtenstein. General I Data Protection Laws. Contributed by Wanger Advokaturbüro. National Legislation. National Regulatory Authority. Contributed by Wanger Advokaturbüro General I Data Protection Laws National Legislation General data protection laws The Data Protection Act (the DPA ) dated 14 March 2002 and the relevant Ordinance on

More information

Nexus Education Schools Trust. Subject Access Request Procedures

Nexus Education Schools Trust. Subject Access Request Procedures Nexus Education Schools Trust Subject Access Request Procedures Date: September 2018 Review Date: September 2019 1 Subject Access Request Procedures Contents 1. Scope... 2 2. Responsibilities... 2 3. Procedure...

More information

ICT Portable Devices and Portable Media Security

ICT Portable Devices and Portable Media Security ICT Portable Devices and Portable Media Security Who Should Read This Policy Target Audience All Trust Staff, contractors, and other agents, who utilise trust equipment and access the organisation s data

More information

Polemic is a business involved in the collection of personal data in the course of its business activities and on behalf of its clients.

Polemic is a business involved in the collection of personal data in the course of its business activities and on behalf of its clients. Privacy policy 1 Background This document sets out the policy of Polemic Forensic ABN 60 392 752 759 ( Polemic ) relating to the protection of the privacy of personal information. Polemic is a business

More information

Blue River Home Care Data Protection Policy

Blue River Home Care Data Protection Policy 1 Blue River Home Care Data Protection Policy Controlled document This document is uncontrolled when downloaded or printed Copyright Blue River Home Care. All rights reserved 2 1. Aim The aim of this policy

More information

Spectrum Wellness Privacy Statement

Spectrum Wellness Privacy Statement Spectrum Wellness Privacy Statement This policy sets out the basis on which any personal data we collect from you, or that you provide to us, will be processed by us. Please read the following carefully

More information

Nexus Education Schools Trust. Subject Access Request Procedures

Nexus Education Schools Trust. Subject Access Request Procedures Nexus Education Schools Trust Subject Access Request Procedures Date: September 2018 Review Date: September 2019 1 Subject Access Request Procedures Contents 1. Scope... 2 2. Responsibilities... 2 3. Procedure...

More information

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT AGREEMENT DATED [ ] BETWEEN: (1) SHELTERMANAGER LTD and (2) [ ] ( The Customer ) BACKGROUND (A) (B) (C) This Agreement is to ensure there is in place

More information

Data Protection Policy & Procedures

Data Protection Policy & Procedures Data Protection Policy & Procedures Introduction: Pit Farm Tennis Club is committed to a policy of protecting the rights and privacy of individuals. Pit Farm Tennis club needs to collect and use certain

More information

Data Protection and Information Security. Presented by Emma Hawksworth Slater and Gordon

Data Protection and Information Security. Presented by Emma Hawksworth Slater and Gordon Data Protection and Information Security Webinar Presented by Emma Hawksworth Slater and Gordon 1 3 ways to participate Ask questions link below this presentation Answer the polls link below this presentation

More information

Information Handling and Classification Table

Information Handling and Classification Table Information Handling and Classification Table Title: Information Classification and Handling Table Reference: IS-07a Status: Approved Version: 1.2 Date: March 2018 Classification: Non-Sensitive/Open Author(s)

More information

GDPR SUBJECT ACCESS REQUESTS PROCEDURE

GDPR SUBJECT ACCESS REQUESTS PROCEDURE SIMON BALLE ALL-THROUGH SCHOOL GDPR SUBJECT ACCESS REQUESTS PROCEDURE First Issue: April 2018 Next Review: April 2020 Committee Responsible: Personnel and/or Student SUBJECT ACCESS REQUESTS (SAR) INTRODUCTION

More information

Redirection Of Domestic Mail

Redirection Of Domestic Mail APPLICATION FOR April 2017 Redirection Of Domestic Mail WHAT THE SERVICE OFFERS Jersey Post s domestic mail redirection services enables customers to have their mail redirected to an alternative address

More information

Policy & Procedure Privacy Policy

Policy & Procedure Privacy Policy NUMBER POL 050 PAGES 12 VERSION V3.8 CREATED: LAST MODIFIED: REVISION: 05/11/2009 06/06/2018 06/06/2019 DOCUMENTS: Authority to Exchange Information Media Authority Student Staff Privacy Agreement REFERENCES:

More information

Data Subject Requests Procedure

Data Subject Requests Procedure Subject Requests Procedure Subject Requests Procedures Issued By: Legal Effective Date: Review Date:.0 Contents 1. Introduction... 3 2. Purpose... 3 3. Responsibilities... 3 3.1 All Staff and Volunteers...

More information

Policy on Privacy and Management of Personal Information

Policy on Privacy and Management of Personal Information Policy on Privacy and Management of Personal Information Purpose The purpose of this privacy policy is to: clearly communicate how SMA manages personal information; provide students, members, staff and

More information

2. The Information we collect and how we use it: Individuals and Organisations: We collect and process personal data from individuals and organisation

2. The Information we collect and how we use it: Individuals and Organisations: We collect and process personal data from individuals and organisation WOSDEC: Privacy Policy West of Scotland Development Education Centre WOSDEC - (We) are committed to protecting and respecting your privacy. This policy sets out how the personal information we collect

More information

Rights of Individuals under the General Data Protection Regulation

Rights of Individuals under the General Data Protection Regulation Rights of Individuals under the General Data Protection Regulation 2018 Contents Introduction... 2 Glossary... 3 Personal data... 3 Processing... 3 Data Protection Commission... 3 Data Controller... 3

More information

Freedom of Information Act 2000 (FOIA)

Freedom of Information Act 2000 (FOIA) Freedom of Information Act 2000 (FOIA) Date: 4 September 2017 Public Authority: Address: Dulverton Junior School Barns Close West Dulverton Somerset TA22 9EE Decision (including any steps ordered) 1. The

More information

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected. I Use of computers This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security policy. To

More information

Information Governance Incident Reporting Procedure

Information Governance Incident Reporting Procedure Information Governance Incident Reporting Procedure : 3.0 Ratified by: NHS Bury CCG Quality and Risk Committee Date ratified: 15 th February 2016 Name of originator /author (s): Responsible Committee /

More information

Remote Working & Mobile Devices Security Standard

Remote Working & Mobile Devices Security Standard TRUST-WIDE NON-CLINICAL DOCUMENT Remote Working & Mobile Devices Security Standard Standard Number: Scope of this Document: Recommending Committee: Approving Committee: SS02 All Staff Joint Information

More information

CURTIS BANKS LIMITED. Privacy Information Notice. curtisbanks.co.uk

CURTIS BANKS LIMITED. Privacy Information Notice. curtisbanks.co.uk CURTIS BANKS LIMITED Privacy Information Notice curtisbanks.co.uk Contents Section Page 1 Who we are 3 2 Why we need to collect, use and process personal information 3 3 The information we may collect,

More information

Electronic Communication of Personal Health Information

Electronic Communication of Personal Health Information Electronic Communication of Personal Health Information A presentation to the Porcupine Health Unit (Timmins, Ontario) May 11 th, 2017 Nicole Minutti, Health Policy Analyst Agenda 1. Protecting Privacy

More information

Data Subject Access Request (SAR) Policy, Guidance and Template

Data Subject Access Request (SAR) Policy, Guidance and Template James Hutton Group Data Subject Access Request (SAR) Policy, Guidance and Template Prepared By: DPO Date: 30 September 2018 Approved By: DPO Date: 30 September 2018 Summary of Changes Since Previous Version:

More information

Preventing Breaches When Using , Telephone and Fax Machines

Preventing Breaches When Using  , Telephone and Fax Machines Preventing Breaches When Using E-mail, Telephone and Fax Machines Harley HIPAA Presented by the UAMS HIPAA Office, July 26, 2011 Breach Reporting When a use or disclosure occurs that is not allowed by

More information

Privacy and Data Protection Policy

Privacy and Data Protection Policy Privacy and Data Protection Policy Introduction 1. The Ripple Pond is committed to ensuring the secure and safe management of personal data held by the Charity in relation to Beneficiaries, Staff, Trustees,

More information

TABLE OF CONTENTS. Page

TABLE OF CONTENTS. Page TABLE OF CONTENTS Page Policy Statement... 1 What kinds of personal information do we collect?... 1 How do we collect and hold personal information?... 1 How do we hold personal information?... 2 Purposes

More information

Accessing Encrypted s Guide for Non-NHSmail users

Accessing Encrypted  s Guide for Non-NHSmail users Accessing Encrypted Emails Guide for Non-NHSmail users April 2017 Version 2.1 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental

More information

DATA PROTECTION LAWS OF THE WORLD. Bahrain

DATA PROTECTION LAWS OF THE WORLD. Bahrain DATA PROTECTION LAWS OF THE WORLD Bahrain Downloaded: 7 April 2018 BAHRAIN Last modified 25 January 2017 LAW There is currently no standalone data protection law in Bahrain. A draft is being reviewed before

More information

Information Governance Incident Reporting Policy

Information Governance Incident Reporting Policy Information Governance Incident Reporting Policy Version: 4.0 Ratified by: NHS Bury Clinical Commissioning Group Information Governance Operational Group Date ratified: 29 th November 2017 Name of originator

More information

Data protection. 3 April 2018

Data protection. 3 April 2018 Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd

More information

ADMA Briefing Summary March

ADMA Briefing Summary March ADMA Briefing Summary March 2013 www.adma.com.au Privacy issues are being reviewed globally. In most cases, technological changes are driving the demand for reforms and Australia is no exception. From

More information

Data Subject Access Request Form (GDPR)

Data Subject Access Request Form (GDPR) Data Subject Access Request Form (GDPR) Article 15 of the EU General Data Protection Regulation (Regulation (EU) 2016/679) (GDPR) grants you the right to access your personal data held by Marshall ADG,

More information

How to obtain information from the University s Publication Scheme

How to obtain information from the University s Publication Scheme FOI Staff Training Introduction In Scotland, the Freedom of Information (Scotland) Act 2002 ( FOISA ) is the main piece of legislation. Requests for environmental information are regulated by the Environmental

More information

Use of and Instant Messaging (IM) Policy

Use of  and Instant Messaging (IM) Policy Use of Email and Instant Messaging (IM) Policy Name of Author and Job Title: Mike Cavaye, IT & Digital Consultant Name of Review/Development Body: IT Services Ratification Body: Quality and Safety Group

More information