1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.

Slides:



Advertisements
Similar presentations
Legal & Regulatory Compliance. Overview What types of information should be included? What issues or problems might there be? What benefits could be obtained?
Advertisements

Introduction to Information Governance (IG)
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
University Safety Office 10 Parks Road Oxford OX1 3PD Health and Safety Self Assurance Toolkit Directly.
Information Governance. “ensuring the confidentiality, accuracy and availability of patient information” Why Information Governance?
Rev.DescriptionAuthorDate 0.0First draftDavid Stone14/07/10 0.1ReviewPhil Walker Magi Nwoli Tony Heap Vanessa Kaliapermall 15/07/10 1.0FinalDavid Stone18/07/10.
Information Governance – Who Cares? Alistair Stewart Information Governance Co-ordinator.
Clare Sanderson Executive Director of Information Governance The NHS Information Centre for health and social care.
Confidentiality & Records Management. What is Information Governance? What is Records Management?
Data Protection.
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
Security Controls – What Works
Developing a Records & Information Retention & Disposition Program:
Session 3 – Information Security Policies
Network security policy: best practices
Data Protection Recruitment Process
Audiences NI Data Protection Workshop
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Administrative Practices Outcome 1
Practical Information Management
Data Protection in Financial Services Are you Seeing the Bigger Picture? 17 September 2008.
Handling information 14 Standard.
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
David N. Wozei Systems Administrator, IT Auditor.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Chapter 3 資訊安全管理系統. 4.1 General Requirements Develop, implement, maintain and continually improve a documented ISMS Process based on PDCA.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operational Control for Information Security.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
© MISHCON DE REYA MAY 2014 RECRUITMENT INTERNATIONAL FINANCIAL DIRECTORS’ FORUM Protecting your business from unlawful competition.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Local Government Reform and Compliance with the DPA Ken Macdonald Assistant Commissioner (Scotland & Northern Ireland) Information Commissioner’s Office.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
SCHOOLS FINANCE OFFICERS MEETINGS Records Management, “Paper-Lite” Environments and Procedures when a school closes Elizabeth Barber.
TRAINING COURSE. Course Objectives 1.Know how to handle a suspected case 2.Know how to care for a recognized trafficked person referred to you Session.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
Partners in improving local health Slide 1 Information Governance & IT Security in the NHS Ian Davison, Director of Business Information Services Alison.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Information Governance A refresher for all staff who have previously gone through the full course.
Administrative Practices Outcome 1
Privacy principles Individual written policies
Chapter 3: IRS and FTC Data Security Rules
GDPR - Individual’s Rights
GENERAL DATA PROTECTION REGULATION (GDPR)
Move this to online module slides 11-56
The session will commence at Please mute your microphone
G.D.P.R General Data Protection Regulations
General Data Protection Regulation
County HIPAA Review All Rights Reserved 2002.
Data Protection principles
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
IT & Security Training Skills.
Information management and communication
INFORMATION GOVERNANCE
HIPAA Overview.
Understanding Data Protection
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Move this to online module slides 11-56
Introduction to the PACS Security
Handling information 14 Standard.
Presentation transcript:

1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk

2 Objectives Explain what Information Governance is Introduce you to the I.G. Toolkit Give some pointers to completing the toolkit Answer any question you may have

3 A Definition Wikipaedia defines Information Governance as: “a set of multi-disciplinary structures, policies, procedures, processes and controls implemented to manage information on all media in such a way that it supports an organisation's immediate and future regulatory, legal, risk, environmental and operational requirements”

4 So What? Legal requirement –Supported by significant fines –Evolving case law Protection of reputation –Breach of trust between patient and Dentist –Toolkit scores available to all Protection of patients –Sensitive data “in the wild” –Potential harm/distress –Identify theft

5 For Example Information Commissioner now has the power to issue fines up £500,000 Hertfordshire County Council fined £100,000 for misdirected fax A4C fined £60,000 for loss of unencrypted laptop

6 There’s More! USB memory stick lost containing details of 200 mental health patients Unencrypted laptop stolen from home - Doctor suspended Over 17,000 USB memory sticks left at dry cleaners during 2010

7 Information Governance Data Protection Act 1998 Freedom of Information Act 2000 Confidentiality Code of Practice Records Management Information Quality Assurance Information Security (ISO27001) Information Governance Management

8 Dental Defence Union Advice Avoid storing identifiable personal data on mobile devices Have an Information Security Policy in place & ensure staff are aware of it Never store patient data on staff home computers or laptops Be aware of relevant ethical & legal guidance specifically from the GDC & the NHS Prevent unauthorised access to confidential information, for example using password protection & providing members of staff, including locums, with unique passwords.

9 More….. Ensure electronic means of communication such as fax & are secure before sending information Report any loss of data straightaway to the nominated senior person in the Practice, so that action can be taken to prevent further breaches & the ICO can be informed, if appropriate Take advice from IT specialists on ensuring the security of any patient information which is held electronically & this extends to sharing data & disposing of it securely when it is no longer needed. Ensure you have a written contract, outlining confidentiality requirements, with third party suppliers such as the company that repairs & maintains your computer.

10 Manual Data Everyone concentrates on computers - manual data is also vulnerable –Card indexes –Patient Files –X-ray images –Correspondence

11 The I.G. Toolkit An opportunity to easily provide assurance to Commissioners and Patients Clear expectations, understandable requirements A “compliance check” on legal requirements Source of exemplar documents Source of key guidance Robust Governance processes

12 The I.G. Toolkit Self assessment which is auditable Applies to all organisations who provide into the NHS 16 evidence focused requirements –Scored between 0 and 3 Level 0-Nothing done Level 1-Have a plan, some preparation Level 2-Have completed the plan, it works Level 3-Review, monitor & update the process.

13 The Requirements (1) Information Governance Management Responsibility for Information Governance has been assigned to an appropriate member, or members, of staff There is an information governance policy that addresses the overall requirements of information governance All contracts (staff, contractor and third party) contain clauses that clearly identify information governance responsibilities All staff members are provided with appropriate training on information governance requirements

14 The Requirements (2) Confidentiality and Data Protection Assurance All person identifiable data processed outside of the UK complies with the Data Protection Act 1998 and Department of Health guidelines Consent is appropriately sought before personal information is used in ways that do not directly contribute to the delivery of care services and objections to the disclosure of confidential personal information are appropriately respected There is a publicly available and easy to understand information leaflet that informs patients/service users how their information is used, who may have access to that information, and their own rights to see and obtain copies of their records There is a confidentiality code of conduct that provides staff with clear guidance on the disclosure of personal information

15 The Requirements (3) Information Security Assurance Monitoring and enforcement processes are in place to ensure NHS national application Smartcard users comply with the terms and conditions of use There is an information asset register that includes all key information, software, hardware and services Unauthorised access to the premises, equipment, records and other assets is prevented The use of mobile computing systems is controlled, monitored and audited to ensure their correct operation and to prevent unauthorised access There are documented plans and procedures to support business continuity in the event of power failures, system failures, natural disasters and other disruptions There are documented incident management and reporting procedures There are appropriate procedures in place to manage access to computer-based information systems All transfers of hardcopy and digital personal and sensitive information have been identified, mapped and risk assessed; technical and organisational measures adequately secure these transfers

16 Quick Wins All person identifiable data processed outside of the UK complies with the Data Protection Act 1998 and Department of Health guidelines Monitoring and enforcement processes are in place to ensure NHS national application Smartcard users comply with the terms and conditions of use

17

18 What you need to do Register your practice with the toolkit –The I.G. lead or an “appointed administrator” needs to register first You will need –Your Organisation Code (ODS Code) –A “work” address Administrators can –Set up other users –Approve and submit your toolkit return

19