Multi-agency data sharing initiatives to support social policy interventions.

Slides:



Advertisements
Similar presentations
Areas of Research Specific issues. Clinical Trials Phase I First use in humans of an experimental drug or treatment In a small group of healthy volunteers.
Advertisements

Clinical Governance VTS Scheme Presentation Feb 2003 Matt Walsh.
INFORMATION SHARING CONSENT OR NO CONSENT Dermot Kelly. Nov 2013.
Leadership and Supervision. Reflective Practice and Critical Analysis Supervision provides an opportunity for reflection, challenge and the testing out.
BIOMETRICS, CCTV & DATA PROTECTION By Drudeisha Madhub Data Protection Commissioner Date:
Childcare Issues in the Young Persons Programme Deirdre Carey Social Worker The Drug Treatment Centre Board.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Informed Consent and HIPAA Tim Noe Coordinating Center.
National Smartcard Project Work Package 8 – Information Law Report.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Information Commissioner’s Office: data protection Judith Jones Senior Policy Officer Strategic Liaison – public security 16 November 2011.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
Cambridgeshire Local Safeguarding Children Board (LSCB) and Schools in Cambridgeshire Josie Collier – LSCB Business Manager Sally.
MASH Understanding Multi-Agency Safeguarding Hubs 1.
Bernadette Malone – Chief Executive Perth and Kinross Council and Chair of GIRFEC National Implementation Working Group Alan Small -Information Sharing.
Child Protection Conferences Caroline Alexander Service Coordinator for Child Protection.
1 Critical issue module 6 Separated children in emergency settings.
Assessment Improvement Maureen McEnaney Safeguarding & Review Manager Every Child Matters.
Care.Data an ICO Update EMIS National User Group Conference East Midlands Conference Centre Nottingham 3 rd October 2013 Lynne Shackley Lead Policy Officer.
Theme: classification & distribution of government control of FEA.
Marketing Ethics and Social Responsibility
Data Protection Act obligations and pseudonymisation Dawn Monaghan Group Manager Information Commissioners Office.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Ethics in Quality Improvement Quality Academy Cohort 6 Melanie Rathgeber MERGE Consulting.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection: An enabler? David Freeland, Senior Policy Officer 23 October 2014.
Privacy Impact Assessments Iain Bourne, Group Manager, Policy Delivery Information Commissioner’s Office, UK Workshop on data protection and the internet:
Processing personal health data: the regulator’s perspective Ken Macdonald Assistant Commissioner Information Commissioner’s Office.
HUMAN RIGHS BASED APPROACH TO PROGRAMMING 22 November 2011 Barbro Svedberg.
European Data Protection reform: preparing for the future Richard Syers - Strategic Liaison, ICO 12 September 2014.
Halton Inspection Planning - Journey of the Child Unannounced Ofsted Inspection Mark Grady Principal Policy Officer, Children & Enterprise.
A project implemented by the HTSPE consortium This project is funded by the European Union SECURITY AND CITIZENSHIP RIGHT AND CITIZENSHIP
ANNOOR ISLAMIC SCHOOL AdvancEd Survey PURPOSE AND DIRECTION.
THE DATA PROTECTION ACT Data Protection Act 1998 DPA 1. Reasons2. People3. Principles 4. Exemptions 4 key points you need to learn/understand/revise.
Information Systems Unit 3.
TRAINING COURSE. Course Objectives 1.Know how to handle a suspected case 2.Know how to care for a recognized trafficked person referred to you Session.
Extreme Event, Inc. THE PUZZLE? – How does 9.11 challenge our understanding of low- probability, high consequence events? WHY IMPORTANT? –Leads to identification.
An overview of OECD Strategies for Improving Regulatory Performance Regulatory Reform and Building Governance Capacities – New Delhi 3 December 2009 Mr.
EVALUATION RESEARCH To know if Social programs, training programs, medical treatments, or other interventions work, we have to evaluate the outcomes systematically.
SOLGM Wanaka Retreat Health and Safety at Work Act 2015 Ready? 4 February 2016 Samantha Turner Partner DDI: Mob:
Data protection—training materials [Name and details of speaker]
AssessPlanDo Review QuestionYesNo? Do I know what I want to evaluate and why? Consider drivers and audience Do I already know the answer to my evaluation.
.  Evaluators are not only faced with methodological challenges but also ethical challenges on a daily basis.
© Copyright  People at Work Project - Overview  People at Work Project - Theoretical Underpinnings  People at.
Research ethics.
Freedom of Information Act ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Commissioning Services: with the DPA in mind South Yorkshire Information and Data Sharing Group Sheffield 14 th August 2014 Lynne Shackley Lead Policy.
Data Protection and Enabling Psi Re-use EVPSI & LAPSI Final Meeting
3-MINUTE READ WORKING TOGETHER TO SAFEGUARD CHILDREN.
3-MINUTE READ WORKING TOGETHER TO SAFEGUARD CHILDREN.
General Data Protection Regulations: what you really need to know
General Data Protection Regulation
Getting it right for every child and information sharing
Museums + Heritage webinar, 30 November 2017
Data Protection and GDPR
GENERAL DATA PROTECTION REGULATION (GDPR)
General Data Protection Regulation
Data protection reform – update from the ICO
G.D.P.R General Data Protection Regulations
Overview of Important Changes to the Final Rule
Data Protection principles
OECD Guidelines Collection Limitation: should be limited to personal data, obtained by lawful and fair means, and (where appropriate) with knowledge and.
How we use Your Health Records
D3 Confidentiality.
Overview of Important Changes to the Final Rule
New Data Innovation Projects: Data Privacy and Data Protection
Principle #1 – Appropriate Product Design and Delivery This presentation is made possible by the Smart Campaign   [Introductions of facilitator(s)
Monitoring and Evaluating FGM/C abandonment programs
Presentation transcript:

Multi-agency data sharing initiatives to support social policy interventions

Overview The focus of this presentation is data sharing initiatives involving multiple organisations. These may involve only public bodies or a mix of public, private and not-for- profit organisations. Examples include: Troubled Families Complex Dependencies Working WellMASHDASH

We have identified three phases in a typical multi-agency data sharing initiative: Intervention Evaluation Identification

At this phase, data from different sources is collated and analysed to identify potential candidates (e.g. individuals or families) eligible for intervention. The pool of personal data is generally larger at this phase than in the subsequent phases.

Intervention This is where the policy is actually implemented, usually through direct contact with individuals or families. Data processing focuses on the participants in the intervention.

Evaluation Here is where data about individuals participating in the project is analysed to assess the intervention. Generally the aim here is to assess value for money and the effectiveness of the intervention so processing may include data from those who did not receive the intervention.

Key considerations for these projects.

These are often important projects addressing critical social needs, like poverty alleviation and safeguarding children. However, from a data protection perspective it is less about the project and more about the processing. Data protection isn’t a barrier to lawful sharing but it asks you to carefully consider the risks to individuals’ privacy.

Conducting a privacy impact assessment can help you think about the privacy risks at each phase and how you will comply with the Data Protection Act.privacy impact assessment With careful consideration in a privacy impact assessment, the intervention and evaluation phases can often be designed in a way that complies with the Data Protection Act (DPA).privacy impact assessment

Often these data sharing projects are treated as a single initiative in PIAs. However, the three phases need to be distinguished from one another as there are unique data protection considerations and challenges for each. From a data processing perspective each phase is distinctly different. Therefore, your legal basis, scheduled conditions and possibly you privacy risks could be different.PIA

While the first and third phases could be considered ‘research’, they are unlikely to be classified as such for the purposes of the DPA exemption. This is because the data is generally processed to support measures or decisions with respect to particular individuals.exemption The second phase (intervention ) is likely to be slightly more challenging from a DPA perspective….

! Challenges at the intervention phase

For example, would it be within an individuals reasonable expectation to process the data in this way? How will you inform individuals whose data is being processed? The DPA does not prescribe how you provide this information; but unless an exemption applies, you need to make fair processing information available. Fairness considerations

Consider data quality and the risks associated with processing inaccurate data. For example, what happens if individuals are identified as ‘at risk’ based on inaccurate data? Data quality

Legal gateway What is your legal basis for processing? Do all organisations involved have the legal basis to share?

Consider what data you need and why With analytics technology, it is tempting to use as much information as possible and about as many people as possible, but this could be excessive. At the same time, you will want to make sure your data set is adequate to identify eligible participants. Consider why is each piece of data needed for your stated purpose and whose data you actually need to process at this phase?

Schedule 2 and 3 conditions What schedule 2 can you rely on for this specific identification activity? If you are processing sensitive personal data, what schedule 3 condition can each organisation rely on?

Think about retention Not everyone whose data is processed will require intervention. What will you do with their data when this phase is finished?

For more information Subscribe to our e-newsletter at or find us on… Read our guide to the Data Protection ActData Protection Act