IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person...

20
Information Governance IG5 – Secure Transfer of Information Procedure Version: 1.1 Date Approved: May 2014

Transcript of IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person...

Page 1: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

Information Governance

IG5 – Secure Transfer of

Information Procedure

Version: 1.1

Date Approved: May 2014

Page 2: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 2 of 20

Document Control Sheet

Title of document: IG5 – Secure Transfer of Information Procedure

Supersedes: IG19 – Secure Transfer of Information Procedure

Placement in Organisation: Information Governance

Consultation/Stakeholders North, South and Central Manchester CCGs

Author(s) name: CSU IG Team – Caroline Cross

Department/Team: CSU IG Team

Approved by:

North Manchester CCG Corporate Governance Committee Central Manchester CCG Corporate Governance Committee South Manchester CCG Corporate Governance Committee

Approval date: May 2014 Review date: May 2016

Implementation Date: August 2014

Implementation Method: Team briefings/meetings

CCG Website

This document is to be read in conjunction with the following documents: Information Governance Policy Records Management Policy Acceptable Use Policy

Version Control

Version Date Brief description of change

V0.1 June 2013 Amendments to reflect CSU management of CCG Information

Governance

V0.2 August

2013

Amendments from the Corporate Governance Committee

V1.0 October

2013

Corporate Services Team – Information Governance Policies and

Procedures Development and Implementation sign off

PLEASE NOTE: the formally approved copy of this document is held on North, Central and South

CCG’s website. Printed copies or electronic saved copies must be checked to ensure they match the

current online version.

Page 3: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 3 of 20

Contents

- Title Page ........................................................................................................1

- Document Control Sheet .................................................................................2

- Contents Page.................................................................................................3

1.0 Procedure Statement........................................................................................4

2.0 Introduction .....................................................................................................4

3.0 Scope ..............................................................................................................6

4.0 Responsibilities ...............................................................................................6

5.0 Definitions of Terms Used ...............................................................................7

6.0 Location/Security Arrangements for a good Safe Haven Environment…….....8

7.0 Types of Data Transmission............................................................................9

8.0 Sharing Information with a non-NHS Organisation........................................13

9.0 Accountability and Responsibilities ...............................................................13

10.0 Process for Approval & Ratification ...............................................................13

11.0 Dissemination, Training & Advice..................................................................14

12.0 Review, Monitoring and Compliance .............................................................14

13.0 References…………………………………………………………………………14

Appendices

Appendix A - Guidance for sending Personal, Confidential or Sensitive information

by Fax .....................................................................................................................16

Appendix B - Guidance for sharing Personal, Confidential or Sensitive information

by Phone.................................................................................................................17

Appendix C - Guidance for sharing Personal, Confidential or Sensitive information

by Post ....................................................................................................................18

Appendix D - Guidance for Transporting Personal information on site....................19

Appendix E – Equality Impact Assessment Tool .....................................................20

Page 4: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 4 of 20

1.0 Procedure Statement

1.1 North, Central and South Manchester Clinical Commissioning Group (hereafter referred to as the CCG or organisation) organisational ‘constitution’ is a nationally approved document, which outlines the fundamental principles that govern how a CCG functions as stipulated by ‘The National Health Service under the Health and Social Care Act (2012)’.

1.2 These rules, collectively, make up (i.e. constitute) what the CCG is required to do. Therefore, when these principles are written into a single document, that document is said to embody a ‘written’ constitution and henceforth is a recognised legal code by which the CCG will be held accountable.

1.3 By virtue of its constitution, the CCG has developed a set of documented principles, to which it is legally accountable to, and therefore, each principal requires a specific set of rules and procedures to guide its decisions and ensure documented evidence of the outcomes is maintained.

2.0 Introduction

2.1 The purpose of this document is to provide guidelines to CCG staff on the secure transfer of information.

2.2 A number of Acts and guidance dictate the need for safe haven arrangements to be set in place, they include (but are not restricted to):

• Data Protection Act 1998 (namely Principle 7): “Appropriate technical and organisational measures shall be taken to make personal data secure”

• NHS Code of Practice: Confidentiality (namely Annex A1 Protect patient Information) “Care must be taken, particularly with confidential clinical information, to ensure that the means of transferring from one location to another are secure as they can be”.

The CCG must maintain the confidentiality of personal confidential data when both using it and transmitting.

2.3 Depending on the content of information being sent safe haven procedures should be applied when it is of a personal/sensitive/ confidential nature.

• Identifying a person - where the person is the focus of the information and links that individual to details which would be regarded as private e.g. name and private address, name and home telephone number, etc.

• Sensitive information - details about a person’s health or physical condition, sexual orientation, ethnic origin, religious beliefs, political views or criminal convictions.

• Sensitive information - details about an organisation e.g. financial information or performance figures

Page 5: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 5 of 20

2.4 The CCG is required to have procedures to maintain the privacy and confidentiality of the personal confidential data they may hold, receive or use. The implementation of the guidance within this policy facilitates compliance with the legal requirements placed upon the CCG.

2.5 When information is being transferred from one CCG/location/organisation to another staff need to be confident of the safety and security of how the information is being transmitted.

2.6 This document sets out a framework within which staff responsible for all routine flows of personal confidential data, personal staff information and commercial in confidence information and any similar exchanges should adhere to.

2.7 This procedure is designed to protect the CCG as an organisation, its constituent businesses and staff by defining the use and application of encryption technology when accessing, storing and transmitting CCG corporate, personal or patient information.

2.8 All members of staff are required to comply or abide by the terms of this procedure.

2.9 Health and Social Care Act (2012) Primary Care Trusts (PCTs) were abolished and Clinical Commissioning Groups (CCGs) were established with the majority of the responsibilities from PCTs. However, CCGs are not direct successors of PCTs and do not have the legal rights to process Personal Confidential Data (PCD), for secondary uses that PCTs had. The Health and Social Care Act 2012 states that only the Health and Social Care Information Centre (HSCIC) is able to receive and process PCD, for secondary use, without patient consent. The Northwest Data Management and Integration Centre (DMIC) currently act as a regional office for the HSCIC and are able to process PCD legally. NHS England has received a Section 251 exemption which allows limited data flows from DMIC to Accredited Safe Havens (ASH) to support some specific commissioning purposes. GM CSU – provides a number of services to the CCGs working in partnership in providing high level of services. What can the CSU do now? Provide PCD to CCGs for use in GP clinical dashboards (includes risk stratification) if the following conditions are met:

• The only users that can see PCD are clinicians - viewing their own patients;

• The data is supplied via the DMIC staff seconded to the HSCIC;

• CCG staff do not have any direct interaction with PCD used by the system;

• The system uses role-based access control (RBAC).

Page 6: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 6 of 20

To provide assurance to the DMIC and HSCIC that the conditions above are in place the CCG will be required to provide details around the security and governance processes in place and sign a DMIC Data Sharing Contract including providing a centralised Service Level Agreement Manager process which includes:

• Centralised patient registration challenges;

• Pseudonymisation of SLAM information for finance, contracting, BI and provider management teams.

What does this mean for CCGs? CCGs cannot:

• send or receive PCD directly from care providers or any other sources for commissioning purposes;

• validate Non Contractual Activity

• validate activity charged for by Trusts;

• use PCD for risk stratification, (unless ASH status achieved) however the DMIC can;

• access or process historic/legacy PCD. CCGs can:

• receive aggregated or pseudonymised data. The above should be considered in conjunction with all the following elements of this guidance.

3.0 Purpose

3.1 This procedure applies to those members of staff who are directly employed by the CCG and for whom the CCG has legal responsibility. For those staff covered by a letter of authority/honorary contract or work experience the CCG’s policies are also applicable whilst undertaking duties for or on behalf of the CCG. Furthermore, this policy applies to all third parties and others authorised to undertake work on behalf of the CCG.

3.2 This procedure relates specifically to the handling of PCD both clinical and non-clinical that has been created, maintained, stored or destroyed by staff of the CCG.

3.3 This procedure aims to raise awareness and provide guidance on:

• The legislation and guidance which dictates the need for a safe haven;

• A definition of the term safe haven;

• When a safe haven is required;

• The necessary procedures and requirements that are needed to implement a safe haven environment.

4.0 Responsibilities

4.1 Organisational Responsibility: The CCG’s Caldicott Guardian has overall responsibility for ensuring safe haven procedures are in place throughout the organisation. The Caldicott Guardian will instigate and monitor an investigation if a breach of safe haven occurs.

Page 7: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 7 of 20

4.2 Service Leads/Line Managers: Have a responsibility for ensuring that all staff are aware of safe haven procedures and report any new flows in or out of the department/team/service/location, or installation of communication modes such as a new fax machine, to the Information Governance Lead.

4.3 All staff: Have a responsibility for ensuring the information is handled, used, stored and shared confidentially and appropriately. If in doubt individuals should seek guidance from their line manager in the first instance, or the Information Governance Lead.

5.0 Definitions of Terms Used

5.1 Safe Haven – The term safe haven is used to explain either a secure physical location or the agreed set of administrative arrangements that are in place within the organisation to ensure personal confidential data is communicated safely and securely. It is a safeguard for confidential information which enters or leaves the organisation whether this is by fax, post or other means. Any members of staff handling confidential information, whether paper based or electronic, must adhere to the safe haven principles.

This term was initially meant to describe the transfer of fax messages, but should now cover the data held and used within

• Fax machines

• Answer phones

• Telephones

• Photocopiers

• Emails

• White boards/notice boards

• Manual records and books

• Post

• Dictation Machines

• Removable media

• Bulk data transfers

5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data

• Personal information is information about a person which would enable that person’s identity to be established by one means or another.

• This might be fairly explicit such as an unusual surname or isolated postcode.

• Could have bits of different information which if taken together could allow the person to be identified.

• All information that relates to an attribute of an individual should be considered as potentially capable of identifying them to a greater or lesser extent.

5.3 Sensitive Personal Information - Sensitive personal information is a category of personal information that is usually held in confidence and whose

Page 8: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 8 of 20

loss, misdirection or loss of integrity could impact adversely on individuals, the organisation or on the wider community, for example, where the personal information contains details of the individual’s:

• Health of physical condition

• Sexual life

• Ethnic origin

• Religious beliefs

• Trade union

• Political opinions

• Criminal convictions For this type of information even more stringent measures should be employed to ensure that data remains secure.

5.4 Business Sensitive information - This is information that if disclosed could harm or damage the reputation or image of an organisation.

6.0 Location/Security Arrangements for a good Safe Haven Environment

6.1 Safe haven procedures should be in place in any location where confidential data is being received, held or communicated especially where the data is person identifiable.

6.2 When choosing a safe haven location the following factors must be considered:

• A safe haven location must be a room that is locked or accessible via a coded key pad (or similar device) known only to authorised staff;

• The office or workspace must be sited in such a way that only authorised staff can enter that location;

• If sited on the ground floor any windows must have locks on them;

• The room must conform to health and safety requirements in terms of fire, safety from flood, theft or environmental damage;

• Manual paper records containing personal confidential data must be stored in locked cabinets when not in use and when the office/workstation is left unattended;

• Operate a clear desk policy, e.g. lock documents away if away from desk during the day, evenings and weekends;

• Documents should not be left unattended for any significant period of time e.g. faxes should be collected/distributed from the fax machine at frequent periods and post should not be left unattended in pigeon holes or on desks;

• Computers must not be left on view or accessible to unauthorised staff and must have a secure screen saver function and be switched off when not in use;

• Equipment such as fax machines in the safe haven must have a code password or pin and be turned off out of office hours.

Page 9: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 9 of 20

7.0 Types of Data Transmission

7.1 Transmission of Personal Information via Fax - Fax machines must only be used to transfer personal information where it is absolutely necessary to do so. Safe haven fax machines must be placed in a secure location which is lockable when unattended. Ideally they should require a code password or pin for operation and numbers for these dedicated fax machines must be made known. The following rules also apply:

• Clarify with the receiver that they operate safe haven procedures;

• The fax is sent to a location where only staff that have a legitimate right to view the information can access it;

• The sender is certain that the correct person will receive it and that the fax number is correct (always confirm with the receiving party before any information is sent);

• You notify the recipient when you are sending the fax and ask them to acknowledge receipt of the information and number of indicated pages;

• Care is taken in dialling the correct number. Frequently used numbers should be pre-programmed to reduce misdialling. Pre-programmed numbers should be routinely checked for accuracy;

• Confidential faxes are not left lying around for unauthorised staff/members of the public to see;

• Only the minimum amount of personal information should be sent. Where possible, the data should be anonymised or NHS Number unique identifier used. Where it is essential that both clinical and personal data is sent, you should consider sending them separately, ensuring the first fax has been received prior to sending the remainder;

• Faxes sent should include a CCG front sheet which states ‘Private and Confidential’ and which contains the CCG confidentiality and disclaimer clause. The intended recipient’s name and job title should be clearly included. Do not include any sensitive information on the front sheet;

• A ‘sent report’ should be obtained which is evidence that the fax was sent to the correct fax number and received by the fax at the other end. This report should be kept secure as part of an audit trail;

• Never leave the information unattended whilst it is being transmitted;

• Do not send a fax to a destination where you know it is not going to be seen for some time or outside office opening times (whenever possible).

Appendix A displays a flowchart which can be printed, laminated and placed by a fax machine for reference.

7.2 Transmission of Personal Information via Computer and Email:

• Access to any personal computer/laptop must be password protected and the password must not be shared;

• Computer screens must not be left on view so that members of the general public or staff who do not have a justified need to view the

Page 10: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 10 of 20

information can see personal data. PCs or laptops not in use should be switched off or have a secure screen saver device in use;

• Information must be held on the organisation’s network servers, not stored on local hard drives. Departments should be aware of the high risk of storing information locally and take appropriate security measures;

• The only accredited and secure way of transmitting patient-identifiable data by e-mail is via NHS Mail between NHS Mail accounts for NHS users. As long as both sender and recipient have the suffix @nhs.net, i.e. ([email protected]), this is the only encrypted mail service provided. Refer to the email section of the Information Governance Policy for further information on secure emailing.

• To maintain confidentiality of data, outside third party organisations that do not have NHS Mail must have encryption software and confirmation of this is required to be obtained from the recipient prior to transmission. The document being sent has to be 256 bit key encryption (AES) and a password has to be set which must consist of 8 characters long with a combination of numbers and letters. The password has to be supplied by phone to the correspondent and not sent by a further email;

• All emails should include the CCG standard disclaimer below: • This email has been scanned for viruses; however we are unable to accept

responsibility for any damage caused by the contents. The opinions expressed in this email represent the views of the sender, not Manchester Clinical Commissioning Groups unless explicitly stated. If you have received this email in error please notify the sender. The information contained in this email may be subject to public disclosure under the NHS Code of Openness or the Freedom of Information Act 2000. Unless the information is legally exempt from disclosure, the confidentiality of this e-mail and your reply cannot be guaranteed.

• Personal information of a more sensitive nature must be sent over NHS Mail with appropriate safeguards:

• Emails which contain sensitive information should be appropriately titled i.e. do not include sensitive details in the subject line;

• Clinical information is clearly marked;

• E-mails are sent to the right people;

• Browsers are safely set up so that, for example, passwords are not saved and temporary internet files are deleted on exit;

• The receiver is ready to handle the information in the right way.

7.3 Disclosure of Information by Telephone: There will be occasions when telephone enquiries are received asking for disclosure of personal information. When the disclosure is legally justified and the caller has a legal right to access that information, the following rules should be adhered to:

• Verify personal details;

• Obtain and record the enquirer’s telephone number;

• If the caller is part of an organisation/company, the main switchboard number of that organisation (via phone book or directory enquiries) should be obtained and used to call back;

• Conduct the call in an area that is private where staff/public cannot

Page 11: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 11 of 20

overhear;

• Any notes made during the calls should be kept in a secure place (locked away) and not left on any desk;

• Any suspect bogus enquiries should be referred immediately to the Information Governance Lead as soon as possible and an incident form completed on Datix;

• Always provide the minimum amount of information that is necessary;

• If in doubt, the caller should be advised that they will be called back, where necessary, a senior manager or the Caldicott Guardian for confidentiality issues should be consulted;

• Be aware of any press enquiries and refer to the CCG’s Head of Corporate Services.

Appendix B displays a flowchart which can be printed, laminated and placed near telephones for reference.

7.4 Communications by Post Incoming:

• Ensure incoming post is received in an environment away from public interference e.g. not left on receptionist’s desk in a waiting area;

• Open incoming mail away from public areas;

• Ensure if post is sorted for onward distribution that it is stored securely and is picked up frequently.

Outgoing:

• Always double check addresses;

• Mark post clearly with names and addresses and with ‘Private and Confidential’;

• Use a CCG letter headed front page or compliment slip;

Use a secure robust envelope, include a return address where appropriate;

• For important letters/parcels, ask for confirmation of safe arrival;

• Outgoing sensitive information should be protected from data loss in line with Department of Health guidance, by using a trackable service, i.e. Royal Mail Special Delivery or the CCG’s authorised courier. Please note that Royal Mail Recorded Delivery is not a trackable service.

Appendix C displays a flowchart which can be printed, laminated and placed near members of staff who are more likely to handle incoming and outgoing post.

7.5 Communications by Text Message: Text messaging is becoming increasingly popular however there are potential information security risks that should be considered before any text messages are used. For example:

• Check the mobile number is correct and be confident that the person using the recipient’s mobile is the person to whom the message is intended;

Page 12: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 12 of 20

• Check that the patient has received the message;

• Text messages are normally stored on SIM cards and are typically only cleared when overwritten (not necessarily when erased) – as mobile phones are easy to misplace or may get stolen there is a danger of a breach of confidentiality occurring that the patient may find embarrassing or damaging;

• Mobile phone networks may be open to additional risks of eavesdropping or interception.

When using this method of communication the minimum amount of confidential data should be sent. Remember that appropriate informed consent must have been sought prior to commencing text messaging communications.

7.6 Transfer of Paper/Hardcopy Documents: Paper records/documents may be required for investigation or to refer to as part of a patient’s care. Care must be taken when transferring documents that contain confidential information:

• Paper documents that contain confidential information must be stored in a lockable cupboard or cabinet;

• Lockable crates must be used to move bulk hardcopy information;

• Only take off site when absolutely necessary, or in accordance with local policy;

• Record what information is taken off site/from a department, and if applicable, where and whom the information has gone to;

• Ensure documents are properly ‘booked out’ of any relevant filing;

• Never leave personal/sensitive/confidential records/documents unattended;

• Ensure the information is returned as soon as possible;

• Record that the information has been returned.

For further information on transferring paper documentation please refer to the CCG’s Records Management Policy. Appendix D displays a flowchart which can be printed, laminated and placed near members of staff who work in/around paper records/documents containing personal confidential data and who may be asked to arrange transfer of the records.

7.7

Other Electronic Media

• Dictation machines and tapes can contain extremely sensitive information and should always be kept in a locked area when not in use. They should be cleared of all dictation when the communication has been completed;

• Answer phones receiving personal information must have the volume lowered so that the information is not being un-necessarily overheard;

• Photocopying machines should be sited in areas where the general public do not have physical access. No papers should be left on the glass after copying.

Page 13: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 13 of 20

7.8 Mobile Working It is recommended when staff are working away from their working environment that they follow the steps below:

• Never save any files onto the hard drive of their mobile device.

• Always dial in with a secure token when accessing files.

• Make sure when save files they are saving to their network drive.

• Never access personal or sensitive information on their mobile device.

• Do not leave the mobile device unlocked if you have to leave it unmanned.

8.0 Sharing information with non-NHS Organisations

8.1 Staff should be aware of the Data Sharing Processor Agreement and the requirement to have an Information Sharing Agreement in place for the routine sharing of personal confidential data.

8.2 Staff authorised to share/disclose personal information to other organisations outside the NHS must seek assurance that these organisations have a designated safe haven point for receiving personal confidential data.

8.3 The CCG must be assured that these organisations are able to comply with the safe haven ethos and that they meet certain legislative and related guidance:

• Data Protection Act 1998

• Common law duty of confidence

• NHS Code of Practice: Confidentiality

9.0 Accountability

9.1 Overall responsibility for procedural documents across the organisation lies with the Accountable Officer who has overall responsibility for establishing and maintaining an effective document management system, for meeting all statutory requirements and adhering to guidance issued in respect of procedural documents.

9.2 Overall responsibility for the Secure Transfer of Information Procedure lies with the Corporate Service Manager who has delegated responsibility for managing the development and implementation of safe haven procedural documents and working with the GM CSU Information Governance Team who will provide safe haven advice and guidance in line with their contractual obligations.

10.0 Process for Approval & Ratification

10.1 The process for approval and ratification detailed in the ‘Corporate Document Template and Users Guidelines Policy’ has been used to develop this policy.

10.2 The Governance Committee is the committee with delegated authority for the approval and ratification of this document.

Page 14: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 14 of 20

11.0 Dissemination, Training & Advice

11.1 Staff will receive instruction and direction regarding the policy from a number of sources:

• policy/strategy and procedure manuals;

• line manager;

• specific training course;

• other communication methods (e.g. team brief/team meetings);

• staff Intranet.

11.2 This procedure and a set of procedural document manuals are available on the CCG staff intranet.

11.3 Staff will be made aware of procedural document updates as they occur via team briefs, team meetings and notifications via the CCG staff intranet.

12.0 Review, Monitoring and Compliance

12.1 Performance against key performance indicators will be reviewed on an annual basis and used to inform the development of future procedural documents.

12.2 This policy will be reviewed on a two-yearly basis, and in accordance with the following as and when required:

• legislative changes;

• good practice;

• guidance

• case law;

• significant incidents reported;

• new vulnerabilities;

• changes to organisational infrastructure.

12.3 Equality Impact Assessment: The CCG aims to design and implement services, policies and measures that are fair and equitable. As part of its development, this policy and its impact on staff, patients and the public have been reviewed in line with the CCG’s legal equality duties. The purpose of the assessment is to improve service delivery by minimising and if possible removing any disproportionate adverse impact on employees, patients and the public on the grounds of race, socially excluded groups, gender, disability, age, sexual orientation or religion/belief.

13.0 References

13.1 A number of other policies in the General Policy/Strategy Manual are related to this policy and all employees should be aware of the full range. The key linked policies are:

• the Information Governance Policy

• the Acceptable Use Policy

• the Records Management Policy

Page 15: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 15 of 20

13.2 Acts covered under the Policy:

• Data Protection Act 1998

• Human Rights Act 1998

• Computer Misuse 1998

• Electronic Communications Act 2000

13.3 The CCG will also take action to comply with any new legislation affecting safe haven procedures as it arises.

Page 16: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 16 of 20

Ask the recipient to

acknowledge receipt

of the fax

Make sure you include a

CCG fax cover sheet (which

includes the CCG

disclaimer) stating clearly

who the fax is for, and

mark it “Private &

Confidential.”

Do Not include confidential

info on the cover sheet

Ask for confirmation

that the fax(s) have

been received safely

Inform the recipient

that you are going to

send confidential

information over the

fax. Double check

the fax number if

necessary

Do not fax

personal,

confidential or

sensitive

information

unless it is

absolutely

Ensure you file/lock

away any

documentation

securely and don’t

leave it lying around

the office

Appendix A – Guidance for sending Personal, Confidential or Sensitive Information by Fax

Page 17: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 17 of 20

Appendix B – Guidance for Sharing Personal, Confidential or Sensitive Information by Phone

Appendices C

Appendices D

Appendices E

Appendices F

Appendices G

Page 18: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 18 of 20

When appropriate

send the information

by tracked post.

Appendix C – Guidance for Sharing Personal, Confidential or Sensitive Information by Post

Page 19: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 19 of 20

Appendix D – Guidance for Transporting Personal Information on Site

Personal information should not be taken offsite without explicit senior management consent and for a justifiable purpose Where personal information is in electronic form is to be taken offsite it MUST BE encrypted to the CCG standard before it leaves CCG premises.

Page 20: IG5 - Secure Transfer of Information Procedure V1.1 Final · • Bulk data transfers 5.2 ‘Person Identifiable’ information, now known as Personal Confidential Data • Personal

IG 5 Version 1.1 May 2014

IG – Secure transfer of Information Procedure Page 20 of 20

Appendix E – Equality Impact Assessment Tool

To be completed and attached to any procedural document when submitted to the appropriate

committee for consideration and approval.

Yes/No Comments

1. Does the document/guidance affect one group

less or more favourably than another on the basis

of:

• Race No

• Ethnic origins (including gypsies and travellers) No

• Nationality No

• Gender (including gender reassignment) No

• Culture No

• Religion or belief No

• Sexual orientation No

• Age No

• Disability - learning disabilities, physical

disability, sensory impairment and mental

health problems

No

2. Is there any evidence that some groups are

affected differently?

No

3. If you have identified potential discrimination, are

there any valid exceptions, legal and/or

justifiable?

4. Is the impact of the document/guidance likely to

be negative?

No

5. If so, can the impact be avoided?

6. What alternative is there to achieving the

document/guidance without the impact?

N/A

7. Can we reduce the impact by taking different

action?

If you have identified a potential discriminatory impact of this procedural document, please refer it to

the CCG’s Equality and Diversity Lead, together with any suggestions as to the action required to

avoid/reduce this impact.

For advice in respect of answering the above questions, please contact the CCG Equality and Diversity

Lead.