Information governance and confidentiality
Download
1 / 14

INFORMATION GOVERNANCE AND CONFIDENTIALITY - PowerPoint PPT Presentation


  • 106 Views
  • Uploaded on

INFORMATION GOVERNANCE AND CONFIDENTIALITY. Information Governance Facilitator. What is Information Governance?. Information Governance (IG) ensures that information (personal or corporate) is dealt with in a legal and ethical manner.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' INFORMATION GOVERNANCE AND CONFIDENTIALITY' - carter-carpenter


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Information governance and confidentiality

INFORMATION GOVERNANCE AND CONFIDENTIALITY

Information Governance Facilitator


What is information governance
What is Information Governance?

  • Information Governance (IG) ensures that information (personal or corporate) is dealt with in a legal and ethical manner.

  • Every member of staff handles information on a day-to-day basis, so you need to make sure you comply with the legislation.


Why is information governance important
Why is Information Governance Important ?

  • If you don’t comply with the legislation you will more than likely have committed a criminal offence

  • You can be held legally responsible.



Personal information
Personal Information

  • Is covered by the Data Protection Act

  • Includes patient and staff information

  • Paper and computerised records

  • Penalties for breaching confidentiality


Main points data protection
Main Points - Data Protection

Personal information should be:

  • Processed fairly and lawfully

  • Adequate, relevant & not excessive

  • Accurate & up-to-date

  • Not kept longer than is necessary

  • Kept secure


The data protection act is not a barrier to sharing information
The Data Protection Act is Not a Barrier to Sharing Information.

When can I use and share patient information?

  • When it is necessary for the provision of a

    patient’s health care.

    Other reasons to share or disclose personal information:

  • When the law requires

  • To prevent harm to the patient or to others

    (eg suicide or murder)

  • In the overriding public interest

    All other uses and disclosures require consent from the individual


Rights of individuals
Rights of Individuals

  • Right to see their records

  • Right to object to inaccurate entries

  • Right to request that inaccurate data is corrected

  • Right to compensation


Corporate information
Corporate Information

  • Under the FOI Act, anyone can request recorded information held by the PCT

  • Reports, accounts, policies, correspondence (inc. e-mails)

  • Requests may be from the Press, Political Parties, Pressure Groups or individuals

  • 20 working days to produce information if it is not exempt

  • FOI Publication schemes


Using and transferring patient information
Using and Transferring Patient Information

  • The Caldicott Report reviewed the use and transfer of patient-identifiable information

  • 6 Caldicott principles

  • Recommended that every Trust have a Caldicott Guardian


The 6 caldicott principles
The 6 Caldicott Principles

  • Justify the purpose(s) for using confidential information

  • Only use it when absolutely necessary

  • Use the minimum that is required

  • Access should be on a strict need-to-know basis

  • Everyone must understand his or her responsibilities

  • Understand and comply with the law


Information security
Information Security

  • Physical and access controls

  • Notes/screens not left on view

  • Password protection

  • Transfer of records by post

  • Telephone enquiries

  • Fax machines

  • Overheard conversations


Records management
Records Management

  • Records Management Policy (includes storage, retention, archiving and destruction of records)

  • Archiving – Make sure you store and archive records correctly (can they be traced if they are needed at some point in the future?)



ad