Information governance and confidentiality
This presentation is the property of its rightful owner.
Sponsored Links
1 / 14

INFORMATION GOVERNANCE AND CONFIDENTIALITY PowerPoint PPT Presentation


  • 69 Views
  • Uploaded on
  • Presentation posted in: General

INFORMATION GOVERNANCE AND CONFIDENTIALITY. Information Governance Facilitator. What is Information Governance?. Information Governance (IG) ensures that information (personal or corporate) is dealt with in a legal and ethical manner.

Download Presentation

INFORMATION GOVERNANCE AND CONFIDENTIALITY

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Information governance and confidentiality

INFORMATION GOVERNANCE AND CONFIDENTIALITY

Information Governance Facilitator


What is information governance

What is Information Governance?

  • Information Governance (IG) ensures that information (personal or corporate) is dealt with in a legal and ethical manner.

  • Every member of staff handles information on a day-to-day basis, so you need to make sure you comply with the legislation.


Why is information governance important

Why is Information Governance Important ?

  • If you don’t comply with the legislation you will more than likely have committed a criminal offence

  • You can be held legally responsible.


What does ig cover

What Does IG Cover?


Personal information

Personal Information

  • Is covered by the Data Protection Act

  • Includes patient and staff information

  • Paper and computerised records

  • Penalties for breaching confidentiality


Main points data protection

Main Points - Data Protection

Personal information should be:

  • Processed fairly and lawfully

  • Adequate, relevant & not excessive

  • Accurate & up-to-date

  • Not kept longer than is necessary

  • Kept secure


The data protection act is not a barrier to sharing information

The Data Protection Act is Not a Barrier to Sharing Information.

When can I use and share patient information?

  • When it is necessary for the provision of a

    patient’s health care.

    Other reasons to share or disclose personal information:

  • When the law requires

  • To prevent harm to the patient or to others

    (eg suicide or murder)

  • In the overriding public interest

    All other uses and disclosures require consent from the individual


Rights of individuals

Rights of Individuals

  • Right to see their records

  • Right to object to inaccurate entries

  • Right to request that inaccurate data is corrected

  • Right to compensation


Corporate information

Corporate Information

  • Under the FOI Act, anyone can request recorded information held by the PCT

  • Reports, accounts, policies, correspondence (inc. e-mails)

  • Requests may be from the Press, Political Parties, Pressure Groups or individuals

  • 20 working days to produce information if it is not exempt

  • FOI Publication schemes


Using and transferring patient information

Using and Transferring Patient Information

  • The Caldicott Report reviewed the use and transfer of patient-identifiable information

  • 6 Caldicott principles

  • Recommended that every Trust have a Caldicott Guardian


The 6 caldicott principles

The 6 Caldicott Principles

  • Justify the purpose(s) for using confidential information

  • Only use it when absolutely necessary

  • Use the minimum that is required

  • Access should be on a strict need-to-know basis

  • Everyone must understand his or her responsibilities

  • Understand and comply with the law


Information security

Information Security

  • Physical and access controls

  • Notes/screens not left on view

  • Password protection

  • Transfer of records by post

  • Telephone enquiries

  • Fax machines

  • Overheard conversations


Records management

Records Management

  • Records Management Policy (includes storage, retention, archiving and destruction of records)

  • Archiving – Make sure you store and archive records correctly (can they be traced if they are needed at some point in the future?)


Who is responsible for information governance

Who is Responsible for Information Governance?

WE ALL ARE


  • Login