Improving information sharing and management iisam
1 / 24

Improving Information Sharing and Management (IISaM) - PowerPoint PPT Presentation

  • Updated On :

Improving Information Sharing and Management (IISaM). Data Protection Officers Conference 3 March 2010 Christine Goodfellow Director Improving Information Sharing and Management Programme. The issue we are trying to address.

Related searches for Improving Information Sharing and Management (IISaM)

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Improving Information Sharing and Management (IISaM)' - jacob

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Improving information sharing and management iisam l.jpg

Improving Information Sharing and Management(IISaM)

Data Protection Officers Conference

3 March 2010

Christine Goodfellow


Improving Information Sharing and Management Programme

The issue we are trying to address l.jpg
The issue we are trying to address

At any one time, 3-4 million children and young people in England will need to access additional services over and above the core health and education services

At some point before their 18th birthday, as many as50% of our children and young peoplecould need additional help

Around 2.7 million people supporting children who

need to provide the solution

So, where does IISaM fit in?

Why iisam l.jpg
Why IISaM?

Be healthy

Stay safe

Enjoy and achieve

Make a positive contribution

Achieve economic well-being

Because practitioners are working together and intervening earlier…

…because they have the tools that enable them to do this

Information sharing l.jpg
Information Sharing

The Protection of Children in England:

A Progress Report, The Lord Laming

(Crown Copyright 2009)

Despite considerable progress in interagency working there remain significant problems in the day-to-day reality of working across organisational boundaries and cultures, sharing information to protect children and a lack of feedback when professionals raise concerns about a child

Joint working between children’s social workers, youth workers, schools, early years, police and health too often depends on the commitment of individual staff and sometimes this happens despite, rather than because of, the organisational arrangements

This must be addressed by senior management in every service.

Slide6 l.jpg

Information sharing guidance: products

Plus posters containing key messages from the guidance, an updated set of training materials and a set of ‘How To…’ guides.

Formal endorsements l.jpg
Formal endorsements

Information Sharing Core presentation Mar 2009

Contactpoint l.jpg

Martin Narey, Barnardo’s

Barnardo’s has been supportive of ContactPoint from the outset because we believe that this initiative has the potential to provide a quick and easy way for professionals to find out who else is working with a child, making it easier for us to spot more children of particular vulnerability. The testing of the scheme in the North West, of which Barnardo’s has been a part, has been encouraging and I welcome the announcement that the system will now be rolled out across England.

What is contactpoint l.jpg
What is ContactPoint?

  • Response to recommendation from Lord Laming’s review into the death of Victoria Climbié

  • The quick way to find out who else is working with the same child

  • A tool to save time for practitioners to spend more time supporting children

  • An online tool for people who work with children who need it to do their job

  • Holds basic contact information for all children in England

  • A national system to make sure no children slip through the net

  • Supports aim to improve the health, safety and well being of all children

Information held l.jpg
Information held









Child’s name

GP practice

Contact details

Youth worker

Contact details





Contact details

Social worker

Contact details

Lead professional

Contact details

Unique identifier


Contact details

Date of birth

Health visitor

Contact details


School Nurse

Contact details

Sensitive service

Contact details


Contact details

ContactPoint will not hold case data or assessment information

Population management and access l.jpg
Population, management and access




Modified CMS

Data matching







Web Access

Access Controls




No IT Access

Mediated Access


Support services (national and local)

152 ‘accountable’ LAs

Fostering a culture of security l.jpg
Fostering a culture of security

In the programme

  • Accurate identification, management and treatment of security risks

  • Understanding that security is often not about technology

  • High visibility across design, implementation and operations

  • Adopting prescribed methodology and building it into programme process

  • Ensuring that ownership for security rests with all work-streams

  • Understanding the concepts of security so that clear and simple policy can be acted upon – e.g. no memory sticks!

    In the user community

  • Mandatory structured training (Including Data Protection and Computer Misuse legislation)

  • User Security Operating Procedures

  • User agreement to be signed by all users

  • Robust identity and background checks (eCRB)

  • Clear accountability for Local Authorities and National Partners

  • Incident response procedures

  • Investigation of any inappropriate activity

Layered approach to security l.jpg

1. Data stored in a highly secure data centre

Layered approach to security

6. Access over secure government networks where possible

9. Users trained in security and sign acceptable use policy

2. All data transfers encrypted and protected in transit

3. Filters prevent large amounts of data leaving the system

8. All users identity checked and eCRB checked

4. Audit of all access to child data

7. Access from internet limited to accredited organisations

5. All users verified through two-factor authentication

Ensuring appropriate data handling l.jpg
Ensuring appropriate data handling

  • Compliance with HMG standards & policies for Information Assurance

  • Clear guidance, backed up by Regulations

  • Purpose of use captured for every access

  • Detailed audits conducted by Local Authorities and National Partners

  • Audit process overseen by Central Service Management team

  • Spot Checks to ensure processes are effectively implemented

  • Reviews of technical, procedural, physical and personnel security controls

  • Data sharing standards

    • Minimum data required from both local and national sources (no case data)

    • Separation of identifiers by domain (health, benefits, education)

    • Separate reporting database, anonymised reports except where absolutely necessary to identify children

Slide15 l.jpg

A steady and incremental approach

Shielding training

for all LAs

Early Adopters

management teams trained




Early Adopter Phase

Early Adopter Managed

User Rollout (800 practitioners)

Other LA and National Partner

management teams trained

National Rollout

What the users say l.jpg
What the users say

Every single practitioner I’ve met

has said ContactPoint is something

we need.

ContactPoint is already proving to be an important tool to help ensure that children and young people get the support they need in a timely, joined-up way. In each case where I have used it, I have been able to quickly get in touch with the right people. More importantly, the children received the support they required.

Staff Nurse, A&E Department

A child came into A&E recently. He lied about his address and phone number as he had run away from home. I went onto ContactPoint and was able to find his correct contact details, enabling us to

quickly contact his social worker and let them know he was safe.


Welfare Officer

Operations Manager,


ContactPoint has helped our Personal Advisers to

make the right links before starting to work with pupils, thus ensuring we set appropriate priorities

and put the right level of support in place. It will

definitely improve joint working practice and

therefore ensure better outcomes for our clients.

ContactPoint Manager

Moving forward l.jpg
Moving forward

  • EA Phase: important learning, must build on this

  • DCSF continue to work closely with delivery partners

  • Lots still to do. A key focus on:

    • Local data loading,

    • Ongoing engagement with key sectors to facilitate their participation

      • For example, health, education, youth justice and early years)

    • Revise and update guidance and tools

      • looking to simplify and consolidate, wherever possible

    • Update regulations: new regs planned to be in force by Spring 2010

  • Analysis indicates perhaps 390,000 users over time, but for LAs and National Partners to determine

What is caf l.jpg
What is CAF?

A tool to help practitioners organise services around children and young people, so services meet their needs better

Helps identify additional needs early, so needs do not become more complex or severe later on

Currently paper-based, or stored on local eCAF systems

A secure national IT system for storing and accessing information captured through a CAF

Available to all local authority areas – operating across borders and agencies, improving service experience and continuity of care for children, young people and families who move locations or use multiple services in different areas

So, what will National eCAF be?

Benefits l.jpg

National eCAF

Cross-border, multi-agency working: the system works across geographic and organisational boundaries

Standardisation: promotes a standard, best practice CAF process

Transparency and visibility: of the work of other LAs/agencies in supporting a child/young person

Improves service experience and continuity of care for children/families accessing services across different areas

Built-in consent process that is clear, consistent, transparent and mandatory

Secure, fast information sharing within the system (avoids email, post, fax, photocopying)

Reporting functionality: in-depth and extensive MI capability

DCSF covers costs of design, build, hosting, software licences, IT support, business support and Level 1 training

Access to shared information: quicker and easier access to the most up-to-date CAF information and the progress of actions and service provision

Smoothes process of bringing practitioners into a team around the child

Management information: provides MI for local management and service planning

e-enablement of CAF


Supports early identification of needs before problems escalate

Faster, more effective service provision: builds a holistic picture of a child/young person’s needs

Reduces repetition for children/families and supports better practitioner time management: practitioners build on existing information rather than start from scratch

Promotes a shared, common language amongst practitioners

Enables more appropriate referrals to specialist services

National ecaf timeline implementation l.jpg
National eCAF timeline & implementation

2010 2011

National eCAF available to P1 EAs Q1 2010

System build and test


Phase 1 Early Adopters:

Cambridgeshire, Northamptonshire, Walsall, Birmingham, Barnardo’s and Kids

Q1 2011

National rollout

Q3 2010

Phase 2 Early Adopters

15 LAs

Q1 2010

Phase 1 Early Adopters

Development of tools Testing of tools Use of tools

Lessons learned

Lessons learned

Contactpoint the quick way to find out who else is working with the same child l.jpg

Supporting information sharing

Children in need

Children with additional needs

ContactPointThe quick way to find out who else is working with the same child

National eCAFA secure IT system for storing and accessing information captured through a CAF. Consent based

Local ICS systems

A framework for social

workers working with children

in need and their families

Team around

the child


of CAF

CAF owner






and contact






All children in England

For further information l.jpg
For further information