20
40 1 Ca ld ico t Ve rs ion - W o rkbook Information Governance Non Caldicott Version - Workbook Version 12 January 2015 CONTROLLED

Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

40

1

Caldicott Version -Workbook

Information Governance

Non Caldicott Version - Workbook

Version 12 January 2015

CONTROLLED

Page 2: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

2

Don’t Get Bitten by the Data Demon

Using this Workbook

The objective of this workbook is to provide you with guidance covering:

• Information Governance

• SafeHaven Guidance

• Data Protection

• Confidentiality

• Freedom of Information

• Records Management

And to ensure you are familiar with good working practice to reduce the risk of

security and data breaches for anyone working for the Council - don’t get bit

by the ‘Data Demon’ for example, being the cause of a data breach.

You will find a number of references to the Council’s Information Management

Policy, Guidelines and Procedures in this course. You should read these if

you have not already done so.

39

Notes

Page 3: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

38

Notes

3

Hi, I am Judith Greenhalgh, the Strategic Director of

Corporate Resources.

One of my responsibilities is to chair the Information

Governance Group where representatives from all

service areas across the Council meet to review and

agree consistent policies and procedures relating to

information management and ensure the Council

adheres to these.

By law, we are all responsible for Information Security

and it is our individual responsibility to comply with

this. The Council continually reviews security breaches and the audits

undertaken and seeks to raise awareness and standards of compliance.

It is essential that the Council maintains the trust and confidence of both the

public and staff in handling their personal data. The same standards also apply

to handling information relating to employees.

I cannot over emphasise the importance of ensuring that personal data is

always managed in a secure way and is governed by the highest standards.

We expect all our staff to follow the agreed policies and procedures in how to

manage any type of information.

Within the Council there is always advice at hand or someone to speak to for

clarification. If you are unsure of any issue relating to Information Security, then

the simple rule is not to disclose information until we are clear that you are

acting appropriately.

The financial penalties for breaches of Information Security can be very serious.

It is not uncommon to be fined hundreds of thousands of pounds for serious

breaches. The Council has high standards of compliance and it is important to

maintain public confidence and reputation.

Introduction by Judith Greenhalgh

Page 4: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

4

Introduction by Judith Greenhalgh continued

It is important that where an information security breach arises that you

report this immediately to your manager. Your early action can minimise risk.

If you observe potential security breaches such as leaving a desk and not

locking a computer screen, or speaking openly about confidential issues, you

should point this out.

The Council takes its responsibility for Information Security very seriously.

When I was appointed to my post, the expectation of my compliance was

stated in my Appointment Letter and the Code of Conduct I was provided

with. All newly appointed employees receive the same information.

Similarly, Information Security is referred to in all procedures covering your

conduct at work and forms an integral aspect of Induction for all employees

and throughout your employment.

I highly recommend the short training course you are about to undertake.

This has been designed to increase your knowledge and understanding.

You may find that as part of your work you require more detailed information

and training on Information Security. If so, please discuss this with your

manager as more detailed information and training is available.

I hope that you enjoy this e Learning course.

Please take the time to complete the comments form at the end. Your

feedback will be used to develop and improve this training.

Judith Greenhalgh

Strategic Director of Corporate Resources

37

Reference documents continued:

The Derbyshire Partnership Forum -

Sets out the principles for Data sharing among Derbyshire’s partners

Records Retention Schedule

Scanning and Disposal Policy

Social Media Policy

Subject Access Requests

Departmental Data Protection Contacts

Departmental Freedom of Information Contacts

Information Commissioners Office

EDRM Departmental Contacts

Similarly, if you need to report a security breach, contact your manager at

the earliest opportunity who will assist you.

*Resource

Page 5: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

36

*Resource

Because of the nature of your employment you may not have access to a

computer and the Council’s Dnet. The reference documents below may be

obtained by speaking to your line manager.

E mail and Internet Acceptable Use Policy -

Accidental Misuse of E Mail or Internet Form

Data Demon

Accidental Misuse of E-Mail and Internet

Document Classification and Handling Policy

Derbyshire Safe Haven Guidance

ICT Security Policy

ICT Acceptable Use Policy

Information Security Breach Reporting Tool

Off-site Document Storage Guidance

Derbyshire Children’s Safeguarding Board

5

Information Governance is the framework which Enables the

organisation and you as an employee to comply with legal and

statutory requirements.

It includes best practice

guidance when handling

person identifiable

information and

organisational records.

Underpinning the Information Governance Framework, in

regard to personal data, is the Data Protection Act 1998.

Information Governance

Page 6: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

6

Derbyshire County Council

SafeHaven Guidance

As an employee you must be aware of your responsibility for secure

personal and confidential information handling and management.

It is the responsibility of managers, senior managers and strategic

directors, to ensure all employees reporting to them have appropriate

training in information security and confidentiality.

The key documents that YOU as an employee should read in relation

to information security are in the Derbyshire SafeHaven Guidance.

35

Ways of Avoiding Security Breaches

Your responses on page 20 to Ways of avoiding security breaches could also

include:

• One way you can reduce the risk of commi)ng a data breach is to ensure

that you have read, understood and comply with the Council’s Data Security

policies

• Save files to secure network drives

• Obtain wri0en consent before sharing personal data

• Have a process in place to double check that correspondence by whatever

media has been sent to correct recipient

• Non DCC devices such as personal mobile phones or tablets should not be

used to share confiden2al data via text, email or social media other than in

emergencies

• Never use unencrypted devices to store personal data

• Lock your prin2ng requests

• When using social media i.e. SMS texts, Facebook, Twi0er etc., ensure you

comply with the Council’s Social Media Policy

• Lock away any papers containing personal data when you leave your desk

• Avoid sending personal data by e-mail unless through a secure network or in

an encrypted state

• Verify recipients iden2ty and address before sharing data par2cularly where

telephone contact is involved

• Log out of IT systems when you leave your worksta2on

Page 7: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

34

Information Governance:

Your Responsibility

It is the responsibility of every employee of the Council to be aware

of and adhere to the Information Governance policies of the

organisation.

For further information contact your departmental Data Protection or

Freedom of Information contact.*

7

DCC SafeHaven Guidance

• Paper record security

• Mail internal and external

• Verbal communica�on

• Electronic records

• Establishment security

• Taking work outside the workplace

• Informa�on sharing

• Management of confiden�al informa�on

The DCC SafeHaven Guidance document gives you advice and

guidance in key areas of information security covering: -

Page 8: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

8

The Data Protection Act 1998

The Data Protection Act 1998 tells you how

to deal with all aspects of peoples Personal

Data.

We will now look at the key aspects of this.

33

Records Management / Classification

To support compliance with Code of Practice the Council has intro-

duced a new policy requiring the labelling of all electronic and paper

documents into the following classifications:

CONTROLLED

This information is generally available to anyone within areas of the Council

and contains business value to the organisation or requires protection due

to personal data

RESTRICTED

Unauthorised disclosure of this information (even within the organisation)

would cause serious damage in terms of financial loss, legal action or loss

of reputation

PUBLIC

This is information that is freely available to anyone, e.g. information that is

provided in flyers, leaflets, press releases, or the Council website and does

not require any access restrictions

Page 9: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

32

Why do we need to adhere to the Code?

Freedom of information is only as good as the records/information it

provides access to:

• Access rights are of limited value if the information cannot be

found, or, when found, cannot be relied upon as being

authoritative

• By adhering to the Code of Practice the Council will give

some assurance that the information it holds is complete and

reliable

• Failure to comply with the practice outlined in the Code can

result in the Information Commissioner issuing a practice

recommendation, or an information notice. Failure to act on

both of these can result in the Council being found in contempt

of court

• It can affect the Authority’s reputation if we get it wrong.

9

The Data Protection Act 1998

The Data Protection Act 1998 is underpinned by a set of eight

straightforward, common-sense principles and establishes a framework of

rights and duties which are designed to safeguard personal data.

The framework balances the legitimate needs of organisations to collect

and use personal data for business and other purposes against the right of

individuals for their personal data to be treated with respect and privacy.

If you make sure you handle personal data in line with the spirit of these

principles, this will go a long way towards ensuring that you comply with the

letter of the law.

Page 10: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

10

The Data Protection Act 1998

What is Personal Data?

Personal data means data which relates to a living

individual who can be identified from that information or

other information in the possession of the organisation

or likely to be in the future.

A Data Subject is the person to whom the data relates.

31

What does the Code of Practice say?

As a Local Authority we should:-

• Ensure that records are stored

securely and that access to them is

controlled

• Define how long they need to keep

particular records, should dispose of

them when they are no longer needed,

and should be able to explain why

records are no longer held

• Please refer to the Council’s Retention

and Disposal Policy for further

information*

• Ensure that records shared with other

bodies or held on their behalf by other

bodies are managed in accordance with the

code

The Council is rolling out an Electronic Document and Records

Management system to improve our compliance with this requirement.

Contact your EDRM representative for further details.*

Page 11: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

30

What does the Code of Practice say?

The Code of Practice states:

• All staff have a legal and professional obligation in respect of

any records which they create or use in the performance of

their duties

• By records it means files, minutes, policies, procedures,

e mails, letters, videos, pictures, web content etc.

• Any record created as a consequence of providing Council

services, is an official record and subject to information

requests (FOI, EIR and Subject Access)

11

Types of Personal Information

What types of Personal

Information are there?

Personal - Anything that focuses on or has the potential to impact

on an individual, e.g., name, date of birth, home address.

Sensitive - Ethnicity, medical history, sexual orientation,

criminality, trade union membership, religion.

For further guidance speak to your Departmental Data Protection

contact.

Page 12: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

12

The 8 Data Protection Principles are:

1. Personal data shall be processed fairly and lawfully. There

are specific conditions in the Act that must be followed before

personal data and sensitive personal data can be processed

2. Personal data shall be obtained only for one or more

specified and lawful purposes and shall not be further processed

in any manner incompatible with that purpose or those purposes

3. Personal data shall be adequate, relevant and not excessive

in relation to the purpose or those purposes

4. Personal data shall be accurate and where necessary, kept

up to date

5. Personal data processed for any purpose or purposes shall

not be kept for longer than is necessary for that purpose or

those purposes

6. Personal data shall be processed in accordance with the

rights of data subjects under this Act

7. Appropriate technical and organisational measures shall be

taken against unauthorised or unlawful processing of personal

data and against accidental loss or destruction of, or damage to

it

8. Personal data shall not be transferred to a country or

territory outside the European Economic Area unless that

country or territory ensures an adequate level of protection for

the rights and freedoms of data subjects in relation to the

processing of personal data

The Data Protection Act 1998

29

Records Management

Records Management is important. It is

a key piece of the Information Govern-

ance jigsaw!

Section 46: Records Management Code of

Practice

• Freedom of Information allows public

access to all recorded information

held by public authorities

• As part of FOI the Lord Chancellor

issued a code of practice on Records

Management

• The Code of Practice outlines the

practice that the Council should

conform to so that it is able to

respond to FOI requests

Page 13: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

28

Freedom of Information

Key principles in answering requests for

information:

• Make sure that everyone knows who is

responsible for dealing with FOI requests

and where to send them

• Don’t leave FOI requests on your desk

or on your PC, forward them on to your

departmental contact without delay, 20

work days can pass very quickly

• Practice good records management to

ensure information can be quickly

identified and retrieved. Check your

records retention schedule to establish

whether we still hold the information at all

• Remember that an FOI request must be

dealt with as soon as possible, but

certainly within 20 days of receipt

13

Subject Access Requests

What is a subject access

request?

A Subject Access Request under The Data Protection Act 1998 is a

request to access personal data held by an organisation that relates to

a person.

The request can be made by the person themselves or someone with

the authority to represent them.

You must respond to a Subject Access Request promptly and in any

event within 40 calendar days of receiving it.

Some types of personal data are exempt from the right of subject

access and so cannot be obtained by making a subject access

request. An example would be data concerning an investigation of the

data subject.

Page 14: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

14

Safeguarding and the Data

Protection Act 1998

Am I ok to share personal

information relating to a

Safeguarding issue?

If you are sharing personal information relating to a Safeguarding

issue, the safety of the individuals concerned should be your first

priority. As long as you can justify your decision to share information

under these circumstances and record it, you will not be in breach of

the Act.

Safeguarding means the protection from maltreatment, preventing

impairment of health or development, proving an environment of safe

and effective care and promoting the best outcomes for children and

vulnerable adults.

If you are involved in Safeguarding of children or vulnerable adults

please ensure you are aware of the Information Sharing Guidance

from Derbyshire Children’s Safeguarding Board.

27

Freedom of Information

Sometimes when applying an

exemption it is necessary to consider

the public interest in the information

being requested. However, “what the

public are interested in” and “what is

in the public interest” are not

necessarily the same thing.

Newspapers for example can contain

stories that the public may find

interesting, however, not all the

information that is disclosed is

something the ‘public need to know’

in the wider public interest.

Apart from exemptions a request can

be refused if the cost exceeds the

Fees Regulations limit (equivalent to

18 hours) or if the request is

vexatious or repeated.

Page 15: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

26

Freedom of Information

The FOI Act provides a right of access to information. Information

should therefore be released wherever possible.

There are recognised “exemptions” in the FOI Act, for example:

• Commercial interests

• Information intended for future

publication

• Personal Data

• Information reasonably accessible

to the applicant by other means

(e.g. it is already published on the

Derbyshire Website)

However, it would clearly not be appropriate for all information to be

made public.

15

The Information Commissioner’s Office

The information Commissioner’s Office (ICO) is the UK’s independent

authority set up to promote access to official information and to protect

personal information.

You will now learn how it achieves these aims.

Page 16: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

16

The Information Commissioner’s Office

The ICO’s mission is to uphold information rights in the public interest,

promoting openness by public bodies and data privacy for individuals.

The ICO can prosecute those who commit criminal offences under the

Act.

Offences include:

• Unlawfully obtaining or disclosing personal data or

information

• Arranging the disclosure of personal data to

someone else

• Selling personal data which was unlawfully obtained

Action that can be taken by the

Information Commissioner’s Office

The Information Commissioner’s Office can:

• Issue monetary penalty notices, requiring

organisations to pay up to £500,000 for serious

breaches of the Data Protection Act

• Prosecute those who commit criminal offences

under the Act

• Report to Parliament on data protection issues of

concern

• Provide information and advice for individuals and

organisations. Much of this can be found on the

Information Commissioners Office website

25

Freedom of Information

• A Freedom of Information request must be made in

writing (an EIR request need not).

• The requester must supply a name and a postal or

email address for the Authority to reply to.

• FOI requests can be made by members of the

public, the media (television, radio, newspapers),

MPs, Charities etc.

• FOI requests can be made by anyone anywhere in

the world.

• The Council is required to reply to a request as soon

as possible within 20 working days

Page 17: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

24

Freedom of Information

All recorded information held by, or on behalf of, a public authority is

within the scope of the Act. However, disclosure of personal data is

subject to the Data Protection Act. The legislation applies to any

recorded information held by the Council.

It covers files, letters, databases, loose reports and letters, e-mails,

office notebooks, videos, photographs, wall charts and maps etc.

It extends to closed files and archived material as well as information in

current use. It also extends to social media such as SMS texts,

Facebook, Twitter etc. if it relates to DCC business.

Where information relates to the environment this is covered by the

Environment Information Regulations 2004 (EIR) which has broadly

similar provisions.

17

ICO – Financial Penalties

Apart from offences by individuals, the ICO has issued penalties for a

variety of data breaches by organisations:

Scottish Borders Council - whose former employees’ pension

records were found in an over -filled paper recycle bank in a supermarket

car park - fined £250,000 for the data breach

NHS Surrey after leaving 3,000 patient records on a computer

subsequently sold online - fined £200,000.

Greater Manchester Police after the theft of a memory stick

containing sensitive personal data from an officer’s home - fined £150,000

for the data breach.

Aberdeen City Council after publishing sensitive material online,

including details relating to the care of vulnerable children fined £100,000.

London Borough of Lewisham after a social worker left sensitive

documents in a plastic shopping bag on a train taking them home to work

on - fined £70,000 for the data breach.

Since 2010 the Information Commissioner has handed out penalties

totalling over £3 million to over 28 public sector organisations for breaking

one or more of the 8 Data Protection principles. In particular relating to

Information Security.

Page 18: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

18

Ways of Avoiding Security Breaches

How can I stop security breaches and

keep this Data Demon away?

Think of ways you could stop security breaches and note them down here:

23

Freedom of Information

Since 1st January 2005 all requests for information

received by a public authority have had to be answered in

accordance with the Freedom of Information Act 2000.

You must be familiar with the basics of the act as any

employee may receive a request.

The access legislation is primarily about a culture change

from “need to know” to “right to know”.

For public authorities it represents a balance between:

• Greater openness and transparency of decision

making

• The need to protect information where disclosure

would cause harm or otherwise be contrary to the

public interest

Page 19: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

22

Confidentiality

Please be aware if you access or disclose any confidential data, which

includes all personal data, held by the Council. Without appropriate

authorisation you could face both internal disciplinary action and criminal

proceedings under the Data Protection and Computer Misuse acts.

Confidentiality is wider than just personal data.

19

Recent Security Breaches

Examples of recent security breaches include:

• Unshredded confidential waste left in corridors

for collection

• Visitors not being signed in entering a building

• Personal data being sent to the wrong recipient

either via post or e-mail

• Personal data being lost i.e. from a stolen

laptop, memory stick or briefcase (never leave

items on display in a parked car)

• Personal data left on a shared printer….last few

pages of confidential document left on printer

after it had run out of paper

Page 20: Information Governance Non Caldicott Version Workbook...• %ne &ay you can reduce the ris' of co((i)ng a data breach is to ensure that you have read, understood and co(ply &ith the

20

Information Security Breaches

You have a responsibility to ensure that personal data is held securely and

that confidentiality is respected and safeguarded.

If you discover or commit an information security breach you should report

it immediately to your line manager and ensure it is recorded on the online

incident report form.

You will find the information Security Breach Reporting Tool on DNET.*

Using the reporting tool will support the identification of any weaknesses in

our systems and working practices. The more examples that are recorded,

the more it will help us to plan and implement preventative measures.

21

Inappropriate Use of Internet and Email

You are required to abide by the council’s E mail and Internet Acceptable

Use Policy.

The use of social media is also covered by the Council policy and all

employees are required to abide by the policy.

However if you do accidentally access inappropriate material on the web,

inform your line manager and complete the report Accidental Misuse of E

mail or Internet Form.*

@