Document name: Acceptable Use of Communications Technology Policy and Guidelines Document type: Policy Staff group to whom it applies: All staff within the Trust Distribution: The whole of the Trust How to access: Intranet Issue date: December 2012 Next review: December 2014 Approved by: Executive Management Team Developed by: Deputy Director of Information Director leads: Director of Finance Contact for advice: Deputy Director of Information Portfolio Manager – IT Infrastructure Acceptable Use of Communications Technology Policy Page 1 of 44 1. INTRODUCTION 4 2. PURPOSE AND SCOPE OF THE DOCUMENT 4 3. DEFINITIONS 3.1 Communication Technology 3.2 Data Protection 3.3 Infrastructure 5 5 5 5 4. DUTIES AND RESPONSIBILITIES 4.1 Trust Responsibilities 4.2 SIRO Responsibilities 4.3 Line Manager Responsibilities 4.4 Staff Responsibilities 4.5 The Health Informatics Service / BHNFT ICT Service 4.6 Legal Responsibilities 6 6 6 6 6 7 7 5. PRINCIPLES 5.1 Security and Confidentiality 5.2 Use of Communications Technology 5.3 Inappropriate Use of Communications Technology 5.4 Security of Communications Facilities 5.5 Monitoring of Communications by the Trust 5.6 Data Protection 5.7 Use of Social Media 5.8 E-Mail Archiving 5.9 Encryption 8 8 8 9 11 12 12 13 14 15 6. EQUALITY IMPACT ASSESSMENT 15 7. DISEMINATION AND IMPLEMENTATION 15 8. PROCESS FOR MONITORING COMPLIANCE AND EFFECTIVENESS 16 9. REVIEW AND REVISION ARRANGEMENTS (including archiving) 16 10. REFERENCES 16 11. ASSOCIATED DOCUMENTS 17 Appendices A Equality Impact Assessment Tool 18 B Checklist for the Review and Approval of Procedural Document 21 C Version Control 24 D Impact of Implementation 25 Acceptable Use of Communications Technology Policy Page 2 of 44 E Monitoring Patient System, Internet or E-Mail Use as part of an investigation 26 E1 Accessing E-Mail when a member of staff is absent 29 G Guidelines in Support of the Acceptable Use of Communications Technology Policy 31 Acceptable Use of Communications Technology Policy Page 3 of 44 Acceptable Use of Communications Technology Policy 1 Introduction 1.1 This document defines the Acceptable Use of Communications Technology Policy for South West Yorkshire Partnership NHS Foundation Trust (referred to hereafter as the Trust). The Acceptable Use of Communications Technology Policy applies to all staff, non-executive directors, contracted third parties (including agency staff), students/trainees, people on secondment and other staff on placement with the Trust, and staff of partner organisations with approved access to the Trust’s communications facilities. For clarity throughout the rest of the document they will simply be referred to as ‘staff’. It has been produced in conjunction with representatives of other NHS Trusts on the Community Of Interest Network (COIN). 1.2 The Trust IT Infrastructure is currently supported via a service level agreement with The Health Informatics Service (The HIS) and Barnsley Hospitals NHS Foundation Trust (BHNFT) Information and Communications Technology (ICT) Service 1.3 This policy replaces the existing policies as follows, E-Mail Policy, Encryption Policy, Internet Policy and it is an alignment of the Acceptable Use of Communications Technology Policy from NHS Barnsley. 1.4 2 The Trust’s communications facilities are available to users for the purposes of it’s business. A degree of limited and responsible personal use by users is also permitted. All use of the Trust’s communications facilities is governed by the terms of this policy and accompanying procedure documents. Purpose/Scope of this Policy 2.1 This document has been developed to explain and set out the Trust communications technology policy and define the boundaries of its use. This is in order that staff can maximize the efficient use of electronic communications and understand the limits of its use. 2.2 Where there is wilful or negligent disregard of this policy it may be investigated and dealt with under the Trust Disciplinary Procedure. 2.3 This policy applies to all information media, systems, networks, portable electronic devices, telephones, applications, locations and Users within the Trust. 2.4 This policy covers usage of communication technology by staff using Trust equipment but also their responsibilities for the use of communications technology in their own time and using their own equipment. Acceptable Use of Communications Technology Policy Page 4 of 44 3. Definitions 3.1 Communication Technology The term covers the use of the following items: Personal computers (PC’s) Laptops Tablets Smartphones (such as Blackberry’s, iPhones, HTC phones) Mobile phones Telephones Removable storage devices (such as memory/pen/USB sticks, CDs/DVDs and removable hard drives) Network facilities Fax machines, Copiers Scanners Note that some elements of personal use of the Trust communications facilities are specifically addressed in section 5.2.2. 3.2 Data Protection Data protection exists to preserve the privacy of individuals, clients and staff alike, and is governed by the Data Protection Act 1998. The Act defines, among others, terms as follows: o data means information which is computerised or in a structured hard copy form o ‘personal data’ is data which can identify an individual, such as a name, a job title, a photograph o ‘processing’ is anything done with the data – just holding data amounts to processing; o ‘data controller’ is the person who controls the purposes and manner of processing of personal data – this role will be within the SWYPFT Trust in the case of personal data processed for business purposes. 3.3 Infrastructure - Computers, systems, networks, cabling and other devices which make up the estate of information management in the Trust. Acceptable Use of Communications Technology Policy Page 5 of 44 4. Duties 4.1 Trust responsibilities 4.1.1 Recognising the importance of protecting the Trust, its Staff and service users/Patients from Information related risks. 4.1.2 Appointing a Senior Information Risk Owner (SIRO) at Board or Senior level within the organisation 4.2 SIRO responsibilities 4.2.1 The review of this policy and the development of related procedure and guidance documents. Also to update in the light of changes to relevant legislation as appropriate. 4.2.2 Policy enforcement – That appropriate audit tools are in place and updated in order to investigate breaches of this policy. Monitor e-mail and internet usage if there are security, confidentiality or disciplinary concerns. 4.2.3 Reporting - In the event of an investigation that arrangements are in place to ensure specific reports will be obtained from internet access logs or e-mail monitoring enabled for sufficient time to establish whether a breach of policy has occurred. This will be undertaken in accordance with the Trust’s Disciplinary policy and procedure. 4.3 Line Manager Responsibilities 4.3.1 Ensuring staff adequately understand where to ask for assistance with understanding this policy. 4.3.2 Allow and support staff to attend and complete annual Information Governance Training 4.4 Staff responsibilities 4.4.1 All staff are responsible for ensuring that they understand and comply with this policy, seeking help and advice where necessary. Staff must use the Trust’s information technology and communications facilities in accordance with this policy and be familiar with the Trust’s Information Management and Technology (IM&T) Security policy and associated procedures, particularly regarding the risks associated with portable electronic devices (laptops/USB etc.,). 4.4.2 All staff are required to undertake Annual Information Governance Training 4.4.3 Ensure any unacceptable use of communication technology incidents that occur are logged via the Datix Incident recording system, grading the incident in accordance with the Trust’s Risk Grading Matrix, with support from their line manager. Acceptable Use of Communications Technology Policy Page 6 of 44 4.4.4 Contact the Service desk to report any faulty communications technology equipment. For West Yorkshire this is tHIS Service Desk 0845 127 2600, in South Yorkshire this is 01226 436090. 4.5 The Health Informatics Service / BHNFT ICT Service 4.5.1 The deployment of encryption software on all Trust devices within the scope of this policy. 4.5.2 Managing configuration changes to the encryption infrastructure. 4.5.3 Providing training and Support related to the technology specified within the scope of this policy. 4.6 Legal Responsibilities 4.6.1 Where relevant, The Trust will comply with: Copyright, Designs & Patents Act 1988 Access to Health Records Act 1990 Computer Misuse Act 1990 The Data Protection Act 1998 The Human Rights Act 1998 Electronic Communications Act 2000 Regulation of Investigatory Powers Act 2000 Freedom of Information Act 2000 Health & Social Care Act 2008 4.6.2. The Trust will comply with other relevant laws and legislation as appropriate. Acceptable Use of Communications Technology Policy Page 7 of 44 5. Principles 5.1 Security and Confidentiality All information relating to the Trust’s service users/patients and staff and that which is considered business sensitive is by definition confidential, both in paper and electronic form. Staff must treat the Trust’s paper-based and electronic information alike with utmost care, in accordance with the Confidentiality policy. http://nww.swyt.nhs.uk/docs/Documents/804.pdf 5.2 Use of Communications Technology 5.2.1 Business use The Trust’s e-mail, internet and telephone facilities exist primarily for business purposes. The Trust derives significant benefits through staff having access to e-mail, internet and telephone facilities. 5.2.2 Personal use It is accepted that staff may occasionally need to use the facilities for personal purposes. This is permitted on condition that all the principles and rules set out in this policy and accompanying guidelines are complied with. Staff need to be aware, however, that if they choose to make use of the Trust’s facilities for personal use, they cannot expect total privacy because the Trust may need to monitor communications for the reasons given in section 5.5. Staff will greatly increase the privacy of any personal e-mail by observing the guideline’s in Appendix G. Staff must ensure that personal e-mail, internet and telephone use: is minimal and limited to taking place substantially outside of normal working hours (i.e. during lunch breaks or before or after normal hours of work); does not interfere with the performance of Trust duties; does not take priority over their Trust work responsibilities; does not cause unwarranted expense or liability to be incurred by the Trust; is not otherwise inappropriate as described in section 5.3 does not have a negative impact on the Trust; is lawful and complies with this policy. 5.2.3 E-mails as records All e-mail messages are subject to Data Protection Freedom of Information (FoI) legislation and may be requested evidence in court. In this respect they can be evidenced for subject access purposes under the Data Protection Act where Acceptable Use of Communications Technology Policy Page 8 of 44 they relate to named or identifiable individuals, or for more general disclosure under FoI. Staff should therefore exercise extreme care in the management of e-mails and observe standard document retention limits where an e-mail is to be maintained as a record. Detailed explanation of the management of non clinical records is found in the Non-clinical records management policy: found at http://nww.swyt.nhs.uk/docs/Documents/816.pdf. Personal e-mails must be stored in a folder marked ‘personal’, in order to maintain their privacy from routine monitoring. The Trust reserves the right to open and review the contents of any mailbox hosted by the organisation except where email is stored in a folder marked ‘personal’. Further explanation of this is in Appendix G. 5.3 Inappropriate Use Of Communications Technology 5.3.1 Confidential information about the Trust, any of its staff or service users/patients, outside the context of normal Trust business, and particularly Person-Identifiable Details (PID) which can name or otherwise uniquely identify an individual must not: be shared with anyone unless the PID is essential to providing services or to the context of the communication; be shared via e-mail without the appropriate level of protection or encryption (such as NHS Mail or encryption) to render it unreadable by anyone other than the recipient; be copied to removable media such as laptops or memory sticks, or CDs/DVDs unless encrypted. Just because it is possible to share PID or confidential material does not mean that it should be shared. The principles of the Data Protection Act, the Caldicott review of patient-identifiable information and the Safe Haven Policy must be adhered to at all times. http://nww.swyt.nhs.uk/docs/Documents/645.doc It is recognised that services where central registrations of patients onto electronic systems are carried out; e-mails containing PID are sent using the internal e-mail system, to support the registration process. This will be phased out and will no longer be allowed after services transfer off IPM and TCS. 5.3.2 The Trust reserves the right to prevent all staff from accessing some internet sites which could reduce the performance of the Trust’s information systems, could damage the reputation of the Trust, or to protect staff from harmful content. This also applies to all personal use from Trust premises. It has been determined that staff will be prevented from accessing sites which have been categorised as: Gambling adult content games anonymisers (Including software designed to cover usage) bombs gambling Acceptable Use of Communications Technology Policy Page 9 of 44 glamour hackers malware models p2p (Peer to Peer file sharing) servers phishing pornography racism sects spyware violence Sites categorised as social media such as Facebook, Twitter and Linked In are currently blocked by the Trust’s Communication Technology network. This will be kept under review. The Trust reserves the right to block access to any website or category of websites for the maintenance of computer network confidentiality, integrity or availability. The Trust reserves the right to block access to telephone services on the grounds of cost or where accessing material is classified as inappropriate in this policy. 5.3.2 Misuse or abuse of the Trust’s fixed and mobile telephones, e-mail, blogs (see accompanying guidance Appendix G, message boards or the internet/intranet in breach of this policy will be managed in accordance with the Trust’s disciplinary procedure. It should be noted that misuse could lead to dismissal under the disciplinary procedure. In particular inappropriate use by viewing, accessing, transmitting, posting, downloading or uploading or otherwise perpetuating any of the following is classed as misuse: material which is discriminatory, offensive, criminal, derogatory or may cause embarrassment to the Trust or any of its staff or its clients; pornographic material; a false and/or defamatory statement about any person or organisation; any other statement which is likely to create any liability, whether criminal or civil, and whether for the Trust or the member(s) of staff concerned; illegal, fraudulent or malicious activities of any kind; political or religious lobbying, or activities on behalf of organisations having no connection with the Trust; ( viewing political or religious sites is classed as personal use) where the purpose is for personal, or commercial financial gain, such as the use of chain letters, solicitations of business or services. Note that personal items Acceptable Use of Communications Technology Policy Page 10 of 44 for sale are permitted through the Intranet; unauthorised fund-raising or similar activities, whether for commercial, personal or charitable purposes. Note that requests for charitable donation are permitted through the fundraising requests facility on the Intranet; purporting to be another person (through the use of an account, their credentials or identity) without their explicit written permission, and only then where the law or circumstances would allow; attempting to circumvent or defeat security or auditing systems without prior authority and other than as part of legitimate system testing or security research; 5.3.3 The Trust recognise that electronic media can be used as a means of harassing or bullying others. The Trust regards harassment as totally unacceptable and the following is taken from the Trust’s Bullying and Harassment policy to reinforce this. Harassment is ‘unwanted conduct related to a relevant protected characteristic, which has the purpose or effect of violating an individual’s dignity or creating an intimidating, hostile, degrading, humiliating or offensive environment for that individual’ Bullying may be characterised as offensive, intimidating, malicious or insulting behaviour, an abuse or misuse of power through means intended to undermine, humiliate, denigrate or injure the recipient.' Source: ACAS Guide for Managers and Employers on Harassment and Bullying at Work. Oct 2010 5.3.4 To avoid doubt, the Trust operates a firm ‘zero tolerance’ stance in respect of ‘adult’ content including images, cartoons or text, etc., which may be deemed by staff to be otherwise inoffensive away from the Trust. This may be judged by a ‘public notice board’ test – i.e. if the content of any web page or e-mail would be unsuitable for posting on a public notice board, or on the front page of the local newspaper. 5.3.5 The Trust acknowledges, however, that access to subjects and web sites of a potentially contentious nature may be appropriate in some areas of normal operation and/or in specific circumstances, e.g. sex education, youth advice, counselling on gambling, approved research, etc. The Trust therefore places a special responsibility of care on staff operating in such areas to ensure that such access is necessary and that other users, staff and members of the community are not exposed to any such material without good cause. Application for such individual exemption must be made in advance of any work done in connection with the research via line management to the Service Desk. 5.4 Security Of Communications Facilities Acceptable Use of Communications Technology Policy Page 11 of 44 5.4.1 The security of the Trust’s communications facilities and systems is of paramount importance. The Trust owes a duty to all of its clients and business partners to ensure that all business transactions are kept confidential. If at any time the Trust needs to rely in court on any information which has been stored or processed using IM&T systems it is essential that it is able to demonstrate the integrity of those systems. 5.4.2 All the Trust’s information systems (where technically possible) log the actions of users. This information can be used to audit valid and appropriate access. Each time staff use the Trust’s systems they assume responsibility for the security implications of what they are doing. 5.4.3 Staff should keep all confidential information secure, use it only for the purposes intended (on a need-to-know basis) and not disclose it to any unauthorised third party. As per the Confidentiality Policy http://nww.swyt.nhs.uk/docs/Documents/804.pdf 5.5 Monitoring Of Communications By The Trust 5.5.1 The Trust is ultimately responsible for all business communications, including the elements of personal use but will, so far as is possible and appropriate, respect staff’s privacy and autonomy. The Trust may monitor and audit everyday business communications for reasons described in section 5.5.2. This will be done by nominated IM&T staff (or external agency as appropriate) under the specific instruction of the Deputy Director of Information Technology or their deputy. 5.5.2 The Trust will monitor telephone, e-mail and internet traffic. Data collected, will include: sender, receiver, subject; attachments to e-mail; numbers called and duration of calls; domain names of web sites visited and duration of visits, and files downloaded from the internet This is necessary because it is not always obviously evident what constitutes business traffic, and what is for non-business use. This is carried out for the following reasons: providing evidence of business transactions; ensuring that the Trust’s business procedures, policies and contracts with staff are adhered to; monitoring standards of service; preventing or detecting unauthorised use of the Trust’s communication systems or criminal activities including fraud; maintaining the effective operation of the Trust’s communications systems. 5.5.3 Where monitoring shows potential misuse by individuals this will be passed to line managers. 5.5.4 Any fraudulent activities uncovered by monitoring of communications facilities will be dealt with through the Trust’s Fraud Policy. Acceptable Use of Communications Technology Policy Page 12 of 44 5.5.5 Use of monitoring as part of an investigation is explained in Appendix E, Monitoring Patient System, Internet or E-Mail Use as part of an investigation. 5.6 Data Protection Staff will, through the use of the Trust’s communications facilities, inevitably be involved in processing personal data for the Trust as part of their role and as a result are bound by the provisions of the Data Protection Act 1998. 5.7 Private use of Social Media 5.7.1 When using Social Networking sites, Instant Messaging tools and/or Blogging sites, Trust employees have a responsibility to refrain from any action which brings them, their work colleagues, the Trust or the NHS into disrepute. The following list is not exhaustive, but gives some examples of the minimum standard of behaviour required. Trust employees will not maintain a site, update a status or a page, or engage in instant messaging that: contains personally identifiable information of Trust patients, (including their relatives, visitors or carers). contains judgments in relation to the Trust, their role or performance that. could reasonably be considered to be derogatory, defamatory or would bring the Trust into disrepute. contains personally identifiable information of another Trust employee in relation to their employment, including judgements of their performance and character. contains any information (for example images, references and/or comments) which breach patient/staff confidentiality. contains defamatory statements about the Trust, their services or contractors. contains any information (for example images, references and/or comments which could be seen to bully or intimidate colleagues contains any information (for example images, references and/or comments) which could be seen as sexually explicit or inappropriate seeks to pursue personal relationships with patients or service users in your care or against professional codes of conduct (outside of those normally expected by professional codes of conduct)., even if they are no longer in your care. If you receive a friendship request from a current or former patient, Facebook and other sites allow you to ignore this request without the person being informed, avoiding the need to give unnecessary offence. Acceptable Use of Communications Technology Policy Page 13 of 44 expresses opinions that purport to represent the views of the Trust unless this is an accepted normal part of their job, or through special arrangements that have been approved in advance. expresses opinions that purport to represent their own views on the Trust. contains information (for example images, references and/or comments) that could reasonably be considered as inaccurate, libellous, defamatory, cause harassment, threatening, may otherwise be illegal or would bring the Trust image into disrepute. depicts employees in their work uniform in any image that could be reasonably considered as derogatory, defamatory, or would bring the Trust image into disrepute. depicts employees in their work situation in any image that could be reasonably considered as derogatory, defamatory, or would bring the Trust into disrepute. depicts any information or activities that could reasonably be considered to be derogatory, defamatory or would bring the Trust into disrepute. depicts any information which breaches patient/staff/Trust confidentiality. depicts Trust patients while they are a patient at the Trust (including their relatives, visitors or carers). contains Trust logos (except with express permission from the Trust Communications Department). 5.7.2 Staff as identified in section 1.1 are advised not to divulge who their employers are within their personal profile page on social media sites (eg. in accordance with RCN guidelines, “RCN Legal Advice on using the internet” http://www.rcn.org.uk/__data/assets/pdf_file/0016/281230/003564.pdf , However, those that do divulge their employer should state that they are tweeting/blogging etc. in a personal capacity. 5.7.3 Further guidance on the use of social media in Appendix G. 5.8 Email archiving 5.8.1 Email mailbox size restrictions may mean that staff wish to archive and keep important emails. The Trust email archiving product is called CommVault and where installed will automatically archive user emails. 5.8.2 Where CommVault is not installed, staff may use a ‘PST’ file system whereby emails are moved to an archive PST file stored on a network folder. This archive should not be stored on a local PC hard disk as it may inadvertently contain important or confidential emails which could be disclosed if a computer is lost or stolen. Acceptable Use of Communications Technology Policy Page 14 of 44 5.8.3 Staff should bear in mind that as a result of a freedom of information act request, they may be required to provide copies of emails from their inbox or archive relating to a subject request. 5.8.4 Staff archiving their e-mail should refer to Appendix G 5.8.5 Computer users should contact the IT Service Desk to discuss email archiving where a query arises. 5.9 Encryption To comply with national mandatory requirements the Trust has adopted the following strategies to be used when holding, processing or transferring person identifiable data (PID) or business sensitive information; 5.9.1 All Trust owned laptops must be fully encrypted and must not be used to store PID or business sensitive information. 5.9.2 Only encrypted and Trust approved USB sticks may be used to store electronic data and must not be used to store PID or business sensitive information. 5.9.3 Personal USB media must not be used to save data from the Trust network – this will be enforced by technical configuration. 5.9.4 Trust budget holders should assess if there is a legitimate business need for the use of USB encrypted drives before purchasing (see Appendix G). 5.9.5 DVD/CD and floppy disks shall be read-only unless a valid business need is identified. 5.9.6 DVD/CD and floppy disks used to transfer PID under an arrangement approved by the IG TAG should be encrypted. 5.9.7 Users’ privately owned mobile computing equipment or related devices must not be connected to the Trust network. 6 Equality Impact Assessment Included as Appendix A 7 Dissemination and Implementation This policy once approved will be notified to staff via the weekly Comms update e-mail and will be placed on the Trust intranet document store. Business Delivery units (BDUs) will be responsible for more detailed briefings to appropriate staff with support from the IM&T Department. A Frequently Asked Questions sheet has been developed and will be available on the Intranet, it will continue to grow as more questions are asked. Advice to staff about information governance will be issued via the weekly update in the form of policy updates or reminders. Where necessary leaflets Acceptable Use of Communications Technology Policy Page 15 of 44 attached to payslips and other communications methods will be used. These will be approved by the Trust communications team. Communications with service users are covered in the information sharing, confidentiality and Data Protection policy. http://nww.swyt.nhs.uk/docs/SitePages/A-Z.aspx Implementation plan is at Appendix D 8 Process for Monitoring Compliance and Effectiveness The following arrangements are in place to monitor compliance and effectiveness: 8.1 Performance reporting arrangements to Trust Board, EMT and BDUs 8.2 Internal Audits 8.3 Compliance and effectiveness of the Corporate Induction Programme 8.4 NHS Information Governance Toolkit yearly self assessment 8.5 IT Security Reports to Information Governance Trustwide Action Group. 8.6 Information governance questionnaire will be employed periodically to assess staff awareness and understanding of information security. 8.8 Information Governance E-Learning (Including information security) will be reported in the Mandatory training report to Executive Management Team (EMT) and senior managers. 9. Review and Revision arrangements (including Archiving) 9.1 This policy has been developed in consultation with the IG TAG 9.2 Will be available on the intranet in read only format. 9.3 A central electronic read only version will be kept by the Integrated Governance Manager in a designated shared folder to which all Executive Management Team members and their administrative staff have access. 9.4 A central paper copy will be retained in the corporate library 9.5 This policy will be retained in accordance with requirements for retention of nonclinical records. 10. References 10.1 This policy has been developed with reference to the Information Governance Toolkit and the example policies provided in it. 10.2 The following documents have also been used in the development of this policy: Acceptable Use of Communications Technology Policy Page 16 of 44 Health and Care Professions Council – Social Media Guidance: Focus on standards – social networking sites British Medical Association - Using social media: practical and ethical guidance for doctors and medical students Nursing and Midwifery Council: - Practical advice for students, nurses and midwives using social networking sites Department of Health: - Guidance: Blogging and social networking RCN guidelines, “RCN Legal Advice on using the internet” http://www.rcn.org.uk/__data/assets/pdf_file/0016/281230/003564.pdf 11 Associated documents This document has been developed in line with guidance issued by the NHS Litigation Authority and with reference to model documents used in other trusts. It should be read in conjunction with: Disciplinary Policy Information Governance Policy Information sharing, confidentiality and data protection policy Information risk management policy Safe Haven Policy Information Security Policy Network Security Acceptable Use of Communications Technology Policy Policy Page 17 of 44 Appendix A Equality Impact Assessment Template for policies, procedures and strategies Date of Assessment: September 2012 Equality Impact Evidence based Answers & Actions: Assessment Questions: 1 2 Name of the policy that you are Equality Impact Assessing Describe the overall aim of your policy and context? Acceptable Use of Communications Technology policy Policy to ensure that best practice is followed by members of staff when accessing, processing or transmitting/transporting information Who will benefit from this policy? 3 Who is the overall lead for this assessment? Deputy Director of Information 4 Who else was involved in conducting this assessment? Assistant Director of Information IG TAG 5 Have you involved and consulted service users, carers, and staff in developing this policy? Staff Representatives and Human Resources What did you find out and how have you used this information? 6 What equality data have you used to inform this equality impact assessment? 7 N/A N/A What does this data say? Acceptable Use of Communications Technology Policy Page 18 of 44 8 Taking into account the information gathered above. Does this policy affect any of the following equality groups unfavourably: Where Negative impact has been identified please explain what action you will take to remove or mitigate this impact. If no action is to be taken please explain your reasoning. YES NO 9a Race NO 9b Disability NO 9c Gender NO 9d Age NO 9e Sexual Orientation NO 9f Religion or Belief NO 9g Transgender NO 9h Carers NO 10 What monitoring arrangements are you implementing or already have in place to ensure that this policy: promotes equality of opportunity who share the above protected characteristics eliminates discrimination, harassment and bullying for people who share the above protected characteristics promotes good relations between different equality No impact expected. No impact expected. No impact expected. No impact expected. No impact expected. No impact expected. No impact expected. No impact expected. This policy aims to standardise the approach to the Use of Communications technology across the Trust. Acceptable Use of Communications Technology Policy Page 19 of 44 groups, 11 Have you developed an Action Plan arising from this assessment? Who will approve this assessment? N/A Executive Management Team 12 Once approved, please forward a copy of this assessment to the Equality & Inclusion Team: inclusion@swyt.nhs.uk If you have identified a potential discriminatory impact of this policy, please refer it to the Director of Corporate Development or Head of Involvement and Inclusion together with any suggestions as to the action required to avoid/reduce this impact. For advice in respect of answering the above questions, please contact the Director of Corporate Development or Head of Involvement and Inclusion. Acceptable Use of Communications Technology Policy Page 20 of 44 Appendix B Checklist for the Review and Approval of Procedural Document Title of document being reviewed: 1 . 2 . 4 . 5 . Comments Title Is the title clear and unambiguous? YES Is it clear whether the document is a guideline, policy, protocol or standard? YES Rationale Are reasons for development of the document stated? 3 . Yes/N o/ Unsur e YES Development Process Is the method described in brief? YES Are people involved in the development identified? YES Do you feel a reasonable attempt has been made to ensure relevant expertise has been used? YES Is there evidence of consultation with stakeholders and users? YES Content Is the objective of the document clear? YES Is the target population clear and unambiguous? YES Are the intended outcomes described? YES Are the statements clear and unambiguous? YES Evidence Base Acceptable Use of Communications Technology Policy Page 21 of 44 Title of document being reviewed: 6 . Yes/N o/ Unsur e Is the type of evidence to support the document identified explicitly? YES Are key references cited? YES Are the references cited in full? YES Are supporting documents referenced? YES Comments Approval Does the document identify which committee/group will approve it? YES If appropriate have the joint Human Resources/staff side committee (or equivalent) approved the document? 7 . 8 . 9 . 1 0 Dissemination and Implementation Is there an outline/plan to identify how this will be done? YES Does the plan include the necessary training/support to ensure compliance? YES Document Control Does the document identify where it will be held? YES Have archiving arrangements for superseded documents been addressed? YES Process to Monitor Compliance and Effectiveness Are there measurable standards or KPIs to support the monitoring of compliance with and effectiveness of the document? YES Is there a plan to review or audit compliance with the document? YES Review Date Acceptable Use of Communications Technology Policy Page 22 of 44 Title of document being reviewed: Yes/N o/ Unsur e Comments . 1 1 . Is the review date identified? YES Is the frequency of review identified? If so is it acceptable? YES Overall Responsibility for the Document Is it clear who will be responsible implementation and review of the document? Acceptable Use of Communications Technology Policy YES Page 23 of 44 Appendix C Version Control Sheet Vers ion Date Author Stat us Comment / changes 1 Dec emb er 2011 John Hodson Draft Using template of current Information Security Policy 1.1 Marc h 2012 John Hodson Draft Incorporate Barnsley CSD AUP Policy IG Policy. 2 May John Hodson Draft Update policy format for presentation to HR and Staff side 3 July John Hodson Draft Incorporate HR changes and general update 4 Sept John Hodson Draft Incorporate further HR Changes and IM&T Infrastructure Manager comments 5 Oct 2012 John Hodson Draft Incorporate comments from Employment Polices working group. Final Nov 2012 John Hodson Final For Presentation to EMT. Located U:\Healthrecs\IG\IG Policies\Draft\AUCT Policy\SWYPFT\Acceptable Use Of Communications Technology Policy final.Docx Page 24 of 44 Appendix D Acceptable Use of Communication Technology Policy Impact of Implementation 1 Description of Impact Staff /Dept affected Increase in enquiries on blocked Web sites IM&T Cost implication No 25 Appendix E Monitoring of Patient System, Internet or E-Mail Use, as part of an investigation process. 1.1 As specified in section 5.5.5 the Trust may wish to utilise the monitoring information collected by the Trusts Communication Technology systems as part of an investigation. The process for this is outlined below. Investigations should be completed following the appropriate procedure (e.g. the Trust’s Disciplinary Procedure, investigations under the Serious Untoward Incident .Process etc.,) Staff should be informed where an investigation is taking place about them. In certain very limited circumstances the Trust may, subject to compliance with any legal requirements, access e-mail marked “Personal”. Examples are when there is reasonable suspicion that they may reveal evidence of unlawful activity, including instances where there may be a breach of a contract with the trust. This would be authorised by a senior Manager from the Human Resources department. The key features and steps for accessing Internet or e-mail use where part of a disciplinary investigation are: a) A line manager requires access to a member of staff’s e-mail or Internet usage; If the line manager is a ‘Senior Manager’,(badn 8b and above) the line manager will contact HR and agree to e-mail the Portfolio Manager – IM&T infrastructure, with the request, how long it is for and confirmation that they have authorised this; a) If the line manager is not a Senior Manager call HR, to find the name of a Senior Manager who can authorise their request and undertake step b) above; b) The Portfolio Manager – IM&T infrastructure will check that the email is from someone who is a Senior Managers and will log a job with the service desk once assured that everything is correct. c) An investigation log will be kept the Portfolio Manager – IM&T infrastructure in e-mail. 1.2ForPatient Systems Where the investigation requires patient systems to be accessed: a) The IG Officer will liaise with the system manager and line manager to reduce the scope of the usage report based on other 26 than legitimate access; b) If required, the IG Officer will ask for IM&T assistance to look up patients and the services they have accessed. c) On completion the system manager will contact the line manager and investigating officer as appropriate to arrange to hand over and explain the report and findings; For E-Mail a) Form will be completed as per Appendix E1; For Internet Usage a) The internet usage will be provided by the ICT service in an agreed and workable format; b) The Portfolio Manager – IM&T infrastructure will contact the line Manager to discuss handover and arrange a meeting if required to explain the report and the details provided. Record of the Investigation a) Details of the request to the service desk and associated actions will be logged; 1.2 Conduct of member of staff accessing e-mail. The following rules must be observed: a) Only individual e-mails covered by the agreed purpose must be accessed (for example if the access is required to find if a particular document has been delivered then only the Inbox should be accessed); b) Any e-mails which are stored in a ‘Personal’ mailbox folder and which are marked “Personal” in the subject heading must not be accessed. Unless the procedure in 1.3 is followed. 1.3 Accessing Staff personal correspondence If an investigation requires access to e-mails that staff have copied to their Personal folder this requires a higher level of authorisation. Managers requiring access to a personal folder must take the following steps: a) Request permission to access personal correspondence from a senior manager in HR, specifying a reason for the request; b) Ensure written authorisation from a senior manager in HR is included in the Investigation file; 27 c) Follow the procedure at 1.2 to log the request for access 28 Appendix E1 CONFIDENTIAL Accessing E-Mail when a member of staff is absent South West Yorkshire Partnership NHS Foundation Trust. Request for access to a member of staff’s email account where permission has not, or cannot be obtained from that member of staff I request that the Service Desk of The Health Informatics Service grant access to the following member of staff’s email account: Name of person to access account ………………………………….. Job Title: ………………………………………….... Location: ………………………...………………… Name of member of staffs account to be accessed ………………………………..…… Job Title: ………………………………………….... Location: ………………………...………………… - The member of staff named above, is on unplanned absence, left organisation Please give reason i.e. Sickness, Left NHS Wakefield District etc* - I believe that the member of staff has been using the email system contrary to South West Yorkshire Partnership NHS Foundation Trust Email Policy.* - An appropriate Out of Office message must be placed on the account, when applicable.* - An Auto forward rule must be placed on the account.* * Delete as appropriate. 29 Name of Senior manager who authorised the request ………………………………..…… Job Title: ………………………………………….... Date: ………………………...………………… Signed ……………………………………………. Date………………………………………………... Name……………………………………………….. Position…………………………………………….. Director / Head of Service Please send a completed copy of this form to: The Health Informatics Service Oak House Brighouse HD6 4AB Tel: 0845 127 2600, ext 2600 Fax: 01422 222168 Email: theservicedesk@this.nhs.uk 30 Appendix G Guidelines in Support of the Acceptable Use of Communications Technology Policy PAGE 1. INTRODUCTION 29 2. PURPOSE 29 3. DEFINITIONS 29 4. PRINCIPLES 29 4.1 Communication Technology 29 4.2 Use of Electronic Mail 30 4.3 Use of Internet and Connect 33 4.4 Inappropriate use of communications technology 33 4.5 Security of communications facilities 34 4.6 Personal blogs, websites and social media 35 4.7 Monitoring of communications by the Trust 36 4.8 Data protection 38 4.9 Using NHSmail (@nhs.net) to send confidential or patient identifiable emails 38 4.10 Encryption 39 4.11 Pornography 41 31 1. INTRODUCTION The guidance applies to all employees of the Trust, non-executive directors, contracted third parties (including agency staff), students/trainees, people on secondment and other staff on placement with the Trust, and staff of partner organisations with approved access. Reference throughout the rest of the document will simply be to ‘staff’. 2. PURPOSE The purpose of this guidance is to enhance and further explain aspects of the Acceptable Use of Communications Technology Policy. 3. PRINCIPLES 3.1 Communication Technology The internet and e-mail are now the primary means of communicating within the NHS. It should be noted that, for example, Department of Health policy and guidance is only disseminated in this way. It is essential, therefore, that staff establish local systems and procedures that recognise this. The Trust will use these facilities to the full (but within available resources and technology) in communicating and cascading information throughout the organisation. Staff are encouraged to familiarise themselves with the facilities and to make use of the Trust’s own Intranet (http://nww.swyt.nhs.uk/ – which will be set as the default web page for all staff at each log-on). The advantage of the internet and e-mail is that they are extremely easy and informal ways of accessing and disseminating information, but this means that it is also easy to send out ill-considered statements. Messages sent on e-mail systems or over the internet should display the same professionalism that would apply when writing a letter or a fax. Staff must not use these media to do or say anything which would be subject to disciplinary or legal action in any other context such as sending, accessing or receiving any discriminatory (on the grounds of a person's sex, race, age, sexual orientation, religion, disability, gender reassignment, marriage or civil partnership, pregnancy, maternity or belief), defamatory or other unlawful material. If in any doubt, staff should seek advice from a manager or contact the Service Desk. Many aspects of communication are protected by intellectual property rights which are infringed by copying. Downloading, uploading, posting, copying, possessing, processing and distributing material from the internet may be an infringement of copyright or of other intellectual property rights. Particular care must be taken when using e-mail or internet message boards as a means of communication because all expressions of fact, intention and opinion in an e-mail may bind the individual and/or the Trust and can be produced in court in the same way as other kinds of written statements. 32 3.2 Use of Electronic Mail 3.2.1 General The Trust considers email as an important means of communication and recognises the importance of proper email content and speedy replies in conveying a professional image and delivering good customer service. Therefore the Trust advises staff to adhere to the following guidelines: Write well-structured emails; Include your name, job title and Trust name; Include an email subject which summarises the content of the email; Use the spell checker before you send out an email; Do not print emails unless you really need to for work purposes. Emails can be saved, if you need to keep them; If you need a reply to your email by a particular date let the recipient know this; If you forward mails, state clearly what action you expect the recipient to take; Only mark emails as important if they really are important; Ensure you send your email only to people who need to see it. Sending emails to all in your address book can unnecessarily block the system; Emails should be treated like any other correspondence and should be answered as quickly as possible; When on leave activate an ‘Out of Office’ message stating when you will return and an alternative contact; Delete any email messages that you do not need to keep a copy of and maintain your mailbox within its allowed limits. Make use of the Outlook archiving feature where possible, with respect to emails you need to retain (5.8 E-Mail Archiving) When utilising the Outlook archiving feature, ensure that patient identifiable and sensitive staff identifiable information is not stored within the .pst file (5.8 E-Mail Archiving) If you have a large document to distribute consider whether this could be made available via a shared drive or by inserting a link; Retaining attachments to emails can take up large amounts of space. If attachments need to be retained it is advisable to save these to a network drive which is located on a file server and is backed up by The Health Informatics Service. Remember that emails can be requested under the Freedom of Information Act. Store any emails containing information likely to be requested e.g. spending of public money/development of services, in a separate folder to allow easy, efficient retrieval. Staff should not amend any messages received, and except where specifically authorised by the other person should not access any other person’s inbox or other e-mail folders nor send any e-mail purporting to come from another person. 33 A disclaimer will be automatically attached to all outgoing e-mail. Staff should not create their own ‘version’ as part of an e-mail ‘footer’. This is designed to limit the Trusts potential liability with regard to the content of the e-mail. Disclaimer ‘Unless expressly stated otherwise, the information contained in this email is confidential and is intended only for the named recipient(s). If you are not the intended recipient you must not copy, distribute, or take any action or reliance upon it. If you have received this e-mail in error, please notify the sender. Any unauthorised disclosure of the information contained in this e-mail is strictly prohibited. This email and any attachments should not be disclosed to third parties under Data Protection or Freedom of Information legislation without first seeking the permission of the sender’ To re-iterate policy section 4.3.1.1.1 Person-Identifiable Details (PID) which can name or otherwise uniquely identify an individual should not be sent externally using e-mail, without the appropriate level of protection or encryption to render it unreadable by anyone other than the recipient. Staff should be aware that this does not extend to non-NHS organisations, such as council networks (e.g. Social Services departments) or voluntary bodies, unless an information sharing agreement and protocols are in place for the secure exchange of information. Again, if staff are unsure they should always seek advice from a manager or via the IS Help Desk. 3.2.2 Business use Each business e-mail should include an appropriate Trust business reference. If the e-mail message or attachment contains information which is timecritical, staff should bear in mind that an e-mail is not necessarily an instant communication (it may encounter network delays, or simply not be picked up immediately by the recipient) and consider therefore whether it is the most appropriate means of communication. In the light of potential security risks inherent in some web-based e-mail accounts (such as ‘hotmail’), staff must not e-mail business documents or those containing PID to personal web-based accounts. Non sensitive documents may be sent to a web-based account, if in doubt ask your line manager. However, under no circumstances should staff send confidential documents or those containing PID to a personal web-based e-mail account, even if asked to do so. E-mail is capable of forming or varying a contract in just the same way as a written letter. Staff should therefore take due care when drafting an e-mail to ensure that the content cannot be construed as forming or varying a contract when this is not the intention. Contact the Service 34 Desk for advice and guidance. 3.2.3 Personal use All personal e-mail must be marked “Personal” in the subject heading, and all personal e-mail sent or received must be filed in a folder marked "Personal" in a user’s mailbox. Staff should contact the Service Desk for guidance on how to set up and use a personal folder. Otherwise all email contained in a user’s inbox or subsidiary folders and sent items folder are deemed to be business communications for the purposes of monitoring (see policy section 5.5). Staff can delete personal e-mail from the live system, but it will have been copied (perhaps many times) onto the sequence of backup. By making personal use of the Trust’s facilities for sending and receiving e-mail staff signify their agreement to abide by the conditions imposed for their use, and signify their consent to the Trust’s monitoring personal e-mail in accordance with section 5.5 of the policy. 3.2.4 Staff are advised to use separate e-mail systems such as hotmail or Gmail for personal e-mail. This will negate the requirement to set up special folders for personal e-mail. E-mails as records E-mails can and do constitute a formal record of a discussion, communication or decision on a matter. In managing e-mails staff should therefore identify those that should be retained as a record. 3.3 Use of Internet and the Intranet Staff are trusted to use the internet responsibly and should bear in mind at all times that, when visiting an internet site, information identifying their PC may be logged. Therefore any activity engaged in via the internet may affect the Trust. Whenever a web site is accessed, staff should always comply with the terms and conditions governing its use. Staff are strongly discouraged from providing their Trust e-mail address when using public web sites for non-business purposes, such as on-line shopping. This must be kept to a minimum and done only where unavoidable, as it could result in the receipt of substantial amounts of unwanted and unnecessary (spam) e-mail. Goods should not be ordered for delivery to Trust premises unless agreed with line manager. Access to certain web sites may be blocked during normal working hours. If you have a particular business need to access such sites, please contact the Service Desk. 35 3.4 Inappropriate use of communications technology Unacceptable use for both business and personal purposes is determined in any of three ways: Through line management supervision, where it is found that use of e-mail or the internet is not acceptable in the context of the performance of the member of staff’s duties Through a ‘public notice board’ test – i.e. if the content of any web page or e-mail would be unsuitable for posting on a public notice board Through the auditing of logs of access and use held by the IM&T Services or Facilities departments, where such use could result in a threat to the efficient, safe, legal operation of the communications infrastructure in line with Trust policies and procedures Staff who find themselves in receipt of an offensive e-mail or who unintentionally connect to an internet site containing offensive or inappropriate material should contact the Service Desk to seek advice and record the incident. Staff must not: use any images, text or material which are copyright-protected, other than in accordance with the terms of the license under which downloading was permitted; introduce software; seek to gain access to restricted areas of the Trust’s network; access or try to access data which is known or could reasonably be expected to be known to be confidential; introduce any form of computer virus. carry out any hacking activities Attempt to obtain access to a password protected system using the password of another member of staff obtained without their express permission. Staff members should not routinely share any computer passwords. Access a computer workstation or application which has been left ‘logged on’ by another member of staff. network ‘packet-sniffing’ or password-detecting Staff should be aware that any of the actions of section 3.4 above would 36 not only contravene the terms of this policy but may also amount to the commission of an offence under the Computer Misuse Act 1990, which creates the following offences: Unauthorised access to computer material i.e. hacking; Unauthorised modification of computer material; Unauthorised access with intent to commit or facilitate the commission of further offences. Where there is evidence of actual or suspected misuse of facilities in breach of this policy the Trust may undertake a more detailed investigation in accordance with its disciplinary procedures, which could lead to curtailment or withdrawal of such facilities and could result in disciplinary action. The procedure for launching investigations is outlined in Appendix E. 3.5 Security of communications facilities The Trust’s systems or equipment must not be used in any way which may cause damage or overloading, or which may affect their performance or that of the internal or external network. Staff should keep system passwords safe, and not disclose them to anyone. Those who have a legitimate reason to access other users' email folders must be given permission from that other user. The Service Help Desk will provide guidance on how to do this. Whenever there is a requirement to load onto a PC material from outside the Trust’s staff must be sure that it is from a secure and safe source. If in doubt staff should contact the Service Desk. No device, equipment or software should be attached to or installed on the Trust’s systems without the prior approval of the IM&T department. This includes any removable storage device (including, but not exclusively, memory sticks), MP3 player or similar device, PDA or telephone. Attachment means to a USB port, infra-red connection port or any network connection point that would support and interface to such a device. The Trust routinely monitors all e-mails passing through its system for viruses. Staff should exercise caution when opening e-mails from unknown external sources or where, for any reason, an e-mail appears suspicious. The Service Desk should be informed immediately if a suspicious communication or suspected virus is received. 3.6 Personal blogs, websites and social media This section specifically covers the use of social media sites, blogs and personal web sites and content. Web logs allow users (usually once 37 registered) to pos’ messages, respond to other postings, and generally keep a thread active on a common theme or specific subject. It is a common tool employed by many web sites to engage with their audience. Likewise, it has become much easier for individuals to create their own web sites and also to maintain a web presence through such web sites as Twitter, YouTube and Facebook. Such content will be covered by the term blog throughout the rest of this section. In their own private time (and using personal IT equipment) staff may wish to create, update, or otherwise contribute to websites, blogs, and message boards or other on-line forums as an individual. For the avoidance of doubt such activities (the above not being an exhaustive list) are classed as personal use. When a member of staff posts any content to the internet - written, vocal or visual - which identifies them as a member of the Trust and/or discusses their work or anything related to the Trust or its business, clients or staff, The Trust expects that individual to act in ways which are consistent with their contract of employment and within the Trust’s policies and procedures. It should be noted that simply revealing their name could be sufficient to identify them as a Trust employee. If staff already have a personal blog or website or intend to create one which indicates in any way that they work for the Trust it should be reported to their manager who will record this in their personal file. Staff should ensure that any content is consistent with their terms and conditions of their employment. If a blog posting clearly identifies that the member of staff works for the Trust and expresses any idea or opinion then a disclaimer, such as "these are my own personal views and not those of the Trust”, should be added or the material removed. Staff should be aware that comments on social media, even those limited to “friends”, are regarded by the courts as being public comments, as “friends” can repeat the comments referenced back to the member of staff. If staff think that something on their blog or website could give rise to a conflict of interest and in particular concerns issues of impartiality or confidentiality required by their role then this must be discussed with their manager. If staff are contacted by someone from the media or press about posts on their blog or website that relate to the Trust they should talk to their manager and the Trust’s communication team must be consulted before responding. Staff are advised: to keep personal and professional social networking as separate as possible. 38 Whether or not you identify your work role online, be aware that all your activity online can reflect on your professional life to protect their own privacy. Think through what kinds of information you want share and with whom, and adjust your privacy settings. On Facebook and other sites, you can adjust your privacy settings at group level to share different levels of information with different kinds of friends. Remember that the more your personal life is exposed through social networking sites, the more likely it is that this could have a negative impact. to remember that everything you post online is public, even with the strictest privacy settings. Once something is online, it can be copied and redistributed, and it is easy to lose control of it. Presume that everything you post online will be permanent and will be shared. If as part of your job you are required to use social media (such as Facebook or Twitter as part of work, it is advised that you set up a separate account from your personal account. 3.7 Monitoring of communications by the Trust In terms of maintaining personal privacy, staff need to be aware that such monitoring might reveal sensitive personal data about them. For example, if they regularly visit web sites which detail the activities of a particular political party or religious group, then those visits might indicate their political opinions or religious beliefs. By carrying out such activities using the Trust’s facilities staff consent to the processing of sensitive personal data about them which may be revealed by such monitoring. Sometimes it is necessary for the Trust to access staff business communications during their absence, such as when away due to illness or on holiday. Unless mailbox and network folder settings have already been enabled such that the individuals who need to do this already have permission to view appropriate files and folders, access will be granted only with the permission of their line manager or HR senior manager. Staff will be made aware of this on their return to work. As per Appendix E1. It is up to individual staff to prevent the inadvertent disclosure of the content of personal e-mail by filing it in accordance with this policy. In particular, staff are responsible to anybody outside the Trust who sends to them, or receives from them, a personal e-mail, for the consequences of any breach of their privacy which may be caused by a failure or inability to file personal e-mail appropriately. All incoming e-mail is scanned on behalf of the Trust, using viruschecking software. The software may also block unsolicited marketing e-mail (spam) and e-mails which have potentially inappropriate 39 attachments. The Trust has the facility to listen in on telephone calls made using its communication facilities. This would be authorised in the same manner as described in section 4.7.5 but carried out by the Facilities team. 3.8 Data protection Staff should be aware that whenever and wherever they are processing personal data on behalf of the Trust it must be kept confidential and secure, and particular care should be taken not to disclose them to any other person (whether inside or outside the Trust) unless authorised to do so for the purposes of their job. If in doubt help should be sought from a line manager or the Information Governance team. The Data Protection Act gives an individual the right to see all the information which any data controller holds about them. This should be borne in mind when recording personal opinions about someone, whether in an e-mail or otherwise. It is another reason why personal remarks and opinions must be made or given responsibly, be relevant and appropriate, as well as accurate and justifiable. Section 55 of the Act makes it a criminal offence to obtain or disclose personal data without the consent of the data controller. ‘Obtaining’ here includes the gathering of personal data by employees at work without the authorisation of the employer. Staff may be committing this offence if without the authority of the Trust they exceed their authority in collecting personal data, access personal data held by the Trust, or pass them on to someone else (whether inside or outside the Trust). Whilst the Trust is data controller for all personal data processed for the purposes of its business, individual staff will be data controller for all personal data processed in any personal e-mail which they send or receive. Use for social, recreational or domestic purposes attracts a wide exemption under the Act, but if in breach of this policy, staff are using the Trust’s communications facilities for the purpose of a business which is not the Trust’s business, then they will assume extensive personal liability under the Act. 3.9 Using NHSmail (@nhs.net) to send confidential or patient identifiable emails The NHSmail email system can be used to send confidential emails or emails containing patient identifiable information under certain circumstances. The system can be accessed via the website http://www.nhs.net NHSmail accounts are available to all staff members and new accounts can be created via this website. The following guidelines MUST be followed if you are considering using this system to send confidential or patient 40 identifiable email: 1. Notify the Portfolio Manager - Information Governance and Health Records so that your data flow can be documented formally. 2. The recipient of your email MUST have an email address which ends in one of the following suffixes: • • • • • • • • • nhs.net gcsx.gov.uk gse.gov.uk gsi.gov.uk gsiup.co.uk gsx.gov.uk pnn.gov.uk pnn.police.uk cjsm.net For example, the recipient address might be joe.bloggs@nhs.net or joe.bloggs@gcsx.gov.uk 3. Ensure that if you are receiving confidential or patient identifiable emails into your NHSmail inbox that the sender uses an NHSmail account or an account where the associated email address ends in one of the suffixes listed. 4. Ensure that you regularly check the contents of your NHSmail account. 5. If you are a manager, ensure that your staff members have appropriate access to NHSmail accounts to ensure the confidential transfer of identifiable data. If you have any queries or concerns about this process, please contact the Portfolio Manager – IM&T Infrastructure or the Portfolio Manager Information Governance and Health Records 3.10 Encryption Encryption Guidelines The following represents a sample of potential risk areas that may affect Trust information assets. Encryption will be used to mitigate any risks to the Trust’s Information assets. Although encryption can be used to protect this data, it is important that it is not used to the detriment of other more relevant controls, policies and good practices. Prior to the transfer of any person identifiable data, full consideration must be given to the business need for the transfer, and to assess if 41 there is any opportunity to anonymise or pseudonomise the data. Trust Workstations Potentially it is recognised that all workstations are subject to an element of risk from being stolen or accessed remotely without permission. However encryption also has some impact on performance so it is not appropriate in all circumstances. Office based Trust workstations should be encrypted by default where they are considered vulnerable. The majority of workstations are protected by a secure network logon, network file servers are made available to Users for the secure storage of data and information and physical access restrictions are in place in most locations. In the following circumstances, PC workstations must be encrypted: All Workstations in open or unrestricted areas that are used to edit PID. Any Workstation that may be used to store PID locally because an exception has been agreed and formalised through the Information Governance TAG i.e. because it is in a location with poor network coverage. Any Trust workstation that may be used to edit PID. Any workstation considered at risk due to its vulnerability to 3rd party access or theft. Trust Laptops Due to their mobility, laptops represent a much larger risk to allowing unauthorised access to business sensitive information and personal identifiable data. Laptops are easily lost and stolen and so data stored locally is at much more risk. All data on Trust laptops should be encrypted. It is the responsibility of the user to ensure that their laptop has been encrypted, if in doubt you should contact the Service Desk who manage and control encryption software across the Trust. Business sensitive information and PID should not be stored on a laptop hard drive. Any data removed from the Trusts secure internal network is potentially at risk and should not be removed, transported or transferred onto a laptop unless there is an authorised business need, formally approved by the Information Governance TAG. This includes all confidential information stored on a laptop, email archives or individual documents. If you need any guidance, need to store PID on a laptop temporarily or require specific information on storing and transporting confidential data you should contact the Portfolio Manager – IM&T Infrastructure, the Portfolio Manager – Information Governance and Health Records or The Service Desk. 42 Mobile Devices Many mobile devices such as USB Memory Sticks, portable hard disks, smart phones and PDAs have the potential to store large amounts of data. As such they represent a significant risk to the security of information if used inappropriately. It is the users responsibility to ensure that the device is encrypted and that no PID is transferred onto the device. Specific Guidance for the following mobile devices follows; Portable Hard Drives – Prohibited on the Trust Network PDAs (Personal Digital Assistants) – Must be encrypted and are prohibited for PID data storage. USB Memory Sticks – Must be encrypted and authorised by a Trust Budget holder. The use of personal memory sticks to save data from the Trust network is not permitted. A secure password must be assigned to an encrypted USB memory stick by the user to enable encryption Smartphones, i-Pods or Media Players – no data should be transferred from Trust network onto these devices. Other Removable Media – the copying of data is discouraged on to DVDs, CDs or floppy disks. PID and business sensitive information should not be copied onto this media without encryption. Any exceptions must be risk assessed and approved by The Information Governance TAG. Applications and Electronic Transmission If Person Identifiable Data is transferred through electronic means, then this data must be encrypted to the level required by the NHS Approved Cryptographic Standards. This is applicable whenever data is transferred by any electronic means outside the perimeter of the secure Trust internal network or a secure virtual private network (VPN). This requirement is applicable for Trust related transmissions or when using Third Party Suppliers to provide applications or services. Other Electronic Transport – Uploading PID/Business sensitive information by other electronic methods such as technical transport protocols should not be used without consulting the Portfolio Manager – IM&T Infrastructure or the Portfolio Manager – Information Governance and Health Records. . 3.11 Pornography What is pornography? Pornography can take many forms. For example, textual descriptions, still and moving images, cartoons and sound files. Some pornography is illegal in the UK and some is 43 legal. Pornography that is legal in the UK may be considered illegal elsewhere. Because of the global nature of Internet these issues must be taken into consideration. Therefore, the Trust defines pornography as the description or depiction of sexual acts or naked people that are designed to be sexually exciting. The Trust will not tolerate its facilities being used for this type of material and considers such behave Indecent Images of Children – Guidance for Managers It is a criminal act under Section 1 of the Protection of Children’s Act 1978 for any person to make and distribute indecent images of children. These are arrestable offences. Upon receipt of any information concerning this kind of activity, the department head should notify the Police (Child and Public Protection Unit) immediately. No downloading or distribution of any images should be completed, either internally or externally within the organisation, as this may leave the individuals responsible open to criminal investigation. The computer should be left and not used by anyone, allowing this to be seized as evidence for forensic examination by the Police. The details of all persons having access to the computer should be made available to allow clear evidence trail to be established. What you must not do Create, download or transmit (other than for properly authorised and lawful research) pornography. Send or forward webmails with attachments containing pornography. If you receive a webmail with an attachment containing pornography you should report it to the (IM&T) Security Officer or your supervisor. What are the consequences of not following this policy? Users and/or the Trust can be prosecuted or held liable for transmitting or downloading pornographic material, in the UK and elsewhere. The reputation of the Trust will be seriously questioned if its systems have been used to access or transmit pornographic material and this becomes publicly known. Users found to be in possession of pornographic material, or to have transmitted pornographic material, will be dealt with under the Trust Disciplinary Procedure. 44