IGT Policy Bundle Optical Practice [Insert practice name] IG Lead [Insert name of IG Lead] Policy Bundle Date [Insert Date of Policy implementation] Policy Review Date [Insert Date of Policy review] Contents Please note: Clicking on the requirement number will jump to that requirement. Page 4 Requirement 114 Description Work plan & IG Lead 5 115 IG Policy 7 116 Contract Clauses 8 117 Staff training 9 209 Offshore transfers 11 212 Patient consent 14 213 Patient awareness 15 214 Confidentiality and data protection assurance 19 304 Information security assurance 20 316 Asset register 21 317 Physical security 22 318 Mobile Computing 24 319 Business data continuity 27 320 Incident reporting 30 321 Information security assurance 32 322 Information security assurance 2 Introduction This document contains all of the relevant policies for compliance with IGT Level 2. Completion of the policies will enable you to list the Optical Confederation bundle as the evidence for all levels. This document can then be printed and retained on file as evidence. It should be read in conjunction with: I. Introduction to the NHS Information Governance Requirements for Optical practices. This document provides a detailed description and guidance on each of the requirements and is intended for contractors and companies. II. Information Governance Training Booklet for Optical Practice Staff This document is intended as a training tool for optical practice staff to meet the requirements of the IG Toolkit. 3 Document name: Date created: Author: Approved by: [Insert Company Name]: Information Governance Work Plan Requirement 114: Information Governance Work Plan Requirement Baseline rating Work to be undertaken to meet Level 2 114 (IG Lead) 115 (IG Policy) 116 (Contract Clauses) 117 (Staff Training) 209 (Offshore transfers) 212 (Patient Consent) 213 (Patient Awareness) 214 (Confidentiality and Data Protection assurance) 304 (Information Security Assurance) 316 (Asset Register) 317 (Physical Security) 318 (Mobile Computing) 319 (Business Continuity) 320 (Incident Reporting) 321 (Information Security Assurance) 322 (Information Security Assurance) 4 Staff member responsible for Task Target date for completion of task Document name: Date created: Author: Approved by: [Insert Company Name]: Information Governance Policy Requirement 115: Information Governance Policy 1. Purpose of Policy This policy sets out the procedures and management accountability and structures that have been put in place within the Optical practice to safeguard the movement of personal data in the Optical practice. 2. Underpinning Procedures The following procedures have been put in place to support the confidential handling of information within the Optical practice and the sharing of this information with other organisations: Staff Confidentiality Code of Conduct (sets out the standards expected of staff in maintaining the confidentiality of patient information); Staff Access Control and Password management SOP (sets out procedures for the management of access to computer-based information systems); Data Transfer SOP (sets out procedures around the secure transfer of data, collecting consent and maintaining confidentiality within the Optical practice including the use of safe havens); Incident management SOP (sets out the procedures for responding to a security breach); Business Continuity SOP (sets out the procedures in the event of system failure); Portable Device Staff Guidelines (provides guidance for staff use on the use of portable devices). 3. Staff Duties and Responsibilities All staff, whether permanent, temporary or contracted are responsible for ensuring that they remain aware of the requirements incumbent upon them for ensuring compliance on a day to day basis. These includes maintaining confidentiality of data, ensuring secure storage of data and being aware of situations where disclosure may be required or may not be required. 5 4. Accountability and Responsibility for this Policy The designated Information Governance Lead in the Optical practice is responsible for overseeing day to day Information Governance issues; developing and maintaining policies, standards, procedures and guidance, coordinating Information Governance in the Optical practice, raising awareness of Information Governance and ensuring that there is ongoing compliance with the policy and its supporting standards and guidelines. The Optical practice contractor (owner) is responsible for ensuring that sufficient resources are available to support the implementation of Information Governance procedures in order to ensure compliance with legal and professional requirements and the NHS Information Governance requirements. 4. Monitoring this Policy This policy will be reviewed at least annually. 5. Sanctions Breach of this policy could lead to disciplinary action. Depending on the circumstances this could range from remedial training to dismissal. 6 Document name: Date created: Author: Approved by: [Insert Company Name]: Confidentiality code of conduct Requirement 116: Confidentiality code of conduct Staff members listed below have the example contract clause either added to their contract of employment or have signed a separate confidentiality clause. Staff Member Access to Patient Records & Data Confidentiality Clause signed Staff Confidentiality Agreement 1. I agree not to disclose, either during or after the termination of my employment, to anyone other than in the proper course of my employment any information of a confidential nature. 2. I understand that breach of this agreement may lead to dismissal without notice and may result in prosecution or an action for civil damages under the Data Protection Act 1998. 3. I agree to abide by the standards set out in the staff confidentiality code of conduct. 4. I have read, understand and agree to the terms and conditions set out above. 7 Document name: Date created: Author: Approved by: [Insert Company Name]: Staff training log Requirement 117: Staff training log The following people from this Optical practice have seen the following documentation and guidance, have undertaken relevant training and confirm here their understanding of the responsibilities they carry for the proper handling of confidential patient information. Documentation and Guidance IG Policy Confidentiality Code of Conduct (which include guidelines for collecting patient consent) Data Transfer SOP Portable Devices Guidelines (for staff with portable devices) Information Governance Incident Management SOP Optical practice Information Governance Leaflet Terms and Conditions for the issue of Smartcards - Form RA01 o Even those without a Smartcard should be aware of the permissible uses o of a Smartcard and the security requirements around its issue and use. Access Control and Password Management SOP Business Continuity Training Optical Confederation Training Booklet for Optical practice Staff [NB: The IG Training Booklet for Optical practice staff includes a staff signature list on the back cover which could alternatively be used to record completion of staff training] Staff Member Signature 8 Date Document name: Date created: Author: Approved by: [Insert Company Name]: Offshore transfers (209) Requirement 209: Offshore transfers Requirements Organisations are responsible for the security and confidentiality of personal information they process. Processing may include the transfer of that information to countries outside of the UK, and where person identifiable information is transferred, organisations must comply with both the Data Protection Act 1998 and the Department of Health guidelines. Department of Health Guidelines Organisations must also comply with the following guidelines issued by the Department of Health: 1. Person identifiable information must not be transferred outside of the UK unless appropriate assessment of risk has been undertaken (see paragraph 10) and mitigating controls put in place. 2. The organisation should review the flows of person identifiable information identified for requirement 308 or requirement 322, dependent on organisation-type, to understand whether information transferred to external organisations flows outside of the UK. 3. Information about overseas transfers of information must be included within the organisation’s Data Protection notification to the Information Commissioner and should ideally be included within the organisation’s Information Governance policy or equivalent document. 4. Decisions on whether to transfer person identifiable information must only be taken by a senior manager or senior care professional that has been authorised to take that decision. 5. Organisations will need to obtain an assurance statement from third parties that process the personal data of their service users or staff overseas. This assurance may be within the contract between the two organisations or within other terms of processing. 9 Data Protection Act Principles 1. Whilst compliance with the eighth Principle is crucial, organisations must also consider all the other Data Protection Principles before making an overseas transfer of person identifiable data. 2. Of particular importance is the first Principle, which in most cases will require that individuals are properly informed about the transfer of their information to a country outside the UK. Determining Whether the Requirement can be marked ‘Not Relevant’ 1. Organisations acting purely as a data processor on behalf of a data controller should only be processing personal data in accordance with their contractual agreement with the data controller. Therefore, it is the data controller who is responsible for assessing their organisation against this requirement. Data processors must still comply with the other Data Protection principles. 2. Those organisations which act as data controllers, joint data controllers or data controllers in common must assess themselves against this requirement and ensure any overseas transfers of information are notified to the Information Commissioner. 3. Where an organisation has determined that it makes no transfers of personal information to non-UK countries this should be documented for audit purposes and the 'not relevant' attainment level option should be selected. 10 Document name: Date created: Author: Approved by: [Insert Company Name]: Offshore transfers (212 & 322) Requirement 212 & (322): Patient Consent & Data Transfer This document outlines the procedures that should be followed where sensitive or person identifiable information is being transferred to or from the optical practice. These procedures are in place to help prevent unauthorised access to information, loss of information, unauthorised disclosure of information or breach of legislation. These procedures apply to all staff working in the optical practice. 1. Maintaining Confidentiality of Data Received (Safe Havens) The term safe haven is a term used to explain either a secure physical location or the agreed set of administrative arrangements that are in place within the optical practice to ensure confidential personal information is communicated safely and securely. Consulting rooms or staff only areas will be considered the optical practice’s ‘safe-haven’ and is the location for patient information to be securely received, for example faxes containing patient sensitive information should be sent to a fax machine in a staff only area. All post for the optical practice should be opened in the in staff only areas or consulting rooms. A. When paper-based information is received it should be stored securely, as soon as practical, for example: (i) (ii) Information moved from the front counter to the staff only area Manual patient records such should be placed in filling cabinets which are lockable when not attended. B. Computers should not be located where their usage can be observed to avoid unauthorised access: (iii) Be careful where you site your computer screen: ensure any confidential information cannot be accidentally or deliberately seen by visitors or staff who do not have authorised access. Be especially careful with computer screens in the consultation area. (iv) Always keep your password confidential and do not write it down. Do not share passwords. (v) Password protected screensavers should be used where possible. (vi) Laptop computers should be locked up when not in use. C. Ensure that confidential conversations are held where they cannot be overhead by members of the public. Ensure that sensitive medical issues are only discussed in the consultation area. 11 2. Only Transferring Data where Appropriate A. The personal information contained in transfers should be limited to those details necessary in order for the recipient to carry out their role. B. Before transferring data, consider whether there are any patient consent requirements that must be met before the transfer is made: A. A record of consent should be maintained where required, either on the relevant form where available (e.g. enhanced services forms etc.) or a record made on the PMS. B. A patient has the right to choose whether or not to agree to the use or disclosure of their personal information and the patient has the right to change their decision about a disclosure before it is made. If the patient indicates refusal to consent, they should be referred to the optometrist or practice manager who can discuss the risks if consent is withheld and consider whether there is a legal requirement for sharing or, if there is no legal requirement, whether it is in the public interest or the vital interests of the patient (or anyone else affected) to disclose information. C. Only staff authorised by the contractor should have responsibility for obtaining consent for non-healthcare purposes, for example research. D. If the patient has detailed questions about consent, they should be referred to the optometrist or practice manager. E. If circumstances change, relevant to the sharing of consent, for example if there is a change of recipient, consent should be reaffirmed. 3. Securely Transferring Data Consideration needs to be given to the mode of transfer and whether any specific controls are required to maintain the confidentiality of the data e.g. encryption on electronic transfers. A. Verbal Communication Be careful about leaving confidential messages on answer-phones (e.g. information about the patient’s eye health). It might not be heard only by the intended recipient. Be careful when taking messages off answer-phones. Ensure that the messages cannot be overheard inappropriately when being played back. When receiving calls requesting personal information: a) verify the identity of the caller, for example, where this is not a known contact, this can be done by taking the relevant phone number, double checking that it is the correct number for that individual / organisation and then calling the recipient back b) ask for the reason for the request, c) if in doubt about whether the information can be disclosed, tell the caller you will call them back, and then consult with your manager. Where information is transferred by phone, or face to face, care should be taken to ensure that personal details are not overheard by other people, including staff who do 12 not have a “need to know”. Where possible, such discussions should take place in private locations and not in public areas, for example staff room. Messages containing confidential / sensitive information should not be left on notice boards that could be accessed by non-authorised staff. B. Post Ensure envelopes are marked “Private & Confidential” Double check the full postal address of the recipient. Carefully consider the method for sending confidential information based on risk of loss. When necessary, ask the recipient to confirm receipt. C. Faxing If faxing personal or confidential information: a) double check the fax number, b) ensure that you mark the fax header “Private & Confidential”. Always identify a named person, not a team, who needs to receive the fax. If faxing personal information to an organisation that doesn’t have a ‘safe haven’ fax machine where information can be received securely, take extra precautions for example, let the recipient know when the fax will be sent, ask them to wait by the fax machine and confirm receipt. Most faxes will allow ‘report’ sheets to be generated which also confirm the transmission was okay. If a particular fax number is going to be used regularly, store the number in the fax machines memory where possible to reduce the risk of typing errors. Don’t send faxes to an organisation outside of their working hours where there is noone present to receive. D. Communication by email Transfer of personal information by email should be avoided other than where both sender and recipient are using an NHSmail account (nhs.net to nhs.net accounts) or the information is sent as an encrypted attachment If identifiable information must be sent other than via NHSmail, it MUST be encrypted to NHS standards The email header should make it clear that the information contains confidential information Other Forms of Information Exchange (e.g. text messages, e-mail, IP phones etc) [Specialist guidance should be inserted for other forms of data transfer in use in the optical practice.] 13 Document name: Date created: Author: Approved by: [Insert Company Name]: Patient leaflet Requirement 213: Patient leaflet An example patient leaflet is available for download from http://www.qualityinoptometry.co.uk/documents/19%20%20IGT%20Leaflet.docx 14 Document name: Date created: Author: Approved by: [Insert Company Name]: Staff confidentiality code Requirement 214: Staff confidentiality code Please note that this document should normally be read and understood prior to the contract of employment or other confidentiality agreement being signed. If there is anything that is not clear please contact your manager. 1. Purpose of Code This code sets out the standards expected of staff in maintaining the confidentiality of patient information. 2. Legal Framework Governing Confidentiality and Staff Responsibility All staff have a personal duty of confidence to patients and to his/her employer. The duty of confidence is conferred by common law, statute, for example the Data Protection Act 1998, contract of employment, and where applicable, professional registration. 3. What is Considered Confidential Information? Personal information is data from which a living individual could be identified; this may include information such as name, age, address, and personal circumstances, as well as sensitive personal information regarding race, health, sexuality, etc. Information is confidential when it is personal information given to someone who has a duty of confidence (the optical practice staff) in the expectation that it will not be disclosed without the consent of the provider of the information. Personal information may be known or stored on any medium. Photographs, videos, etc are subject to the same requirements as information stored in health records, on a computer, or given verbally. 4. Keeping it Confidential: Following Optical Practice Procedures The following procedures have been put in place to support the confidential handling of information and should be followed by all staff: 15 Data Transfer SOP (sets out the procedures around the secure transfer of data, collecting consent and maintaining confidentiality within the optical practice including the use of safe havens); Incident Management SOP (sets out the procedures for responding to a security breach); Business Continuity SOP (sets out the procedures in the event of systems failure); Portable Device Guidelines (provides guidance for staff that use portable devices and removable media); Access Control and Password Management SOP (sets out procedures for the management of access rights to computer-based information systems). All staff need to ensure they are aware of the procedures that are relevant to their role and comply with them. Staff who have been issued with smartcards will need to comply with the smartcard guidelines (Requirement 304). 5. Passwords, smartcards and security All users will be assigned a level of access to the practice management system that is appropriate to their role. Personal passwords should be regarded as confidential and those passwords must not be communicated to anyone or written down. No employee should attempt to bypass or defeat the security systems or attempt to obtain or use passwords or privileges issued to other employees. Any attempts to breach security should be immediately reported to your line manager. 6. Use of Email and Web-based Services Email and internet usage should be restricted to work related issues. 7. Circumstances where Confidential Information can be disclosed The optical practice will inform service users, staff and any other data subject why, how and for what purpose personal information is collected, recorded and processed. This will be achieved by leaflets and information provided face to face in the course of a consultation. Personal information may be disclosed with patient consent where the disclosure is necessary for healthcare purposes and is undertaken by a health professional or a person owing an equivalent duty of confidentiality. Consent may be implied or explicit. 16 Explicit consent of the data subject is required where a disclosure of personal information is not directly concerned with the healthcare / treatment of a service user e.g. medical research, health service management, financial audit, personnel data or where disclosure is to a non-health care professional. Explicit consent may be given in writing or verbally. A basic explanation of what information is to be disclosed and why / what further uses may be made of it, must be provided to the data subject together with a description of the benefits that may result from the proposed sharing of information and any risks if consent is withheld. Personal information may be disclosed without consent in certain circumstances, for example where permitted by law, e.g. where public interest overrides the need to keep the information confidential. All requests for disclosure without the consent of the data subject, including requests from the police, should be referred to the optical practice Information Governance lead. 8. Dealing with Access to Health Records Requests issues Access to Health records requests should be dealt with by the IG Lead. Patients are charged a fee of £10 for Access to Health Records Requests plus any costs for reproducing the records (e.g. photocopying). The requested information must be provided within 40 days. The patient should be asked to provide their name, address, postcode and date of birth to ensure correct identification of the patient’s records. The patient request should be in writing. The patient should be asked to provide identification before the records are shared, for example their passport, full driving license. The patient should be asked to either collect the information in person from the optical practice or consent to the record being posted to them. 9. Offsite/Home Working Arrangements Patient identifiable information must not be removed from the optical practice. 10. Support For assistance with disclosure issues, please contact the Information Governance lead. 11. Abuse of Privilege and Breach of confidentiality It is strictly forbidden for employees to look at information about any patient including any information relating to their own family, friends and acquaintances unless they are directly involved in the patient’s care or with administration on behalf of the optical practice. Action of this kind will be viewed as a breach of confidentiality and may result in disciplinary action. 17 12. Possible Sanctions for breach of confidentiality Breach of this code could lead to disciplinary action. Depending on the circumstances this could range from remedial training to dismissal. Prosecution or an action for civil damages may also be taken under the Data Protection Act 1998. 18 Document name: Date created: Author: Approved by: [Insert Company Name]: Smart cards Requirement 304: Smart cards NA to this optical practice [ ] This document sets out the communication, monitoring and enforcement processes that are in place to ensure that staff members comply with the NHS national application smartcard terms and conditions of use (RA01 terms). Communication When staff received their EPS Release 2 Smartcard, they will have been made aware of the RA01 terms and conditions and their responsibilities regarding Smartcard usage. Over time, the terms and conditions may change and smartcard users will be asked to accept the changes through their computer software. If staff members need access to a current copy of the terms and conditions they can request this from the NHS England Area Team at any time. All staff members that have EPS Release 2 Smartcards are asked to sign a staff signature list to confirm that they have read the terms and conditions and understand their responsibilities regarding Smartcard usage. Annual reminders are issued to staff on the terms and conditions and staff responsibilities. Monitoring Monitoring to ensure that staff understand and are complying with the terms and conditions of smartcard usage is monitored through audit checks every 6 months. The standard optical practice IG audit checklist is used. Enforcement Staff members have been made aware that, where they have been issued with NHS Smartcards, they need to comply with the terms and conditions set down by the NHS for use of these cards. If staff members are found to not be complying, for example if this is identified through audit checks, the optical practice’s standard disciplinary procedures will be followed as outlined in the Staff Confidentiality Code. Depending on the circumstances, sanctions range from remedial training to dismissal. Prosecution or an action for civil damages may also be taken under the Data Protection Act 1998. 19 Document name: Date created: Author: Approved by: [Insert Company Name]: Information asset register Requirement 316: Information asset register Date Id Number Location Date Decommissioned Accessed patient data Note: If the device is no longer used enter the date it ceased to be used in the “date decommissioned” box. Accessed patient data is a yes or no answer. If a computer is used but cannot access patient data enter “no”, if it can access patient data enter “yes”. Examples may include optometrists personal smartphone or laptop. These may be used for other business purposes without being able to access patient data. 20 Document name: Date created: Author: Approved by: [Insert Company Name]: Physical security risk assessment Requirement 317: Physical security risk assessment 1: Are accessible windows protected with locks? Yes/No Risk Level: Action Plan: Red/Amber/Green 2: Are windows closed when the premises are closed? Yes/No Risk Level: Action Plan: Red/Amber/Green 3: Are external doors protected with locks? Yes/No Risk Level: Red/Amber/Green Action Plan: 4: Is there a burglar alarm? Yes/No Risk Level: Red/Amber/Green Action Plan: 5: Are screensavers in use on computers that are used to display information about patients? Yes/No Risk Level: Action Plan: Red/Amber/Green 6: Do computer system users have unique logon details? Yes/No Risk Level: Action Plan: Red/Amber/Green 7: Are laptops and other portable devices stored securely overnight? Yes/No Risk Level: Action Plan: Red/Amber/Green 8: Is back-up data stored securely? Yes/No Risk Level: Red/Amber/Green Action Plan: 9: Is IT equipment asset marked? Yes/No Risk Level: Red/Amber/Green Action Plan: 21 Document name: Date created: Author: Approved by: [Insert Company Name]: Mobile computing guidelines Requirement 318: Mobile computing guidelines NA to this optical practice [ ] N.B: If the optical practice does not use any mobile computing i.e. there are no laptops and smartphones, nor any portable device used to hold or transfer personal information (e.g. USB sticks and CDs/DVDs), ‘Level 2’ can be recorded but the optical practice should indicate that their policy is that they have no mobile computing devices and staff should not use mobile computing devices in their role. This can be recorded in the optical practice contractor IG workbook (Introduction to the NHS Information Governance Requirements for Optical Practices) . This document outlines the guidelines that should be followed by staff when using portable computer devices, mobile phones and removable media. Definitions: Portable Computer Devices – this includes laptops, notebooks, tablet computers, smartphones and mobile phones. Removable Data Storage Media – this includes any physical item that can be used to store and/ or move information and requires another device to access it. For example, CD, DVD, floppy disc, tape, or digital storage devices (flash memory cards, USB disc keys, and portable hard drives). Essentially anything you can copy, save and/or write data to which can then be taken away and restored on another computer. Scope This guidance applies to all optical practice staff including temporary staff. Only authorised staff should have access to portable computer devices and digital storage devices such as flash cards, USB disc keys and portable hard drives. Any member of staff allowing access to any unauthorised person deliberately or inadvertently may be subject to disciplinary action. Staff should not use unauthorised portable devices or digital storage device (such as personal phones) for storing or communicating information. 22 Use of Portable Computer Devices DO … Store portable equipment securely when not in use on site Store portable equipment securely when not in use off site Set up access controls, for example a personal password, where possible Ensure files containing personal or confidential data are adequately protected e.g. encrypted Ensure that smartphones are configured so that they lock after a maximum period of 5 minutes inactivity. Once locked the smartphone should be set to require password authentication to resume use. Install password protected screensavers on laptops Use and regularly update anti-virus software Take regular backups of the data stored on the portable equipment Obtain authorisation prior to the removal of portable equipment from the premises Be aware that software and any data files created by staff on optical practice portable computer devices are the property of the optical practice Report immediately any stolen portable equipment to the police and line manager Be aware that the security of your portable computer device is your responsibility and you should check your home and car insurance policies to ensure they cover for business use Ensure that portable devices are returned to the optical practice if you are leaving employment DO NOT … Use your own portable computer device or digital storage device such as flash cards, USB sticks and portable hard drives) for optical practice business unless authorised Leave portable equipment in places where vulnerable to theft Leave portable equipment visible in the car when travelling between locations Leave portable equipment in an unattended car Leave portable equipment unattended in a public place Install unauthorised software or download software / data from the internet Disable the virus protection software Use portable computer devices outside the optical practice premises without authorisation Allow unauthorised personnel/friends/relatives to use portable equipment in your charge Delay in reporting lost or stolen equipment, Attach unauthorised equipment to the network Remove personal information off site without authorisation Document name: [Insert Company Name]: Business continuity plan for data 23 Date created: Author: Approved by: Requirement 319: Business continuity plan for data 1. Introduction The profession of optometry and optical practices differ vastly from the professions of dentistry and pharmacy. As such, the Business Continuity Plan (BCP) should also differ vastly to those that are appropriate to the other professions. As such, in the context of Optometry, the BCP will concern itself only with ensuring the safeguarding of practice records. 2. Purpose The Business Continuity Plan is intended to help the optical practice overcome any unexpected incident to its premises, which may prevent the delivery of optometric services. The aim is to ensure the preservation of practice records in the event of an incident affecting its business. Where relevant the plan should be read in conjunction with the practice’s Incident Management Procedures. 3. Scope The plan is designed to enable the practice to resume activities whether the situation is one of full or partial loss of key assets. As such, it covers the protection of records only. 4. Responsibilities Under the Civil Contingencies Act 2004, the NHS Area Team organisation has a duty to ensure that those organisations delivering services on their behalf (i.e. contracted out services) or the capabilities that underpin those services, can be delivered to the extent required in the event of an emergency, e.g. flooding, pandemic flu, etc. However as optometry is contracted on a “paid per task” basis, with no stipulation on the minimum number of patient episodes, a more pragmatic approach needs to be taken. Optometric practices operate in a free market environment with no registration of patients to a particular practice or practitioner. As such patients are free to exercise choice and have an eye examination at any practice with a General Ophthalmic Services (GOS) contract. 24 Practices which hold community service contracts, (previously enhanced services) should notify the commissioner if the practice is unavailable for a significant time period so patients can be directed to alternative participating practices. 5. Loss of premises In the event of an incident that renders the practice unsafe or unusable for the purposes of GOS, arrangements should be made for the safe and secure recovery and storage of any practice computers or equipment which may hold patient sensitive data, and any patient records cards. Risk Assessment descriptors: Use the descriptors below to assess the Likelihood of a risk occurring Score 5 4 3 2 Descriptor Likelihood of occurrence Probable More likely to occur than not >50% chance >1 in 2 chance 1 Possible Unlikely Rare Negligible Reasonable Chance of occurring 50% to 5% 1 in 20 chance Unlikely to occur Will only occur in rare circumstances 0.5% to 0.05% 1 in 2000 chance Will only occur in exceptional circumstances 0.05% to 0.005% 1 in 20,000 5% to 0.5% 1 in 200 chance Risk Impact: Use the descriptors below to assess the Impact severity if a risk occurs Score 5 4 3 2 1 Descriptor Catastrophic Major Moderate Minor Insignificant Severity of Impact Permanent loss of core service or facility Sustained loss of service which has serious impact on delivery of patient care Some disruption in service with unacceptable impact on patient care. Non permanent loss of ability to provide a service Short term disruption to service with minor impact on patient care Interruption in a service which does not impact on the delivery of patient care or the ability to continue to provide a service. 25 Record the likelihood and impact of potential hazards and /or threats together with the recovery time frame options. Hazard or threat Likelihood Score Impact Score Loss of main premises Loss of computer systems/ essential data Loss of the telephone system Loss of essential supplies Loss of optical practice records Incapacity of staff Loss of electricity supply Loss of gas supply/gas heating Loss of water supply Loss of security systems 26 Option 1 Option 2 Option 3 (2 hours) (24 hours or more) (5 days or more) Document name: Date created: Author: Approved by: [Insert Company Name]: Incident reporting Requirement 320: Incident reporting Information security incidents are any event that has resulted or could have resulted in the disclosure of confidential information to an unauthorised individual, the integrity of the system or data put at risk or the availability of the information through the system being put at risk. Incidents may include theft, misuse or loss of equipment containing confidential information or other incidents that could lead to authorised access to data. 1. Procedures for Dealing with various types of Incident All staff should report any suspicious incidents to the IG Lead. Incidents should always be investigated immediately whilst there is still the possibility of collecting as much evidence as possible. Investigations should normally be co-ordinated by the IG Lead. The following procedures should be followed for particular breaches: A) Theft of equipment holding confidential information and unauthorised access to an area with unsecured confidential information: Check the asset register to find out which equipment is missing. Investigate whether there has been a legitimate reason for removal of the equipment (such as repair or working away from the usual base). If the cause is external inform the Police and ask them to investigate. If the cause is internal, establish the reason for the theft/ unauthorised access Consider the sensitivity of the data and the risk that it will be misused, to support assessing whether further action is appropriate (e.g. warning patients, informing the Police, PCT). Consider whether there is a future threat to system security and the need to take protective action e.g. change passwords Categorise and report the incident as described as per ‘recording and reporting’ requirements. B) Access to patient records by an authorised user who has no work requirement to access the record: Interview the person reporting the incident to establish the cause for concern. Establish the facts by; 27 o Asking the system supplier to conduct an audit on activities by the user concerned. o Interviewing the user concerned. Establish the reason for unauthorised access. Consider the sensitivity of the data and the risk to which the patient(s) have been exposed and consider whether the patient(s) should be informed. Take appropriate disciplinary action with staff and action with the patient(s) where appropriate. Categorise and report the incident as described as per ‘recording and reporting’ requirements. C) Inadequate disposal of confidential material (paper, PC hard drive, disks/tapes): This type of incident is likely to be reported by a member of the public, a patient affected, or a member of staff; Investigate how the data came to become inappropriately disposed. Consider the sensitivity of the data and the risk to which the patient(s) have been exposed and consider whether the patient(s) should be informed. Take appropriate action to prevent further occurrences. (e.g. disciplinary, advice/training, contractual) Take appropriate action with the patient(s) as appropriate Categorise and report the incident as described as per ‘recording and reporting’ requirements. D) Procedure for dealing with complaints about patient confidentiality by a member of the public, patient or member of staff: Interview the complainant to establish the reason for the complaint (Note, any complaint by a patient in relation to his NHS services must be investigated and handled in accordance with the Terms of Service) Investigate according to the information given by the complainant and take appropriate action. Take appropriate action with the patient(s) as appropriate Categorise and report the incident as described as per ‘recording and reporting’ requirements. E) Loss of data in transit e.g. when posting GOS 18 referral forms to the GP surgery or to the Hospital Eye Service. Investigate, as far as possible what has gone missing and where Consider the sensitivity of the data and the risk to which the patient(s) have been exposed and consider whether the patient(s) should be informed. 28 Take appropriate action to prevent further occurrences. (E.g. process (was the envelope correctly addressed, is there further safeguards that could be introduced). Take appropriate action with the patient(s) as appropriate Categorise and report the incident as described as per ‘recording and reporting’ requirements 2. Procedures for recording incidents A record of all incidents, including near-misses, should be made by completing a copy of the information security incident report form. Incidents should be classified in the log according to severity of risk to patients and the optical practice using the following incident classification system described below. For nearmisses, consider the likely impact if the breach had occurred. Incident Classification: Insignificant: Minor: Moderate: Major: Critical: Minimal discernible effect on patients or the optical practice. Minor breach, for example data lost but files encrypted, less than 5 patients affected. Moderate breach, for example unencrypted clinical records lost, up to 20 patients affected. Inconvenient to the optical practice but manageable. Potential for damage to the optical practice’s reputation. Serious breach, for example unencrypted clinical records lost, up to 1,000 patients affected or particular sensitivity. e.g. mental health status Serious breach in terms of volume of records, for example over 1,000 patients affected or particular sensitivity of records. Potential for damage to the optical practice’s reputation and/or local media coverage. Damage to the reputation of the NHS and the optical practice profession. Potential for national media coverage. 3. Procedures for reporting incidents Incidents should be reported to the optical practice Information Governance lead. The Information Governance lead will determine whether there is also a need to report the incident to others depending on the type and likely consequences of the incident, e.g. inform the Police, the PCT, the optical practice’s insurer etc. Although there is no legal requirement to do this, where there is high risk of harm to patients, it is considered best practice to also inform the Information Commissioner. 29 Document name: Date created: Author: Approved by: [Insert Company Name]: Information security assurance – role-based access Requirement 321: Information Security Assurance – Role Based Access Technical access controls are built into information systems by Optical practice IT system suppliers. To ensure data is safeguarded, this functionality must be complemented by operational and managerial controls put in place in the Optical practice. This document outlines the procedures for managing access to systems. 1. Scope of the procedure This procedure provides guidance on how staff access to the Patient Medication Record system is managed. 2. Authorising Access to the System The following individual(s) are responsible for ensuring staff in the Optical practice have appropriate access rights to the system where required: IG Lead. Note: Ideally, all users should be assigned an individual user ID with the access level set at the lowest level possible that still permits the staff member to undertake their role. However, there is a balance between security and usability of systems and it is recognised that individual staff logins may not be a practical option at this time, for example to control access to the PM system by Optical practice staff. Decisions on the extent of access controls applied should be taken by the Optical practice contractor based on the risks of unauthorised access, the nature of the data and the impact on Optical practice workload of any controls. 3. Managing Changes to Access Rights A. Joiners As part of normal induction processes new staff required to use the computer system will be issued with a user name, password and access rights appropriate to their role. B. Profile Changes Whenever there is a temporary or permanent significant change in the way a person works, a review of their access rights must be carried out. C. Leavers When staff members leave permanently, their profile should be removed. 30 D. Locums Locum staff should be given temporary log on details, the password for this log on should be changed once the locum has finished their contract of employment. E. Forgotten Passwords Any staff member who has forgotten their password should contact IG Lead. F. Misuse If any staff member suspects misuse for example if their password has been accidentally disclosed, this must be reported to the IG Lead. Depending on the severity of the allegation an investigation maybe required and appropriate disciplinary measures taken. 4. Procedures for staff in relation to logging in to the system Please mark any procedures which are implemented regarding passwords and login. Password must be changed after first login [ ] Password must contain at least 8 characters [ ] Password must contain a mix of alpha numeric characters [ ] Password must contain a mix of upper and lower case characters [ ] Passwords must be changed every 90 days [ ] Passwords cannot be reused [ ] Password can be changed at user request [ ] 5. Local Audit The management of access rights will be subject to internal audit to ensure that this procedure is being followed. The audit will be undertaken every 12 months and will be coordinated by the IG Lead. Areas considered in the audit: Are only staff regularly working in the Optical practice registered as active users on the system Is there any evidence of staff sharing their access rights 6. Requirements for periodic review of the procedure The procedure will be reviewed annually taking into consideration changed in national guidance and changes made to the technical access controls in systems by Optical practice system suppliers. 31 Document name: Date created: Author: Approved by: [Insert Company Name]: Information security assurance – data transfer Requirement 322: Information Security Assurance – Data Transfer Describe the nature of the information flow between the Optical practice and the external organisation, e.g. data item, format, transfer method Patient or Guardian Referral letter copies, Prescription copies, Patient Recall letters, patient record copies. NHS England NHS sight test vouchers and NHS optical vouchers Identify the type and risk level of breaches of confidentiality Describe the measures taken to mitigate the risk of breaches in confidentiality of information that is passed between the optical practice and the external organisation Low Information only sent to Confirmed patient address by mail. Low Forms sent by recorded delivery or delivered by practice staff member Low Forms sent by recorded delivery or delivered by practice staff member HES Referral letters Low Sent by post, fax to safe Haven, or email using NHS Mail or encrypted email. GP Referral letters Low Sent by post, fax to safe Haven, or email using NHS Mail or encrypted email. Low Sent by post, fax to safe Haven, or email using NHS Mail or encrypted email. Telephone if patient identity can be verified and consent obtained. Low Minimum data sent, order Number or surname identifier Used. CCG Payment forms for Community services Another optical practice Spectacle prescription copy, Contact lenses prescription Copy. Glazing lab Spectacle prescription 32 Wholesale supplier Contact lens prescription, Spectacle prescription Low Minimum data sent, order Number or surname identifier Used. Tertiary Ophthalmology Service Tertiary Ophthalmology Service Low Sent by post, fax to safe Haven, or email using NHS Mail or encrypted email. Review of compliance with Data Transfer Procedures (322/Level 2) Are envelopes containing personal information being marked ‘private & Confidential’? Confirmed that personal information is not being sent via email other than from NHS.net addresses to NHS.net addresses? When providing information over the telephone is the callers identify always confirmed? Confirmed that staff members are not copying any personal information to unencrypted memory sticks? Optical Practice Map of Information Flow The diagram below shows the standard map of data flow for optical practices. Patient or guardian NHS England CCG Optical practice HES GP Another optical practice Glazing Lab Wholesale supplier Tertiary Ophthalmology service 33 Telephone & Personal Conversations: Mapping can only be carried out on tangible information flows and where physical evidence of the information exists. If telephone calls are recorded or discussions transcribed to tapes etc. which are then routinely sent to different locations, these will count as data flows. The security and confidentiality of telephone and personal conversations is clearly very important but must be addressed through policies, procedures and staff training. Transfers within an Optical Practice Company: Transfers within an optical practice company do not need to be documented in this mapping exercise; however optical practice companies should ensure they meet their legal obligations including compliance with the Data Protection Act. 34