12
Author(s) Owner(s) Author: Gill Richards, Information Governance Manager Owner: Ros Preen, Senior Information Risk Owner Version No. Version 2.2 Approval Date 7 December 2020 Review Date 31 March 2023 Information Risk Policy

Information Risk Policy · 2021. 1. 11. · Author: Gill Richards, Information Governance Manager Owner: Ros Preen, Senior Information Risk Owner Version No. Version 2.2 Approval

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Information Risk Policy · 2021. 1. 11. · Author: Gill Richards, Information Governance Manager Owner: Ros Preen, Senior Information Risk Owner Version No. Version 2.2 Approval

Author(s) Owner(s)

Author: Gill Richards, Information Governance Manager

Owner: Ros Preen, Senior Information Risk Owner

Version No. Version 2.2

Approval Date 7 December 2020

Review Date 31 March 2023

Information Risk

Policy

Page 2: Information Risk Policy · 2021. 1. 11. · Author: Gill Richards, Information Governance Manager Owner: Ros Preen, Senior Information Risk Owner Version No. Version 2.2 Approval

Information Risk Policy Shropshire Community Health NHS Trust

Information Risk Policy 1341-63636 Page 1

Policies, Procedures, Guidelines and Protocols

Document Details

Title Information Risk Policy

Trust Ref No 1341-63636

Local Ref (optional)

Main points the document covers

This policy details the procedures and processes required for managing Information Risks

Who is the document aimed at?

This policy is aimed at all staff.

Author Gill Richards, Information Governance Manager

Approval process

Who has been consulted in the development of this policy?

Selection of Managers/staff

Approved by (Committee/Director)

SIRO

Approval Date 7 December 2020

Initial Equality Impact Screening

Yes

Full Equality Impact Assessment

No

Lead Director Director of Finance

Category General

Sub Category Information Governance

Review date 31 March 2023

Distribution

Who this policy will be distributed to

Staff via Datix system

Method Dissemination via Datix Alerts to managers and available to all staff via the Trust’s website

Document Links

Required by CQC No

Required by NHLSA No

Other No

Amendments History

No

1 07/12/2020 Appendix C updated

2 07/12/2020 Appendix D updated

3 07/12/2020 Author’s name updated.

4 07/12/2020 Updated to include GDPR/DPA2018

5

Page 3: Information Risk Policy · 2021. 1. 11. · Author: Gill Richards, Information Governance Manager Owner: Ros Preen, Senior Information Risk Owner Version No. Version 2.2 Approval

Information Risk Policy Shropshire Community Health NHS Trust

Information Risk Policy 1341-63636 Page 2

Contents

1. Introduction ..................................................................................... 3

2. Purpose ........................................................................................... 3

3. Processes ....................................................................................... 3

4. Related Documents ........................................................................ 4

5. Definitions ....................................................................................... 4

6. Responsibilities .............................................................................. 5

7. Data Losses and Confidentiality/Security Breaches .................... 6

8. Training ........................................................................................... 6

9. Review and Monitoring .................................................................. 6

10. Glossary .......................................................................................... 7

Appendix A: Legal and Regulatory Requirements .............................. 8

Appendix B: Examples of Information Assets ..................................... 9

Appendix C: Risk Review Procedure for Information Assets ........... 10

Appendix D: Information Asset Risk Review ..................................... 10

Page 4: Information Risk Policy · 2021. 1. 11. · Author: Gill Richards, Information Governance Manager Owner: Ros Preen, Senior Information Risk Owner Version No. Version 2.2 Approval

Information Risk Policy Shropshire Community Health NHS Trust

Information Risk Policy 1341-63636 Page 3

1. Introduction

1.1 This policy relates to information risk for Shropshire Community Health NHS Trust (hereafter referred to as the Trust).

1.2 The Trust is highly reliant on information that is captured, stored, processed and delivered by information systems and their associated communication facilities.

1.3 Such information plays a vital role in supporting businesses processes and patient services, in contributing to operational and strategic business decisions and in conforming to legal and statutory requirements.

1.4 Accordingly the information and the enabling technologies are important assets that will be protected to the level commensurate with their value to the organisation.

1.5 The key requirement of this policy is for information risk to be managed in a robust way within work areas and not be seen as something that is the sole responsibility of IT or Information Governance staff.

2. Purpose

2.1 It is the policy of the Trust to ensure that the approach to information risk management:

Takes full advantage of existing authority and responsibility structures where these are fit for this purpose;

Associates tasks with appropriate management levels;

Avoids unnecessary impacts on day to day business;

Ensures that all the necessary activities are discharged in an efficient, effective, accountable and visible manner.

3. Processes

3.1 All information systems within the Trust (both electronic and paper based) fall within the scope of this policy.

3.2 This policy applies to all Trust staff (including temporary workers, locums and staff seconded or contracted from other organisations) and parties authorised by the Trust together with their staff (including temporary workers, locums and staff seconded or contracted from other organisations).

3.3 Any breach of or refusal to comply with this policy will lead to disciplinary action in accordance with the organisations’ Human Resource policy framework available on the organisation’s website.

3.4 This policy defines how the Trust will manage information risk and how effectiveness will be assessed and measured.

3.5 The information risk policy should be read in conjunction with the organisation’s overall Risk Management Strategy and Risk Assessment Code of Practice; information risk need not be managed separately from other business risks but should be considered a fundamental component of effective information governance.

Page 5: Information Risk Policy · 2021. 1. 11. · Author: Gill Richards, Information Governance Manager Owner: Ros Preen, Senior Information Risk Owner Version No. Version 2.2 Approval

Information Risk Policy Shropshire Community Health NHS Trust

Information Risk Policy 1341-63636 Page 4

3.6 This policy is to ensure that all staff are aware of their individual responsibilities in relation to the management of information risk. Legal and Regulatory Requirements are listed in Appendix A.

4. Related Documents

4.1 The following Shropshire Community Health NHS Trust documents contain information that relate to this policy:

Information Governance Policy (including Data Protection and Freedom of Information)

Information Quality Assurance Policy

Information Security Policy

Records Management Policy

Risk Management Policy

Risk Assessment Code of Practice

Incident Reporting Policy

Incident Reporting on DATIX

Whistleblowing Policy and Procedure

5. Definitions

5.1 The definition of risk in this context provided by NHS Digital is “The chance of something happening, which will have an impact upon objectives. It is measured in terms of consequence and likelihood”. Information risk is inherent in all administrative and business activities and everyone working for or on behalf of the Trust continuously manages information risk.

5.2 Full descriptive definitions of risk management and the risk management process, drawn from AS/NZS 4360:1999, are described in the organisation’s Risk Management Strategy

5.3 An Information Asset is a definable piece of information, stored in any manner which is recognised as 'valuable' to the organisation. Information Assets come in many shapes and forms, and an illustrative list is given in Appendix B. It is the responsibility of Information Asset Owners to identify new information assets and ensure they are recorded on the Information Asset Register managed by the Informatics Department.

5.4 Irrespective, the nature of the information assets themselves, they all have one or more of the following characteristics:

They are recognised to be of value to the Trust

They are not easily replaceable without cost, skill, time, resources or a combination

Their loss would cause reputational damage to the Trust

Page 6: Information Risk Policy · 2021. 1. 11. · Author: Gill Richards, Information Governance Manager Owner: Ros Preen, Senior Information Risk Owner Version No. Version 2.2 Approval

Information Risk Policy Shropshire Community Health NHS Trust

Information Risk Policy 1341-63636 Page 5

Their data classification would normally be ‘confidential’

The asset is maintained by people working in a consistent and cooperative manner.

5.5 An Information Asset increases in value according to the amount of analysis it performs converting low level Information into more refined Information.

6. Responsibilities

6.1 The Chief Executive is the Accounting Officer and has overall responsibility for ensuring that information risks are assessed and mitigated to an acceptable level.

6.2 The Senior Information Risk Owner (SIRO) is a member of the Executive Team, who owns the organisation’s information risk policy and acts as advocate for information risk on the Board.

6.3 The SIRO will advise the Chief Executive and the Trust Board on information risk management strategies and provide periodic reports and briefings on risk management assurance.

6.4 Information Asset Owners (IAOs) are senior Trust staff involved in running services or departments. Their role is to understand and address risks to the information assets they ‘own’ and to provide assurance to the SIRO on the security and use of those assets.

6.5 IAOs must ensure that information risk assessments are performed on all information assets where they have been assigned ‘ownership’, following guidance from the SIRO and following the Trust risk strategies, policies, codes of practice and procedures. See Appendix C for the Risk Review Procedure for Information Assets.

6.6 IAOs must submit the results of their risk reviews and associated mitigation plans to the SIRO for review, along with details of any assumptions or external dependencies. Mitigation plans (including Business Continuity Plans) should include specific actions with expected completion dates, as well as an account of residual risks.

6.7 A template to assist with the completion of information asset risk assessments is given in Appendix D.

6.8 Once the risk assessments are complete a quarterly controls assurance update should be provided to the SIRO using the approved template.

6.9 IAOs may identify an Information Asset Administrator (IAA) or System Administrator (SA) to support them. The delegated responsibilities can be passed to operational/corporate staff with day to day responsibility for managing risks to their information assets e.g. managing access, data quality.

6.10 It is the responsibility of IAOs to ensure that their staff undertake the mandatory Information Governance training to enable them to identify and assess risk within their own daily work and be aware of policies which will support them maintain their own knowledge of legislation and standards.

6.11 IAOs must ensure any identified risk which meets the criteria detailed in the Risk Management Strategy or Risk Assessment Code of Practice are recorded within departmental risk assessments or directorate risk registers.

Page 7: Information Risk Policy · 2021. 1. 11. · Author: Gill Richards, Information Governance Manager Owner: Ros Preen, Senior Information Risk Owner Version No. Version 2.2 Approval

Information Risk Policy Shropshire Community Health NHS Trust

Information Risk Policy 1341-63636 Page 6

6.12 Further guidance on specific Information Governance matters relating to information risk may be obtained from specialists within the organisation e.g. Data Protection, Freedom of Information and Records Management leads.

6.13 For any patient confidentiality issues the first point of contact should be the Caldicott Guardian.

7. Data Losses and Confidentiality/Security Breaches

7.1 All incidents that constitute a loss of information which could potentially lead to a breach of patient confidentiality must be reported, in accordance with the Incident Reporting Code of Practice, by the IAO directly to the Trust Risk Manager, the Caldicott Guardian and the SIRO.

7.2 All incidents that constitute a loss of information which could potentially lead to a breach of staff confidentiality must be reported by the IAO directly to the Trust Risk Manager and the SIRO.

7.3 Full details of process for this are given in the Risk Management Strategy, Incident Reporting Code of Practice and the organisation’s Information Security Policy.

7.4 Near misses relating to Person Identifiable Information, Personal Confidential Data (PID/PCD) should be reported by the IAO in accordance with the Incident Reporting Code of Practice and to the SIRO.

8. Training

8.1 All new staff (employed and non-employed) will be given Information Governance training as part of their corporate induction training.

8.2 The Trust will provide Information Governance training as part of its annual mandatory training programme

8.2 The Trust will ensure that their staff are aware of its policies and requirements regarding Information Risk and appropriate training arrangements will be made available.

8.3 Links between Information Risk and other Information Governance requirements will be clarified for staff.

9. Review and Monitoring

9.1 This policy will be reviewed as required by the Information Governance Manager following the publication of the Data Security and Protection Toolkit (DSPT) or to implement any changes in legislation.

9.2 The Information Governance Operational Group will review incidents for trends or patterns and impacts on controls in place and provide a commentary for an annual risk assurance report.

Page 8: Information Risk Policy · 2021. 1. 11. · Author: Gill Richards, Information Governance Manager Owner: Ros Preen, Senior Information Risk Owner Version No. Version 2.2 Approval

Information Risk Policy Shropshire Community Health NHS Trust

Information Risk Policy 1341-63636 Page 7

10. Glossary

Term / Abbreviation

Explanation / Definition

Caldicott Guardian A Caldicott Guardian is a senior person responsible for protecting the confidentiality of patient and service-user information and enabling appropriate information-sharing

NHSD NHS Digital (Successor to HSCIC)

IAA Information Asset Administrator

IAO Information Asset Owner

SA System Administrator

DSPT Data Security and Protection Toolkit (DSPT)

SCHT Shropshire Community Health NHS Trust

PID Person Identifiable Data

PCD Personal Confidential Data

SIRO Senior Information Risk Owner

Page 9: Information Risk Policy · 2021. 1. 11. · Author: Gill Richards, Information Governance Manager Owner: Ros Preen, Senior Information Risk Owner Version No. Version 2.2 Approval

Information Risk Policy Shropshire Community Health NHS Trust

Information Risk Policy 1341-63636 Page 8

Appendix A: Legal and Regulatory Requirements

Legal and Regulatory Requirements applicable to the management of information risk:

Details

Access to Health Records Act 1990

Communications Act 2003

Computer Misuse Act 1990

Confidentiality NHS Code of Practice

General Data Protection Regulation (GDPR) 2018

Data Protection Act 2018

Electronic Communications Act 2000

Freedom of Information Act 2000

Human Rights Act 1998

NHS Information Governance Codes of Practice

Regulation of Investigatory Powers Act 2000 (and Lawful Business Practice Regulations 2001).

Risk Assessment Code of Practice

Page 10: Information Risk Policy · 2021. 1. 11. · Author: Gill Richards, Information Governance Manager Owner: Ros Preen, Senior Information Risk Owner Version No. Version 2.2 Approval

Information Risk Policy Shropshire Community Health NHS Trust

Information Risk Policy 1341-63636 Page 9

Appendix B: Examples of Information Assets

Personal Information Content Software

Databases and data files Back-up and archive data Audit data Paper records (patient case notes/staff records) Paper reports

Applications and System Software Data encryption utilities Development and Maintenance tools

Other Information Content Hardware

Databases and data files Back-up and archive data Audit data Paper records and reports

Computing hardware including PCs, Laptops, communications devices e.g. smartphones and removable media

System/Process Documentation Miscellaneous

System information and documentation Operations and support procedures Manuals and training materials Contracts and agreements Business continuity plans

Environmental services e.g. power and air-conditioning People skills and experience Shared service including Networks and Printers Computer rooms and equipment

Page 11: Information Risk Policy · 2021. 1. 11. · Author: Gill Richards, Information Governance Manager Owner: Ros Preen, Senior Information Risk Owner Version No. Version 2.2 Approval

Information Risk Policy Shropshire Community Health NHS Trust

Information Risk Policy 1341-63636 Page 10

Appendix C: Risk Review Procedure for Information Assets

IAO Identifies IA and

records on the IAR

Risk review carried out

as per Policy

Has the

review been

carried out

correctly?

IAO

Risk review result

added to Datix

Is there a

‘High Risk’

for this IA?

IG manager collects

audits and reports to

SIRO

IG manager to remind

IAO to carry out audit

Risk review to be

scheduled for 12

months’ time

IG manager to provide

additional support to

IAO if needed

No

Yes

Inform SIRO and Risk Manager to

take further action No

Yes

Key / Glossary

IA Information Asset

IAO Information Asset

Owner

IAR Risk and incident

Register management software

SIRO Senior Information Risk

Owner

Process

Question

Page 12: Information Risk Policy · 2021. 1. 11. · Author: Gill Richards, Information Governance Manager Owner: Ros Preen, Senior Information Risk Owner Version No. Version 2.2 Approval

Information Risk Policy Shropshire Community Health NHS Trust

Information Risk Policy 1341-63636 Page 11

Appendix D: Information Asset Risk Review

Please complete the following audit in respect of the information assets listed above.

Please add or amend any items in the list above. If you identify any risks please raise these

in line with the Risk Management Policy.

If you have any questions please contact one of the Information Security Officers or the Risk Manager.

. Yes No

Are the Business Continuity Plans appropriately and effectively managed in accordance with the Trust Guidance?

Are the access and security arrangements managed appropriately and effectively in accordance with the Information

Governance and Information Security Policies e.g. smartcards, passcodes, system admin and maintenance?

Are the risks appropriately and effectively managed in accordance with the Risk Management Policy e.g. recorded on

Datix?

Is the information asset appropriately and effectively managed in accordance with the Records Management Policy

e.g. paper records archived, system back-up.

Are the information sharing arrangements managed in accordance with the Information Governance Policy e.g. Data

Sharing Agreement?

Is data held outside of the UK?

If data is held outside of the UK have your appropriately and effectively managed this process e.g. sought advice from

IG Manager?

Are your information assets approppriately and effectively reviewed on a regular basis e.g. every 1, 2 or 3 years?

Information Asset Owner sign-off - [insert name and job role]

Date:

Statement of Compliance - Information Asset Register 2016-17

Statement of Compliance

(yes/no)