Records Managers are by nature cautious. To retain rather than manage
seems to be the norm.
Sometimes bold steps are needed.
If a rough approximation of BP0008 has been followed and you can prove
the authenticity of the scanned documents and can show that they are
accurate and you have all the correct backup procedures in place and
there is no legal necessity to hold the paper originals take a deep
breath and securely destroy them in the knowledge that you have done all
you can.
Holding on to the paper documents will be of no value to the surgery and
will increase the security risk.
Chris
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Aston Information
Security
Sent: 18 May 2006 13:45
To: [log in to unmask]
Subject: [data-protection] Destroying Personal Data
Afternoon all
I just need confirmation on something.
A Primary Care Trust client has been asked by a GP practice whether they
can
destroy all their paper patient records, as they have now all been
scanned
into their computer.
Personally, I do not think there is a problem destroying the paper docs,
as
long as there has been an audit to ensure that the docs scanned
accurately.
Does anyone have a different view?
Thanks
JASON PARKER-SMITH
BS7799/ISO17799/ISO27001 Consultant
www.astoninfosec.co.uk
This e-mail is confidential and intended solely for the use of the
individual to whom it is addressed. Any views or opinions presented
(including attachments) are solely those of the author and do not
necessarily represent those of Aston Information Security Ltd.
If you are not the intended recipient, be advised that you have received
this e-mail in error and that any use, dissemination,
forwarding, printing, or copying of this e-mail is strictly prohibited.
If you have received this e-mail in error, please contact the sender.
Whilst every effort has been taken to ensure protection against virus
infection, we cannot accept any responsibility for viruses.
Consequently,
please ensure that all attachments are virus checked prior to opening.
^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list
owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
**********************************************************************
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.
This footnote also confirms that this email message has been swept by MIMEsweeper for the presence of computer viruses.
www.mimesweeper.com
**********************************************************************
Please do not print out this e-mail unless absolutely necessary. Save energy and paper!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|