You will probably need to arrange formal confidentiality training, which
provides the individual(s) involved with the skills to maintain the
necessary chinese walls, or structure the work so the necessity does not
arise.
I would suggest there may be a need for the organisation to carefully
consider the risks to data subjects as a result of the current working
arrangements. (And document that risk assessment to show in the future it
was conducted).
Ian W
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]]On Behalf Of Nikki Ankers
Sent: 07 June 2002 08:56
To: [log in to unmask]
Subject: Data Sharing question
Please can anyone help me on the following matter.
We have staff jointly employed working on combined NHS and SS work. They
are using the same data and populating data bases in the NHS and in Social
Services.
How do we comply with Data Protection and Caldicott when it is obviously
impossible for one person to split their memory so they do not share data
with them selves!!
Phrases such as Joint Data Controllers and Data Processors and Sharing
Protocols have all been bandied about but we're not sure on where to find
information on this.
Any help would be greatly appreciated
Nikki Ankers
Information Security Officer
Berkshire Shared Services Organisation
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|