At its most basic level, Information Governance is simply a framework within
which the management of information can take place with due regard to
legislation, ethical standards, technological standards and required codes
of practice.
The term Information Governance, whilst adopted predominantly by the NHS and
Government might be different in content depending on the nature on the
information to be governed.
Simon Howarth.
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Nick Landau
Sent: 19 January 2007 15:48
To: [log in to unmask]
Subject: Re: [data-protection] NHS Info Sharing Principles - was School
fingerprinting: Warning: likely to r aise blood pressure
According to the Birmingham Women's Health Care NHS Trust's Information
Governance webpages
http://www.bwhct.nhs.uk/info-gov-home/info-gov-horus.htm
Information Governance covers the following:
Caldicott
Confidentiality Code of Practice
Data Protection
HORUS
Environmental Information Regulations
Freedom of Information
Information Governance Toolkit
Information Security
Records Management
Links
Very similar to the Caldicott and Data Protection (which it says coexist) is
HORUS.
"Held securely and confidentially
Obtained fairly and efficiently
Recorded accurately and reliably
Used effectively and ethically
Shared appropriately and lawfully"
According to the DH webpage on Information Governance in Social Care
http://www.dh.gov.uk/PolicyAndGuidance/InformationPolicy/InformationForSocia
lCare/CaldicottArticle/fs/en?CONTENT_ID=4075306&chk=dvqjYH
Information Governance is "wider than just Caldicott principles".
"What is Information Governance?
Information governance currently covers the following:
Data Protection Act 1998
Freedom of Information Act 2000
The Confidentiality Code of Practice
Information Security Management - BS7799
Records Management
It is wider than just Caldicott principles, and addresses five broad aspects
of Information processing - how information is Held, Obtained, Recorded,
Used and Shared (). Whenever the delivery of policy involves any form of
information processing, then the information processing will, at least in
part, determine the outcome.
Information Governance has four fundamental aims:-
To support the provision of high quality care by promoting the effective and
appropriate use of information.
To encourage responsible staff to work closely together, preventing
duplication of effort and enabling more efficient use of resources.
To develop support arrangements and provide staff with appropriate tools
and support to enable them to discharge their responsibilities to
consistently high standards.
To enable organisations to understand their own performance and manage
improvement in a systematic and effective way."
Nick Landau
----- Original Message -----
From: "Simon Richardson" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Friday, January 19, 2007 2:54 PM
Subject: [data-protection] NHS Info Sharing Principles - was School
fingerprinting: Warning: likely to r aise blood pressure
On Fri, 19 Jan 2007 14:26:37 -0000, Nick Landau <[log in to unmask]>
wrote:
>Some years ago when I was going for Information Governance posts in the NHS
>there were IG Principles (I think) on the NHSIA (NHS Information Authority)
>website. Well the NHSIA is no longer, and the Principles as such no longer
>seem to be available. It seems another NHS flavour of the month. Otherwise
I
>would have quoted them.
Nick
The NHS now works by the Caldicott Principles (named after Dame Fiona
Caldicott, whose commission reported on info sharing in the NHS).
All NHS organsiations have a Caldicott Guardian - usually a board member
with a clinical background - and all transfers of patient data (other than
for the direct care of that patient) must be formally approved by this
guardian.
The Caldicott Principles are:
1. Justifiable purpose
2. Only use patient identifiable info if absolutely necessary
3. Use minimum necessary patient identifiable info
4. Access on a strict need to know basis
5. Everyone handling patient identifiable info must be aware of their
responsibilities
6. Every use of patient identifiable info must be lawful
Simon
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list
owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your
needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list
owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your
needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|