Data Security Awareness Level 1 - PowerPoint - 28-03-2017-Published
Data Security Awareness Level 1 - PowerPoint - 28-03-2017-Published
3
Description
4
Learning Objectives
5
Why is Data Security important in Health and Care?
6
Safe data, safe care
8
Scenario
• Jane falls badly and hurts her leg.
• The paramedics ask Jane for her details and whether she is allergic to any
medications but Jane isn’t sure.
• The paramedics attempt to access Jane’s Summary Care Record,
[Confidentiality – the Paramedics have a proven need to see the record.]
But there is a telephone network outage preventing access.
• The paramedics administer morphine, but Jane is allergic – a fact held on
her record – and goes into anaphylactic shock. [Integrity – the record is
correct and unmodified but was not available.]
• In hospital she is kept in intensive care.
• In this case, the lack of information Availability has had a direct impact on
patient care.
9
Summary
10
Information and the Law
• We will now look in more detail at managing patient and service user
information in health and care. This section covers:
1. Confidentiality - good practice.
2. The Data Protection Act, including the rights of patients and service users.
3. The Freedom of Information Act, including how to comply.
4. Good record keeping.
11
Types of information
13
The Value of Information
16
Confidentiality – Good practice
17
Confidentiality - Informing People
• You should inform patients and service users that you are accessing and
using their information.
Explain Give choice
Clearly explain to people how you will use their Give people a choice about how their
personal information and point them to
information is used and tell them whether
additional information about this – for example,
that choice will affect the services offered to
on your organisation’s website, in a leaflet or
them.
on a poster.
Meet expectations
Only use personal information in ways that people would reasonably expect.
• You don't need to obtain consent every time you use information for the
same purpose, providing you have previously informed the individual.
18
Confidentiality - Sharing information for care
• Sharing information with the right people can be just as important as
not disclosing to the wrong person.
• Note the duty to share for care where the right conditions are met.
Respect objections
Normally, if the individual objects to any proposed information sharing, you must
respect their objection even if it undermines or prevents care provision. Your
Caldicott Guardian or Information Governance lead will be able to advise on what
to do in these circumstances.
19
Confidentiality - Sharing information for non-care
20
Data Protection
21
Rights of Individuals
22
Data Protection - Good Practice 1
23
Data Protection - Good Practice 2
• Remember - patients and service users have a right
to see information recorded about them. So make sure
you:
– Record clearly so that others can rely on your entries.
– Be accurate and keep information up-to-date.
• Follow your organisation’s rules when disposing of
personal information.
• Note the impact of the General Data Protection
Regulation (GDPR).
24
The Freedom of Information Act 2000
The Act allows anyone from anywhere in the The Act only applies to information that already
world to make a written request for information exists in a recorded form.
held by a public body.
Coverage - not all organisations have to comply with the Act. Is your organisation type listed below?
• Local authorities, health bodies and regulators, dentists, general practitioners, optical contractors
and pharmacy businesses must comply with the Act.
• Private health and care providers should check their contract for any duty to comply with the Act.
• Charities and similar organisations may deal with FOI requests on a voluntary basis.
25
Handling FOI requests
26
Activity - Can you recognise a valid request?
Identify which ones you think are valid FOI requests and Valid Not
which you think are not valid FOI requests valid
A. Please send me a copy of my social care record
B. How many GPs work in the practice?
C. When’s my daughter’s next appointment?
D. How much did the Trust spend on rail travel last year?
E. How many staff have passed their IG training?
F. What services are being considered for closure in the
next year?
27
Record keeping - Good practice
31
Social engineering
Those who want to steal data may use tricks to manipulate people to
give access to valuable information. This is called social engineering.
On the phone: A social engineer might call and pretend to be a fellow employee or a trusted
outside authority (such as law enforcement or an auditor).
In the office: "Can you hold the door for me? I don't have my key/access card on me." How often
have you heard that in your building? While the person asking may not seem suspicious, this is a
very common tactic used by social engineers.
Online: Social networking sites have opened a whole new door for social engineering scams.
One of the latest involves the criminal posing as a Facebook "friend”. But you can never be
certain the person you are talking to on Facebook is actually the real person. Criminals are
stealing passwords, hacking accounts and posing as friends for financial gain.
32
The fake ICT Department
33
Social Engineering - what you can do
• Always be vigilant:
– When using the phone,
– Receiving unsolicited emails,
– Using social media, or
– Walking around your place of work. Stay Vigilant
• If it’s safe to do so:
– Challenge suspicious behaviour, and
– Request proof of identification.
34
Email phishing and malware
Email though efficient has risks:
• Criminals use email attachments and links to
trick people into providing information.
• Email attachments may be executable files
that contain malicious software (malware).
This is known as phishing and the emails
aim to force you to make a mistake.
• Never give your login details to anyone.
• If you receive an email requesting sensitive
information that looks as though its from a
colleague - double check by phoning the
colleague.
• Do not open links or attachments in
unsolicited emails.
Report suspicious emails to your ICT
department or provider. 35
Phishing - what to do
• Be vigilant:
– Do not install any new software unless authorised.
– Think - Is someone trying to extract or extort
information?
– Discuss issues with your manager and ICT
department/provider.
• If you do identify a phishing email, take these Stay Vigilant
steps:
– Do not reply.
– Select the email, right-click it and mark it as junk.
– Block suspicious email domains.
– Inform your local ICT department or provider - your
organisation is likely to have a process for dealing
with spam.
36
Macros
• Macros are a series of actions that a program such as Microsoft Excel
may perform to work out some formulas.
38
Good practice - Setting passwords
40
Good practice - Removable drives
42
Good practice - Mobile devices
Digital Do’s
45
Good practice - Clear desks
• Follow your organisation’s clear desk
policy.
• Do not leave information in unsecure
locations.
• Having a clear desk means reduced
potential for leaving sensitive
information unattended, reducing the
risk of a breach.
46
Summary
• In this section you have learnt about different types of
data security threat, how to spot them, and what to do.
• The learning also covered good practice in the
workplace.
• The last section covers what to do if you identify that a
security incident or breach has occurred.
47
Breaches and incidents
• The section covers:
– Identifying breaches and incidents
– Reporting breaches and incidents
– Avoiding breaches and incidents
– Everyday scenarios where information can be lost.
48
Different types of incident
Breaches Cyber incidents
49
Most reported breaches in health and care
• From the Information Commissioner trend reports
about breaches and incidents:
– Faxes that are sent to the wrong number or misplaced.
– Lost or stolen paperwork.
– Failure to adhere to principle 7 of the Data Protection Act
1998.
50
Incidents using technology
Website defacement
This term is used to describe an attack on a website that changes the content of the
site or a webpage. It may also involve creating a website with the intention of
misleading users into thinking that it has been created by a different person or
organisation.
51
Consequences of breaches and incidents
53
Postal breach
The situation - Miss Broom is waiting to receive The organisation’s reaction - The organisation's
information from her social worker. She opens her information governance lead telephones Miss Broom
post one morning and finds that, as well as her own to apologise for the error and asks her to keep the
letter, the envelope contains two further letters letters safe whilst arrangements are made for
addressed to other people. someone to collect them.
Miss Broom contacts the organisation and tells an
administrative officer about the additional letters.
She receives an apology and the promise of a call
back.
Consequences - The organisation wrote a formal apology to Miss Broom and to the two individuals that she received
letters about. Both individuals were deeply concerned that Miss Broom (who they did not know) now knew important
information about them. One of them wrote to their local paper about the breach.
Senior staff in the local authority spent the next two weeks responding to media queries about the number of
breaches the organisation had experienced. The other individual, who had suffered from a similar breach the previous
year, instructed his solicitor to bring legal proceedings against the local authority.
54
Postal checklist
55
Email breach
The situation - Mr. Foster has recently been diagnosed with depression and has joined a
support group to help him through his care.
The organisation emails information to support group members each month. Recently,
they have started to receive emails and phone calls from individuals who are upset about
the disclosure of their names and email addresses to more than 500 people.
Consequences - Everyone who received the email could identify who was a member of
the depression support group. The investigation also finds that all existing staff members
involved in sending out emails knew what to do, but had not supervised the new member
of staff.
56
Email checklist
• Before emailing any external parties:
– Check whether it is acceptable to send personal information.
– Confirm the accuracy of the email addresses.
– Check that everyone on the copy list has a genuine ‘need to
know’.
– Use the minimum identifiable information (e.g. NHS number).
– Check encryption requirements.
• Where email needs to be sent to an unsecure recipient:
– Check they understand and accept the risks or
– If you can encrypt the email.
57
Phone breach
• The result - The next morning, Mrs Smith phones the practice
and tells Joe that her brother-in-law has information about her
health that he can only have obtained from the practice. At that
point, Joe realises he had no proof that the previous day's call
was from the local hospital.
58
Phone checklist
• Where possible:
– Confirm the enquirer’s name, job title and organisation.
– Confirm the reason is appropriate.
– Take a contact phone number, e.g. main switchboard number.
– Check whether the information can be provided - if in doubt,
tell the enquirer you will call them back.
– Provide the information only to the enquirer.
• Record your name and details about disclosure, along
with the recipient’s details.
59
Fax breach
60
Fax checklist
62
Data security risks 2
• Doors: Nearly every door was open; even “restricted access” doors
had been propped open to allow for a delivery.
• Visitors: The receptionist was happy to direct him to the server room…
he wasn’t even asked to sign in or show a visitor’s badge.
• Desks: There was so much information in unoccupied office areas. He
randomly dispersed memory sticks on the desks; hopefully someone
will plug one into their machine and it can start installing malware.
• Other areas: The server room door was unlocked, meaning he could
disrupt the server causing connectivity problems.
• As there is so little physical security, he can potentially come and go as
he pleases…perhaps next week.
63
Summary
65
Resources
1. The NHS Care Record Guarantee . London: NIGB, 2011.
2. Department of Health. Information Security Management: NHS Code of Pra
ctice
. London: DH, 2007.
3. Records Management Code of Practice for Health and Social Care 2016
IGA, 2016
4. Website of the Information Governance Alliance
5. Caldicott 1 - Report on the Review of Patient-Identifiable Information .
London: Caldicott Committee, 1997
6. Caldicott 2 - Information: To Share Or Not To Share? The Information Gov
ernance Review
. London: Independent Information Governance Oversight Panel, 2013
7. Caldicott 3 - Review of Data Security, Consent and Opt-Outs . London:
National Data Guardian, 2016 66
References
1. Information Commissioner’s Office.
Chelsea and Westminster Hospital NHS Foundation Trust
monetary penalty notice.
2. Department of Health. Confidentiality: NHS Code of Practice.
London: DH, 2003.
3. The National Cyber Security Centre - Creating passwords:
https://www.ncsc.gov.uk/blog-post/three-random-words-or-th
inkrandom-0
.
4. The National Cyber Security Centre - Password Managers:
https://www.ncsc.gov.uk/blog-post/what-does-ncsc-think-pa
ssword-managers 67
Assessment
• Learners are required to undertake an individual assessment to
test their understanding.
• Organisations should ensure assessments are undertaken and
scores are collated so that where necessary, learners with further
questions or struggling with understanding can be supported.
• Learners should attempt all of the following 10 questions, and
then provide the answers for marking according to their
organisation's local processes.
• Organisations should mark and record the scores attained – the
pass mark is 80%
68
Assessment
69
Assessment
Question 2: Which of the following statements on the topic of confidentiality is
correct? Tick one option from the answers listed below.
A It is not necessary to explain how someone’s personal information
will be used
B It is not necessary to give them a choice about how their personal
information is used
C It is not necessary to tell them before their personal information is
shared for the first time
D It is not necessary to get consent every time you subsequently
share someone’s personal information for the same purpose
70
Assessment
Question 3: Which of the following statements on the Data Protection Act 1998
is correct? Tick one option from the answers listed below.
A The Act only applies to patient or service user information
B The Act only applies to personal information in digital form
C The Act prevents information being shared for health and care
purposes
D Organisations can be fined or face legal action for breaching the
principles of the Act
71
Assessment
Question 4: Which of the following statements on the Freedom of Information
Act is correct? Tick one option from the answers listed below.
A The Act puts a duty on organisations to supply information to
individuals who make a written request
B Individuals can submit a request for information in writing or over the
telephone
C Organisations must respond to a valid request within 10 working
days
D If necessary, organisations have a duty to create new information in
order to meet a FOI request
72
Assessment
Question 5: Which of the following represents an example of good practice in
record keeping? Tick one option from the answers listed below.
A Storing commonly used records in your drawer
B Including each person’s NHS number
73
Assessment
Question 6: Which of the following represents an example of good practice in
physical security? Tick one option from the answers listed below.
A Having a sign-in procedure for visitors
B Sharing your ID badge with a colleague who has forgotten his
C Propping open fire doors when the weather is warm
D Leaving service user records on your desk in case you need them
later
74
Assessment
Question 7: Which of the following should not be used to send personal
information unless absolutely necessary? Tick one option from the answers
listed below.
A Post
B Email
C Fax
D Telephone
75
Assessment
Question 8: Which of the following is likely to increase the risk of a breach when
sending personal information? Tick one option from the answers listed below.
A Using a trusted postal courier service
B Verifying the identity of telephone callers
C Using a secure email system
D Leaving messages for telephone callers
E Encrypting any personal information
76
Assessment
Question 9: Which of the following statements best describes how to respond to
an incident? Tick one option from the answers listed below.
A All incidents should be reported
77
Assessment
Question 10: Which of the following is least likely to create a security risk?
Tick one option from the answers listed below.
A Leaving sensitive documents on your desk
78
Assessment
79
Assessment
80
Assessment
Question 13: Which of the following is the best course of action if you
receive a phishing email? Tick one option from the answers listed below.
A Reply to the email
B Forward the email to your colleagues
C Notify your IT department/provider
D Open the attachments
E Click on the links in the email
81
Assessment
Question 14: Consider the following statement. “If your computer is running
slowly you should disable the anti-virus software.” Tick one option from the
answers listed below.
A This statement is true
82
Assessment
Question 15: Which of the following represents an example of good practice
in data security? Tick one option from the answers listed below.
A Attaching unauthorised equipment to your work-provided digital
asset
B Updating the anti-virus software on your work-provided digital
asset
C Using your work-provided digital asset for personal reasons not
consistent with your organisation’s policy
D Downloading software or data from the Internet to your work-
provided digital asset
E Connecting your work-provided digital asset to an unknown
network
83
End
• You have reached the end of this presentation.
84
www.digital.nhs.uk
@nhsdigital
[email protected]
0300 303 5678