Data Protection Policy

 

BACK TO MAIN INDEX

 

1. Introduction

  • This Data Protection Policy is the overarching policy for data security and protection for Forest Hill Road Group Practice (hereafter referred to as "us", "we", or "our").
 

2. Purpose

  • The purpose of the Data Protection Policy is to support the 7 Caldicott Principles, the 10 Data Security Standards, the General Data Protection Regulation (2016), the Data Protection Act (2018), the common law duty of confidentiality and all other relevant national legislation. We recognise data protection as a fundamental right and embrace the principles of data protection by design and by default.
  • This policy covers: 
  1. Our data protection principles and commitment to common law and legislative compliance;
  2. procedures for data protection by design and by default.
 

3. Scope

  • This policy includes in its scope all data which we process either in hardcopy or digital copy, this includes special categories of data.
  • This policy applies to all staff, including temporary staff and contractors.
 

4. Principles

  • We will be open and transparent with service users and those who lawfully act on their behalf in relation to their care and treatment. We will adhere to our duty of candour responsibilities as outlined in the Health and Social Care Act 2012.
  • We will establish and maintain policies to ensure compliance with the Data Protection Act 2018, Human Rights Act 1998, the common law duty of confidentiality, the General Data Protection Regulation and all other relevant legislation.
  • We will establish and maintain policies for the controlled and appropriate sharing of service user and staff information with other agencies, taking account all relevant legislation and citizen consent.
  • Where consent is required for the processing of personal data we will ensure that informed and explicit consent will be obtained and documented in clear, accessible language and in an appropriate format. The individual can withdraw consent at any time through processes which have been explained to them and which are outlined in our Record Keeping Policy: Withdrawal of consent procedures. We ensure that it is as easy to withdraw as to give consent.
  • We will undertake annual audits of our compliance with legal requirements.
  • We acknowledge our accountability in ensuring that personal data shall be:
  1. Processed lawfully, fairly and in a transparent manner;
  2. Collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes;
  3. Adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed (‘data minimisation’);
  4. Accurate and kept up to date;
  5. Kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed (‘storage limitation’);
  6. Processed in a manner that ensures appropriate security of the personal data.
  • We uphold the personal data rights outlined in the GDPR;
  1. The right to be informed;
  2. The right of access;
  3. The right to rectification;
  4. The right to erasure;
  5. The right to restrict processing;
  6. The right to data portability;
  7. The right to object;
  8. Rights in relation to automated decision making and profiling.
  • In line with legislation we employ a Data Protection Officer (DPO) who will report to the highest management level of the organisation. We will support the DPO with the necessary resources to carry out their tasks and ensure that they can maintain expertise. We guarantee that the DPO will not be pressured on how to carry out their tasks, and that they are protected from disciplinary action when carrying out the tasks associated with their role.
 

5. Underpinning policies & procedures

This policy is underpinned by the following:

  • Data Quality Policy – outlines procedures to ensure the accuracy of records and the correction of errors;
  • Record Keeping Policy – details transparency procedures, the management of records from creation to disposal (inclusive of retention and disposal procedures), information handling procedures, procedures for subject access requests, right to erasure, right to restrict processing, right to object, and withdrawal of consent to share;
  • Data Security Policy – outlines procedures for the ensuring the security of data including the reporting of any data security breach;
  • Network Security Policy – outlines procedures for securing our network;
  • Business Continuity Plan –outlines the procedures in the event of a security failure or disaster affecting digital systems or mass loss of hardcopy information necessary to the day to day running of our organisation;
  • Staff Confidentiality Code of Conduct - provides staff with clear guidance on the disclosure of personal information.
 

6. Data protection by design & by default

The CPA recognises that this will be new for much of the sector. There is extensive guidance from the Information Commissioner’s Office here. Please note that this is not sector specific.

We shall implement appropriate organisational and technical measures to uphold the principles outlined above. We will integrate necessary safeguards to any data processing to meet regulatory requirements and to protect individual’s data rights. This implementation will consider the nature, scope, purpose and context of any processing and the risks to the rights and freedoms of individuals caused by the processing.
We shall uphold the principles of data protection by design and by default from the beginning of any data processing and during the planning and implementation of any new data process.
Any new high-risk data processing activities will be assessed using a Data Privacy Impact Assessment (DPIA) before the processing commences.
All new systems used for data processing will have data protection built in from the beginning of the system change.
All existing data processing has been recorded on our Record of Processing Activities. Each process has been risk assessed and is reviewed annually.
We ensure that, by default, personal data is only processed when necessary for specific purposes and that individuals are therefore protected against privacy risks.
In all processing of personal data, we use the least amount of identifiable data necessary to complete the work it is required for and we only keep the information for as long as it is required for the purposes of processing or any other legal requirement to retain it.

 

7. Responsibilities

Our designated Data Protection Champion is Roksana Kalisz. The key responsibilities of the lead are:

  • To ensure the rights of individuals in terms of their personal data are upheld in all instances and that data collection, sharing and storage is in line with the Caldicott Principles;
  • To define our data protection policy and procedures and all related policies, procedures and processes and to ensure that sufficient resources are provided to support the policy requirements.
  • To complete the Data Security & Protection Toolkit (DSPT) annually and to maintain compliance with the DSPT.
  • To monitor information handling to ensure compliance with law, guidance and the organisation’s procedures and liaising with the Senior Information Risk Owner (SIRO) and DPO to fulfil this work.

Our designated DPO is Roksana Kalisz they can be contacted via email using our secure online form; phone: 020 8299 1234 or at the following address: 1 Forest Hill Road, London, SE22 0SQ.

The key responsibilities of the DPO are:

  • Overseeing changes to systems and processes;
  • Monitoring compliance with the GDPR and DPA18;
  • Completing DPIA;
  • Reporting on data protection and compliance with legislation to senior management;
  • Liaising, if required, with the Information Commissioner’s Office (ICO).

Our Senior Information Risk Owner (SIRO) is Dr Liz Main.

The key responsibilities of the SIRO are:

  • To manage, assess and mitigate the information risks within our organisation;
  • To represent all aspects of information and data protection and security to senior management and drive engagement in data protection at the highest levels of the organisation.