School of Applied Business and Management
Unit: 1STU104 – Legal and Ethical Context of
                            Practice.
Topic : Discuss the safe and effective use of health and social
care information
September 2021                          Presentation By: MR. OWENS
The CARE CERTIFICATE
Handling information
                       Standard
                            2
Learning outcomes
14.1 Handling information
                            Standard
                                 3
Handling information
The information about an
individual's care and support
may be personal and sensitive.
This information must be
treated as confidential and
only shared with people who
need to know.
Respecting confidentiality is:
■ A legal requirement
■ Essential to promote the
   individual
■ An important part of
   building trust.
                                 4
Information sharing
■ Information can be shared with
  people who need-to-know.
                                               Yes X     No✓
■ Which of the people below would ‘need-to-know’ about an
  individual’s care and support needs?
The individual’s neighbour                                          X
A health and social care worker who is involved in providing care   ✓
The individual's family or friends                                  X
The worker’s family or friends                                      X
A health and social care worker not involved in providing care
to the individual
                                                                    X
A worker in a different role who is involved in providing care to
the individual                                                      ✓
                                                  5
Social media
■ The internet enables sharing
  of information through
  social media such as
  ‘Facebook’ and ‘Twitter’
■ Mobile internet technology
  makes it possible to share
  information instantly
  increasing the risks of
  breaching confidentiality.
                                 6
The General Data Protection Regulation 2016
There are 6 privacy principles contained within the GDPR:
1. Lawfulness, fairness and transparency
2. Purpose limitations
   Personal data can only be obtained for specified, explicit and legitimate
   purposes and can only be used for a specific purpose and no other,
   without further consent.
3. Data minimisation
   No more than the minimum amount of data should be kept for specific
   processing.
4. Accuracy
   Data must be accurate and where necessary kept up to date.
5. Storage limitations
   Data no longer required should be removed.
6. Integrity and confidentiality
Data must be handled in a secure manner
                                              7
Freedom of Information Act
The Freedom of Information Act and the Environmental
Information Regulations allow members of the public to access
recorded information held by public authorities in England,
Northern Ireland and Wales.
                                     8
Handling information in health
and social care
■ You must always work in agreed ways that
  protect information
■ Examples of policies and procedures which protect
  information include:
                       Secure storage of     Office security
Computer firewalls
                             keys                 codes
Not sharing passwords with       Locked filing cabinets and
   unauthorised people                  cupboards
                            Security fobs or cards to access
 Password protection
                                      secure areas
                                      9
Care plans
Care plans are an important tool in good communication
between those involved in providing care and support.
In order to ensure quality and consistency of care
they must be:
■ Kept up to date
■ Complete
■ Accurate
■ Legible
■ Factual (without opinion)
■ Free from jargon.
                                      10
Reporting concerns
Concerns about the recording, storing or sharing of
information should be reported to your manager.
Confidential files being left around
A missing key to a cabinet containing confidential files
Passwords being shared with unauthorised people
Personally identifiable information being shared on
social media
Workers discussing an individual in the pub.
If your concerns are not taken seriously you have a duty to
report incompetent or unsafe practice to the regulatory body.
                                       11
Knowledge check
What type of information does the ‘General Data Protection
Regulation 2016 (GDPR)’ apply to?
                                             Click to reveal answer
     Spoken information
     Information which is given
     in training sessions
     Electronic files and organised,
     paper filing systems
     Information that does not identify individuals
                                       12
Knowledge check
Who would be your first point of call if you have concerns
regarding confidentiality?
                                            Click to reveal answer
      My manager or supervisor
      My colleague
      The individual or their family
      The Care Quality Commission
                                       13
Knowledge check
Which of the following people would be classed as an ‘authorised
person’ or would ‘need-to-know’ personal information?
                                                Click to reveal answer
      A senior worker not involved in
      supporting the individual
      A member of the family of the
      individual that you support
      A colleague who is not
      involved in supporting care
      Another worker from the care
      team providing support to an individual
                                         14
Explain when, and how, to share information
and advice between peers in accordance
with current legislation and policy
                          15
The seven golden rules to sharing
information
■ Remember that the General Data Protection Regulation
  (GDPR), Data Protection Act 2018 and human rights law
  are not barriers to justified information sharing, but
  provide a framework to ensure that personal information
  about living individuals is shared appropriately.
■ Be open and honest with the individual (and/or their
  family where appropriate) from the outset about why,
  what, how and with whom information will, or could be
  shared, and seek their agreement, unless it is unsafe or
  inappropriate to do so.
■ Seek advice from other practitioners, or your information
  governance lead, if you are in any doubt about sharing
  the information concerned, without disclosing the
  identity of the individual where possible.
                                     16
■ Where possible, share information with consent, and
  where possible, respect the wishes of those who do not
  consent to having their information shared. Under the
  GDPR and Data Protection Act 2018 you may share
  information without consent if, in your judgement, there
  is a lawful basis to do so, such as where safety may be at
  risk. You will need to base your judgement on the facts of
  the case. When you are sharing or requesting personal
  information from someone, be clear of the basis upon
  which you are doing so. Where you do not have consent,
  be mindful that an individual might not expect
  information to be shared.
                                      17
■ Consider safety and well-being: base your information sharing
  decisions on considerations of the safety and well-being of
  the individual and others who may be affected by their
  actions.
■ Necessary, proportionate, relevant, adequate, accurate, timely
  and secure: ensure that the information you share is
  necessary for the purpose for which you are sharing it, is
  shared only with those individuals who need to have it, is
  accurate and unto-date, is shared in a timely fashion, and is
  shared securely (see principles).
■ Keep a record of your decision and the reasons for it –
  whether it is to share information or not. If you decide to
  share, then record what you have shared, with whom and for
  what purpose.
                                     18
Sharing Information
■ Sharing information is an intrinsic part of any frontline
  practitioners’ job when working with children and young
  people. The decisions about how much information to share,
  with whom and when, can have a profound impact on
  individuals’ lives. Information sharing helps to ensure that
  an individual receives the right services at the right time and
  prevents a need from becoming more acute and difficult to
  meet.
■ Poor or non-existent information sharing is a factor
  repeatedly identified as an issue in Serious Case Reviews
  (SCRs) carried out following the death of or serious injury to,
  a child. In some situations, sharing information can be the
  difference between life and death.
                                       19
■ Fears about sharing information cannot be allowed to stand
  in the way of the need to safeguard and promote the welfare
  of children at risk of abuse or neglect. Every practitioner
  must take responsibility for sharing the information they
  hold, and cannot assume that someone else will pass on
  information, which may be critical to keeping a child safe.
                                    20
The principles
■ The principles set out below are intended to help
  practitioners working with children, young people,
  parents and careers share information between
  organisations. Practitioners should use their judgement
  when making decisions about what information to share,
  and should follow organization procedures or consult
  with their manager if in doubt.
■ The most important consideration is whether sharing
  information is likely to support the safeguarding and
  protection of a child.
                                    21
Necessary and proportionate
■ When taking decisions about what information to share,
  you should consider how much information you need to
  release. Not sharing more data than is necessary to be of
  use is a key element of the GDPR and Data Protection Act
  2018, and you should consider the impact of disclosing
  information on the information subject and any third
  parties. Information must be proportionate to the need
  and level of risk.
                                     22
Relevant
■ Only information that is relevant to the purposes should
  be shared with those who need it. This allows others to
  do their job effectively and make informed decisions.
                                    23
Adequate
■ Information should be adequate for its purpose.
  Information should be of the right quality to ensure that it
  can be understood and relied upon.
                                       24
Accurate
■ Information should be accurate and up to date and
  should clearly distinguish between fact and opinion. If
  the information is historical then this should be
  explained.
                                    25
Timely
■ Information should be shared in a timely fashion to
  reduce the risk of missed opportunities to offer support
  and protection to a child. Timeliness is key in emergency
  situations and it may not be appropriate to seek consent
  for information sharing if it could cause delays and
  therefore place a child or young person at increased risk
  of harm. Practitioners should ensure that sufficient
  information is shared, as well as consider the urgency
  with which to share it.
                                     26
Secure
■ Wherever possible, information should be shared in an
  appropriate, secure way. Practitioners must always follow
  their organisation’s policy on security for handling
  personal information.
                                     27
Record
■ Information sharing decisions should be recorded,
  whether or not the decision is taken to share. If the
  decision is to share, reasons should be cited including
  what information has been shared and with whom, in line
  with organisational procedures. If the decision is not to
  share, it is good practice to record the reasons for this
  decision and discuss them with the requester. In line with
  each organisation’s own retention policy, the information
  should not be kept any longer than is necessary. In some
  rare circumstances, this may be indefinitely, but if this is
  the case, there should be a review process scheduled at
  regular intervals to ensure data is not retained where it is
  unnecessary to do so.
                                       28
When and how to share information
■ When asked to share information, you should consider
  the following questions to help you decide if, and when,
  to share. If the decision is taken to share, you should
  consider how best to effectively share the information. A
  flowchart follows the text.
                                     29
When
■ Is there a clear and legitimate purpose for sharing
   information?
• Yes – see next question
• No – do not share
▪ Do you have consent to share?
• Yes – you can share but should consider how
• No – see next question
▪ Does the information enable an individual to be identified?
• Yes – see next question
• No – you can share but should consider how
▪ Have you identified a lawful reason to share information
   without consent?
■ • Yes – you can share but should consider how
■ • No – do not share
                                      30
How
■ Identify how much information to share
• Distinguish fact from opinion
• Ensure that you are giving the right information to the right
individual
• Ensure where possible that you are sharing the information
securely
• Where possible, be transparent with the individual, informing
them that that the information has been shared, as long as
doing so does not create or increase the risk of harm to the
individual.
■ All information sharing decisions and reasons must be
   recorded in line with your organization or local procedures. If
   at any stage you are unsure about how or when to share
   information, you should seek advice on this. You should also
   ensure that the outcome of the discussion is recorded.
                                       31
Flowchart of when and how to share
information
                           32
Types of Privacy
           33
 The First Kind: Defensive Privacy
▪ The first type of privacy
  is defensive privacy, which
  protects against transient
  financial loss resulting from
  information collection or
  theft. This is the territory of
  phishers, conmen,
  blackmailers, identity thieves,
  and organized crime. It could
  also be the purview of
  governments that seize
  assets from people or
  businesses.
                                    34
The Second Kind: Human Rights
Privacy
■ The second type of privacy
  is human rights privacy,
  which protects against
  existential threats resulting
  from information collection or
  theft. This is the territory of
  stalkers and other felonious
  criminals as well as
  authoritarian governments
  and other persons intent on
  doing damage to someone
  for personal for his or her
  beliefs or political views.
                                    35
The Third Kind: Personal Privacy
■ The third type of privacy
  is personal privacy, which
  protects persons against
  observation and intrusion;
  it's what Judge Thomas
  Cooley called "the right to
  be let alone",
                                36
The Fourth Kind: Contextual Privacy
■ The fourth type of privacy
  is contextual privacy, which
  protects persons against
  unwanted intimacy.
                                 37