Additional memorandum by the Government
INTRODUCTION
1. This additional memorandum provides cross-governmental
information on policies and practices on data sharing and collection.
It covers the relevant work and information systems from the Departments
for Business; Enterprise and Regulatory Reform; Her Majesty's
Revenue and Customs; Communities and Local Government; the Government
Fraud Review; Children, Schools and Families; Innovation, Universities
and Skills; Health; Work and Pensions; and Transport for London.
It also covers information on the work that has been undertaken
in the data sharing and data protection area since the publication
by the Government of its Information Sharing Vision Statement
in September 2006.
DATA SHARING
UPDATE
2. In September 2006, Government published
its Information Sharing Vision Statement (the work of MISC 31,
the Cabinet Committee on data sharing). This set out the Government's
intention to improve public services, tackle crime and terrorism,
and protect the vulnerable through increased public sector data
sharing. It also reaffirmed the commitment to provide a robust
framework for protecting the individual's rights to privacy.
3. Since then, Ministry of Justice (MoJ)
has been undertaking work to inform the Service Transformation
Agreement.
4. On 9 October 2007, the Government published
its Service Transformation Agreement (STA), which will underpin
the 30 Public Service Agreements (PSAs) which were announced as
part of the Comprehensive Spending Review. The STA sets outs the
Government's vision for the transformation of public services
around the citizen and specific actions for individual Government
departments.
5. As part of the Service Transformation
Plans, the MoJ will lead a cross-government programme to deliver
a package of measures over the next three to five years to overcome
the current barriers to information sharing within the public
sector. The aim of this programme is to "develop frameworks
and mechanisms that enable public sector organisations to share
information to improve personalised public services, increase
public safety and tackle social exclusion in an environment of
openness and respect for citizens' privacy and access rights".
6. On 25 October 2007 the Prime Minister
asked the Information Commissioner, Richard Thomas, and Dr Mark
Walport, Director of the Wellcome Trust, to undertake a review
into how personal information is used and protected in both the
private and public sectors. The review will consider whether there
should be any changes to the way the Data Protection Act 1998
operates in the UK and the options for implementing any such changes.
The recommendations will seek to take account of technological
advances and strike a balance that ensures appropriate privacy
and other safeguards for individuals and society, whilst enabling
sharing information to protect the public, increasing transparency,
enhancing public service delivery as well as the need to minimise
the burden on business. The review report and recommendations
will be submitted to the Secretary of State for Justice in the
first half of 2008.
7. On 22 November 2007, following events
at HMRC, the Prime Minister asked Kieran Poynter of PricewaterhouseCoopers
to undertake a review into HMRC's data handling procedures. The
interim report sets out the work Keiran Poynter has already put
in hand and makes recommendations as to the immediate steps that
HMRC must take to protect data security. HMRC has aready put in
place a number of measures these include:
(a) the imposition of a complete ban on the transfer
of bulk data without adequate security protection, such as encryption;
(b) measures to prevent the downloading of data
without adequate security safeguards; and
(c) HMRC disabling all the personal and laptop
computers it uses to prevent downloading of data on to removable
media. These will only be reactivated with approval of a senior
manager, and for a specific business-critical purpose.
8. A full report from Keiran Poynter is
expected in Spring 2008.
9. The PM also announced that the Government
would give the Information Commissioner the power to carry out
spot-check inspections of Government Departments' compliance with
the Data Protection Act 1998. These spot checks will start early
in the New Year.
10. Also, the PM announced that Sir Gus
O'Donnell would be undertaking a review to consider procedures
in departments and agencies for the protection of personal data;
consider their consistency with Government-wide policies and standards;
consider the arrangements for ensuring that procedures are being
fully and properly implemented and making recommendations on improvements.
The first stage concluded on 10 December, involved Departments
undertaking an analysis of their systems and procedure for complying
with policies and standards on data protection, including making
recommendations for practical improvements.
11. On 17 December the Sir Gus O'Donnell
Review published Data Handling Procedures in Government: Interim
Progress report which set out the findings of the review so far,
an update of progress and detailed the next steps. In particular
the next steps committed on extending the spots checks to the
entire public sector and in principle to the introduction of new
sanctions under the Data Protection Act for the most serious breaches
of the principles. Both of these commitments will be consulted
on early in 2008. Stage two of the Review will look collectively
at improved standards and procedures across Whitehall. This is
due to be completed in early 2008.
EVIDENCE FROM
DEPARTMENT FOR
BUSINESS, ENTERPRISE
& REGULATORY REFORM
(BERR)
SUMMARY
1. The Department for Business, Enterprise
& Regulatory Reform (BERR) is committed to fostering competitive
markets in the UK, EU and worldwide. By fighting anti-competitive
practices and promoting open markets, we enable companies to compete
freely and fairly, giving UK consumers more choice and better
value. To support this aim, BERR has an enforcement and regulatory
capacity to investigate, prosecute and regulate a range of activities,
including criminal offences relating to company and personal insolvency
fraud and in relation to suspected fraud of health related compensation
schemes for former employees of British Coal, who are now the
responsibility of the Department; and the regulation of misconduct
or unscrupulous practice in actively trading companies.
2. This response to the House of Lords Call
for Evidence will only comment from the viewpoint of the regulatory
and enforcement arm of BERR as described above. Any reference
from this point onwards to "BERR" should be taken only
to include these enforcement and regulatory arms of the Department.
This response will examine the various ways in which BERR utilises
private data, including that obtained by covert techniques, and
assess the relative impact on the right to privacy of the individual
and their corresponding relationship with the state, through their
relationship with BERR. Further, although the Call for Evidence
covers the wide topic of personal data issues, BERR's view will
be restricted to the competencies of its enforcement and regulatory
functions.
DATA COLLECTION
3. BERR has a need to access personal information
to fight crime and protect both the consumer and the UK open market
economy. Although some parts of BERR collect personal data to
enable compensation claims to be assessed, in the main, BERR does
not collect and hold personal and private information on citizens
in the traditional sense, however generally gathers information
to be used in an evidential format to found and support both civil
and criminal actions. Thus, personal information is held for the
length of time necessary to prove or disprove allegations and
the concordant time after judicial process to facilitate any such
appeals as may occur.
4. BERR obtains information under a variety
of legislative permissionsthe Data Protection Act 1998,
the Anti-Terrorism, Crime & Security Act 2001, the Companies
Act 1985 (although this relates to company material and not personal
or private information), the Police and Criminal Evidence Act
1984 and the Regulation of Investigatory Powers Act 2000. In all
of its dealings, BERR is subject to the checks of the Human Rights
Act 1998, the European Convention on Human Rights and Fundamental
Freedoms, the DPA 1998, PACE 1984 and the various auspices of
administrative law governing public authorities.
5. Personal information which is required
by BERR is requested with reference to the Data Protection Act
1998, if there is no more specific legal gateway in which information
can be obtained. BERR uses the exemption at section 29 to request
information (that might otherwise be withheld) for the explicit
purpose of the prevention and detection of crime and the apprehension
and prosecution of offenders, whilst section 35 is used where
the information is required for the purpose of legal proceedings.
The reasons for the request are outlined, giving the recipient
of the request a choice whether to release the information or
not, dependant on their opinion on the necessity of the information
and whether they agree that the exemption applies to the request.
A safeguard is inherent therefore in that information does not
have to be provided unless the provider feels that disclosure
is justified and necessary to further the enquiry. It is submitted
that any information gathered in such a way by BERR has therefore
been impartially audited to protect privacy of citizens and minimise
any risk of collateral intrusion.
6. The same audit process is conducted for
any requests made under the Anti-Terrorism, Crime and Security
Act 2001, section 19, again providing a level of assurance that
the requested information is necessary, legally sought and for
a specified, guaranteed purpose. Further, BERR guarantees that
the information sought cannot be obtained by any other means,
that it is of substantial value to the enquiry and that lack of
the information would prejudice the enquiry. Again, these are
safeguards used to protect the public from unnecessary intrusion
into their private life and to ensure that BERR is complying with
the requirements and ethos of the HRA and ECHR.
7. BERR is authorised under the Regulation
of Investigatory Powers Act 2000 to conduct directed, non-intrusive
surveillance, to authorise the conduct of covert human intelligence
sources and to obtain communications data. BERR considers that
these methods are fundamental, basic and crucial utensils of any
investigative toolbox. During the period January 2006 to November
2007, BERR made six directed surveillance applications and four
applications for the use of Covert Human Intelligence Sources
("CHIS"). During the same period, 68 notices to communication
providers were issued, for communications data to be used in 17
enquiries. This may give the impression that BERR is not the most
prolific user of RIPA. However, it is submitted that the potential
to employ such a powerful tool is a basic requirement of investigation;
effectively disarming BERR without the capacity. BERR places much
emphasis on the criteria of proportionality and necessity, using
the tool sparingly as a last resort after all other methods of
obtaining the information have been exhausted. It can be argued
that even if just one offender was brought to justice using information
obtained under RIPA, the capacity would be justified. The information
obtained is compelling, powerful and often irrefutable, for example
in the case of company directors allegedly paying for goods from
suppliers with stolen cheques. Communications data obtained regarding
both telephone and Post Office box numbers proved links to the
defendants, resulting in a guilty plea. Additionally, the example
of the disqualified director running a haulage business, whereby
telephone numbers on vehicles were demonstrated, through gathering
communications data, to be diverted to the telephone number of
the suspect assisted in bringing the offender to justice. The
facility of RIPA results in fairer, swifter, more effective justice
by proving or disproving allegations, reducing investigation times,
obtaining guilty pleas where appropriate so freeing up court time
and relieving witnesses of the trauma of having to give evidence.
8. BERR only interferes with the exercise
of the right to respect for private and family life in accordance
with the exemptions provided for in the ECHR, ie in accordance
with the law of the HRA and RIPA. BERR is of the view that there
will always have to be some sacrifice of personal privacy on the
part of the individual in order to protect the welfare of society,
citizens and the public purse and believes the public accept this
trade-off. However, the sacrifice is only made in proportion with
the seriousness of the allegation under investigation and if it
is necessary as a line of enquiry of last resort. There is objective
scrutiny by a Senior Investigating Officer impartial to the investigation,
and in some cases impartial to the Unit undertaking the enquiry,
before covert conduct is authorised. This accountability is provided
for in RIPA and is further monitored by the Offices of the Surveillance
and Interception Commissioners. It is submitted that there is
little more that can be done to protect individual privacy from
unnecessary intrusion whilst still affording a level of protection
from fraud to the community at large. Removing this investigative
tool would be tantamount to rendering BERR investigators ineffective,
whilst allowing fraudsters to defraud with impunity. Further,
it is suggested that any such action would be deeply unpopular
with the general law abiding taxpayer who has a right to, and
a legitimate expectation of, protection.
9. BERR also accesses private data by way
of search warrants and orders for production of special procedure
material under the Police and Criminal Evidence Act 1984, sections
8 and 9. Again, although the material obtained is often personal
and private to the individual, the judicial scrutiny required
before obtaining these orders and the inherent requirement of
the court to construe and implement all decisions in line with
the fundamental rights identified by European law and conventions
provides independent analysis of BERR's requests to access personal
information. The court adjudicates on the necessity and proportionality
of any such request to protect the rights of the individual from
unwarranted state intervention; thereby it is submitted, preserving
their relationship of trust with the state.
10. It is submitted that it is the responsibility
of each and every public authority to conduct any interaction
with the public with legal care, consideration and a respect for
fundamental human rights, particularly with regard to the collection,
retention and sharing of personal data. The public judge the effectiveness,
efficiency and integrity of the state on the basis of their dealings
with public bodies. BERR takes the mantle and responsibility of
public confidence very seriously, both understanding and acting
to maintain the delicate balance between individual liberties
and the safeguarding of the community in a democratic society.
BERR therefore feels that although the relationship between citizen
and state is, of necessity, changing as society and crime is changing,
it is still a relationship of trust and confidence.
EVIDENCE FROM
HER MAJESTY'S
REVENUE AND
CUSTOMS (HMRC)
1. Her Majesty's Revenue and Customs (HMRC)
is responsible for the collection and administration of Capital
Gains Tax, Corporation Tax, Environmental Taxes, Income Tax, Inheritance
Tax, National Insurance Contributions, Excise duties, Insurance
Premium Tax, Petroleum Revenue Tax, Stamp Duty (including Land
Tax and Reserve Tax) and VAT. HMRC also has functions in relation
to Child Benefit, Child Trust Fund and Tax Credits, National Minimum
Wage and the collection of student loans on behalf of the Department
for Innovation, Universities and Skills. HMRC collects data in
pursuit of all of these functions and this is held on secure databases.
2. A review is currently underway into security
processes and procedures, as announced by the Chancellor on 20
November. The review which is being led by Kieran Poynter, Chairman
of PricewaterhouseCoopers, will be looking at HMRC practices and
procedures in the handling and transfer of confidential data.
It will make recommendations on how internal processes can be
strengthened and whether HMRC's wider processes for liaison with
other organisations should be changed to reduce the risks. Details
on these issues are not included in this report therefore, to
avoid compromising the findings from this Review.
3. HMRC collects data in order to carry
out its functions. The data ranges from tax information about
the earnings of individuals, the turnover of businesses, data
about employees and employers (tax codes, pay schemes etc), those
entitled to tax credits and child benefit and child trust fund
payments. Data is collected about transactions eg supplies of
anything subject to tax including the sale of goods and services,
the purchase of homes (stamp duty) and inheritance tax whilst
HMRC's work at the frontier involves the collection and analysis
of data about the import and export of goods, the movement of
passengers and vehicles, suspected or proven smuggling activity
and other relevant information.
4. In order to improve the extent to which
individuals and businesses pay the right amount of tax due and
receive the credits and payments to which they are entitled, and
to reduce the compliance burden upon them, the data collected
may be internally pooled where there is a legitimate need to do
so and it is proportionate and appropriate.
5. HMRC conduct surveillance activity to
obtain information in both civil and criminal investigation cases.
Their directed and intrusive surveillance activity is conducted
in accordance with the provisions of the Regulation of Investigatory
Powers Act, the Police Act and the relevant codes of practice.
The conduct of this surveillance activity is subject to scrutiny
by the Interception of Communications Commissioner and the Surveillance
Commissioner. All this surveillance activity is authorised in
accordance with the codes of practice and, where appropriate by
the relevant Commissioner and the Home Secretary.
6. HMRC aims to ensure that data is only
used where lawful to do so and for the purposes for which it is
intended. HMRC aims to balance the collection of data and use
of surveillance activity with the need to protect privacy and
maintain confidence that data will be used only where it is relevant,
necessary and proportionate to do so and is adequately protected
against misuse.
EVIDENCE FROM
DEPARTMENT OF
COMMUNITIES AND
LOCAL GOVERNMENT
(CLG)
1. The Department of Communities and Local
Government within its day-to-day operations may manage and hold
personal information for various purposes. The most common form
of personal information held is name and contact details on stakeholder
consultation lists. For example the Gypsy and Traveller Stakeholders
list is kept for the purpose of consultation and keeping our stakeholders
informed and involved in our policy making processes. Such lists
are maintained and updated by the policy officials in the relevant
policy teams and are unlikely to be shared with officials across
the department. Names are added and maintained on a stakeholder
on request of the individual and consent can freely be withdrawn
at any time.
2. It may be worth the committee noting,
that although the department collects limited personal information
in comparison to some other departments, we do provide guidance
(where it has been identified as helpful or needed) to Local Authorities
on the management and use of personal information which they control.
For example the department is currently working on guidance for
use and sharing of personal information for revenues and benefits
departments within Local Authorities. Guidance is not legal advice
but is designed to help Local Authorities determine the best position
possible in respect to their particular circumstances and purposes.
3. Below are two examples of relevant work
and information systems in CLG which the committee may find of
interest.
SUPPORTING PEOPLE
(SP)
4. SP was launched in 2003. It is a grant
programme which enables the provision of housing support services
to help vulnerable people maintain or improve their ability to
live independently in their homes and their communities.
5. Providers complete a form recording standard
information for each new service user they take on and send it
to the Centre for Housing Research (CHR) in St Andrews University
where the data collection, processing and preliminary statistical
analysis is carried out. Summary statistics are sent to each Administering
Authority and CLG on a quarterly basis and non-personal data is
uploaded to a website hosted by St Andrews.
6. Additionally since 2007, providers complete
a form for each service user who leaves their service (or on a
sampling basis for clients in receipt of long-term services),
which indicates how successful the service was in meeting the
clients' needs (to assist them to achieve greater independent
living). Forms are sent to St Andrews and are processed as above.
7. The personal information collected for
this programme includes:
Age (but not date of birth).
National Insurance number (optional
and agreed by DWP, introduced at beginning of 2006-07).
Ethnic origin (optional).
Disability (optional on Outcomes
form and will be introduced as an optional question on Client
Records form for 2008-09).
Which client group the client is
defined by.
Whether client has been accepted
as requiring services under statutory frameworks.
Whether client has been assessed
as a higher risk.
Whether client is subject to requirements
under an ASBO.
Type of referral (from within same
authority or from another).
Accommodation occupied prior to receiving
support service.
How long client has lived in authority
where the service is being provided (if less than six months,
where they lived before).
Clients religion (optional and on
Outcomes form only).
How successful the support was in
achieving a number of outcomes.
BENEFITS TO
THE CITIZEN
8. Combining Client Record and Outcomes
data allows analysis of patterns of clients moving through different
services throughout England. Therefore, it provides a measure
of progression which can:
be used to assess clients' needs
and so identify the level of need for services and in which areas;
assist in the development of servicesto
ensure they are tailored to clients' needs;
monitor performance of servicesidentifying
where improvements can be made to services or the provision of
services for clients;
monitor effectiveness of the programme
in delivering positive outcomes for individuals; and
inform commissioning and contact
management.
9. CLG ensures the following safeguards
or methods of data management to ensure the sharing of personal
information is kept to a minimum;
National Insurance Numbers will not
be linked to any database that would allow the identification
of individual clients and National Insurance Numbers, and are
not shared with anyone but CLG.
CLG will not be able to identify
any individuals from the national insurance numberthe client's
name and date of birth are not recorded.
CLG owns the data and permission
must be sought before disclosing it to any other organisation
(as outlined in the terms of the contract with St Andrews).
INFO4LOCAL
WEBSITE
10. www.info4local.gov.uk is a one-stop
web portal that gives local authorities and others quick and easy
access to information from across central government. It is managed
by a partnership of seven departments (Communities and Local Government,
the Department for Children, Schools and Families, Defra, the
Department for Transport, the Department for Work and Pensions
and the Home Office). More than 70 departments, agencies and public
bodies add information to info4local, including links to news,
consultations, policy documents, guidance, circulars, newsletters,
events, research, related links and more.
(a) Personal information collected for the programme
includes:
11. An email alert service is sent twice
a day to more than 53,000 subscribers. People can choose whether
or not to subscribe to this free service. Subscribers fill in
an online form in order to register and give the following information:[13]
Whether they work for a local authority
and, if so, which one.
Whether they work in central government,
the voluntary and community sector, the NHS or other field. If
so, they are asked which region they are based in.
12. They are asked to supply the following
information:
If they respond that the work in
an "other" field, they are asked to specify which.
Whether they wish to be included
in future research.
All other parts of the form relate to information
the subscriber would like to receive in their email alert.
13. We also have a contacts form. We ask
people to include their telephone number if they want to discuss
their query. The form asks for information, including the following:
Area of work (central government,
local government, local-government related organisation, NHS,
voluntary and community sector, other): this is not a mandatory
field.
14. We also collect information through
customer satisfaction surveys and site usage information, using
cookies, log files and page tagging techniques, including JavaScript.
BENEFITS TO
THE CITIZEN
15. Subscribers to email alerts receive
a service they have asked to receive and we need some personal
information (eg email address) to deliver the service. Other information,
such as details about their work, helps us to build up a picture
of who is using info4local that we can use to target future promotion.
16. Customer satisfaction surveys are voluntary.
They are a way of asking users' views about the service we provide
and consulting them about future developments so that we can improve
the service to them.
17. Site usage information also helps us
to improve the service we provide. They show, for example, which
information users have been most interested in.
SAFEGUARDS
18. CLG publish their privacy policy on
info4local so that users understand the intended uses of any information
that may be collected. CLG also has a commitment in place to communicate
any changes to the privacy policy.
19. The information is stored on an externally
hosted database server on DCLG's corporate hosting infrastructure.
The only people who have access to the information as the site
developers and authorised CLG personnel.
20. Access is restricted by user accounts
so it is possible to trace back a change to a particular user
account. In addition to the site developers' security credentials,
CLG has also recently conducted a penetration test carried where
we identified no outstanding vulnerabilities to be addressed.
EVIDENCE FROM
THE GOVERNMENT
FRAUD REVIEW
(AG)
1. In 2006 a cross cutting interdepartmental
group established by the Attorney General and the Chief Secretary
conducted a Review of the way we combat fraud in England and Wales.
It recommended a Government led, national anti fraud strategy
to manage a holistic programme of shared knowledge, co-ordinated
action and improved prevention across both the public and private
sectors.
2. The damage caused to society and the
economy is known to run into many billions of pounds annually.
Fraud is known to fund and support most forms of organised crime
and even terrorism. In addition, individual fraud victims suffer
acute anxiety and stress and may lose confidence both in the security
of financial services products and systems and in the Criminal
Justice System itself.
3. Following extremely supportive public
consultations, the key recommendations of the Fraud Review were
accepted by the Government and will be implemented following funding
being made available as part of the 2008-11 Comprehensive Spending
Review. The principal architecture for the national strategy comprises
a National Fraud Strategic Authority (NFSA), a National Lead Force
for Fraud and a National Fraud Reporting and Intelligence Centre
(NFRC).
4. These are being designed by joint public-private
sector working groups and will be established serially during
2008-10. The working groups are under the direction of the Attorney
General's Programme Board, which includes senior members of the
Home Office, British Bankers' Association, the Association of
Chief Police Officers Economic Crime Portfolio, Department of
Work & Pensions, Association of British Insurers, Serious
Fraud Office, Financial Services Authority, the Ministry of Justice
and HM Revenue and Customs; and is chaired by the Director of
Policy at the AG's Office.
5. The NFSA will provide the leadership
for the National Strategy and will bring together all the key
stakeholders (public and private), whose combined power and authority
will ensure that co-ordinated action is taken to implement the
agreed strategies.
6. Concerted action will be taken across
the entire existing system, comprising deterrence, prevention,
detection, investigation, law enforcement, sanctions and redress
for victims. The Strategy will aim to protect public money, businesses
and individual consumers from fraud and to increase the impact
of joint anti fraud efforts and law enforcement.
7. Key to the success of the National Strategy
will be the sharing of information and knowledge about fraud,
enabling weaknesses to be addressed and anti fraud actionsbe
they preventive or deterrentto have greater impact on fraud
incidents and repeated offending. It is of fundamental importance
to the success of the project that the rights of citizens be protected.
Therefore, these information sharing arrangements must be compliant
with both the Human Rights Act 1998 and Data Protection Act 1998
so that there is proper management, use and disclosure of the
personal information in a manner which is necessary, reasonable
and proportionate to achieve the intended aims of the national
fraud strategy.
8. Existing sector strategies of this kind
have already resulted in considerable success in reducing financial
fraud in particular areas:
The NHS counter fraud and security
management service (CFSMS) achieved £189 million savings
in 2005.
The Audit Commission's National Fraud
Initiative saved over £111 million in 2005-06.
The DCPCU (Dedicated Cheque &
Plastic Crime Unit, sponsored by APACS) saved £10 million.
9. Each 1% reduction in fraud losses in
the Banking sector (which contributes some 8% of GDP annually)
secures £2.8 million in extra Corporation tax. CIFAS (The
UK fraud prevention service, operating in the financial sector)
has estimated that more data sharing between the public and private
sectors has the potential to deliver between £137 million
and £273 million annually in benefits to the public sector.
The Serious Crime Act 2007 contains power for the Secretary of
State to designate fraud prevention organisations for this purpose.
10. The NFSA will also have an important
role in providing public information about fraud and in measuring
and publicising the success of actions taken to prevent, deter
and punish fraud offences. It will be able to build on lessons
learned in frontline investigation and feed these into both policy
making and the design of anti fraud systems. Businesses, Government
Departments and individual potential victims will benefit from
greater awareness of fraud losses and from the experiences of
others in reducing these.
11. The NFRC will be a police led organisation,
housed within the City of London Police; whose existing role as
the lead force for fraud in London and the South East will be
extended to provide the National Lead Force. The NFRC will contain
a fraud intelligence analysis capability, to support the national
anti fraud strategy, as well as providing an important service
to the public in general and to fraud victims in particular. It
will be essential to the success of the strategy to build knowledge
and understanding of fraud methods, typologies and repeat offenders,
so that vulnerabilities can be identified and addressed.conf
12. The NFRC is being designed in close
co-operation with the Information Commissioner's Office. Its final
form and processes have yet to be decided by the Programme Board;
but its overriding object will be to manage the knowledge we have,
and can obtain, about fraud; ie about those who commit frauds,
their methods and their fields of operation, in order to maximise
the impact of all anti fraud action across the entire law enforcement
and crime prevention "system". One of the options for
the NFRC's call centre functionality is a partnership with an
existing government department call centre, such as the OFT's
Scambusters network, the FSA's consumer hotline or those operated
by DWP or HMRC.
13. The NFRC will eventually receive all
reports of fraud offences or incidents, either directly from victims
(individual or corporate) or in bulk from organisations that already
record suspected or actual offences and incidents: the Police,
SOCA, Government departments, specialist units such as CIFAS,
the DCPCU and the Insurance Fraud Bureau, Regulators and their
equivalents overseas. This will enable it to contribute important
data for measuring fraud losses which will in turn direct a future
risk based national strategic response to fraud. The analyses
of fraud incidents performed by the NFRC will support and inform
the NFSA's public awareness work and ensure a better service to
all victims. A survey conducted during the Fraud Review indicated
that fraud victims are anxious to ensure that others do not fall
prey to the same frauds. The NFRC will have an important role
to play in publicising fraud methods and informing the public
of the specific weaknesses and vulnerabilities that fraud exploits.
14. Some of the technology to link the various
databases may not yet exist; for example the Police National Database
project; so it is likely that the NFRC's capability will be built
in stages and that it will be the last building block supporting
the National Strategy to become fully operational. The programme
will be subject in due course to a Gateway Review conducted by
the Office for Government Contracts.
15. The NFRC will analyse the reports of
fraud received, adding intelligence received from police and other
sources to provide packages for action by law enforcement, Regulators
and the public and private sectors. It is anticipated that the
organisation will benefit from secondments of experienced civilian
staff from all these sectors, to ensure that appropriate packages
are designed for maximum impact on fraud reduction.
16. The NFRC will adhere strictly to any
Codes of Conduct produced by the Information Commissioner and/or
the Ministry of Justice's Information Sharing Strategy projects.
Its intelligence packages will be conforming to the National Intelligence
Model (NIM).
EVIDENCE FROM
DEPARTMENT FOR
CHILDREN, SCHOOLS
AND FAMILIES
(DCFS) AND THE
DEPARTMENT FOR
INNOVATION, UNIVERSITIES
AND SKILLS
(DIUS)
1. Effective sharing of data and information
is central to the Department for Children, Schools and Families'
(DCSF) ability to deliver better outcomes for children and learners.
Better information sharing is crucial to safeguarding children
and supporting the drive to personalise learning and to improve
service delivery; it also contributes to improvements in efficiency
and effectiveness, in reducing burdens on the front line, and
in ensuring effective accountability. It is a cornerstone of the
Every Child Matters (ECM) strategy to improve outcomes for all
children and for delivery of many of our reform programmes such
as specialised diplomas and vocational qualifications reform.
2. Better information sharing brings many
benefits and the DCSF is determined to ensure that the benefits
are balanced against the need for privacy and the safety and security
of personal data and information. This is reflected in the design
and delivery of programmes and the systems that support them.
This includes legislation when appropriate, guidance and training
for practitioners, authorisation and authentication of users,
and secure systems.
3. Much of DCSF activity depends on effective
information sharing, both at the level of Government databases,
and between individual practitioners. Every Child Matters is a
cross-Government programme, led by DCSF, of system-wide reform
of children's services that supports working across professional
boundaries to co-ordinate services around the needs of individual
children and young people. Similarly, the devolved nature of the
education, skills and children's services sector, and large number
of public bodies and institutions within it make effective sharing
of data and information particularly important. This is increasingly
the case as services are organised around the needs of customers.
4. Many of the major DCSF programmes depend
on effective sharing of data, all of which aim to improve services
to children, families and learners. Some are an essential force
for protecting children and young peopleContactPoint and
the Common Assessment Framework, and the new Vetting and Barring
scheme, which is a cross-Departmental programme with the Home
Office in the overall lead and DCSF and DH sharing the policy
lead for children and for vulnerable adults respectively.
5. In July the Government announced that
it will provide to front-line professionals in children's services
support by implementing a single national IT system to support
the Common Assessment Framework (eCAF).
6. The Common Assessment Framework (CAF)
is a key element of the Every Child Matters programme to transform
children's services by supporting more effective prevention and
early intervention. Its goal is to provide a standardised approach
for practitioners in the holistic assessment of a child's needs
and the design of an integrated service to meet those needs.
7. eCAF will allow a practitioner to create
electronically, store, and share a CAF securely. Completion of
CAFs by different agencies and the subsequent exchanges of data
between relevant agencies promote multi-agency working and early
interventions. The complexities of cross border work are removed,
as eCAF provides a consistent approach for all practitioners working
in different agencies and locations, thus facilitating the effective
and efficient delivery of a coordinated service. eCAF will only
hold information about some (not all) children, with consent,
and for a limited period of time.
8. Access to it will be granted only to
authorised users who have undergone appropriate checks, including
those provided by the Criminal Records Bureau. Practitioner use
of the eCAF system will be audited to ensure information is only
accessed where it is necessary for practitioners to do so, and
so guard against inappropriate access by authorised users.
9. Sharing of data is central to the introduction
of major reform programmes such as the Specialist Diplomas for
14 to 19 year olds. For example, this programme may result in
a learner completing courses with a number of learning providers
and qualification awarding bodies. Students may have a personal
portfolio of evidence drawn from different sources. This portfolio
(probably web based) would be portable and owned by the student.
It would be capable of being updated from different sources (learning
providers, employer assignments) and shared by the student with
others including universities, colleges and employers. In this
instance the sharing of data brings real benefits to the learner
through greater transparency, choice and ownership and supports
greater efficiency and effectiveness in the system.
10. We have recently led on work with partners
across government, and more widely (including the Information
Commissioner's Office (ICO)), to develop a practitioner guide
on information sharing. The guidance is published as part of the
Every Child Matters strategy and is proving a valuable tool for
practitioners to enable them to know when and how they can share
information legally and professionally, in compliance with the
Data Protection Act, the Human Rights Act and the Common Law Duty
of Confidentiality. It addresses sharing information as part of
preventative services and enables practitioners to reach an informed
and appropriate decision about whether information should be shared.
11. The Integrated Children's System (ICS)
is a framework for working with children in need (as defined under
the Children Act 1989) and their families. ICS provides a conceptual
framework, a method of practice, and a business process to support
practitioners and managers in undertaking the key tasks of assessment,
planning, intervention and review, for looked after children and
other children in need. It is based on an understanding of children's
developmental needs in the context of parental capacity and wider
family and environmental factors. It has full regard to current
legislation. Because the work with children in need requires skilled
use of detailed and complex information, ICS is designed to be
supported by an electronic case record system.
12. A key aim of ICS is to provide frontline
staff and their managers with the necessary help, through information
communication technology (ICT), to record, collate, analyse and
output the information required. There is no "ICS database".
Each of the 150 top-tier local authorities has been required to
adopt the best practice principles enshrined in ICS, of assessment,
planning, intervention and review. Authorities are required to
ensure that the information needed for each of these key processes
for responding to children in need in their own area is held electronically
according to appropriate exemplars. This has meant that each authority
has been developing it own existing IT systems to meet this challenge.
13. ICS users are not exempt from the legal
requirements governing either the sharing of personal data or
social care practice. The Children Act 1989 is clear that, whenever
an assessment of a child's needs, either for services, accommodation,
or protection, is made, the child's wishes and feelings must be
taken into account.
14. The CCIS (Client Caseload Information
System) is a well established operational system. It is currently
managed by Connexions and is capable of monitoring the activities
of young people at local authority and even ward level. CCIS was
primarily designed as a tool for Connexions personal advisers
and lead professionals to support effective intervention and identify
the most vulnerable young people and their needs. It provides
a framework for the consistent recording of information, which
is used for performance management and measuring progress towards
local targets for supporting those not in education, employment
or training.
15. There are also programmes within the
Department for Innovation, Universities and Skills (DIUS) which
are about enabling efficiency, and improving educational attainment.
The most notable is the Managing Information Across Partners (MIAP)
programme will enable information about post-14 learners to be
shared more efficiently between bodies such as schools, colleges
and exam boards.
See Annex 2 for more details of MIAP.
16. The examples above demonstrate some
of the benefits of data sharing to both the citizen and administrative
systems. The DCSF aims to balance these benefits with the need
to maintain privacy and security of data. We are very aware that
if citizens are to take up the education, skills and children's
services to which they are entitled they must have confidence
in the way their personal data is handled and shared. While all
services are subject to the appropriate legislation on privacy
and security of data, we have also put in place a range of measures
that aim to provide this confidence and accountability. This is
achieved through a range of measures including appropriate legislation,
guidance to practitioners, access control through authorisation
and accreditation of practitioners and building security into
system design.
17. Following the recent events in HMRC,
DCSF undertook a review of its internal processes which is led
by the Chief Information Officer reporting directly to the Permanent
Secretary. We have also asked Deloitte to carry out an independent
review of information security for ContactPoint, where we know
people will want additional assurance.
18. We have strong arrangements in place
to protect data held by the Department. The Departmental Security
Unit has primacy on all security matters including IT security
and Information Assurance, and reports directly to a Board member.
Our Data Services Group leads on statistical returns and analysis
and safeguards this material. Our Internal Audit Division is a
major player in managing risk and ensuring compliance.
19. Data security is being built into the
design and implementation of all the major DCSF programmes. A
prime example is ContactPoint which will be the quick way for
authorised professionals working with children to find out who
else is working with the same child or young person, making it
easier to deliver more coordinated support. This basic online
directory will be available to authorised staff who need it to
do their jobs. It is a key part of the Every Child Matters programme
to improve outcomes for children.
20. The use of biometric systems can bring
benefits to schools including reductions in bullying and better
attendance, along with administrative efficiency and can have
other advantages in this regard over other systems such as smart
cards. The British Educational Communications and Technology Agency
(Becta) is producing guidance on our behalf, and in consultation
with the ICO, on the use of biometric systems in schools. This
is in response to the growing numbers of schools that are using
biometric systems to improve school management; mainly to register
attendance, pay for meals or access the library. The guidance
advises School governing bodies and headteachers (although parents
and carers will also find the information useful) on the practical
and legal steps they need to follow should they decide to introduce
biometric systems. The guidance aims to ensure parents are fully
informed about what the school is planning, that appropriate data
security measures are in place and that parents and children have
alternative access should that be necessary.
21. Becta has also published a technical
specification for school infrastructure which sets out the security
steps for ensuring that electronic data is kept secure, and safeguarded
against a range of potential threats, including identity theft.
These steps include establishing ICT security policies and procedures,
and implementing appropriate physical security, data security,
network security and Internet and remote access security.
22. ContactPoint will not hold assessments,
record statements of need, academic performance, attendance, diet
any subjective material or clinical observations about a child,
nor will it hold opinions or views about a child's parents or
carers. It will hold only the contact details of the child's carers,
general practitioner surgery, school and other professionals working
with the child. Authorised users will have to have had relevant
training and to have undergone appropriate checks, including enhanced
Criminal Records Bureau (CRB) certification and will be subject
to the requirements of the new Vetting and Barring Scheme, established
following the Bichard Inquiry to avoid harm, or risk of harm,
to children and vulnerable adults.
See Annex 1 for more details of ContactPoint.
23. The National Pupil Database (NPD) is
another example of the way in which data security is central to
DCFS systems. The NPD has been recording information on pupils'
attainment in education over a number of years. This information
can be used effectively to see how pupils have progressed and
whether particular initiativessuch as the Aim Higher programme,
which aimed to increase participation in higher educationhave
had an impact.
24. Crucially, this information is held
securely and researchers have to apply for access. Any data provided
is anonymous: it shows comparative attainment levels, not the
details of the pupils and can help researchers identify trends
and evaluate policy initiatives.
25. Becta has worked closely with the Qualifications
and Curriculum Authority (QCA) to ensure that the revised secondary
curriculum includes references to the teaching of e-safety. This
is reflected in the revised level descriptors for each of the
key stages. Becta and the QCA have also developed an Internet
Proficiency scheme for Key Stage 2 pupils.
26. The Child Exploitation and Online Protection
Centre (CEOP) have also developed ThinkUKnow a primary and secondary
education programme for schools which focuses on developing safe
and responsible behaviours online. This has been delivered to
over one million children.
27. Becta works closely with Local Authorities
and schools to ensure that there are appropriate measures in place
to cover education and training for teachers, leaders and pupils,
a safe secure infrastructure, effective policies and monitoring
procedures all underpinned by robust standards and frameworks.
28. Becta's approach to this issue has adopted
two fundamental principlesprotect children when in school
and educate them for their lives outside of school. These principles
have been supported in the four main areas of policy and practice,
education and training, infrastructure and inspection and standards.
In conjunction with the QCA, we have developed an Internet Proficiency
scheme for Key Stage 2 pupils. We have evaluated safety products
and built safety into our standards and frame-work contracts,
most recently advising British Standards on a safety standard
for home computers.
VETTING AND
BARRING SCHEME
29. The Vetting and Barring Scheme to be
introduced under the Safeguarding Vulnerable Groups Act 2006 and
following the Bichard Inquiry aims to help avoid harm, or risk
of harm, to children and vulnerable adults. It aims to do this
by preventing those who are deemed unsuitable to work with children
and vulnerable adults from gaining access to them through their
work. This will be done by:
Providing employers with a more effective
and streamlined vetting service for potential employees.
Barring unsuitable individuals from
working, or seeking to work, with children and vulnerable adults
at the earliest opportunity.
30. The responsibility for taking barring
decisions will lie with a new Independent Safeguarding Authority
which will be an independent statutory body. The application processes
for vetting and barring decisions will be run by the Criminal
Records Bureau (CRB).
31. The Department takes issues around security
and confidentiality of data very seriously. We want to ensure
that it is only used for the purposes for which it is intended.
Effective data sharing enables the delivery of better outcomes
for children and learners, and helps to protect them from harm
by preventing those who are barred from working with children
having contact with them or data about them. The measures we are
putting in place are designed to provide effective services while
also addressing both the legislative requirements on privacy and
security and building the confidence of citizens about the education,
skills and children's services to which they are entitled.
Annex 1
CONTACTPOINT
1. The purpose of ContactPoint is to support
Children's Services Authorities and their partners in their duties
to co-operate to promote the well-being of children, and to safeguard
them and promote their welfare, as set down in Sections 10 and
11 of the Children Act 2004 and in the safeguarding duty on school
and colleges in Section 175 of the Education Act 2002. The purpose
of ContactPoint is not to support the fight against crime.
2. ContactPoint is being established under
section 12 of the Children Act 2004. Regulations made under this
section came into force on 1 August 2007.
3. The intention is that ContactPoint will
be available in all Local Authority areas by the end of 2008.
ContactPoint will be a basic online directory containing a record
for each child up to the age of 18 in England. With their consent,
the records of young people leaving care or with learning difficulties
can be retained up to the age of 25. The record will contain basic
demographic information about the child, details of the parent/carer(s)
and the name and contact details of practitioners working with
the child. It will not contain case information. The purpose of
ContactPoint is to save time and support early intervention by
allowing authorised practitioners to see who else is working with
the same child.
4. ContactPoint will be populated with data
from a range of existing national and local systems. Section 12
and the draft regulations set out what data is to be held and
lists the persons and bodies who are permitted or required to
supply this data. It is anticipated that these data sources will
include case management systems used by Youth Offending Teams
and in the future the e-Borders system currently being established
by the Home Office.
5. ContactPoint will not be used to profile
children or young people. No support for profiling is being designed
into the system. Through extensive work with practitioners ContactPoint
has been designed to help practitioners to find out who else is
working with the same child or young person, making it easier
to deliver more coordinated support.
6. Access to ContactPoint will be restricted
to authorised staff who need it as part of their work. The regulations
detail the categories of practitioner who are eligible to be granted
access to ContactPoint, these include police officers, members
of youth offending teams and staff at secure training centres.
An individual will only be granted access if it is clear that
they need access to support their work on safeguarding or improving
wellbeing for children. It will not be acceptable for users to
access the system to support enforcement activities. This will
be made clear to all users through training and guidance (due
to be issued in early 2008).
7. Before being granted access, individuals
will also have to attend training and have received an enhanced
disclosure from the Criminal Records Bureau (or equivalent vetting
for police). All users will be authenticated to ContactPoint using
strong (2-factor) authentication techniques in line with the e-Government
Unit (eGU) guidance. Every access will be monitored and audited.
Potential misuse will be subject to investigation and if necessary
disciplinary and criminal proceedings.
8. There are no plans for data sharing between
ContactPoint and the National Identity Register. The bulk disclosure
of data from ContactPoint will only occur in anonymised or psuedonymised
form. This is to support statistical analysis and for research
purposes.
9. The regulations provide for the Secretary
of State or a local authority to disclose information from ContactPoint
where this is required by a court order or where this disclosure
is necessary for the prevention or detection of crime of the prosecution
of offenders. These provisions are intended only for limited circumstances
are will be subject to a judgement on a case-by-case basis. As
stated previously, ContactPoint is not intended to provide a tool
for use in the fight against crime.
Annex 2
MANAGING INFORMATION
ACROSS PARTNERS
1. Managing Information Across Partners
(MIAP) arose from the post-16 reforms following the Learning and
Skills Act 2000 and the legacy of disparate data policies and
systems sector wide. There was a recognition that effective data
management would help realise the benefits of the Government's
reform agenda. MIAP now brings together over 40 post-14 learning
and skills sector organisations who have signed up to a new framework
for data sharing.
2. The MIAP service is very much in line
with the Government's thinking around Information Sharing, and
has been developed in full consultation with the Information Commissioner's
Office (ICO). It is all about managing information sharing in
a transparent and controlled way, with legal and process controls
in place to ensure that information is shared appropriately. It
is also about sharing information for the benefit of individuals
whilst ensuring there are sufficient safeguards in place; with
an appropriate balance being maintained between the need for appropriate
sharing of information and the potential risks to privacy. Data
Governance arrangements have been developed and published and
are accessible on the MIAP website www.miap.gov.uk
3. The MIAP programme of improvement to
data collection and sharing will be introduced over several years
and will result in information being collected once, used many
times and used by all organisations that are entitled to it. The
MIAP service will remove bureaucracy for learners by making their
interaction with the education and training sector easier; enabling
them to access directly, for the first time, information held
on them and to share that information with others so that they
can receive a better service and/or confirm their qualification
levels.
4. In practical terms MIAP is an internet
based and technology enabled set of services, supported by common
data definitions. It has three core parts:
a UK Register of Learning Providers,
launched in August 2005, where individuals and organisations can
access information about individual learning providers (their
contact details; their courses; and their performance) through
a single route;
from September 2007, MIAP has begun
to assign Unique Learner Numbers (ULNs) to all individuals over
the age of 14 undertaking publicly funded learning in schools
and FE (and potentially HE). It will do this through the Learner
Registration Service (LRS). The service will hold the Unique
Learner Number and enable other organisations to access the number
and contain it in their systems, enabling third party to third
party transactions about learners to be made much more easily;
from September 2008, MIAP will enable
individuals to access information held on them about their school
and FE learning participation and achievement in the form of a
Learner Record, which can be shared with frontline organisations
and potential/existing employers as they wish. It is expected
that other data sources will be added in due course, for example,
more timely achievement information direct from awarding bodies,
and HE information from universities. This system will also provide
a data query service for registered users. The lifelong record
of learning will be capable of editing by individuals who may
not want to share all the details of their learning.
5. The Learner Registration Service and
the Unique Learner Number support better processing of data. The
Unique Learner Number will be held by both awarding bodies and
learning providers making the transfer of data about enrolment
on exams and achievement information more efficient and accurate.
It will support the way that units of qualifications (being developed
by the QCA through the Qualifications and Credit Framework and
14-19 Diplomas) can be brought together overtime at the individual
level to confirm achievement towards full qualifications.
6. For Information Advice and Guidance and
Learning Providers, including schools with post-14 pupils, MIAP
offers operational benefits in communicating with other educational
bodies, such as examinations boards, and will enable them to understand
how their learners progress in future learning. The National Client
Caseload Information System (NCCIS) will contain the Unique Learner
Number and will be able to share the number with local Connexions
systems, enabling transfer of information about individuals between
schools/providers and Connexions to be much easier. This will
facilitate better monitoring of local targets for supporting those
not in employment, education or training.
7. MIAP is represented on the cross DCSF/DIUS
Identity Management Stakeholder Group, which is looking at identity
management across all ages in education. Work is ongoing to look
at how MIAP can support that strategy.
8. It must be recognised that crime has
become more sophisticated, complex and subsequently more difficult
to prevent and detect, reflecting society's advances, changes
in moral values and advances in technology. Citizenship and individualism
in the 21st century is evolving with alacrity. As this individualism
advances, it is submitted that interdependence between individuals
and state actually increases, as traditional aspects and cohesiveness
of society break down.[14]
The measure of society is that criminal acts continue to offend
deeply held aspects of the collective conscience and so increasingly
citizens look to the state for protection; to enable crime to
be prevented and detected under these conditions, the relationship
between citizen and state cannot remain static. Some aspects of
individual privacy must be sacrificed to protect the welfare and
safety of society, citizens and the public purse and it is submitted
that citizens respect and understand this. As long as the investigators
of a democratic state continue to undertake their duties honestly,
fairly, with integrity and in accordance with law, both domestic
and European, public faith will be maintained.
EVIDENCE FROM
DEPARTMENT OF
HEALTH (DH)
1. The Committee has requested written evidence
from the Department of Health on surveillance and data collection
activities and, in particular, the safeguards that are in place
to protect privacy and the rights of the citizen.
2. The primary purpose for NHS data capture
is to maintain a record of the care provided and the drugs prescribed
by its staff. This informs subsequent care, provides an evidence
base to resolve complaints and litigation, allows the quality
of care provision to be monitored and supports a wide range of
health service management activities including financial management,
planning, research and epidemiology.
3. The NHS is currently in the midst of
a major modernisation programme in respect of its information
technology. It is moving away from organisational, or in many
cases sub-organisational departmental records, which have been
largely paper based, to a modern digital infrastructure. A core
component of this programme is the development of the NHS Care
Records Service (NHS CRS) which will, in due course, provide a
nationally available, secure, lifelong patient record. Access
to the NHS CRS is controlled via secure smartcard technology,
available at the point of need by healthcare professionals who
have a role based, legitimate relationship with the patient.
4. The NHS CRS will incorporate stringent
security controls and safeguards to prevent unrestricted or uncontrolled
access to personal information. Beyond that, patients will have
the right, subject to rare public safety exceptions, to restrict
access to their clinical information. The NHS CRS holds detailed
clinical information locally, with a summary of key information
held nationally so that it is available wherever and whenever
it is needed. Citizens may choose not to have a national summary
care record and can control how the information in their local
detailed records is shared.
5. The Department of Health is a recipient
of non-personal statistical data drawn from activity reports that
are generated for management purposes within and across the NHS.
The Health and Social Care Information Centre is the NHS body
responsible for analysing NHS, and to a lesser extent, social
care performance data. The Department also holds the contracts
for the maintenance of a number of national databases which hold
personal data, and which are accessed by NHS staff in the course
of delivering, administering and planning care. These databases
are only accessed centrally by Departmental staff to perform essential
maintenance, resolve data quality issues or where required by
law eg when a citizen asks to see what data is held.
6. An important additional component of
the NHS IT modernisation programme is the creation of a Secondary
Uses Service (SUS) which is used to generate anonymous or coded
data to support management and research purposespurposes
usually described as "secondary" to the provision of
care. This is an important new development in the context of safeguarding
the personal data of citizens as it enables important activities
to be supported without breaching privacy or confidentiality rules.
The overarching approach to privacy and safeguards
7. The NHS and the Department of Health
treat patient privacy and confidentiality extremely seriously
and there is a robust frameworkusually referred to as information
governancewhich sets exacting standards and monitors organisational
performance. This comprises:
A National Information Governance
Board, which advises Ministers on significant issues and monitors
organisational performance. This board incorporates the statutory
Patient Information Advisory Group that has provided a more limited
leadership since 2001.
Publication of a Care Records Guarantee
that sets out the privacy and confidentiality commitments that
the NHS makes to patients.
Audits of information governance
performance by the Healthcare Commission, the body responsible
for assessing organisational compliance with key standards.
Performance assessment of NHS organisations
against detailed standards for legal compliance, security, data
quality and records management set by the Department of Health
in collaboration with key regulatory bodies, with performance
data collected through an on line information governance toolkit.
The appointment in each NHS body
of a senior clinician, termed a Caldicott Guardian, who is responsible
for championing patient confidentiality and advising management
boards.
The NHS IT modernisation programme
8. The NHS IT Modernisation Programme has
several components, a number of which are covered by the broad
heading of the NHS Care Records Service:
The Personal Demographics Service
(PDS). This is a national register of all NHS patients. It does
not contain clinical information, but holds the contact details,
date of birth, unique NHS number and registered GP for each patient.
The National Summary Care Record
(SCR). This is a national database of key clinical information
considered by clinicians as being important when providing care
to a patient in the absence of full notes.
Detailed Care Records. These are
the digital replacements for traditional GP or hospital patient
records, available across health communities and along care pathways.
The SCR is derived from these records.
The Secondary Uses Service (SUS).
This is a database of clinical information that can be used to
generate anonymised or pseudonymised (coded but not identifiable)
data sets for research and management purposes.
There are a number of other components which
modernise the services available for citizens which are not directly
relevant to this Committee:
Electronic Transfer of Prescriptions.
This service supports paperless prescribing and collection of
repeat prescriptions.
Choose & Book. This service allows
patients to be booked directly into clinics when referred by a
GP, supporting choice and enabling appointments to be set around
the requirements of citizens.
9. International security standards are
applied across all system implementations. These include the use
of encryption to communication links between systems, and to user
interfaces with systems. The security of data centres is assured
using both international and British standards, and all suppliers
to the NHS IT Programme are contractually bound to auditing their
adherence to these.
10. Users are vetted and sponsored by their
local organisations for specific access appropriate to their job
role and area of work. There is a strong registration process
compliant with the highest government standard (eGif level 3)
which means the user has to initially appear in person to prove
their identity before access is assigned by the "Registration
Authority" with accountability at local NHS Trust level.
On successful completion of the registration process, a user is
issued a smartcarda secure token that, together with a
passcode, confirms the identity of a user at the time of access.
The registration process assigns them a role profile consistent
with their area of work and responsibilities and establishes a
unique electronic footprint when used to access systems. These
records can be analysed to identify suspect behaviours.
11. There are a limited number of circumstances
where systems may permit users with appropriate role profiles
to access more data than their basic access privileges will permit.
These circumstances are tightly defined and do not, for example,
allow administrative staff to override controls in order to access
clinical information. They include, for example, circumstances
where a clinician is involved in the provision of emergency care
and there is no time to establish appropriate access rights. When
this occurs, the system generates an alert which is sent to designated
privacy staff who will investigate to ensure there has been no
misuse of the system.
Types of patient information collected, the options
available to patients in respect of each, and the specific safeguards
that apply
12. Patients' demographic details (name,
address, NHS Number etc) are held nationally in the Personal Demographics
Service (PDS), a key component of the NHS Care Records Service
that is already in place and working well. These details are required
to ensure that any previous records are located and that patients
can be contacted when necessary. Regulations require the NHS to
keep a record of which GP practice each person is registered with
and reasons of efficiency and probity require this to be held
centrally (eg to prevent multiple GPs from being paid for the
same patient and to ensure that the correct commissioning body
meets the cost of care provided). A register is also needed to
enable the Secretary of State to meet legal obligations to provide
healthcare, free at the point of contact, for those patients who
are ordinarily resident in England.
13. Whilst NHS patients cannot exercise
choice about their demographic data being held, they can ask for
their contact details to be treated as sensitive. This prevents
local NHS staff from seeing these details. This facility is used
primarily to support those in witness protection programmes and
military personnel, but is also available to anyone who is concerned
about the ease with which NHS staff may be able to determine where
they currently live eg people hiding from abusive partners.
14. Access to the Personal Demographics
Service (PDS) by NHS staff is restricted to those issued with
a smartcard and an appropriate role as described above. To locate
a specific individual's records it is necessary for these staff
to input sufficient information to obtain a unique match, generally
only possible where the individual concerned is present and can
be asked for details. If this proves difficult because there are
too many individuals with similar details, a list can be accessed
but doing so generates an alert to other staff responsible for
ensuring and checking that the system is not being misused.
15. Clinicians are required by their professional
regulator bodies to keep clear, accurate, legible and contemporaneous
patient records which report the relevant clinical findings, the
decisions made, the information given to patients, and any drugs
or other treatment prescribed, and which serve to keep colleagues
well informed when sharing the care of patients.
16. The NHS IT modernisation programme is
replacing local stand alone systems or paper processes with modern
digital systems that are integrated at a local level to support
the care delivered by health communities. These new systems also
enable key summary data to be extracted and held nationally to
support care outside of the boundaries of the local health community
and/or in unscheduled circumstances.
17. Only the duly authorised staff of organisations
that are involved in providing care will have access to clinical
information held within the NHS Care Records Service (NHS CRS).
No system functionality will be available to an individual who
does not possess a smartcard and know the associated pass code.
The role profile that has been assigned to an individual through
the registration process determines which system functions, and
consequently which parts of a record, an individual who has logged
on to the system can access.
18. A central record is also maintained
within the systems of which patients each staff teamworkgroupare
currently caring for. A GP Practice, an A&E Department or
a clinic would be typical workgroups. This relationship, termed
a "legitimate relationship" (LR) is a prerequisite of
access to a specific patient's record. Without such a relationship
access is prevented.
19. Full audit trails of who has done what,
made possible by the unique identity associated with each smartcard,
are maintained within systems and it is intended that these will
be available to patients on request, as well as to staff charged
with checking for system misuse by authorised staff. This is a
considerable advance on what exists now with either paper or electronically
held records.
20. These technical controls are complex
to implement and there is a trade-off between usability and ease
of access to data and questions relating to security and patient
safety. The Department is therefore proceeding cautiously and
consultatively to ensure that the right balance is struck.
21. Uniquely, the Department is also providing
security controls that are set at the direction of patients. This
provides unprecedented confidentiality management for patients
of the NHS in England. Patients have a number of options. They
were developed following extensive research and consultation with
patients/carers/citizens and the NHS. Patients may choose
(i) Not to have a national Summary Care Record
by requesting this through the GP Practice where they are registered.
(ii) To direct that controls are set to prevent
data sharing. In this case the SCR can only be viewed with the
individual's express permission or in accordance with the exceptions
to English common law confidentiality obligations. Local sharing
of Detailed care records across organisational boundaries will
also be preventedessentially recreating the pre-NCRS situation.
22. In time, patients will also be able
to designate some data items within a record as sensitive so that
they cannot be viewed outside of the team that recorded the information
without the individual's express permission, or where concerns
are extreme, that they are not available at all outside of that
team. These types of control are referred to as "sealed envelopes"
and "sealed and locked envelopes" respectively.
Use of data held on the new systems for purposes
other than the delivery of care eg clinical research
23. Exceptionally, disclosure of clinical
information outside of a health context may be considered in cases
of serious crime or where there are significant risks to other
people, following the guidelines set out for the NHS in the Department
of Health publication Confidentiality: NHS Code of Practice, a
guidance document that was agreed with the Information Commissioner
and the General Medical Council.
24. The primary purpose of the NHS Care
Records Service (NHS CRS) is to support the delivery of care to
patients. However, as a by-product of collecting information for
operational patient care, the architecture of the NHS Care Records
Service (NHS CRS) provides the opportunity to rationalise data
abstraction, data flows, data management, analysis and reporting.
This supports management and clinical purposes other than direct
patient care, such as healthcare planning, commissioning, public
health, clinical audit, benchmarking, performance improvement,
research and clinical governance. The system by which this is
done is called the Secondary Uses Service (SUS).
25. Wherever possible, data will extracted
automatically as a by-product of NHS services supporting direct
patient care, including the NHS Care Records Service (NHS CRS),
Choose and Book and Electronic Transmission of Prescriptions.
Initial Secondary Uses Service (SUS) content will cover the NHS
in England and will be patient-specific. It will build on operational
information already being shared by the NHS such as commissioning
of healthcare services (eg diagnosis and procedures), cancer waiting
times, clinical audit and supporting demographic data. Data will
in due course cover all care settings (primary, community and
acute) and all NHS-commissioned activity, including services provided
for the NHS by the independent sector.
26. The aim is for this data to be made
available either in aggregate form or, where detailed information
is provided, in anonymised or pseudonymised form. This process
removes patient identifiable information and allocates a consistent
"pseudonym" so that individual cases can still be tracked,
but only with explicit approval and still without identifying
the individual concerned.
27. Access to identifiable information is
available only where patient consent has been given, or where
specific permissions apply. Permission is required from an expert
group called the Patient Information Advisory Group (PIAG), set
up under the Health and Social Care Act (2001). This group assesses
each application to test that the use of patient information is
justified, taking into account issues of confidentiality and consent.
28. As with all other elements of the NHS
CRS, access to the Secondary Uses Service requires each user to
be formally registered and to use individual smart card access,
just as for other systems in the National Programme for IT in
the NHS. Each user is allocated a role which determines the functions
(ie what reports they can access) and the coverage (eg the organisation
or geography of data which may be accessed). Key user activities,
eg, logon and performing an extract, are logged.
EVIDENCE FROM
DEPARTMENT OF
WORK AND
PENSIONS (DWP)
1. The Department for Work and Pensions
(DWP) is here to promote opportunity and independence for all
through modern, customer-focused services. We help people to achieve
their potential through employment, so that they are able to provide
for their children and to work and save for secure retirement.
All this is part of building a fair and inclusive society. DWP's
main customer groups are:
disabled people and their carers.
2. Just about everyone in Great Britain
will deal with the Department or one of its eight businesses at
some point in their lifetime.
3. Our business requires us to collect and
hold a wide range of personal information. Sir David Varney's
report for HM Treasury, Service transformation: A better service
for citizens and businesses, a better deal for the taxpayer, published
in December 2006, set out a vision for transforming the delivery
of public services. It aims to make service delivery channels
more responsive to the needs of citizens and business.
4. Our goal is to collect and use information
effectively, efficiently and securely and in a way which enables
the Department and wider government to fulfil its policy and delivery
ambitions.
5. DWP holds personal information on all
of its customers to enable it to carry out its business, gathered
from customers, or from other government departments and public
bodies:
HM Revenue and Customs (HMRC);
Department for Children, Schools
and Families (DCSF);
the Home Office (including the Immigration
and Passport Service (IPS) and the Police);
NI Social Security Agency; and
6. All data held by the Department is in
accordance with relevant legislation including the Data Protection
Act.
7. We hold basic identity detailsname,
address, date of birth etcfor all our customers, and bank
account details if that is the customer's chosen method of payment.
Other information held will depend on what benefits or services
the Department provides for each customer.
8. Staff are provided with access to data
in accordance with business requirements. All requests for access
are approved by line management. Staff access to data is automatically
audited by DWP systems, the audit logs produced are checked, on
both a random basis and when particular conditions are satisfied.
In addition staff accesses are randomly selected for management
checking.
9. DWP shares information with other public
bodies for a wide range of different purposes:
to ensure customers receive their
full entitlement, for example by identifying recipients of winter
fuel payments and by identifying Housing Benefit and Council Tax
Benefit customers who might also be entitled to Pensions Credit;
to ensure our customers receive other
help to which they are entitled, for example providing information
to Local Authorities to verify entitlement to free school meals;
to prevent and detect fraudulent
claims, for example by matching death information from the General
Register Office with our customer records; and
to improve the services we deliver
to customers, for example by using information to encourage customers
to have their benefits paid into bank accounts.
10. DWP also carries out limited data matching
with private sector sources, such as Credit Reference Agencies
to help detect fraud. The Social Security Fraud Act provides a
legal gateway where, under specified conditions, information can
be requested from private sector organisations such as banks and
building societies as part of gathering evidence in fraud investigations.
11. The Jobcentre Plus Fraud Investigation
Service conducts criminal investigations for DWP into alleged
benefit fraud. Investigations may involve the use of a number
of techniques and access a range of data sources, guidance on
the usage of which reflects relevant legislation and codes of
practice. Surveillance can only be undertaken if it is necessary
and proportionate to the alleged offence and has been properly
authorised. This means that all other avenues must be considered
first.
12. DWP's approach to data sharing is that
new opportunities to improve public services are exploited, while
ensuring information is shared legally and in line with public
expectations. Joint approaches should be agreed across government
and beyond and trusted standards and safeguards should be established
and maintained.
13. DWP will only disclose personal data,
or receive data from another organisation, where this is permitted
in law, and where it complies with the Data Protection Act and
Human Rights Act principles.
14. Data sharing is managed in DWP through
the use of a simple Data Sharing Protocol, which sets out the
information required to test the strategic fit and legality of
proposals and ensures appropriate safeguards are in place.
15. The Protocol defines clear standards
of behaviour; emphasises the need for a clear well defined case
for data sharing; and stresses the need to undertake an assessment
of the impact of any proposed data share.
EVIDENCE FROM
TRANSPORT FOR
LONDON (TFL)
1. As a major organisation and heavy user
of over 10,000 CCTV cameras spread across its rail network, stations
and roads in London and the fleet of 8,000 buses all equipped
with CCTV cameras, Transport for London (TfL) welcomes the opportunity
to submit written evidence to this inquiry.
2. TfL has a lawful obligation to provide
a safe and efficient transport system in London and as such uses
and maintains a number of data sources relating to the transport
system to meet this obligation. TfL actively works with its stakeholders,
passenger groups and the Information Commissioner to ensure that
it holds, processes and discloses information in a transparent,
proportionate, fair and lawful manner.
3. CCTV systems in particular are used successfully
by TfL for both transport system management and delivering a safe
and secure environment for those who travel on London's transport
system. In addition to its own rail and bus networks, TfL has
helped fund CCTV cameras on some National Rail stations and trains
serving London as well as paying the Metropolitan Police £60
million and British Transport Police £50 million for resources
to provide a safe transport network. For example, we use on-bus
CCTV to deal with crime and anti-social behaviour on buses and
have worked in partnership with the Metropolitan Police to deal
with individuals perpetrating crime on the bus network. This has
led to over 1,000 convictions of individuals on the bus network
and helped to deliver a more safe and secure environment for our
passengers and staff.
4. In addition, the CCTV coverage of TfL's
network proved invaluable to the police and Security Services
in the aftermath of the incidents of 7 and 21 July 2005. It provided
valuable intelligence to the Security Services and gave vital
assistance in the investigation and prosecution of individuals
involved in the incidents. The CCTV coverage of the network remains
an essential component of protecting the system from terrorism
and providing essential intelligence to the Police and security
services to support this.
5. TfL also works with the police services
in London in order to assist with the investigation of crime and
disorder on and around the network and will, where it is lawful
provide data to assist the police to investigate crime. There
have been a number of recent high profile serious crimes that
have been successfully solved with the assistance of data provided
by TfL. There are clear procedures in place to govern the transfer
of such data and ensure that any transfer is undertaken in a manner
that is transparent, proportionate, fair and lawful.
6. TfL takes its responsibilities as the
Data Controller of the personal data and CCTV images of our passengers
very seriously and will not release data without careful consideration
of the implications for Londoners. However, where the release
can be undertaken in a transparent, proportionate, fair and lawful
way and will benefit Londonparticularly by making a direct
contribution to the safety and security of our passengerswe
will work with partners to ensure that this is delivered effectively.
7. Our procedures are developed using legal
advice, guidance from the Information Commissioner and our approach
has been ratified by TfL Board. We continue to develop these procedures
and protocols and they will be continually reviewed in line with
case law, legal advice, and any updated guidance that is issued
by the Information Commissioner. The bus operators who control
in excess of 50,000 on-bus cameras have strict procedures that
are agreed with TfL on handing the data and any disclosures made
to the police and law enforcement agencies is done a transparent,
proportionate, fair and lawful way. These procedures are regularly
reviewed by TfL in line with our own. The operators receive regular
visits to ensure compliance with these. We strive to balance the
benefits we can deliver to our passengers with regard to safety,
security, reliability and service responsiveness with the important
privacy demands of our passengers.
8. In a TfL survey (carried out by MORI)
of 1,003 respondents in December 2006, 87% of people said they
supported increasing CCTV coverage and believe it will help to
improve passenger safety on trains and in stations.
9. Overall, TfL believes that the use of
CCTV data in a transparent, proportionate, fair and lawful manner
allows us both to effectively protect our passengers and staff,
and information about them, and provide a more safe, reliable
and effective transport system for London.
January 2008
13 Not all of this information would constitute
"personal data" under the Data Protection Act Back
14
Emile Durkheim (1859-1917) Back
|