In 1997, the Caldicott committee presented its report on patient confidentiality.1 The impetus behind this were concerns about patient information and security.2,3 For example, there had been reports in the press that patient hospital records could be freely accessed and that patient notes had ended up lying around in village streets for all and sundry to read.
The committee came up with six main principles as follows.
One should justify the purpose of holding patient information.
Information on patients should only be held if absolutely necessary.
Use only the minimum of information that is required.
Information access should be on a strict need to know basis.
Everyone in the organisation should be aware of their responsibilities.
The organisation should understand and comply with the law.
National Health Service (NHS) organisations should have Caldicott guardians who have responsibilities to safeguard and govern the use of patient information. The guardian is usually a board level health professional or their deputy. They should develop local protocols for information disclosure, restrict access to patient information by enforcing strict need to know principles, and regularly review and justify the uses of patient information.
The Caldicott committee also came up with recommendations for ensuring patient confidentiality, which are summarised in fig 1.
“National Health Service organisations should have Caldicott guardians who have responsibilities to safeguard and govern the use of patient information”
These principles regarding patient confidentiality are also entrenched in the NHS core plan. Indeed, the NHS plan core principle 10 states that “patient confidentiality will be respected throughout the process of care”. The Data Protection Act 1998 is also relevant in this context. The aim of this act is to uphold an individual’s right to privacy with regard to the processing of personal data. There are eight main principles of this act (fig 2).
Where does this lead us as pathologists? First, I suspect that patient confidentiality will feature more and more within the NHS with the associated potential for litigation. Caldicott issues will probably be used as NHS performance indicators based partly upon the Caldicott audit returns. For example, we will need to ensure secure transmission and distribution of our patients’ data, such as accurate faxing of laboratory results to information safe havens, and use password protected computer systems. Information technology security should comply with BS7799 and the Data Protection Act. In addition, we should take particular care of the safety of patient notes and ensure patient consent where necessary regarding confidentiality issues. The only time that patient information can be divulged to a third party is if the patient has given their properly informed consent for this to happen, or if the data are totally anonymised to prevent identification of the patient from the details given.
The General Medical Council statement on confidentiality (September 2000) also remarked that as doctors we hold information about patients, which is private and sensitive. This information must not be given to others unless the patient consents or the disclosure can be justified. We will also need to establish training programmes about patient confidentiality for our staff and help map patient information flows, to name but a few areas. Non-consensual data sharing may be deemed contrary to medical ethics and where possible anonymised patient data should be used.4–7
These aspects of patient confidentiality are summarised as the Caldicott audit points shown in table 1.
Table 1.
Audit points | Audit level 0 | Audit level 1 | Audit level 2 | |
1 | Information for patients/clients on the proposed uses of information about them | No information provided, or limited to simple posters and leaflets in waiting rooms, etc | An active information campaign is in place to promote patient understanding of NHS information requirements | An active information campaign is supported by comprehensive arrangements for patients with special/different needs |
2 | Staff code of conduct in respect of confidentiality | No code exists, or staff not generally aware of it | Code of conduct exists and all staff aware of it | Code regularly reviewed and updated as required |
3 | Staff induction procedures | No mention of confidentiality and security requirements in induction for most staff | Basic requirements outlined as part of induction process | Comprehensive awareness raising exercise undertaken and comprehension checked |
4 | Confidentiality and security training needs assessment | Training needs not assessed systematically for most staff | Training needs only considered as a consequence of organisational or systems changes | Systematic assessment of staff training needs and evaluation of training that has occurred |
5 | Training provision (confidentiality and security) | No training available to most staff | Training opportunities broadcast with take up left to line management discretion | In house training provided for staff; for example, comparable to health and safety training provision |
6 | Staff contracts | No reference to confidentiality requirements in staff contracts | Confidentiality requirements included in contracts for some staff | Contractual requirements included in all staff contracts |
7 | Contracts placed with other organisations | No confidentiality requirements included | Basic agreements of undertaking are signed by contractors | Formal contractual arrangements exist with all contractors and support organisations |
8 | Reviewing information flows containing patient identifiable information | Information flows have not been comprehensively mapped | Information flows have been mapped and senior management has been informed | Procedures are in place for the regular review of information flows and the justification of purposes |
9 | Internal information/data “ownership” established | Information/data “ownership” has not been established for all information/data sets | “Ownership” established for all information/data sets and register established | All “owners” justifying purposes and agreeing staff access restrictions with the guardian |
10 | Safe haven procedures in place to safeguard information flowing to and from the organisation | No safe haven procedures used | Safe haven procedures used for some information flows | Safe haven procedures in place for all patient identifiable information |
11 | Protocols governing the sharing of patient identifiable information with other organisations locally agreed | No locally agreed protocols in place | Partner organisations clearly identified and information requirements understood | Agreed protocols in place to govern the sharing and use of confidential information |
12 | Security policy document | No security policy available | Security policy exists but not reviewed within last 12 months | Security policy reviewed annually and reissued if appropriate |
13 | Security responsibilities | No information security officer appointed, or existing officer is not appropriately trained | An appropriately trained information security officer is in post | Responsibility for information security identified in various staff roles, coordinated by the security officer |
14 | Risk assessment and management | No programme of information risk management exists | A risk management programme is under way and reports are available | A formal programme exists with regular reviews, outcome reports, and recommendations provided for senior management |
15 | Security incidents | No incident control or investigation procedures exist | The security officer handles incidents as they arise | Procedures are documented and accessible to staff to ensure incidents reported and investigated promptly |
16 | Security monitoring | No monitoring or reporting of security effectiveness or incidents takes place | Basic reporting of major incidents or problem areas only | There are regular reports made to senior management on the effectiveness of information security |
17 | User responsibilities | No guidance issued to staff for password management | Users encouraged to change passwords regularly but this is at their discretion | Password changes are enforced on a regular basis |
18 | Controlling access to confidential patient information | Staff vigilance, and/or an “honour” system control access. Some physical controls, lockable rooms, etc, may exist | Access for many staff controlled by “all or nothing” systems. Staff groups requiring access identified and agreed with the guardian | All staff have defined and documented access rights agreed by the guardian. Access is controlled, monitored and audited |
Section 60 of the Health and Social Care Act, passed by parliament in May 2001, gives the secretary of state for health the power to allow the processing of patient information for medical purposes if these purposes are in the public interest (for example, cancer registries). “Patient information” in this context means any health or medical information about the patient, whether identifiable with an individual or not. The government also agreed to the establishment of a statutory advisory committee (the patient information advisory group) to keep the provisions on confidential data and their use by the secretary of state under review.
In summary, patient information and confidentiality issues will probably gain increasing importance in the following years within the NHS. A balance between individual data privacy and useful information exchange for the benefit of society will need to be struck.8 On that note, do not forget the Caldicott principles’ mnemonic, a reminder of Dame Fiona Caldicott herself:
FIONA C
Formal justification of purpose.
Information transferred only when absolutely necessary.
Only the minimum required.
Need to know access controls.
All to understand their responsibilities.
Comply with and understand the law.
This may help us to focus on patient confidentiality in our clinical work; remembering it to be an important part of risk management and clinical governance.
REFERENCES
- 1.The Caldicott report. IHRIM 1999;40:17–19. [PubMed] [Google Scholar]
- 2.Wiederhold G. Future of security and privacy in medical information. Stud Health Technol Inform 2002;80:213–29. [PubMed] [Google Scholar]
- 3.Gaunt N. Practical approaches to creating a security culture. Int J Med Inf 2000;60:151–7. [DOI] [PubMed] [Google Scholar]
- 4.Data Protection Act, 1998.
- 5.Access to health records, 1990.
- 6.Computer Misuse Act, 1990.
- 7.Human Rights Act, 1998.
- 8.Anderson R. Undermining data privacy in health information. BMJ 2001;322:442–3. [DOI] [PMC free article] [PubMed] [Google Scholar]