Skip to main content
editorial
. 2003 Jun;56(6):426–428. doi: 10.1136/jcp.56.6.426

Table 1.

Caldicott audit points

Audit points Audit level 0 Audit level 1 Audit level 2
1 Information for patients/clients on the proposed uses of information about them No information provided, or limited to simple posters and leaflets in waiting rooms, etc An active information campaign is in place to promote patient understanding of NHS information requirements An active information campaign is supported by comprehensive arrangements for patients with special/different needs
2 Staff code of conduct in respect of confidentiality No code exists, or staff not generally aware of it Code of conduct exists and all staff aware of it Code regularly reviewed and updated as required
3 Staff induction procedures No mention of confidentiality and security requirements in induction for most staff Basic requirements outlined as part of induction process Comprehensive awareness raising exercise undertaken and comprehension checked
4 Confidentiality and security training needs assessment Training needs not assessed systematically for most staff Training needs only considered as a consequence of organisational or systems changes Systematic assessment of staff training needs and evaluation of training that has occurred
5 Training provision (confidentiality and security) No training available to most staff Training opportunities broadcast with take up left to line management discretion In house training provided for staff; for example, comparable to health and safety training provision
6 Staff contracts No reference to confidentiality requirements in staff contracts Confidentiality requirements included in contracts for some staff Contractual requirements included in all staff contracts
7 Contracts placed with other organisations No confidentiality requirements included Basic agreements of undertaking are signed by contractors Formal contractual arrangements exist with all contractors and support organisations
8 Reviewing information flows containing patient identifiable information Information flows have not been comprehensively mapped Information flows have been mapped and senior management has been informed Procedures are in place for the regular review of information flows and the justification of purposes
9 Internal information/data “ownership” established Information/data “ownership” has not been established for all information/data sets “Ownership” established for all information/data sets and register established All “owners” justifying purposes and agreeing staff access restrictions with the guardian
10 Safe haven procedures in place to safeguard information flowing to and from the organisation No safe haven procedures used Safe haven procedures used for some information flows Safe haven procedures in place for all patient identifiable information
11 Protocols governing the sharing of patient identifiable information with other organisations locally agreed No locally agreed protocols in place Partner organisations clearly identified and information requirements understood Agreed protocols in place to govern the sharing and use of confidential information
12 Security policy document No security policy available Security policy exists but not reviewed within last 12 months Security policy reviewed annually and reissued if appropriate
13 Security responsibilities No information security officer appointed, or existing officer is not appropriately trained An appropriately trained information security officer is in post Responsibility for information security identified in various staff roles, coordinated by the security officer
14 Risk assessment and management No programme of information risk management exists A risk management programme is under way and reports are available A formal programme exists with regular reviews, outcome reports, and recommendations provided for senior management
15 Security incidents No incident control or investigation procedures exist The security officer handles incidents as they arise Procedures are documented and accessible to staff to ensure incidents reported and investigated promptly
16 Security monitoring No monitoring or reporting of security effectiveness or incidents takes place Basic reporting of major incidents or problem areas only There are regular reports made to senior management on the effectiveness of information security
17 User responsibilities No guidance issued to staff for password management Users encouraged to change passwords regularly but this is at their discretion Password changes are enforced on a regular basis
18 Controlling access to confidential patient information Staff vigilance, and/or an “honour” system control access. Some physical controls, lockable rooms, etc, may exist Access for many staff controlled by “all or nothing” systems. Staff groups requiring access identified and agreed with the guardian All staff have defined and documented access rights agreed by the guardian. Access is controlled, monitored and audited