Information Governance V4.0.0
ID | S30 |
Version | 4.0.0 |
Type | Overarching Standard |
Status | Retired |
Effective Date | Mar 13, 2025 |
Contracting Vehicle(s) |
- 1 Introduction
- 2 Requirements
- 2.1 Authentication
- 2.2 Role-based Access Control
- 2.3 Legitimate Relationships
- 2.4 Information Sharing across Organisations for Direct Care
- 2.5 Additional Privacy Controls
- 2.6 Workstation Access Controls
- 2.7 Data Labelling
- 2.8 Provenance
- 2.9 Data Suppression & Removal
- 2.10 Audit
- 2.11 Notifications
- 2.12 Data Subject Access Requests
- 2.13 General Data Protection Regulation (GDPR)
- 2.14 Information Security
- 3 Onboarding Supporting Information
- 4 Applicable Capabilities
- 5 Roadmap
Introduction
Supports the controls needed to ensure that Special Category Data is kept confidential, is accurate and is available to authorised users when required.
The implementation of this Standard applies to all Business Capabilities illustrated in the Capabilities and Standards Model and is a mandatory Overarching Standard.
The Information Governance Standard defines the controls that are needed to ensure that the significant quantities of sensitive Personal Data processed by systems are kept confidential, are available to authorised users when required, and are accurate.
Information Governance is a key aspect of the Authority’s requirements for systems, reflecting for example the public commitments made under the Care Record Guarantee and the NHS Confidentiality Code of Practice.
Systems under the Capabilities and Standards Model process considerable amounts of sensitive, personally identifiable information, and this Standard intends to provide controls over the processing and use of that data.
See also Guide to GDPR - key definitions, for definitions of Personal and Special Category Data.
The Information Governance Standard includes:
Authentication - National Authentication (as per Authentication and authorisation section of Interoperability Standard) and local authentication
Role-based Access Control (RBAC) - For authorising access to system functions and data
Legitimate Relationships - Management of legitimate access to Active and Inactive Patient/Service User records and access to information from other organisations for Active Patients/Service Users
Information Sharing across Organisations for Direct Care - Data Sharing, testing of the application and best practice monitoring
Additional Privacy Controls - For restricting access to Personal and Special Category Data
Workstation Access Controls - Minimising the risk that information may be viewed and accessed on unattended workstations
Data Labelling - Outputs from the system are properly marked to reflect their sensitivity
Provenance - The source of all clinical data is appropriately recorded and accessible
Data Suppression & Removal - The accuracy of the Patient/Service User record is maintained
Audit - All system actions are recorded, and accessible, providing an important control against the misuse of systems
Notifications - Alerting mechanism for the designated Privacy Officer
Information Security - Storage, testing, communications and network access controls
Data Subject Access Requests (DSARs) - Support responding to Data Subject Access Requests, providing data where required
General Data Protection Regulation (GDPR) - Adherence to the regulation and support related processes
Requirements
Authentication | |||
Applicable Contracting Vehicle(s) | ID | Requirement | Level |
|---|---|---|---|
All | GP-IG-2.1-3A | Authentication - Access using NHS authenticationAny access to Personal or Special Category Data within Solutions to be subject to NHS authentication (as per Authentication and authorisation section of Interoperability Standard). | may |
All | GP-IG-2.1-3B | Authentication - General standardsAny access to Personal or Special Category Data within Solutions will be subject to authentication at least to standards described in GP-IG-2.2-1. | MUST |
All | GP-IG-2.1-4 | Authentication - NHS authentication with no additional authenticationSolutions shall ensure that, where NHS authentication (as per Authentication and authorisation section of Interoperability Standard) is used, those users are able to carry out all Solution activities (subject to their access rights) without the need for any additional authentication. | MUST |
All | GP-IG-2.1-10 | Authentication - LocalUsers not using NHS authentication (see GP-IG-2.1-4) can only use local authentication and will not therefore be allowed access to Solution functions for which NHS authentication is required. | MUST |
All | GP-IG-2.1-12 | Application start-up messageThe application shall prominently display the following message upon application start-up to remind users of their responsibilities and the legal constraints on the use of the Solution: Access to this computer/Solution and any information it contains is limited to authorised users only. Legal action can be taken against unauthorised use of, or unauthorised access to, this computer/Solution and/or any information it contains, including pursuant to the Computer Misuse Act 1990. If you are an authorised user, by proceeding to access and use this computer/Solution and/or the information it contains, you are accepting any terms of use, notices and policies which are contained or referenced within it or which have otherwise been drawn to your attention as an authorised user. Note that this wording can be updated from time-to-time. | SHOULD |
All | GP-IG-2.1-13 | Enable user role and organisation validationThe application shall make it possible – by clearly and continually displaying the user’s name, role and organisation – for users to validate the role and organisation relevant to the access they are being granted so as not to be able to claim ignorance of that role or organisation, or otherwise justify a lack of awareness of the significance of their actions. | MUST |
All | GP-IG-2.1-14 | Audit authentication activityAll activities associated with requirements in this section will be recorded in the Solution Audit Trail. Such Audit Trail entries can also include End User device (or Solution) identification information. | MUST |
All | GP-IG-2.2-1 | Local authentication modelThe Solution can provide a local authentication model to provide an alternative method of authentication for users who are unable to use NHS authentication. Access to records on the Spine will use Authenticator Assurance Level 3 - ref: NIST 800-63-b. | may |
All | GP-IG-2.2-9 | Two-factor authenticationTwo-factor authentication can be used for local authentication. Access to records on the Spine will use Authenticator Assurance Level 3 - ref: NIST 800-63-b. | may |
All | GP-IG-2.2-9A | Two-factor authentication for CitizensTwo-factor authentication will be used for Citizens to log into Solutions. | may |
All | GP-IG-2.2-2 | Local authentication - unique user identity and passwordAny local authentication will be based on a unique user identity which is then authenticated at least through the use of a password. | MUST |
All | GP-IG-2.2-3 | Local authentication - password strength and managementLocal authentication will satisfy the password strength and password management guidance set out in Meeting the Digital Service Standard and Password Guidance. | MUST |
All | GP-IG-2.2-4 | Password storageWhere passwords are stored in Solution databases, they will be stored salted and hashed, using algorithms and strengths recommended in NIST Cryptography Standards. | MUST |
All | GP-IG-2.2-5 | User access and password Audit TrailSuccessful login, unsuccessful login attempts, logouts and password changes will be recorded in the Solution Audit Trail. Data to be included in such an Audit Trail entry: Successful login, logout:
Unsuccessful login:
Password changes:
Such Audit Trail entries to also include End User device (or Solution) identification information. | MUST |
All | GP-IG-2.2-6 | New user - password creationNew users will be assigned, or will be required to enter, a password matching password-strength requirements in GP-IG-2.2-3. | MUST |
All | GP-IG-2.2-7 | New user - define own password on first useIf initial password is assigned, the new user will be required to set a password that meets the password-strength requirements in GP-IG-2.2-3, upon first use of the Solution. | MUST |
All | GP-IG-2.2-8 | Password resetPassword reset facilities are provided; the Solution will store additional information associated with each user so as to allow newly-generated passwords to be provided securely to devices previously known to be associated with the user (such as mobile number or NHSmail email address). Any such newly-generated passwords cannot be made visible to Solution-administration staff, and following first use of such passwords, the user will be required to set their own password. | MUST |
Role-based Access Control | |||
All | GP-IG-3-2 | Role-based access controlThe Solution will have Role-based access control to authorise users’ access to the Solution functions and data. For NHS authentication requirements see Authentication and authorisation section of Interoperability Standard. | MUST |
All | GP-IG-3-7 | Updates to Job Role to Baseline ActivitiesThe Solution will have a process for incorporating updates to the nationally-defined mapping from Job Role to Baseline Activities as published by the Authority. | MUST |
All | GP-IG-3-8 | Local Role-based access controlWhere the Solution supports users who do not use NHS authentication, the Solution shall implement local Role-based access controls which support the allocation of access rights. These are in line with the nationally-defined job roles and activities taken from the latest National RBAC Database. Local RBAC mechanisms will need to:
Access controls to include the ability to segregate access to the following functions:
| MUST |
All | GP-IG-3-9 | Local authentication - local access rightsWhere Solutions provide local authentication (see GP-IG-2.2-1) that can be used by users who are enabled to use NHS authentication, any local access rights to automatically reflect the access rights associated with the user as defined on Spine, i.e. without any manual update mechanism being required and no increased access rights can be locally associated with the local based authentication. | MUST |
All | GP-IG-3-12A | Role-profile and Organisation Context matchingThe Solution will ensure that the Organisation Context of the Solution matches the selected role-profile. Where the Solution supports a single organisation, that organisation to match the organisation from the selected role-profile for any user access to proceed. Where a particular Solution supports multiple organisations, the Solution shall set the Organisational Context to that of the selected role-profile (and thus influencing the control as to what Personal Data the user has access to). | MUST |
All | GP-IG-3-12B | Organisation Context transparently set based on Patient/Service UserThere can be specific circumstances where a user requires access across organisational contexts using the same or different Solutions (where it would be impracticable for that user to explicitly manually change their role-profile selection). Examples would include where more than one Organisation (with their own Organisation Data Service (ODS) code) shares a physical location and can share administrative staff where:
In such circumstances, the Solution will provide facilities for the user’s organisational context within the Solution(s) to be transparently set according to the Patient/Service User being accessed, subject to all of the following:
| MUST |
All | GP-IG-3-13 | Provide local Solution functions to RBAC mappingsSuppliers will provide details of the mapping of their local Solution functions to activities from the National RBAC Database. This is to support the Registration Authority (RA) process (to ensure that RAs have information to enable them to correctly define positions and allocate users to such positions, or by allocating users individual User role-profiles containing appropriate job roles and any additional activities) and also to support the compliance process. | MUST |
All | GP-IG-3-16 | Support users having multiple roles with own associated activitiesThe Solution will support the concept of a user having more than one role, each with its own activities. | MUST |
All | GP-IG-3-17 | Activities restricted to logged in user roleThe Solution can only support the activities associated with the role that the user has logged in under. The Solution will not combine activities from multiple roles for the purposes of controlling a user’s access to the Solution. | MUST |
All | GP-IG-3-18 | Support non-RBAC rolesThe Solution can support roles (e.g. GP, Practice Nurse) and activities that are not part of the National RBAC Database but which extend or elaborate the National RBAC Database. Any such roles or activities will not contradict or conflict with the National RBAC Database. | may |
All | GP-IG-3-19 | Specific professional statusThe Solution will support the notion of specific professional status for users, to support areas of functionality where there can be, for example, statutory reasons to restrict such functionality to certain professional groups (for example where fit notes can only be issued by GPs). | MUST |
All | GP-03.4-05 | Non-RBAC role detailsSupport definition of the following detail for non-RBAC roles:
| MUST |
All | GP-IG-16-3 | View local Solution access levelsAbility to view local Solution access levels for all Staff Members (with a list of their roles and activities, detailing start and end dates and any periods of inactivity). | MUST |
Legitimate Relationships | |||
All | GP-IG-4-3 | Access to the records of non-active Patients/Service UsersAccess to the records of non-active Patients/Service Users can be provided within a grace-period following inactivation (such a period to be configurable per organisation, default 4 weeks):
| MUST |
All | GP-IG-4-4 | Reactivate Patient/Service User record - alertThe act of making a Patient/Service User record active (from an inactivated or archived state), when carried out without a formal Patient/Service User re-registration, will generate an alert to the user designated as the organisation’s Privacy Officer (see Notifications). | MUST |
All | GP-IG-4-5 | View information managed in separate organisations - Active Patients/Service Users onlyWhere the Solution provides the ability to view information managed in separate organisations, these controls are to ensure that information is only made available if it concerns Patients/Service Users with a currently active registration. For example, any cross-organisational data sharing will not take place for inactivated, or archived, Patients/Service Users. | MUST |
Information Sharing across Organisations for Direct Care | |||
“safe and appropriate sharing in the interests of the individual’s direct care should be the rule, not the exception”
There are different ways in which information is commonly shared across organisations; for example:
The requirements in this section are intended to recognise that:
| |||
All | GP-IG-5-1 | Data sharing - recording Patient/Service User expressed preferencesSolutions will provide the capability to record a Patient/Service User’s expressed preferences as to how clinical information about them, can be accessed from other care settings, for their direct care. Where Solutions are directly used in other care settings, it is expected that such preferences can be managed at the level of individual operational units or settings in which Patients/Service Users would reasonably expect their information to be shared without hindrance, in order to support their direct care. | MUST |
All | GP-IG-5-2 | Organisational change - Patient/Service User preferences carried forwardOrganisational structures change over time, for example as Practices merge or split. In such circumstances, every Patient/Service User’s expressed preferences will be carried forward into the new organisational structure, on the basis that Patients/Service Users have been made aware of the implications of any such proposed change, prior to it taking place, and that Patients/Service Users had the opportunity to amend their expressed preference. | MUST |
All | GP-IG-5-3 | Practice controlled information sharingThe Practice is to have control as to whether information sharing (access to information from other care settings) for any Patient is enabled, so as to align with Confidentiality: Good Practice in handling Patient information. | MUST |
All | GP-IG-5-4 | Respect recorded preferencesThe Solution will respect any such recorded preferences, having effect on the sharing of information that might otherwise be technically possible. | MUST |
All | GP-IG-5-5 | Preferences for sharing data into the Organisation from other care settingsIf the Solution also supports access to information from other care settings, then it will need to also support the recording (and respect of) expressed preferences whether information about them from specific other organisations can be viewed from within the Organisation. It is not necessary that an explicit consent to such sharing be recorded within the Solution prior to any such sharing taking place, other than the exception condition described in requirement GP-IG-5-6A. | SHOULD |
All | GP-IG-5-6A | PDS - express dissent settingSome Patients/Service Users have an “express dissent” setting (value 2) on the consent-to-share flag held nationally on PDS, to be interpreted that the Patient/Service User has previously expressed concern about potential information sharing for their direct care across different care settings. For such Patients/Service Users, making their Personal Data available to other care settings will need to be on an “opt-in” basis, rather than the default “opt-out”. Therefore, in that situation, Solutions will have to prevent any access to information from other care settings, unless the Patient/Service User has explicitly consented to such sharing in the local Solution through facilities provided in requirement GP-IG-5-5. | MUST |
All | GP-IG-5-6B | Information sharing promptIn circumstances where both (i) the Patient/Service User has an ”express dissent” (value 2) setting nationally, and (ii) the Solution has not recorded any expressed decisions from the Patient/Service User, the Solution will prompt the Clinician as part of an encounter with the Patient/Service User, to provide an opportunity to confirm the Patient/Service User’s intentions through the facilities described in requirement GP-IG-5-5. | MUST |
All | GP-IG-5-6C | Amending consent to share status on PDSThe Solution to support the amendment of the Patient/Service User’s consent-to-share status held on PDS:
| MUST |
Additional Privacy Controls | |||
All | GP-IG-17-1 | Access to whole RecordsIt will be possible to:
| MUST |
All | GP-IG-17-2 | Access to individual parts of recordsIt will not be possible, over and above the use of RBAC in general:
| MUST |
Workstation Access Controls | |||
All | GP-IG-7-2 | User Solution lock facilityThe Solution shall provide a facility for the user to lock the Solution with a single action, this action hiding any Personal Data from view and ensuring that re-authentication is required for the application to be resumed. | MUST |