background preloader

Information Governance

Facebook Twitter

Knowledge tools

Information Charters. Corporate Governance and Data Security and Privacy - Information Management Magazine Article. What is a Caldicott guardian? -- Roch-Berry 79 (935): 516 -- Postgraduate Medical Journal. Abstract A review of patient confidentiality issues was commissioned and its findings published as the Caldicott Report in December 1997. It made 16 recommendations and formulated six principals.

To help in remembering these principles the mnemonic FIONA C can be used: Formal justification of purpose; Information transferred only when absolutely necessary; Only the minimum required; Need to know access controls; All to understand their responsibilities; Comply with and understand the law. Since the Caldicott Report in 1997 the following acts have become law. Data Protection Act 1998, Human Rights Act 1998, Public Interest Disclosure Act 1998, Audit Commission Act 1998, Terrorism Act 2000, section 60 of the Health and Social Care Act 2001 and Regulation of Investigatory Powers Act 2000, and by 2005 The Freedom of Information Act 2000 will become law and affect the NHS. Caldicott guardian The Caldicott Committee made a total of 16 recommendations, namely: Box 1: Questions Table 1 1.

Governance and information governance: some ethical considerations within an expanding information society. Governance and Sustainability in Information Systems 2011. Governance and Sustainability in Information Systems 2011: Hamburg, Germany data released under the ODC-BY 1.0 license. See also our legal information page. IBIMA Publishing. Keywords: Information Security Governance, Banking Corporate Governance, Information Security Governance Framework Introduction The growth of information technology has been so explosive in the recent decade. Computer has been widely applied in every aspect of our life from business, government, education, finance, health-care, and aerospace to defense system. With society's increasing dependency on information technology (IT), the consequences of computer crime can be extremely grave (Mahncke et al, 2009).

Security breach and computer viruses cost global businesses $1.6 trillion a year and 39,363 human years of productivity. In 2009, Symantec has detected 59,526 phishing hosts around the globe, that number is increased by 7 percent compared to phishing hosts detected in 2008. Information system has become the heart of modern banking in our world today, and information has become the most valuable asset to protect from insiders, outsiders and competitors. Reports and Research | BCS Policy Hub | Opinion, News, Analysis. Information governance standards for managing e-health information.