Published using Google Docs
Information Policy & Procedures
Updated automatically every 5 minutes

Apricot Centre Logos_RGB-01.png

INFORMATION POLICY & PROCEDURES

Introduction

Scope of this Information Policy

Farm and Farm Services Information includes (less sensitive information):

Wellbeing Service Information includes (highly sensitive information):

Organisation wide security mandates:

Service Defined Information Categories, Privileges and Management Goals

How we manage the security of personal data held

Confidentiality of treatment and personal information

Confidentiality Statement

Privacy and Confidentiality

Requests for Freedom of Information (FOI)

Subject Access Requests (SARs)

Requests for Disclosures of Information by Police and Other Agencies

Data Retention and Data Destruction

Reviews of Policies

Introduction

Apricot Centre CIC ensures that personal data in relation to Customers, Service Users, Practitioners, Staff, and Partners is used fairly, lawfully and transparently.

The UK Data Protection Act 2018 implements the EU General Data Protection Regulation (GDPR), a legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union (EU). It stresses 8 principles, that data must be:

1) Fairly and lawfully processed

2) Processed for limited purposes

3) Adequate, relevant and not excessive

4) Accurate

5) Not kept for longer than is necessary

6) Processed in line with your rights

7) Secure

8) Not transferred to other countries without adequate protection.

The Data Protection Act 1998 (DPA) sets standards governing the storage, processing of personal information held on manual records and on computers. The Care Standards Act 2000 provides the framework for ensuring service users rights to privacy are promoted and has been further developed over time.

Scope of this Information Policy

This policy addresses all information, systems, facilities, programs, data, networks and all users of technology in the Apricot Centre organisation, without exception. Apricot Centre Directors and Managers (Spring 2018) audited all information processes within the organisation and developed the GDPR Processes spreadsheet, identifying the types of data, basis for lawful processing, and the locations of data storage. Apricot Centre CIC handles personal data and sensitive information in both physical and digital formats.

Data and personal information is dealt with differently according to the specific service or business transaction. There are two main arms of the Apricot Centre with differing levels of sensitivity around data held. This policy therefore outlines different levels of security policy according to the level of service or business transaction.

  1. Farm and Farm Services
  2. Wellbeing Service

Farm and Farm Services Information includes (less sensitive information):

Wellbeing Service Information includes (highly sensitive information):

Organisation wide security mandates:

Service Defined Information Categories, Privileges and Management Goals

The Apricot Management team will review permissions for access to written/printed materials across the service and permissions on cloud-based systems to be reviewed every 6 months - In the first week of January. And in the first week of July each year. These reviews will be recorded in the Directors Minutes at the subsequent directors meetings.

Classification Category

Category defined

Management goals/objectives

Wellbeing Customer Information

Wellbeing Customers refers to customers who refer, purchase or commission wellbeing services from Apricot Centre.  We hold financial and contact information in respect of our wellbeing customers. For private referrals the customer may be also the client.

Wellbeing Staff roles will determine their level of  access to customer data as follows:

  • ACWS Administrators/Coordinators - Will have full access to customer data for the purpose of quoting, invoicing, and liaising with customers regarding service setup and delivery. information integrity entails no write access outside accountable job functions,and in order to prevent loss of assets.
  • ACWS Manager - Will have full access to customer data to oversee all aspects of the business and service delivery.
  • AC Directors - Will have access to relevant customer data by specific request made to the Manager and recorded as an ‘incident’.
  • Supervisors & Coaches - Will have no access to customer data beyond the name of the customer and contact details in order to deliver services, and only for purposes of communicating with customer. information integrity entails no write access outside accountable job functions,and in order to prevent loss of assets.
  • Practitioners - Will have no access to customer data, but will have access to contact details of key professionals with whom they are  required to liaise. information integrity entails no write access outside accountable job functions,and in order to prevent loss of assets.
  • Group Facilitators - Will have no access to customer data.
  • Volunteers or Students on Placement - Will have no access to customer data.

Wellbeing Client Information

Wellbeing Clients refers to the recipients of services from the Apricot Centre. We hold address and contact information, medical/health-related information relevant to therapeutic or non-therapeutic intervention and including details of personal history, ethnicity, gender, age, sexual orientation, religion. Third-party information is often held such as other members of the family and their circumstances.

Wellbeing Staff roles will determine their level of  access to client data as follows:

  • ACWS Administrators - Will have full access to client data in order to coordinate core service delivery.
  • ACWS Manager - Will have full access to client data to oversee and maintain quality standards for all aspects of the business and service delivery.
  • AC Directors -  In circumstances such as dealing with a complaint or a serious organisational issue, Directors will have access to relevant client data by specific request made to the Manager and recorded as an ‘incident’.
  • Supervisors & Coaches - Will have full ‘read’ access to client data, but will only have ‘write’ access for a specific purpose and by request made to the Manager.
  • Practitioners - Will have restricted access to client data where they are the ‘authorised’ or lead practitioner, or where they are the supporting practitioner for a particular contract.
  • Group Facilitators - Will have restricted access to client data where there is a predefined need in order to fulfil their role and support clients effectively.
  • Volunteers or Students on Placement - Will have no access to client data, except for basic service monitoring processes or questionnaires which will be processed and handed to a relevant manager.

Please Note: As ACWS has client information based upon work in different counties within the UK, we realise that there is a need to separate access and permissions to such data according to where practitioners practice. We will soon be working with our IT Developers Clystnet Ltd to develop specific permissions, by area, access across the entire service.

Farm Customer Information

Customer food orders including: financial information, name  and contact details

Farm Staff roles will determine their level of  access to farm customer data as follows:

  • AC Director - Full access
  • Farm manager - Full access
  • Farm staff - Access to orders and contact details only for the purpose of communicating with customer. Access to financial information only when involved in sales.
  • Administrator - Full access
  • Finance Coordinator - Full access.
  • Apprentices - Will be given access specific to the area of their apprenticeship and tasks undertaken. E.g. access to market information, such as login to iZettle for taking monies at market.
  • Volunteer - According to a defined purpose, and accountable to a named member of core staff may be given restricted access but allowing access to contact details, monitoring and evaluation processes.

Farm Consultation / Training Services

Customer information may include; financial information, name and contact details, personal or business-sensitive information (such as confidential business plans etc..)

Farm Staff roles will determine their level of  access to farm consultation/training services data as follows:

  • AC Director - Full access
  • Farm manager - Full access
  • Administrator - Full access
  • Consultant or Trainer - Restricted access as required by specific role and in order to prevent loss of assets.
  • Apprentices - Will be given access specific to the area of their apprenticeship and tasks undertaken. E.g. helping to gather information for a survey or farm design.
  • Volunteer - Possible access defined by specific role and always accountable to a named core member of staff.

How we manage the security of personal data held

Security -

Apricot  Centre CIC has been working with Clystnet Ltd  in order to bring our information security to the highest of standards. We operate from two  cloud-based information systems accessed through the Google Chrome Browser. No client data is held, stored or processed on personally-owned devices or computers.

Egress Encrypted Email Software

ISO27001 is the international best practice standard for information security management systems: http://www.itgovernance.co.uk/iso27001.aspx  . Egress Software data centres are all certified to ISO27001 and all Egress offices are in ISO27001 scope (London, Sheffield, Barnsley and Toronto). The initial ISO27001:2013 certification was completed in July 2014 and continues to undergo regular independent audits by BSI Group. Certificate No: IS 611606. Issue date: 14/07/2017

G Suite and Google Cloud Platform Security

System 1 - GSuite for Business - Staff have permission to access specific levels of data relevant to their role in working with clients or customers of the service. Google Apps is accessed via a username and strong password (see policy for required changes to passwords), as well as by two-step verification.

Data encryption in transit - Data is encrypted at several levels. Google forces HTTPS (Hypertext Transfer Protocol Secure) for all transmissions between users and G Suite services and uses Perfect Forward Secrecy (PFS) for all its services. Google also encrypts message transmissions with other mail servers using 256-bit Transport Layer Security (TLS) and utilizes 2048 RSA encryption keys for the validation and key exchange phases. This protects message communications when client users send and receive emails with external parties also using TLS.

PFS requires that the private keys for a connection are not kept in persistent storage. Anyone who breaks a single key can no longer decrypt months’ worth of connections; in fact, not even the server operator is able to retroactively decrypt HTTPS sessions.

Apricot Centre CIC have signed the G Suite and Cloud Data Processing Amendment (DPA 2.0) and model contract clauses as a means of meeting the adequacy and security requirements of the European Parliament and Council of the European Union's Data Protection Directive and General Data Protection Regulation (GDPR).

Drive File Stream encrypts all network traffic and validates host certificates to protect against man-in-the-middle (MITM) attacks.

SuiteCRM Security

SuiteCRM (Customer Relationship Management) hosted on Fast Comet a cloud-based service where information is stored in London servers only. Staff have designated permissions to only access information according to User Security Roles. Sensitive Information is thus locked-down and accessed only in accordance with individual or team security roles.

Passwords are  set to expire within 35 days and so need to be renewed monthly.

1st Line of Defence - Boundary Firewalls and Internet Gateways

Assess and configure all boundary firewalls and internet gateways used on behalf of Apricot Centre CIC

Placement of the policy in the context of other management directives and supplementary documents (e.g., is agreed by all at executive level, all other information handling documents must be consistent with it)

Supporting Documents Referenced (e.g. roles and responsibilities, process, technology standards, procedures, guidelines)

Specific designation of well-established responsibilities (e.g. the technology department is the sole provider of telecommunications lines)

Consequences for non-compliance (e.g. up to and including dismissal or termination of contract)

Mobile Device Management - Staff can access sensitive data, emails and calendars on personally-owned devices if they agree to Mobile Device Management enabling Apricot Centre managers to enforce security policies and security controls such as; configuration password options, application permissions, control over device updates, and to wipe or lock the device if necessary. A device can be considered 'managed' if the enterprise provisioned the device from a known initial state (e.g. from factory reset) and then technically enforces security policies on the device throughout its life. The user must not be able to modify a minimal set of critical security controls, including: data storage encryption VPN configuration passphrase options control over application permissions (eg no third party applications which require access to work email) control over device updates, to ensure devices remain up-to-date enterprise audit, wipe or lock of the device if necessary

Use of Public Wi-Fi Access Points - Staff may use Wi-Fi access point or the Wi-Fi service in public venues from their device except where they are required to authenticate to the Wi-Fi through a ‘captive’ portal (Such as is common in Starbucks/Costas etc..). Captive portals will ask for a separate login via the browser before giving access – allowing direct browser access to these captive portals will leave the browser open to attack. Therefore only Wi-Fi services which the user can access through standard pre-shared key authentication, or enterprise authentication with certificates should be used.

Apricot CIC responsibilities as a Data Controller. Data controllers are responsible for implementing appropriate technical and organisational measures to ensure and demonstrate that any data processing is performed in compliance with the GDPR. Controllers' obligations relate to principles such as;

As a Data Controller involved in Cloud-based Processing of Client Sensitive Data - GDPR applies to our using Google and SuiteCRM for processing client data.

Contract with Google - GSuite - In order to be GDPR compliant regarding the storage of client sensitive data in the cloud, we have signed DPA version 2.0 which took effect on 25 May 2018. DPA version 2.0 specifically addresses GDPR changes. We have also opted-in to G Suite EU Model Contract Clauses (MCCs).

Confidentiality of treatment and personal information

 - ensuring that personal files and records and financial information are kept confidential, and only shared with the consent of the person concerned. Discussions about a person’s well-being, treatment and any personal information take place in confidence within the team setting and with supervisors only. Confidentiality will be discussed with the client at the onset of therapy and reviewed periodically during the course of the work.

Confidentiality Statement

(This statement is included in the Wellcome Letter and a simpler version is written in the Therapy Plan)

As a rule the information which you and your child provide will only be shared with your agreement. However, there may be certain times when we may need to share information when somebody is at risk without your consent .  For example:

We always aim to communicate with you when it is important for us to share confidential information, unless we think that it will lead to increasing risks.  

Privacy and Confidentiality 

All service users have a right to privacy. This means that their personal information will be protected by staff of the Apricot Centre and through the processes and procedures of recording and reflecting upon confidential and personal identifying information. There are some exceptions to confidentiality and privacy for example when we believe that a child or vulnerable adult is experiencing abuse or neglect or is at risk of significant harm. We will always aim to address these issues as sensitively as possible when they arise. At such times we may need to communicate with the Police, Social Services. Care Standards Commission, Health or GP services.

Requests for Freedom of Information (FOI)

Members of the public are entitled to request

If the information you want is not publicly available, you can submit a FOIA request to the agency's FOIA Office. The request simply must be in writing and reasonably describe the records you seek. Most federal agencies now accept FOIA requests electronically, including by web form, e-mail or fax.

The Freedom of Information Act 2000 provides public access to information held by public authorities. It does this in two ways: public authorities are obliged to publish certain information about their activities; and. members of the public are entitled to request information from public authorities.

Your main obligation under the Act is to respond to requests promptly, with a time limit acting as the longest time you can take. Under the Act, most public authorities may take up to 20 working days to respond, counting the first working day after the request is received as the first day.

Subject Access Requests (SARs)

Please note: The following information has not been updated since the Data Protection Act 2018 became law. This ACT implements the EU’s General Data Protection Regulation (GDPR). The Apricot Policy will be updated soon to reflect recent changes.

The Apricot Centre CIC will work closely with the rights and duties as set out in sections 7-9A of the Data Protection ACT (DPA) referred to as ‘the right of subject access’.  A SAR is a written request made by or on behalf of an individual for information which he or she is entitled to ask for under section 7 of the DPA. This request can come in any form.

The Apricot Centre CIC will respond to any requests received within 20 days of the request.

NB: Some key points with reference to Parents and Children requesting information are below:

Requests for Disclosures of Information by Police and Other Agencies

Except under certain circumstances confidential information about a child should not be released to other agencies or individuals without the consent of the child, unless the protection of the child or a third party are at stake. However the Apricot Centre CIC asks all staff to work and discuss openly each individual case with management and in supervision.

“Professionals should be aware that it may be possible to prevent breach of confidentiality in court if it can be argued that the disclosure of personal information is not in the public interest. However, the circumstances in which public interest immunity can be used are limited, and legal advice should always be sought.” (Offering children confidentiality: Law and guidance. The children’s legal centre)

Data Retention and Data Destruction

The Apricot Centre CIC Wellbeing Service operates according to the GDPR storage limitation period ensuring that data is not kept for longer than it is needed. Retention periods are determined according to insurance, legal, accountability and valid reference purposes.

Retention Period - How long ACWS keeps Service User records

Archiving Period

Retention Period

Disposal Method

Personnel Data

Archived as soon as practitioner leaves service

Retained for 6 years after leaving service

Digital information deleted. Physical information securely destroyed or shredded

Complaints Records

Archived within a year after the complaint is closed

Retained for 6 years after complaint closed, for legal and insurance reasons.

Digital information deleted. Physical information securely destroyed or shredded

Procurement Records

Digital information deleted. Physical information securely destroyed or shredded

Referral Information for Unopened cases -

(N.B. Referral information for opened cases remains part of the Service User Records - see below)

Referral information and associated documents or unopened cases will be deleted or physically shredded/destroyed within 6 months of the referral being lost. If on review there is the possibility of the referral being reopened this period may be extended a further 6 months.

Digital information deleted. Physical information securely destroyed or shredded

Practitioner Process Notes - Contain detailed information of what happens or is discussed in sessions. These are often in paper form.

Practitioners are asked to shred or otherwise destroy process notes within a short period of time, for example, after they have been used or supervisory purposes. No more than 6 months

Physical information securely destroyed or shredded

Adult (only) Service User Clinical Record & Service User Records

Service User information including Clinical Notes/Records - Contain information about the basic clinical details of therapeutic or mentoring sessions. These are stored on our SuiteCRM system, and occasionally in a client folder on GDrive. 

Adult Clinical notes are kept for up to six years as this is the timeframe within which someone can take legal action against their therapist after therapy has ended.

For Service Users who have no capacity to take an action within the timeframe (severe mental health problems, etc.). If evidence is convincing, the court may allow a case to proceed even after the deadline has elapsed as it has discretion to do so.

Digital information deleted. Physical information securely destroyed or shredded

Young Persons Service User Clinical Record & Service User Records

Service User information including Clinical Notes/Records - Contain information about the basic clinical details of therapeutic or mentoring sessions. These are stored on our SuiteCRM system, and occasionally in a client folder on GDrive. 

Young Person’s Clinical notes are kept for six years after their eighteenth birthday.

Clinical Notes for

For Service Users who have no capacity to take an action within the timeframe (severe mental health problems, etc.). If evidence is convincing, the court may allow a case to proceed even after the deadline has elapsed as it has discretion to do so.

Digital information deleted. Physical information securely destroyed or shredded

Reviews of Policies

All of our policies will be reviewed and updated annually (see latest update version details at bottom of each page)

This policy/document was reviewed by:

Signed            Date  19th July 2018

Position  Service Manager

Signed ………………………..…………… Date …………………….…………

Position ………………………………………………………………….

Previous revision date - July 2021

Last reviewed - 21/08/2024

The next revision date is: August 2027

Page  of

AC & ACWS Information Policy & Procedures  – previously reviewed 07/12/2022