INFORMATION POLICY & PROCEDURES
Scope of this Information Policy
Farm and Farm Services Information includes (less sensitive information):
Wellbeing Service Information includes (highly sensitive information):
Organisation wide security mandates:
Service Defined Information Categories, Privileges and Management Goals
How we manage the security of personal data held
Confidentiality of treatment and personal information
Requests for Freedom of Information (FOI)
Subject Access Requests (SARs)
Requests for Disclosures of Information by Police and Other Agencies
Data Retention and Data Destruction
Apricot Centre CIC ensures that personal data in relation to Customers, Service Users, Practitioners, Staff, and Partners is used fairly, lawfully and transparently.
The UK Data Protection Act 2018 implements the EU General Data Protection Regulation (GDPR), a legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union (EU). It stresses 8 principles, that data must be:
1) Fairly and lawfully processed
2) Processed for limited purposes
3) Adequate, relevant and not excessive
4) Accurate
5) Not kept for longer than is necessary
6) Processed in line with your rights
7) Secure
8) Not transferred to other countries without adequate protection.
The Data Protection Act 1998 (DPA) sets standards governing the storage, processing of personal information held on manual records and on computers. The Care Standards Act 2000 provides the framework for ensuring service users rights to privacy are promoted and has been further developed over time.
This policy addresses all information, systems, facilities, programs, data, networks and all users of technology in the Apricot Centre organisation, without exception. Apricot Centre Directors and Managers (Spring 2018) audited all information processes within the organisation and developed the GDPR Processes spreadsheet, identifying the types of data, basis for lawful processing, and the locations of data storage. Apricot Centre CIC handles personal data and sensitive information in both physical and digital formats.
Data and personal information is dealt with differently according to the specific service or business transaction. There are two main arms of the Apricot Centre with differing levels of sensitivity around data held. This policy therefore outlines different levels of security policy according to the level of service or business transaction.
The Apricot Management team will review permissions for access to written/printed materials across the service and permissions on cloud-based systems to be reviewed every 6 months - In the first week of January. And in the first week of July each year. These reviews will be recorded in the Directors Minutes at the subsequent directors meetings.
Classification Category | Category defined | Management goals/objectives | ||
Wellbeing Customer Information | Wellbeing Customers refers to customers who refer, purchase or commission wellbeing services from Apricot Centre. We hold financial and contact information in respect of our wellbeing customers. For private referrals the customer may be also the client. | Wellbeing Staff roles will determine their level of access to customer data as follows:
| ||
Wellbeing Client Information | Wellbeing Clients refers to the recipients of services from the Apricot Centre. We hold address and contact information, medical/health-related information relevant to therapeutic or non-therapeutic intervention and including details of personal history, ethnicity, gender, age, sexual orientation, religion. Third-party information is often held such as other members of the family and their circumstances. | Wellbeing Staff roles will determine their level of access to client data as follows:
Please Note: As ACWS has client information based upon work in different counties within the UK, we realise that there is a need to separate access and permissions to such data according to where practitioners practice. We will soon be working with our IT Developers Clystnet Ltd to develop specific permissions, by area, access across the entire service. | ||
Farm Customer Information | Customer food orders including: financial information, name and contact details | Farm Staff roles will determine their level of access to farm customer data as follows:
| ||
Farm Consultation / Training Services | Customer information may include; financial information, name and contact details, personal or business-sensitive information (such as confidential business plans etc..) | Farm Staff roles will determine their level of access to farm consultation/training services data as follows:
|
Security -
Apricot Centre CIC has been working with Clystnet Ltd in order to bring our information security to the highest of standards. We operate from two cloud-based information systems accessed through the Google Chrome Browser. No client data is held, stored or processed on personally-owned devices or computers.
Egress Encrypted Email Software
ISO27001 is the international best practice standard for information security management systems: http://www.itgovernance.co.uk/iso27001.aspx . Egress Software data centres are all certified to ISO27001 and all Egress offices are in ISO27001 scope (London, Sheffield, Barnsley and Toronto). The initial ISO27001:2013 certification was completed in July 2014 and continues to undergo regular independent audits by BSI Group. Certificate No: IS 611606. Issue date: 14/07/2017
G Suite and Google Cloud Platform Security
System 1 - GSuite for Business - Staff have permission to access specific levels of data relevant to their role in working with clients or customers of the service. Google Apps is accessed via a username and strong password (see policy for required changes to passwords), as well as by two-step verification.
Data encryption in transit - Data is encrypted at several levels. Google forces HTTPS (Hypertext Transfer Protocol Secure) for all transmissions between users and G Suite services and uses Perfect Forward Secrecy (PFS) for all its services. Google also encrypts message transmissions with other mail servers using 256-bit Transport Layer Security (TLS) and utilizes 2048 RSA encryption keys for the validation and key exchange phases. This protects message communications when client users send and receive emails with external parties also using TLS.
PFS requires that the private keys for a connection are not kept in persistent storage. Anyone who breaks a single key can no longer decrypt months’ worth of connections; in fact, not even the server operator is able to retroactively decrypt HTTPS sessions.
Apricot Centre CIC have signed the G Suite and Cloud Data Processing Amendment (DPA 2.0) and model contract clauses as a means of meeting the adequacy and security requirements of the European Parliament and Council of the European Union's Data Protection Directive and General Data Protection Regulation (GDPR).
Drive File Stream encrypts all network traffic and validates host certificates to protect against man-in-the-middle (MITM) attacks.
SuiteCRM Security
SuiteCRM (Customer Relationship Management) hosted on Fast Comet a cloud-based service where information is stored in London servers only. Staff have designated permissions to only access information according to User Security Roles. Sensitive Information is thus locked-down and accessed only in accordance with individual or team security roles.
Passwords are set to expire within 35 days and so need to be renewed monthly.
1st Line of Defence - Boundary Firewalls and Internet Gateways
Assess and configure all boundary firewalls and internet gateways used on behalf of Apricot Centre CIC
Placement of the policy in the context of other management directives and supplementary documents (e.g., is agreed by all at executive level, all other information handling documents must be consistent with it)
Supporting Documents Referenced (e.g. roles and responsibilities, process, technology standards, procedures, guidelines)
Specific designation of well-established responsibilities (e.g. the technology department is the sole provider of telecommunications lines)
Consequences for non-compliance (e.g. up to and including dismissal or termination of contract)
Mobile Device Management - Staff can access sensitive data, emails and calendars on personally-owned devices if they agree to Mobile Device Management enabling Apricot Centre managers to enforce security policies and security controls such as; configuration password options, application permissions, control over device updates, and to wipe or lock the device if necessary. A device can be considered 'managed' if the enterprise provisioned the device from a known initial state (e.g. from factory reset) and then technically enforces security policies on the device throughout its life. The user must not be able to modify a minimal set of critical security controls, including: data storage encryption VPN configuration passphrase options control over application permissions (eg no third party applications which require access to work email) control over device updates, to ensure devices remain up-to-date enterprise audit, wipe or lock of the device if necessary
Use of Public Wi-Fi Access Points - Staff may use Wi-Fi access point or the Wi-Fi service in public venues from their device except where they are required to authenticate to the Wi-Fi through a ‘captive’ portal (Such as is common in Starbucks/Costas etc..). Captive portals will ask for a separate login via the browser before giving access – allowing direct browser access to these captive portals will leave the browser open to attack. Therefore only Wi-Fi services which the user can access through standard pre-shared key authentication, or enterprise authentication with certificates should be used.
Apricot CIC responsibilities as a Data Controller. Data controllers are responsible for implementing appropriate technical and organisational measures to ensure and demonstrate that any data processing is performed in compliance with the GDPR. Controllers' obligations relate to principles such as;
As a Data Controller involved in Cloud-based Processing of Client Sensitive Data - GDPR applies to our using Google and SuiteCRM for processing client data.
Contract with Google - GSuite - In order to be GDPR compliant regarding the storage of client sensitive data in the cloud, we have signed DPA version 2.0 which took effect on 25 May 2018. DPA version 2.0 specifically addresses GDPR changes. We have also opted-in to G Suite EU Model Contract Clauses (MCCs).
- ensuring that personal files and records and financial information are kept confidential, and only shared with the consent of the person concerned. Discussions about a person’s well-being, treatment and any personal information take place in confidence within the team setting and with supervisors only. Confidentiality will be discussed with the client at the onset of therapy and reviewed periodically during the course of the work.
(This statement is included in the Wellcome Letter and a simpler version is written in the Therapy Plan)
As a rule the information which you and your child provide will only be shared with your agreement. However, there may be certain times when we may need to share information when somebody is at risk without your consent . For example:
We always aim to communicate with you when it is important for us to share confidential information, unless we think that it will lead to increasing risks.
All service users have a right to privacy. This means that their personal information will be protected by staff of the Apricot Centre and through the processes and procedures of recording and reflecting upon confidential and personal identifying information. There are some exceptions to confidentiality and privacy for example when we believe that a child or vulnerable adult is experiencing abuse or neglect or is at risk of significant harm. We will always aim to address these issues as sensitively as possible when they arise. At such times we may need to communicate with the Police, Social Services. Care Standards Commission, Health or GP services.
Members of the public are entitled to request
If the information you want is not publicly available, you can submit a FOIA request to the agency's FOIA Office. The request simply must be in writing and reasonably describe the records you seek. Most federal agencies now accept FOIA requests electronically, including by web form, e-mail or fax.
The Freedom of Information Act 2000 provides public access to information held by public authorities. It does this in two ways: public authorities are obliged to publish certain information about their activities; and. members of the public are entitled to request information from public authorities.
Your main obligation under the Act is to respond to requests promptly, with a time limit acting as the longest time you can take. Under the Act, most public authorities may take up to 20 working days to respond, counting the first working day after the request is received as the first day.
Please note: The following information has not been updated since the Data Protection Act 2018 became law. This ACT implements the EU’s General Data Protection Regulation (GDPR). The Apricot Policy will be updated soon to reflect recent changes.
The Apricot Centre CIC will work closely with the rights and duties as set out in sections 7-9A of the Data Protection ACT (DPA) referred to as ‘the right of subject access’. A SAR is a written request made by or on behalf of an individual for information which he or she is entitled to ask for under section 7 of the DPA. This request can come in any form.
The Apricot Centre CIC will respond to any requests received within 20 days of the request.
NB: Some key points with reference to Parents and Children requesting information are below:
Except under certain circumstances confidential information about a child should not be released to other agencies or individuals without the consent of the child, unless the protection of the child or a third party are at stake. However the Apricot Centre CIC asks all staff to work and discuss openly each individual case with management and in supervision.
“Professionals should be aware that it may be possible to prevent breach of confidentiality in court if it can be argued that the disclosure of personal information is not in the public interest. However, the circumstances in which public interest immunity can be used are limited, and legal advice should always be sought.” (Offering children confidentiality: Law and guidance. The children’s legal centre)
The Apricot Centre CIC Wellbeing Service operates according to the GDPR storage limitation period ensuring that data is not kept for longer than it is needed. Retention periods are determined according to insurance, legal, accountability and valid reference purposes.
Retention Period - How long ACWS keeps Service User records
Archiving Period | Retention Period | Disposal Method | |
Personnel Data | Archived as soon as practitioner leaves service | Retained for 6 years after leaving service | Digital information deleted. Physical information securely destroyed or shredded |
Complaints Records | Archived within a year after the complaint is closed | Retained for 6 years after complaint closed, for legal and insurance reasons. | Digital information deleted. Physical information securely destroyed or shredded |
Procurement Records | Digital information deleted. Physical information securely destroyed or shredded | ||
Referral Information for Unopened cases - (N.B. Referral information for opened cases remains part of the Service User Records - see below) | Referral information and associated documents or unopened cases will be deleted or physically shredded/destroyed within 6 months of the referral being lost. If on review there is the possibility of the referral being reopened this period may be extended a further 6 months. | Digital information deleted. Physical information securely destroyed or shredded | |
Practitioner Process Notes - Contain detailed information of what happens or is discussed in sessions. These are often in paper form. | Practitioners are asked to shred or otherwise destroy process notes within a short period of time, for example, after they have been used or supervisory purposes. No more than 6 months | Physical information securely destroyed or shredded | |
Adult (only) Service User Clinical Record & Service User Records Service User information including Clinical Notes/Records - Contain information about the basic clinical details of therapeutic or mentoring sessions. These are stored on our SuiteCRM system, and occasionally in a client folder on GDrive. | Adult Clinical notes are kept for up to six years as this is the timeframe within which someone can take legal action against their therapist after therapy has ended. For Service Users who have no capacity to take an action within the timeframe (severe mental health problems, etc.). If evidence is convincing, the court may allow a case to proceed even after the deadline has elapsed as it has discretion to do so. | Digital information deleted. Physical information securely destroyed or shredded | |
Young Persons Service User Clinical Record & Service User Records Service User information including Clinical Notes/Records - Contain information about the basic clinical details of therapeutic or mentoring sessions. These are stored on our SuiteCRM system, and occasionally in a client folder on GDrive. | Young Person’s Clinical notes are kept for six years after their eighteenth birthday. Clinical Notes for For Service Users who have no capacity to take an action within the timeframe (severe mental health problems, etc.). If evidence is convincing, the court may allow a case to proceed even after the deadline has elapsed as it has discretion to do so. | Digital information deleted. Physical information securely destroyed or shredded |
All of our policies will be reviewed and updated annually (see latest update version details at bottom of each page)
This policy/document was reviewed by:
Signed Date 19th July 2018
Position Service Manager
Signed ………………………..…………… Date …………………….…………
Position ………………………………………………………………….
Previous revision date - July 2021
Last reviewed - 21/08/2024
The next revision date is: August 2027
Page of
AC & ACWS Information Policy & Procedures – previously reviewed 07/12/2022