Caldicott Guardian Sample Clauses

Caldicott Guardian. The Caldicott Guardian will be responsible for the approval, maintenance and review of this protocol through the IM&T Steering Group. Caldicott Guardian/Nominated Lead(s) for Information Sharing The Caldicott Guardian/Nominated Lead(s) for Information Sharing will ensure dissemination of this protocol and monitor the implementation and compliance of this framework within their own Organisations/Departments.
AutoNDA by SimpleDocs
Caldicott Guardian. Although not a statutory requirement, partner organisations are committed to the Caldicott principles which encapsulate the above mentioned statutes when considering whether confidential information should be shared. These are:- Caldicott Principles: Principle One – Justify the Purpose Every proposed use or transfer of personal identifiable information within or from an organisation should be clearly defined and scrutinised, with continuing uses regularly reviewed by an appropriate Guardian. Principle Two – Don’t use personal information unless it is absolutely necessary Personal identifiable information items should not be used unless there is no alternative. Principle Three – Use the minimum necessary personal identifiable information Where use of personal identifiable information is considered to be essential, each individual item of information should be justified with the aim of reducing identifiability Principle Four – Access to personal information should be on a strict need to know basis Only those individuals who need access to personal identifiable information should have access to it, and they should only have access to the information items they need to see Principle Five – Everyone should be aware of their responsibilities Action should be taken to ensure that those handling personal identifiable information are aware of their individual responsibilities and obligations in respect of maintaining client confidentiality. Principle Six – Understand and comply with the law Every use of personal identifiable information must be lawful. A person in each organisation should be responsible for ensuring that the organisation complies with the legal requirements
Caldicott Guardian. Acting as the 'conscience' of an organisation, the Caldicott Guardian should actively support work to facilitate and enable information sharing, advising on options for lawful and ethical processing of information as required. Caldicott Guardian Name Post title Organisation Xxxx Xxxxxxxx Interim Director of Public Health NHS Lanarkshire
Caldicott Guardian. The Data Processor has an appointed Caldicott Guardian and as part of the ISO 27001 processes. Relevant personnel with access to confidential data are trained in recognising and appropriately handling confidential and sensitive information. The training is based on NHS Digital materials.
Caldicott Guardian. Acting as the 'conscience' of an organisation, the Caldicott Guardian should actively support work to facilitate and enable information sharing, advising on options for lawful and ethical processing of information as required. Caldicott Guardian Name Post title Organisation Xxxx Xxxxxxxx Interim Director of Public Health NHS Lanarkshire Data Protection Officer Lead IG Practitioner Name Post title Organisation Xxxxxx Xxxxxx Data Protection Officer North Lanarkshire Council Xxxxxxxx Xxxxx Data Protection Officer NHS Lanarkshire Xxxxxx Xxxxxx Data Protection Officer North Lanarkshire Integration Joint Board Signatories North Lanarkshire Council Name of Parties to ISA North Lanarkshire Council Authorised signatories to ISA Title /Name Des Xxxxxx Role Chief Executive Head Office address Xxxxx Xxxxxx, Xxxxxxxx Xxxxxx, Xxxxxxxxxx, XX0 0XX Centre of Excellence Registration Date N/A Name of Parties to ISA North Lanarkshire Council Authorised signatories to ISA Title /Name Xxxxx Xxxx Role Senior Information Risk Owner Head Office address Xxxxx Xxxxxx, Xxxxxxxx Xxxxxx, Xxxxxxxxxx, XX0 0XX Centre of Excellence Registration Date N/A NHS Lanarkshire Name of Parties to ISA NHS Lanarkshire Authorised signatories to ISA Title /Name Xxxxx Xxxxxxxx Role Chief Executive Head Office address NHS Lanarkshire Headquarters, Kirklands, Xxxxxxxx Xxxx, Xxxxxxxx X00 8BB Centre of Excellence Registration Date N/A Name of Parties to ISA NHS Lanarkshire Authorised signatories to ISA Title /Name Xxxxxx Xxxxxx Role Senior Information Risk Officer Head Office address NHS Lanarkshire Headquarters, Kirklands, Xxxxxxxx Xxxx, Xxxxxxxx X00 8BB Centre of Excellence Registration Date N/A Name of Parties to ISA NHS Lanarkshire Authorised signatories to ISA Title /Name Xxxx Xxxxxxxx Role Caldicott Guardian Head Office address NHS Lanarkshire Headquarters, Kirklands, Xxxxxxxx Xxxx, Xxxxxxxx X00 8BB Centre of Excellence Registration Date N/A Lanarkshire Integration Joint Board Name of Parties to ISA North Lanarkshire Joint Integration Board Authorised signatories to ISA Title /Name Xxxx XxXxxxxx Role Interim Chief Accountable Officer Head Office address 00 Xxxxx Xxxxxx, Xxxxxxxxxx, XX0 0XX Centre of Excellence Registration Date N/A Name of Parties to ISA North Lanarkshire Joint Integration Board Authorised signatories to ISA Title /Name Xxxxx Xxxx Role Senior Information Risk Officer Head Office address 00 Xxxxx Xxxxxx, Xxxxxxxxxx, XX0 0XX Centre of Excellence Registration Date n/a Sign off "We the un...
Caldicott Guardian. NO Record the information sharing decision and your reasons, in line with the Trust Policy (CP12) Share information: • Identify how much information to share • Distinguish fact from opinion • Ensure that you are giving the right information to the right person • Ensure that you are sharing information securely • Inform the person that the information has been shared if they were not aware of this and it would not create or increase risk or harm. DO NOT SHARE Is there sufficient public interest to share? See below YOU CAN SHARE Orange bold Italics relate to scenario specific responses Addendum for Southern Health NHS Foundation Trust (HPFT) Information Sharing protocols, guidance, policy, memorandums of understanding CP 12.1 Interagency Policy on Confidentiality & the Management of Service User Information, V5 (Agreement between HPFT, Hampshire Adult Services, Southampton Adult Services and Surrey & Borders Partnership NHS Foundation Trust CP 12.2 Procedural Agreement between the Agencies on Arrangements for the Transfer and Management of Confidential Service User Information, Version 3 CP 12.3 Staff Practice Guidelines for Confidentiality and Information Sharing, Version 4 Memorandum of Understanding for Potentially Dangerous People between HPFT and Hampshire Constabulary (January 2011)

Related to Caldicott Guardian

  • xxx/OpenGovernment/LobbingAtOrangeCounty aspx A lobbying blackout period shall commence upon issuance of the solicitation until the Board selects the Contractor. For procurements that do not require Board approval, the blackout period commences upon solicitation issuance and concludes upon contract award. The County may void any contract where the County Mayor, one or more County Commissioners, or a County staff person has been lobbied in violation of the black-out period restrictions of Ordinance No. 2002-15. • Orange County Protest Procedures xxxx://xxx.xxxxxxxxxxxxxx.xxx/VendorServices/XxxxxxXxxxxxxXxxxxxxxxx.xx px Failure to file a protest with the Manager, Procurement Division by 5:00 PM on the fifth full business day after posting, shall constitute a waiver of bid protest proceedings.

  • Asset Management Supplier will: i) maintain an asset inventory of all media and equipment where Accenture Data is stored. Access to such media and equipment will be restricted to authorized Personnel; ii) classify Accenture Data so that it is properly identified and access to it is appropriately restricted; iii) maintain an acceptable use policy with restrictions on printing Accenture Data and procedures for appropriately disposing of printed materials that contain Accenture Data when such data is no longer needed under the Agreement; iv) maintain an appropriate approval process whereby Supplier’s approval is required prior to its Personnel storing Accenture Data on portable devices, remotely accessing Accenture Data, or processing such data outside of Supplier facilities. If remote access is approved, Personnel will use multi-factor authentication, which may include the use of smart cards with certificates, One Time Password (OTP) tokens, and biometrics.

  • Contract Management To ensure full performance of the Contract and compliance with applicable law, the System Agency may take actions including:

  • Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement.

  • Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.

  • Investment Management If and to the extent requested by the Advisor, the Sub-Advisor shall, subject to the supervision of the Advisor, manage all or a portion of the investments of the Portfolio in accordance with the investment objective, policies and limitations provided in the Portfolio's Prospectus or other governing instruments, as amended from time to time, the Investment Company Act of 1940 (the "1940 Act") and rules thereunder, as amended from time to time, and such other limitations as the Trust or Advisor may impose with respect to the Portfolio by notice to the Sub-Advisor. With respect to the portion of the investments of the Portfolio under its management, the Sub-Advisor is authorized to make investment decisions on behalf of the Portfolio with regard to any stock, bond, other security or investment instrument, and to place orders for the purchase and sale of such securities through such broker-dealers as the Sub-Advisor may select. The Sub-Advisor may also be authorized, but only to the extent such duties are delegated in writing by the Advisor, to provide additional investment management services to the Portfolio, including but not limited to services such as managing foreign currency investments, purchasing and selling or writing futures and options contracts, borrowing money or lending securities on behalf of the Portfolio. All investment management and any other activities of the Sub-Advisor shall at all times be subject to the control and direction of the Advisor and the Trust's Board of Trustees.

  • COMPETENT SUPERVISORY AUTHORITY Identify the competent supervisory authority/ies in accordance with Clause 13 … ANNEX II - TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA EXPLANATORY NOTE: The technical and organisational measures must be described in specific (and not generic) terms. See also the general comment on the first page of the Appendix, in particular on the need to clearly indicate which measures apply to each transfer/set of transfers. Description of the technical and organisational measures implemented by the data importer(s) (including any relevant certifications) to ensure an appropriate level of security, taking into account the nature, scope, context and purpose of the processing, and the risks for the rights and freedoms of natural persons. [Examples of possible measures: • Measures of pseudonymisation and encryption of personal data • Measures for ensuring ongoing confidentiality, integrity, availability and resilience of processing systems and services • Measures for ensuring the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident • Processes for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures in order to ensure the security of the processing • Measures for user identification and authorisation • Measures for the protection of data during transmission • Measures for the protection of data during storage • Measures for ensuring physical security of locations at which personal data are processed • Measures for ensuring events logging • Measures for ensuring system configuration, including default configuration • Measures for internal IT and IT security governance and management • Measures for certification/assurance of processes and products • Measures for ensuring data minimisation • Measures for ensuring data quality • Measures for ensuring limited data retention • Measures for ensuring accountability • Measures for allowing data portability and ensuring erasure]

  • Management Grievance The Employer may initiate a grievance at Step 3 of the grievance procedure by the Employer or designate presenting the grievance to the President of the Union or designate. Time limits and process are identical to a union grievance.

  • Certificate of Operating Authority A certification by the State Commission that CLEC has been authorized to operate within the State as a provider of local Telephone Exchange Services within CenturyLink’s local service area; in many states this certification is known as a Certificate of Public Convenience and Necessity. CIC: An acronym for Carrier Identification Code. CLASS: An acronym for Custom Local Area Signaling Services. CLASS is based on the availability of Common Channel Signaling (CCS). CLASS consists of number- translation services such as call-forwarding and caller identification, available within a local exchange. CLASS is a service mark of Bellcore, now Telcordia. CLEC Profile: A CenturyLink form required to be completed and submitted to CenturyLink by any Telecommunications Carrier requesting to interconnect or exchange traffic with CenturyLink’s network, requesting unbundled access to CenturyLink’s Network Elements, or the ability to initiate any order submission to CenturyLink. Among other things, a Telecommunication Carrier is required to provide CenturyLink, on the CLEC Profile, the following: its Operating Company Number (OCN), Company Code (CC), and Access Carrier Name Abbreviation (ACNA). CLLI Codes: Common Language Location Identifier Codes. Collocation: An arrangement whereby a requesting Telecommunications Carrier may locate equipment necessary for Interconnection or access to Unbundled Network Elements at CenturyLink Central Offices for the purposes of interconnecting with CenturyLink’s network or for accessing CenturyLink’s Unbundled Network Elements pursuant to the Interconnection obligations under the Act as codified in 47 C.F.R. §51. Commingle: The act of Commingling. Commingling: The connecting, attaching, or otherwise linking of an unbundled Network Element, or a combination of unbundled Network Elements, to one or more facilities or services that CLEC has obtained at wholesale from CenturyLink or the combining of an unbundled Network Element, or a combination of unbundled Network Elements with one or more such facilities or services. Commission: The State Public Service or Public Utility Commission, as applicable. Common Channel Signaling (CCS): A high-speed, specialized, packet-switched communications network that is separate (out-of-band) from the public packet-switched and message networks. CCS carries addressed signaling messages for individual trunk circuits and/or database-related services between Signaling Points in the CCS network using SS7 signaling protocol. Common Transport: An interoffice transmission path between End Office Switches, between End Office Switches and Tandem Switches and between Tandem Switches in CenturyLink’s network. Common Transport paths/Common Tandem Trunks are shared between multiple customers and are required to be switched at the Tandem Switch. Company Identifier or Company ID: A three to five (3 to 5) character identifier that distinguishes the entity providing voice service (e.g. wireline, wireless, VoIP, etc.) to the End User. The Company Identifier registry is maintained by NENA in a nationally accessible database. Competitive Local Exchange Carrier (CLEC): As defined in 47 U.S.C. §153, authorized to provide Telephone Exchange Services or Exchange Access Services in competition with an ILEC.

  • Records Management Records the Provider must keep

Time is Money Join Law Insider Premium to draft better contracts faster.