Duty of Confidence Code of Practice

Total Page:16

File Type:pdf, Size:1020Kb

Duty of Confidence Code of Practice Version No: V4 Date: May 2018 Duty of Confidence Code of Practice MAY 2018 Duty of Confidence Details: Review Frequency: Date of last review: Date of next review: Every three years Created March 2018 to May 2021 replace Confidentiality Procedure Service number ID Manual: Information Management (Transformation and Partnerships) (if appropriate) Revision Approved Review Version Version ref Reviser History by Date Lawrence 31 March 2017 Draft Serewicz Paula 3 May 2018 Draft V2 Sheen Lawrence 4 May Draft V3 Serewicz Paula 11 May V4 Final IGG 22/5/18 May 2021 Sheen 2 22 MAY 2018 Duty of Confidence Contents 1. Introduction ...................................................................................................................................4 2. Purpose ..........................................................................................................................................4 3. Scope..............................................................................................................................................4 4. Responsibilities............................................................................................................. ................5 Specific other staff:..........................................................................................................................6 5. Confidentiality ...............................................................................................................................7 6. How to Ensure Confidentiality.....................................................................................................8 6.1 Anonymise Data............................................................................................................................9 6.2 Sharing of Information...................................................................................................................9 6.3 Information Sharing and Disclosure across Agencies ................................................................11 6.4 Disclosure Required by Law .......................................................................................................11 6.5 Disclosure with Consent ............................................................................................................12 6.6 Disclosure in the Public Interest..................................................................................................13 6.7 Disclosure to Elected Members or MP’s.....................................................................................14 6.8 Deceased Records.....................................................................................................................15 6.9 Telephone Conversations ..........................................................................................................15 6.11 Public Access Points................................................................................................................16 6.12 Security in Offices .....................................................................................................................16 6.13 Working Away from the Office Base .........................................................................................17 6.14 Confidentiality for anonymous referrers....................................................................................17 6.15 Transferring Confidential Information....................................................................................18 Use of E-Mail Systems..................................................................................................................18 Use of Postal Systems ..................................................................................................................18 6.16 Data used for Research and Statistical Purposes ...................................................................19 7 Breach of Confidence .................................................................................................................19 Related Documents.................................................................................................................... .........20 3 22 MAY 2018 Duty of Confidence 1. Introduction A duty of confidence arises when one person discloses information to another in circumstances where it is reasonable to expect that the information will be held in confidence e.g. information provided to your doctor or lawyer would be confidential. Confidentiality is a legal obligation that is derived from case law. The council handles a significant amount of personal and financial information that is confidential and some jobs have extra responsibilities regarding confidentiality because of the type of personal data they handle. Confidential information is important to the way we work since it represents the trust between our service users and the council. Our service users trust us to maintain confidentiality so that their personal lives are protected and their information is only shared where there is a legal basis to do so. At the same time, the duty of confidence gives assurance to council employees that the council will treat employee information with appropriate care. Within this circle of confidence and trust, the council is able to provide its services to the benefit of the public. All employees and agents who work for the Council are bound by a legal duty of confidence to protect confidential information they may come in contact with during the course of their work. This is not just a requirement of their contractual responsibilities but also a requirement of the common law duty of confidence and where this involves personal information, the Data Protection Act 2018 (DPA18). For some staff it is also a requirement of their professional code of conduct. 2. Purpose The purpose of this document is to provide an overall understanding of the duty of confidence. This includes how it works in practice, what needs to be done to safeguard confidentiality and the consequences should it be breached. As a corporate document, it will supplement and not supersede the duty of confidence requirements as set out by legislation, case law or professional practices. 3. Scope This policy applies to all full time and part time employees and to associated individuals who work for the Council including agency staff, contractors and others employed under a contract of service. The policy also applies to Members in their role as a Member of the Council. The policy covers all confidential information that the Council holds in any medium such as paper, CD/DVD, USB sticks, computer or even heard by word of mouth. 4 22 MAY 2018 Duty of Confidence 4. Responsibilities Members All elected members are to be made fully aware of this policy and of their duties and responsibilities to safeguard confidentiality. Members are also bound by the Members’ Code of Conduct and are their own data controllers for any case work linked to their duties. Staff All staff will be required to complete mandatory data protection training appropriate to their role and will be required to sign a confidentiality statement as follows: staff employed on a permanent, temporary or casual contract are required to sign an appropriate Statement of Particulars as part of their contract of employment which provides a written undertaking to conform to the provisions of this procedure. • Agency workers are required to sign a confidentiality statement within the De Poel agreement. • Students, Volunteers and Work experience must read and discuss this procedure with their manager and this must be recorded as part of their placement by completion of the SS432 (Appendix 1). • Researchers must sign up to the appropriate confidentiality agreements included within the relevant Research Approval Governance process Any breach of confidentiality, inappropriate use of service user records, staff records or business sensitive/confidential information, or abuse of computer systems is a disciplinary offence, which could result in dismissal or termination of employment contract, and must be reported. Corporate Management Team (CMT) CMT has overall responsibility for ensuring that staff comply with the Councils legal obligations regarding the handling of personal information and for the development of any service specific guidance for sharing of information. Senior Managers Senior Managers are responsible for ensuring that all staff are compliant with the requirements of the policy and that confidentiality and for advising, dealing with and monitoring any issues regarding disclosure or access to information. Team Managers All Team Managers must ensure that they know and understand this procedure and all related organisational procedures for access to personal records. They must be aware of the need to conform to these procedures and the actions agreed for sharing 5 22 MAY 2018 Duty of Confidence information. They are also responsible for ensuring their staff are aware of the requirements and should be the first point of contact for staff for the provision of advice and support on confidentiality issues. Information Management Team (IMT) The IMT based in Transformation and Partnerships provides the Data Protection liaison for the Council and will provide advice, guidance and support in relation to confidentiality and Data Protection issues. Legal Services Legal services will provide advice and guidance on legal issues to the Information Management Team – services should not seek legal advice direct without
Recommended publications
  • Cumulative Index (Volumes 1-20)
    Campbell Law Review Volume 20 Article 7 Issue 2 Spring 1998 February 2012 Cumulative Index (Volumes 1-20) Follow this and additional works at: http://scholarship.law.campbell.edu/clr Recommended Citation Cumulative Index (Volumes 1-20), 20 Campbell L. Rev. 497 (1998). This Index is brought to you for free and open access by Scholarly Repository @ Campbell University School of Law. It has been accepted for inclusion in Campbell Law Review by an authorized administrator of Scholarly Repository @ Campbell University School of Law. et al.: Cumulative Index (Volumes 1-20) INDEX BY VOLUME Volume 1 Prior Crimes as Evidence in Present Criminal Trials ................... 1:1 Charles W. Gamble In Praise of Pension Reform .......................................... 1:31 Ronald I. Kirschbaum A History of Liquor By-The-Drink Legislation in North Carolina ........ 1:61 Michael Crowell Statutory Standard of Care for North Carolina Health Care Providers... 1:111 John Marsh Tyson Separation Agreements: Effect of Resumed Marital Relations - Murphy v. M urphy ....................................................... 1:131 Donald R. Teeter Farmers as Merchants in North Carolina - Currituck Grain, Inc. v. Pow ell .......................................................... 1:141 Beverly Wheeler Massey The Effect of Unanimous Approval on Corporate Bylaws - Blount v. T aft ............................................................. 1:153 Margaret Person Currin North Carolina and Declarations Against Penal Interest - State v. H aywood ........................................................ 1:161 Samuel W. Meekins Confronting Accused With Evidence Against Him as "Interrogation" Within the Meaning of Miranda - State v. McLean ................. 1:173 William M. Spivey Public Documents in the Hands of Private Collectors - State v. West .... 1:179 Samuel R. Clawson Volume 2 Advisory Rulings by Administrative Agencies: Their Benefits and D angers ........................................................
    [Show full text]
  • Breach of Confidence - the Eedn for a New Tort - Watts V
    Campbell Law Review Volume 8 Article 6 Issue 1 Winter 1985 January 1985 Breach of Confidence - The eedN for a New Tort - Watts v. Cumberland County Hospital System Kathryn B. Remick Follow this and additional works at: http://scholarship.law.campbell.edu/clr Part of the Evidence Commons, and the Legal Ethics and Professional Responsibility Commons Recommended Citation Kathryn B. Remick, Breach of Confidence - The Need for a New Tort - Watts .v Cumberland County Hospital System, 8 Campbell L. Rev. 145 (1985). This Note is brought to you for free and open access by Scholarly Repository @ Campbell University School of Law. It has been accepted for inclusion in Campbell Law Review by an authorized administrator of Scholarly Repository @ Campbell University School of Law. Remick: Breach of Confidence - The Need for a New Tort - Watts v. Cumberl BREACH OF CONFIDENCE-THE NEED FOR A NEW TORT-Watts v. Cumberland County Hospital System. INTRODUCTION When a patient divulges embarrassing, intimate, or even in- criminating information to a therapist he or she usually expects that such disclosures will be kept completely confidential. A wrongful disclosure by a therapist potentially injures a patient in two distinct ways.' First, the patient is injured by the adverse ef- fects flowing from the wrongful disclosure' and second, the wrong- ful disclosure destroys the patient's expectation that communica- tions will be kept confidential.' Since confidentiality is vital to the adequate functioning of a patient-therapist relationship, the legal protection of these confidences is necessary to promote a relation- ship that is beneficial to society. The North Carolina Court of Appeals in Watts v.
    [Show full text]
  • Table of Contents
    TABLE OF CONTENTS VOLUME 1 Preface .................................................... v Table of Contents ............................................ C-1 Contents Checklist........................................... CL-1 Table of Cases ............................................. TC-1 PART 1 Ð INTRODUCTION Chapter 1 Introduction ........................................1-1 1:10 Introduction . 1-1 1:20 Historical Antecedents of the Employment Relationship . 1-2 PART 2 Ð CONSTITUTIONAL JURISDICTION Chapter 2 Constitutional Jurisdiction..............................2-1 2:10 Antecedents and General Framework . 2-1 2:20 Multi-Undertaking Employers . 2-6 2:30 Concurrency . 2-7 2:40 Federal Spending . 2-8 2:50 Non-use of Constitutional Authority. 2-9 2:60 Corporate Identity . 2-9 2:70 Workers' Compensation and Occupational Health Schemes . 2-9 2:80 Human Rights . 2-10 2:90 Integral . 2-10 2:100 Transportation . 2-14 2:110 Telecommunications . 2-16 2:120 Aeronautics . 2-18 2:130 Aboriginal Peoples . 2-19 2:140 Banking. 2-21 2:150 Emergencies . 2-22 2:160 Declaration . 2-22 2:170 Federal Territory . 2-23 C-1 November 2015 CANADIAN EMPLOYMENT LAW 2:180 Federal Public Sector and Crown Corporations . 2-23 2:190 Charter Remedy . 2-23 PART 3 Ð PRIMARY COMPONENTS OF THE RELATIONSHIP Chapter 3 Employer and Employee Status . 3-1 3:10 The Existence of the Relationship . 3-1 3:10.1 The ªMaster and Servantº Relationship . 3-1 3:10.2 Control . 3-6 3:10.3 Fourfold Test . 3-8 3:10.4 Entrepreneur Test . 3-9 3:10.5 Organization Test . 3-11 3:10.6 Assignment of Employment Contracts . 3-13 3:20 Employee and Employer Status .
    [Show full text]
  • 12. Breach of Confidence Actions for Misuse of Private Information
    12. Breach of confidence actions for misuse of private information Contents Summary 179 The likely future development of the action for breach of confidence 180 Damages for emotional distress in action for breach of confidence 181 Injunctions, privacy and the public interest 185 Injunctions in defamation and breach of confidence 188 Injunctions to restrain disclosure of private information 190 Summary 12.1 This chapter makes two proposals dealing with existing protections of privacy at common law and with a view to the likely development of the common law if a statutory cause of action is not enacted.1 12.2 In addition to and separate from the detailed legal design of a statutory cause of action for serious invasion of privacy, the Terms of Reference require the ALRC to make recommendations as to other legal remedies to redress serious invasions of privacy and as to innovative ways in which the law may reduce serious invasions of privacy. 12.3 The Terms of Reference also direct the ALRC to make recommendations as to the necessity of balancing the value of privacy with other fundamental values including freedom of expression and open justice. 12.4 The first proposal is intended to redress uncertainty in the community as to whether Australian law provides a remedy for emotional distress suffered as a result of a breach of privacy which takes the form of the disclosure or misuse of private 1 In this chapter, the ALRC does not consider the possible development at common law of a new or separate tort for harassment or intrusion into seclusion, because it considers that, in the absence of a statutory cause of action for serious invasion of privacy, a statutory action for protection against harassment is the more appropriate way for the law to be developed: see Ch 14.
    [Show full text]
  • The New Law of Ideas
    Harvard Journal of Law & Technology Volume 28, Number 1 Fall 2014 THE NEW LAW OF IDEAS Robert C. Denicola* TABLE OF CONTENTS I. INTRODUCTION .............................................................................. 195 II. IDEAS AS TRADE SECRETS ........................................................... 198 A. Trade Secrets and Ideas ........................................................... 198 B. Idea Protection Under the UTSA ............................................. 201 III. DISPLACEMENT UNDER THE UTSA ............................................ 204 A. Alternative Causes of Action To Protect Ideas ......................... 205 B. Ideas That Do Not Qualify as Trade Secrets ............................ 215 IV. SUBSTANTIVE STANDARDS FOR IDEA PROTECTION ................... 218 V. FEDERAL PREEMPTION OF NON-CONTRACTUAL IDEA CLAIMS ......................................................................................... 220 A. Preemption by Federal Patent Law .......................................... 221 B. Preemption by Federal Copyright Law .................................... 223 VI. CONTRACTUAL PROTECTION OF IDEAS ...................................... 225 A. Express and Implied-in-Fact Contracts ................................... 226 B. Federal Preemption of Contractual Idea Protection ............... 230 1. Federal Patent Law ................................................................ 231 2. Federal Copyright Law .......................................................... 233 VII. CONCLUSIONS ..........................................................................
    [Show full text]
  • Restatement of the Law of Torts, Volume Iv: a Comparison Between American and English Law *
    March, X943 University of Pennsylvania Law Review And American Law Register FOUNDED 1852 Copyright 1943, by the University of Pennsylvania VOL. 91 MARCH, 1943 NUMBER 6 RESTATEMENT OF THE LAW OF TORTS, VOLUME IV: A COMPARISON BETWEEN AMERICAN AND ENGLISH LAW * ARTHUR L. GODHART t Volume IV of the Restatement of the Law of Torts is perhaps the most interesting of the Restatements, for it is concerned with such controversial topics as interference with business relations, private nui- sance, interference with privacy, and damages. It is also of particular interest from the standpoint of comparative law as the differences be- tween English and American law seem to be more marked here than they are in the other branches of the law of torts dealt with in previous volumes. This may be more apparent than real, due to the fact that the American Law Institute, having gained confidence with experience, seems to have stated doubtful rules in a more categorical fashion than was its earlier practice. Thus, for example, Section 867, which deals with "interference with privacy", is far more absolute on this point than are most of the other American authorities on the law of tort. INTERFERENCE WITH BUSINESS RELATIONS Volume IV begins with a chapter on the miscellaneous trade prac- tices which are condemned by the American law. These rules are con- siderably more stringent than are the corresponding ones in England, but it is doubtful whether in practice American commercial morality * This article concludes a series of articles by Professor Goodhart on Volumes one, two and three of the Restatement.
    [Show full text]
  • The Law of Torts
    ______________________________________________________________________________ THE LAW OF TORTS ______________________________________________________________________________ NCA Syllabus by: Nicholas Fernandes (Updated 2021) - 2 - TERMS OF USE Copyright © 2020 Law of Torts by Nicholas Fernandes. All rights reserved. No part of these notes may be reproduced or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, or stored in any retrieval system of any nature, without the prior written permission of the copyright holder. By signing up for the Law of Torts classes hosted by Nicholas Fernandes, you agree to abide by the terms contained herein, failing which, the copyright holder would be entitled pursue enforcement of his rights, which can include the launching of a formal complaint with the relevant Provincial administrative body. These materials are produced for the sole purpose of self-study in preparation for the NCA Law of Torts Examination and should not be used for any other purpose. The copyright holder does not accept liability for, and makes no warranties in regards to, any use made of these materials beyond their stated purpose. NCA candidates are only permitted to reproduce these materials for their personal use in examination preparation. The copyright holder makes his best efforts to ensure that these materials are accurate and current as of January, 2020. These materials are based on and include text from Robert M Solomon, Mitchell McInnes, Erika Chamberlain and Stephen GA Pitel, Cases and Materials on the Law of Torts, 10th ed (Toronto, ON: Carswell, 2019); and, GHL Fridman, Introduction to the Canadian Law of Torts, 3rd ed (Lexis-Nexis, 2012). The majority of case law and legislative resources needed by NCA candidates are available on CanLII, the free legal information resource funded by the Federation of Law Societies of Canada (www.canlii.org).
    [Show full text]
  • Freedom of Expression, Breach of Confidence and American Cyanamid
    Freedom of Expression, Breach of Confidence and American Cyanamid Stephen M Hunter* 1: INTRODUCTION From October 1992 until June 1994, a company named European Pacific used the New Zealand courts to shield its misdeeds from the glare of publicity, or as one of their lawyers called it, "prurient public inquisitiveness".' The principal legal means used to achieve this was the action for breach of confidence. The most important defence to this action, the public interest defence, was of little consequence. The cases surrounding the Winebox documents are the most significant and interesting on confidence in New Zealand for some years.' The Winebox documents contain evidence of large-scale circumvention of New Zealand tax law by some of this country's largest companies. The public interest in the documents is widely acknowledged. 3 Despite this, the owners of the documents, the European Pacific Group, were able to use actions for breach of confidence to prevent disclosure of the documents for over eighteen months. Part II of this article concentrates on the present state of the public interest defence to the action for breach of confidence. There will be discussion of its history, role and operation. Of particular importance isthe manner in which the defence operates at the interlocutory stage, as discussed in Part III. Part IV analyses how the courts decide whether or not to apply the defence when they have not had the benefit of hearing the full facts at trial. Parts V and VI discuss the operation and the adequacy of the defence in litigation relating to the Winebox documents.
    [Show full text]
  • Bibliography
    345 Bibliography Alexander (1972) 'The Law of Tort and Non-Physical Loss: Insurance Aspects', 12 JSPTL 119. Allen et al. (1979) Accident Compensation after Pearson (Sweet & Maxwell). Anderson (1994) in Markesinas & Deakin, Tort Law. Atiyah (1967) Vicarious Liability in the Law of Torts (Sweet & Maxwell). Atiyah (1972) 'Res Ipsa Loquitur in England and Australia', 35 MLR 337. Atiyah (1989) An Introduction to the Law of Contract, 4th edn (Oxford University Press). Baker (1990) An Introduction to English Legal History, 3rd edn (Butterworths). Baker and Milsom (1986) Sources of English Legal History (Butterworths). Bell (1983) Policy Arguments in Judicial Decisions (Oxford University Press). Beyleveld and Brownsword (1991) 'Privity, Transivity and Rationality', 54 MLR48. Birks (1985) An Introduction to the Law of Restitution (Oxford University Press). Birks (1991), 'Civil Wrongs: A New World', Butterworths Lectures 1990-91. Bishop (1980) 'Negligent Misrepresentation through Economists' Eyes', 96 LQR 360. Bishop (1982) 'Economic Loss in Tort', 2 OJLS 1. Bowman and Bailey (1986) 'The Policy Operational Dichotomy - A Cuckoo in the Nest', 45 CLJ 430. Buckley (1996) The Law of Nuisance, 2nd edn (Butterworths). Burrows (1994) Remedies for Torts and Breach of Contract, 2nd edn (Butter- worths) Burrows (1993), 'The Scope of Exemplary Damages', 109 LQR 358. Calabresi (1970) The Costs of Accidents (New Haven, CT). Calcutt (1990) Report on Privacy and Related Matters (HMSO), Cmnd 1102. Calcutt (1993) Review of Press Self-Regulation (HMSO), Cm 2135. Cane (1989) 'Economic Loss in Tort: Is the Pendulum out of Control', 52 MLR 200. Cane (1996) Tort Law and Economic Interests, 2nd edn (Oxford University Press). Cane (1993) Atiyah's Accidents, Compensation and the Law, 5th edn (Butter­ worths).
    [Show full text]
  • “In Confidence” – Putting in Place a Trade Secret Protection Program
    “In Confidence” – Putting in Place a Trade Secret Protection Program Training of the Trainers Program on Effective Intellectual Property Asset Management by Small and Medium Sized Enterprises (SMEs) WIPO & IPOM, Mongolia Ulaanbaatar, October 8 to 10, 2013 Susanna H.S. LEONG Associate Professor & Vice Dean NUS Business School, National University of Singapore Protection of Trade Secrets - TRIPS • In TRIPS, the obligation of member states to provide protection for confidential or undisclosed information is found in article 39 which provides: • (1) In the course of ensuring effective protection against unfair competition as provided in Article 10bis of the Paris Convention (1967), members shall protect undisclosed information in accordance with paragraph 2 and data submitted to governments or governmental agencies in accordance with paragraph 3. • (2) Natural and legal persons shall have the possibility of preventing information lawfully within their control from being disclosed to, acquired by, or used by others without their consent in a manner contrary to honest commercial practices so long as such information: – (a) is secret in the sense that it is not, as a body or in the precise configuration and assembly of its components, generally known among or readily accessible to persons within the circles that normally deal with the kind of information in question; – (b) has commercial value because it is secret; and – (c) has been subject to reasonable steps under the circumstances, by the person lawfully in control of the information, to keep it secret. [emphasis added] Protection of Confidential Information under Common Law • At common law, a plaintiff who alleges a breach of confidence must establish all of the following: • (a) the information must have the necessary quality of confidence about it; • (b) the information must have been imparted in circumstances importing an obligation of confidence; and • (c) there must have been an unauthorised use of that information to the detriment of the party communicating it.
    [Show full text]
  • Divulging Secrets and Other Breaches of Confidence
    Legal Link Marvin Joel Huberman Divulging Secrets and Other Breaches of Confidence “A secret spoken finds wings.” ---Robert Jordan, The Path of Daggers We – individuals, corporations and governments – all have communicated the information in confidence; that the secrets. Some are of tremendous value; others less so. Some information was misused by the defendant and that the are complex; others are simple. defendant suffered loss or detriment as a consequence of the breach. The plaintiff must also plead with particularity, Broadly speaking, it is wrong to divulge – to spread among the among other things, the relationship in which the confidence multitude – a secret. By definition, a secret is “something that arose and the damages resulting from the breach. is kept or meant to be kept unknown or unseen by others”. And while there are exceptional circumstances which may The test to determine whether the information was conveyed justify or even compel the disclosure of the secret, protecting in confidence is if the circumstances are such that any the confidential information and honouring the relationship of reasonable person standing in the shoes of the recipient of the trust and the expectation that the information conveyed will be information would have realized that on reasonable grounds kept private and confidential are often the paramount the information was given to him or her in confidence. This consideration. determination requires an analysis of the specific context and facts and circumstances of the given case presented. It is not Sometimes revealing something communicated in confidence necessary that the confidential information be disclosed to a is not only morally or professionally wrong, it is also third party.
    [Show full text]
  • The Economic Torts and English Law: an Uncertain Future
    Kentucky Law Journal Volume 95 | Issue 4 Article 3 2007 The conomicE Torts and English Law: An Uncertain Future Hazel Carty Manchester University Follow this and additional works at: https://uknowledge.uky.edu/klj Part of the Common Law Commons, and the Torts Commons Right click to open a feedback form in a new tab to let us know how this document benefits you. Recommended Citation Carty, Hazel (2007) "The cE onomic Torts and English Law: An Uncertain Future," Kentucky Law Journal: Vol. 95 : Iss. 4 , Article 3. Available at: https://uknowledge.uky.edu/klj/vol95/iss4/3 This Symposium Article is brought to you for free and open access by the Law Journals at UKnowledge. It has been accepted for inclusion in Kentucky Law Journal by an authorized editor of UKnowledge. For more information, please contact [email protected]. ARTICLES The Economic Torts and English Law: An Uncertain Future Hazel Carty' I. INTRODUCTION A. The Economic Torts Outlined There is no over-arching tort of unfair competition or misappropriation in English common law. Rather, when excessive competitive practices are al- leged, the aggrieved party must identify a specific tort (or torts) that cover the harm done to them. The causes of action most appropriate where unfair trading is the issue are the so-called "economic torts."' These causes of action comprise the torts of simple conspiracy, unlawful conspiracy, induc- ing breach of contract, intimidation, unlawful interference with trade, and malicious falsehoodA The list also includes the important tort of passing off which, unlike the others, is not a tort of intention.
    [Show full text]