Recommendation 3.
Managing the risk of re-identifying data – review of processes
|
Rules about privacy and security should include ways to stop people finding people’s names or knowing who the information is about |
|
These rules for the data asset and computer system should be checked every year. This can help to make sure that the data on computer systems is kept private and safe. |
Response
|
We agree. |
|
The Board will be asked to agree to a review that looks at extra ways to stop people’s names being known or information being linked back to people. |
|
A review is a way to look at how things are being done and make changes if needed. |
|
The review could look at:
|
The review should be done every year when there is new data or when things are found not to be safe. |
|
A report will be written about this and given to all the groups who need it, including the Board and the Council. |
|
|
The first review is to be done by July 2025. |