Skip to main content

Part of A guide to confidentiality in health and social care: Treating confidential information with respect 

Rule 3: Information that is shared for the benefit of the community should be anonymised

Current Chapter

Current chapter – Rule 3: Information that is shared for the benefit of the community should be anonymised


Information that has been collected by health and social care services while providing direct care for individuals has the potential to provide huge benefits for the community. However, to protect the individual’s confidentiality, anonymised information should be used wherever possible when it is for the benefit of the community, rather than in support of direct care.16

Information is considered to be anonymised when there is little or no risk of an individual being identified17This could include information that has been summarised and presented in a table18 for the purposes of analysis. Information collected in support of direct care is of enormous value when assessing the quality and efficiency of health and social care services and identifying how they can be improved. Such work includes the use of anonymised information about individuals who have suffered from a particular disease or have undergone a particular treatment.

This information may also be of huge benefit to researchers trying to find new and better cures. The experiences of individuals on a particular care pathway may help commissioners to improve services for the benefit of future users. Public health specialists running health improvement programmes to increase life expectancy or reduce health inequalities may need to combine information from different sources to build up a picture of how people’s health outcomes relate to their individual lifestyles and environment.

Those using information should always ensure that they minimise the risk of identifying an individual. The guiding principles about the type of information which should be used for different purposes are considered below in the order in which they should be addressed

1. Will anonymised information be sufficient for the purpose? This sort of information can be published and used without limitations (part A). 

If not 

2. Will deidentified information (information which identifies an individual has been removed, but there are still some risk of re-identification be sufficient for the purpose?

There are 2 ways to protect de-identified information so it can be considered to be "anonymised"

  • where there is a low risk of reidentification appropriate19 agreements or contacts can be put in place, which limit how the information can be used
  • where there is a higher risk of re-identification stricter controls can be put in place to create a trusted environment for the information (part B)

If not

Is there a lawful basis to use confidential information (part C) 


All health and social care organisations should clearly explain to patients, service users and the public how the confidential  information they collect could be used in de-identified form for research, audit, public health and other purposes.20


A. Generally, anonymised information can and should be used to support the improvement of care services

Effectively anonymised information can be published

Removing the individual’s name, age, address and other personal identifiable information21 may not be sufficient o effectively anonymise the information. This is because it is sometimes possible to link pieces of information together which on their own would not identify an individual but when looked at together could re-identify an individual. For the same reason anonymisation is not always achieved through masking the individual’s identity by using pseudonyms or coded references.

When confidential information has been anonymised in line with the HSCIC Anonymisation Standard22 or equivalent, it can lawfully be published and used. This means it can be shared without breaching confidentiality.


B. However, sometimes anonymised information by itself is not sufficient to release benefits to the community

Sometimes anonymised information is not adequate to support important activities. Occasionally it is important to have information at service user or patient level, which allows for a differentiation between individuals. Although the information is not  identifiable there is still a risk that an individual could be identifiable unless appropriate controls are put in place. The controls required will be based on the risk of re-identifiable of an individual.

The risk is deemed to be low where personal identifiable have been removed. This risk can be controlled by data sharing agreements or contracts with appropriate liabilities and penalties included.

Anonymisation within a ‘trusted’ environment

The risk is higher where, for example, a single personal identifiable is used and the controls required must be more robust. An example of this is where commissioners of integrated social care and health services for people with complex needs want to plan improved care pathways. They may need to know one identifying characteristic about the individuals concerned to ensure they are making best use of the services in the community. To achieve these benefits information about the same person needs to be linked together by the use of one identifying characteristic, but there is no need to know who the individual is.

Such linkage may only be performed within a trusted environment which applies strict controls. When this is done the information in the possession of that organisation or person can be considered to be anonymised. It would not be anonymised if it were shared outside of those controls or published.

The controls need to be sufficient to ensure the recipient has created a ‘trusted environment.'23 Examples include

  • signed contracts or agreements which stipulate how the information will be used, including restrictions on linking information to prevent the re-identifi of individuals. (See, for example, the HSCIC data sharing contract24)

AND

  • demonstration of meeting the required standards of security and privacy, for example the Information Governance Toolkit (IGT)25

AND

  • an independent auditor’s opinion of security and privacy measures

The information ceases to be confidential information and is considered ‘anonymised’ only by virtue of the controls in place.



D.For all of the lawful methods of sharing confidential information above, all of the following three conditions should be met

1. ​​​​​Individuals should be informed about how their confidential information may be shared or used32

The law33 says that any organisation holding confidential information should ensure there are no surprises for individuals about how it is used. There are some exceptions, for example where it would compromise a criminal investigation or where information is shared for safeguarding reasons.

As a minimum, individuals should be told:

  • what confidential information is held about them
  • who may access it and/or who it may be provided to
  • the purpose it is being used for
  • how they can raise an objection

Where confidential information passes through several organisations which are not directly involved in an individual’s care, it can become increasingly difficult to meet this requirement. Even where it is not pragmatic for an individual to be informed directly, each body in the chain must publish the information above in a prominent and accessible form (for example on a website).

2. Steps should be taken to use the minimum level of confidential information necessary to support the purpose

In all cases the minimum level of confidential information necessary to achieve the purpose should be used.34

3. The law should be checked to ensure there are no legal restrictions to sharing particular pieces of confidential information

Information should always be shared in accordance with the law and organisations must abide by legal provisions which ban or limit the sharing of particular pieces of confidential information35. One example is the law which makes the disclosure of information relating to assisted conception treatment (for example information about gamete donors and people receiving treatment) a criminal offence in most cases.36


Flow chart showing how to decide if to share or disclose confidential information for the benefit of the community

Footnotes

16. A detailed explanation of the boundary between ‘direct care’ (the subject of rule 2) and ‘indirect care’ (the subject of this rule) is provided in section 10 (‘Using health and social care information - direct care and indirect care purposes’) of the references document

17. Further guidance on anonymisation techniques is available in section 12 (‘Anonymisation guidance’) of the references document

18 .Often referred to as aggregate information, where entries that may enable individuals to be identified have been removed.

19. See section 14 (‘Data sharing contracts and agreements’) of the references document

20. More information about fair processing and the level of transparency required can be found in section 3 (‘The Data Protection Act 1998’) of the references document

21. Other examples of personal identifiable include (but are not restricted to) date of birth, post code, local hospital number, national insurance number and telephone number. Further guidance can be found in section 1 (‘The Information Governance Review’) of the references document.

22. ISB 128 

23. Section 13 (‘Accredited Safe Havens’) of the references document

24. The Data Sharing Contract used by the HSCIC can be found in section 14 (‘Data sharing contracts and agreements’) of the references document.

25. Data Security and Protection Toolkit

26.  Further details of legal obligations to disclose confidential information are available in section 16 (‘Legislation that controls confidential information disclosures’) of the references document.

27. Public Health (Control of Disease) Act 1984 and amendments. See in particular the Heath Protection (Notification Regulations 2010 (SI 2010/659)

28. The Health and Social Care Act 2012. Full details are available in section 15 (‘The Health and Social Care Information Centre’s powers under the Health and Social Care Act 2012’) of the references document.

29. Such as the Crime and Disorder Act 1998 section 115, the Data Protection Act 1998 section 29, and the Police and Criminal Evidence Act 1984

30. Section 251 of the NHS Act 2006 (commonly referred to as ‘section 251’). The Health Service Control of Patient Information Regulations 2002 invoked are the regulations which allow the Secretary of State to exercise judgement as to whether the duty of confidentiality should be set aside

31. Further details can be found in section 16 (‘Legislation that controls confidential information disclosures’) of the references document.

32. Because confidential information is also personal, the Data Protection Act 1998 still applies. The principles within it are outlined here in respect of confidential information. These conditions also apply to the use of confidential information for direct care and are covered in rule 2

33. The Data Protect Act 1998. More information about fair processing and the level of transparency required can be found in section 3 (‘The Data Protection Act 1998’) of the references document

34. Where explicit consent has been obtained, the amount of confidential information shared should be determined in relation to the terms of consent

35. Further details can be found in section 16 (‘Legislation that controls confidential information disclosures’) of the references document

36. Section 33A and section 41 of the Human Fertilisation and Embryology Act 1990


Last edited: 9 February 2022 9:19 am