Intranet

This is our intranet for staff and volunteers, please note only those who registered for this intranet site will have access to content pages.

If you are logged in, simply click on topics above. If you cant see anything then please check that you have been granted access and are logged in.

Existing members First time users Still cant see anything?

Existing members have to log-in: just scroll to the bottom of  the  website and click 'Log in'.

If you're new to NCnet, you will have to 'Sign Up' via the button above. A website admin will then manually have to grant access, please send email to Communications

If after that you are still unable to see the content please send email to Communications



Information Governance and Confidentiality

Information Governance, Confidentiality are absolutely fundamental parts of our every day working life.

In our job roles, we handle a lot of personal - and sensitive - information about a lot of people.

This webpage is all about how we behave in order to keep this data safe. Keeping the data safe means that we avoid 'near misses' or 'data breaches'.

There are 2 parts to the IG Training:

  • IG overview training (a short PowerPoint video)
  • Digital Care Hub elearning - 4 training modules & 1 assessment

The E-learning modules are:

Module 1: Data Protection Rights and Responsibilities (30 minutes)

Module 2: Keeping Data Secure (20 minutes)

Module 3: Threats to Data Security (20 minutes)

Module 4: Data Breaches (15 minutes)


Assessment - mandatory to complete - download your pass certificate and send it to your Line Manager and Louise Peerless

The module are independent of each other. Once you have completed each one, return to the main DigitalCareHub page, and select the next one. 

You assessment is on the same webpage. Once you have done the assessment, please download your certificate and send it to your Line Manager, copying in Louise Peerless.

Follow the links in the table below to do both elements of the training:

Powerpoint Video E-learning modules
Information Governance Training 2024
E-learning modules and assessment

Data Breaches

A data breach happens when we give personal information to the wrong person, someone who should not have access to that information. Example data breaches:

Email sent to the wrong person Email sent out without using bcc - everyone sees everyone else's email addresses

Reply all instead of Reply to the sender - when your response contains personal information

Personal information shared outside of our domain (northamptonshire-careres.org) without encryption Letter sent to the wrong postal address or  put in the wrong envelope

Incorrect address information recorded about someone on Charitylog

Verbal disclosure of information about another person

Personal information left on a desk

Whenever you become aware of a data breach, you must:

  1. Report the incident to your Line Manager, the IG lead, Deputy Lead, or another Senior Manager
    • Explain what you have found
    • Explain any actions that you have taken so far to contain the issue
  2. Participate in any subsequent actions and investigation needed
  3. Complete a Breach Report Form and send it to the IG Lead or Deputy
For more information on what to do if you receive a Subject Access Request or a Freedom of Information request, see the Process below.

Data Breaches or Near Misses

Subject Access Requests or Freedom of Information Requests

Data Breach Report form

Process notes for Data Breaches

Process for Subject Access Requests or Freedom of Information Requests