Policies
View Trust policies using the dashboard below. Search by keyword or the type of policy (policy category). Please note that you may not be able to access some of the links in the policies - for example, to approved forms and supporting documents - unless you are a Trust member of staff.
If you are a Trust member of staff, please log in to Focus to view the full range of policies.
Bold table headings can be clicked to sort results
| Name of policy | Category | Ratification Group |
|---|---|---|
| Internet Usage Policy and Procedures | Data Security and Protection | Data Security and Protection Group |
| Registration Authority Policy and Procedures | Data Security and Protection | Data Security and Protection Group |
| Staff Subject Access Policy and Procedure | Data Security and Protection | Data Security and Protection Group |
| Staff Code of Conduct for Confidentiality for Person Identifiable Policy and Procedures | Data Security and Protection | Data Security and Protection Group |
| Recording, Storage and Use of Visual and Audio Images of Service Users Policy and Procedure | Data Security and Protection | Data Security and Protection Group |
| Data Protection Impact Assessment (DPIA) and IT Change Control Policy | Data Security and Protection | Data Security and Protection Group |
| Clinical Video Calls Policy and Procedure | Data Security and Protection | Data Security and Protection Group |
| Data Protection Act Policy and Procedure | Data Security and Protection | Data Security and Protection Group |
| Data Quality Policy and Procedures | Data Security and Protection | Data Security and Protection Group |
| Freedom of Information Act 2000 and Environmental Information Regulations 2004 Policy and Procedure | Data Security and Protection | Data Security and Protection Group |
| Information Security Policy and Procedures | Data Security and Protection | Data Security and Protection Group |
| Records Management Policy | Data Security and Protection | Data Security and Protection Group |
| Email, Safehaven and Pseudonymisation Policy and Procedure | Data Security and Protection | Data Security and Protection Group |
| Data Security and Protection Contracts and Information Sharing Agreements with External (or Third) Parties Policy and Procedure | Data Security and Protection | Data Security and Protection Group |
| Removable Media and Mobile Phone Policy and Procedure | Data Security and Protection | Data Security and Protection Group |
| Acceptable Use Policy | Data Security and Protection | Data Security and Protection Group |
| Information Handling and Classification Policy | Data Security and Protection | Data Security and Protection Group |
| Artificial Intelligence AI Policy | Data Security and Protection | Data Security and Protection Group |


