Information Governance & Data Protection

Current Status
Not Enrolled
Get Started
This course is currently closed

Welcome to the Beauty Training Portal and the start of your learning journey.

On the portal you will find your complete chosen course, including course modules and assessment questions, if applicable. Please work through each module, answering the questions thus enabling you to move on to the next module.

You have 90 days to complete the course, so you can study in your own time at your pace. If you need extra time, please email to gain extra time.

All the assessment questions are multiple choice and you need to achieve at least 80% to pass. On successful completion of the course, you will receive your course certificates, this can be downloaded straight after your quiz. This will be available to you in ‘My account’ section.

This training is designed to provide instructional guidance to you as practitioners. We will provide the necessary information you will require for appropriate responsive action if you encounter personal data, whether in written or verbal form.

The training course will cover the following:

  • Guidance and Legislation
  • Caldicott Guardian
  • Caldicott Principles and Guardian
  • Duty of Confidence
  • Duty of Candor
  • Explicit Consent
  • Vital Interest
  • Staff Responsibilities
  • Care Provider Responsibilities
  • Personal Data & Sensitive Data

Other essential areas of interest:

  1. Person Unidentifiable Data to Corporate Data
  2. Corporate Data
  3. Held Obtained Recorded Used Shared (HORUS)
  4. Information As an Asset
  5. Data Protection Act
  6. Data Subject Access Request
  7. The Freedom of information (FOI) Act 2000 and Exemption
  8. Freedom of Information Breaches and Consequences of Failure to Comply
  9. When it Goes Wrong

Why is this training a vital necessity?

It is a mandatory prerequisite of the law as well as a moral and social responsibility of all healthcare workers and practitioners alike to treat all patient or client information with the utmost confidentiality. This is based on the confidential nature of the relationship that exists between practitioners and their clients

Considering the fact that confidential services can be borderline impossible to exercise given the involvement of multiple personnel who might not be well versed with appropriate and effective identification as well as proper handling of Information considered to be confidential, it is our collective lawfully guided responsibility to ensure such information is kept secure while duly reporting any breach.

Our collective and mandatory efforts, however, a minute or otherwise is required even where there is no actual contact with patient or client’s personal Information.

With this, a confidential service, therefore, refers to every and all employees and volunteers alike being bound by law to maintain absolute confidentiality. This applies to everyone, including personnel with whom patient or clients do not have direct contact with.

Expected Learning Outcomes

On concluding this training activity, you ought to be able to:

  1. Comprehend the core principles of information governance as well as the importance of data security.
  2. Understand how to provide confidential services effectively.
  3. Facilitate and maintain effective record keeping as is required by the legislation guidance.
  4. Comprehend the essential fundamentals of confidentiality
  5. Fully comprehend the organizational responsibilities under the Freedom of Information Act 2000
  6. Individually comprehend the maintenance of information security
  7. Clearly distinguish between personal information and sensitive personal information.
  8. Effectively define confidentiality as well as what kind of Information it applies to and how to maintain such Information optimally.
  9. Effectively define security as well as how good security is planned and how all personnel are factored in.
  10. Effectively identify and duly report any confidentiality as well as security breaches and potential loopholes.
  11. Raise relevant issues that may potentially lead to the improvement of the organization.
  12. Comprehend the available different types and values of Information.
  13. Understand the involved principles of data security as well as comprehending how to safeguard the confidentiality, integrity, and availability of data.
  14. Stay alert to imminent threats to data security, how to avoid them through; social engineering, careful and mitigated use of online platforms including social media, emails, malicious softwares, how to effectively protect Information and physical security.
  15. Identify any breach or potential breach as well as knowing the relevant information to report.
  16. Comprehend the fundamentals of data protection and general data protection regulations (GDPR).

Please contact us directly on if you require further assistance.

We hope you enjoy your course and we wish you every success for the future.

The Beauty Training Portal Team

COPYRIGHT NOTICE: No paragraph or photographs within this publication may be copied, reproduced, or transmitted in any form or by any means, electronic or mechanical, without permission of The Beauty Training Portal Team. Any person breaching this copyright may be liable to criminal prosecution and a claim for civil damages

Beauty Training Portal