How It Works2018-11-20T10:46:57+00:00

How it works

ShareforYou securely connects health and social care electronic record systems. This allows information from different types of care records to be included when a patient’s record is accessed. This allows professionals to see the latest and historical information related to the patient.

We will only access your ShareforYou record with to provide health and social care services to you. If you would prefer that we didn’t share your record then you can opt out at any time via your GP.

How will you ensure that you keep my personal data safe and secure?

We have put in place robust technical and non-technical controls to ensure that your personal data is always kept safe and secure. We monitor and keep audit logs so that your personal data is only accessed and used appropriately by our staff.

We will only transfer data through using secure technology that has already been tried and tested in other parts of the Country, and as part of this programme. The technology we are primarily using is called Graphnet and enables us to securely view and access your personal data from existing systems so that the minimum and legally permitted personal data about you is accessed as one single record.

How will you ensure that you keep my personal data safe and secure?

We have put in place robust technical and non-technical controls to ensure that your personal data is always kept safe and secure.  We monitor and keep audit logs so that your personal data is only accessed and used appropriately by our staff.

We will only transfer data through using secure technology that has already been tried and tested in other parts of the Country, and as part of this programme.    The technology we are primarily using is called Graphnet and enables us to securely view and access your personal data from existing systems so that the minimum and legally permitted personal data about you is accessed as one single record.

A comprehensive audit trail is maintained, which allows us to know exactly who has accessed what information and when.