Staff access, audit trails, training oversight, and AI governance
Access to pharmacy data should be granted according to role and need. Leaders must be able to say who can access which records, why that access is required, how it was authorised, and how improper use would be detected.
Role-based access and audit leadership
- Least privilege should be the default: staff should have only the access needed for their role and current duties.
- Named accounts matter: shared logins, borrowed credentials, and informal workarounds reduce accountability.
- Joiner, mover, leaver controls must be reliable: new starters, locums, role changes, and leavers all create points of risk that need prompt action.
- NHS and shared-system access needs oversight: smartcards, role profiles, local permissions, and remote access arrangements should be justified and regularly reviewed.
- Audit trails are only useful if reviewed: leaders should know what is logged, who reviews exceptions, and how repeated concerns are escalated.
Training oversight is a leadership responsibility
All staff who handle confidential information require regular data-protection training. Roles that carry specific information-governance or data-protection risk need additional, role-focused learning. ICO audit guidance supports targeted training, and Community Pharmacy England expects IG leads to complete detailed learning and to review their team's training needs annually.
- General staff need baseline training: confidentiality, recognising phishing, secure communication, access rules, incident escalation, and routine good practice.
- Specialist roles need extra depth: DPOs, IG leads, system administrators, managers handling SARs or breaches, and procurement leads require training beyond basic awareness.
- Training evidence should be reviewable: records should show completion, gaps, overdue refreshers, and any follow-up actions after incidents.
Digital and physical security foundations
Leadership oversight must cover both digital and physical security. Confidential information in a pharmacy can be exposed via unlocked screens, insecure mobile devices, paper records, printers, consultation-room paperwork, device repair or disposal, and weak control of cabinets, keys, or back-office areas.
- Physical records need real protection: locked rooms, cupboards, cabinets, or drawers; controlled keys; and routine checks for unattended records during site walks.
- Devices and workstations need baseline controls: screen locking, suitable encryption, secure disposal or repair arrangements, and removal of unused accounts.
- Printing and paper handling matter: collection slips, PMR printouts, delivery paperwork, and consultation notes should not be left visible or mixed into general waste.
- Visitors and contractors need boundaries: engineers, cleaners, and other third parties should not have casual access to confidential information or unlocked records.
- Security should be monitored: leaders should know how these controls are checked locally rather than assume compliance.
Storage, backups, and resilience
Security includes availability. If the organisation cannot restore access to essential personal data after an outage, cyberattack, or supplier failure, people may be harmed even if no information has been leaked.
- Know where data and backups are held: live systems, archives, supplier environments, and cloud backups should all be understood.
- Seek assurance on restore capability: backups are useful only if recovery works and is tested or otherwise evidenced.
- Protect backups appropriately: leaders should ask whether backups are segregated, access-restricted, and resilient against the same compromise that could affect live systems.
- Include archives and backups in retention thinking: leaders should understand deletion, return, and end-of-contract arrangements beyond the live platform.
- Expect proportionate cyber resilience: patching, secure configuration, MFA for privileged access where appropriate, and recognised frameworks such as Cyber Essentials may support assurance, but they do not replace governance.
Leadership rules for AI use
- Approved tools only: staff should know which AI systems, if any, are authorised for work use.
- No identifiable patient data in unapproved tools: this must be an explicit, enforced rule.
- Prompt minimisation: even in approved tools, use the minimum data necessary.
- Human review remains essential: AI output must not replace professional or managerial judgement.
- Logging and review matter: AI use should be included in normal governance and audit processes.
Good access control is not only a technical issue. It depends on leadership decisions about role design, supervision, audit review, specialist training, and whether staff feel allowed to improvise around weak systems.

