Job summary Elgar House Surgery is looking for a forward thinking and friendly Data and Systems Co-Ordinator to join our fantastic team. We want you to be able to do the best work of your career, be confident in your care and proud of the outcomes you achieve … be required to provide support to the multidisciplinary team, ensuring all issues are resolved or escalated in a timely manner. The role of the Data & Systems Co-ordinator requires a self-motivated, disciplined individual to take ownership of the efficient day to day running of the service, supporting the … a key member of the Elgar House team. Main duties of the job To support the Practice Manager in the coordination and administration of Data, I.T. and Systems within the practice. The role will also support the practice team when resources are low. About us Elgar House Surgery is more »
Job summary This is an exciting opportunity to join the Data Quality Team in Informatics Merseyside as a Information Facilitator. The Data Quality team supports GP practices across Liverpool in improving the use of the clinical systems and assisting with general data quality and the uptake and … with the Practices to help them develop their IT systems, to move away from paper records and use the computer system to record clinical data to support improvement in the quality or care. Implementing and influencing use of protocols, policies and procedures as produced by Liverpool Place. Persuade and … for all roles." Job description Job responsibilities To support the development of the use of information to improve patient care by: Entering complex, clinical data onto the practice clinical computer system, including medical histories, and entering health promotion and chronic disease management details. Supporting practices in the development and more »
contract - 1-stage interview process! The role: As a Business Analyst your input will be crucial in helping our client risk assess their personal data processing activities. In this role, they are looking for an analytical and driven individual who will spearhead and deliver a project to map their … personal data across the group. This will all happen by working closely with a variety of teams and stakeholders from across the various business entities. Working with the DataProtection team, you will play a pivotal role in crafting personal data flow maps and designing a … process to keep them current. We answer questions like: Where is our data? Where did it come from? How did it get there? What is the data? Do we collect the minimum amount of data? How long should we keep it for? How is it kept secure more »
of the UHN Group to accurate record and codify its clinical activity is fundamental to understanding the quality of its clinical services. Our coded data is used by all parts of the Group's business to deliver trusted and high-quality services to patients. Accredited Clinical Coders are a … training). You will assist the Clinical Coding Team Leads to support and mentor Associate Clinical Coders and to achieve the submission of codified data in a timely manner. About us In July 2021 we formed the University Hospitals of Northamptonshire NHS Group, bringing together the constituent organisations of … clinical information describing a patients diagnostic and procedural healthcare status within an episode of care using ICD-10 and OPCS-4 classifications. Ensure codified data is of high quality and accurate i.e., in line with all relevant National Clinical Coding Standards and Local Clinical Coding Policies. Ensure codified datamore »
Greater London, England, United Kingdom Hybrid / WFH Options
IGS | Information Governance Services
to-date advice on information security matters in any given project; When ready, provide consistent and high quality guidance and advice to clients on dataprotection and information security matters; Support the DataProtection Consultants in delivering training and communication to key stakeholders; Work with the … business to deal effectively with issue management and dataprotection matters and if required this will include complaints from customers and employees; Maintain compliance with dataprotection regulations that apply to any of the company’s client’s businesses, including but not limited to: -DataProtection Act 2018; -UK GDPR; -General DataProtection Regulation (GDPR); -Freedom of Information Act 2000; -Access to Health Records Act 1990; -Privacy and Electronic Communications Regulations (PECR); Any new or developing dataprotection regulations. Lead and promote dataprotection and information security more »
Warrington, England, United Kingdom Hybrid / WFH Options
MRJ Recruitment
enhance patient care, and improve the healthcare professional experience – they’re transforming the future of primary care and scaling rapidly. As a Senior AWS Data Engineer, you'll play a crucial role in designing, developing, and maintaining robust data pipelines and ETL processes on the AWS platform. Your … expertise will be instrumental in optimising data warehouse performance, ensuring data integrity, and enabling large-scale analytics. Salary of £70k - £80k | Hybrid remote with offices in Warrington (must be based in the UK) As a purpose led brand, you’ll be making a real impact in the healthcare … sector, contributing to solutions that enhance patient outcomes and support healthcare professionals in their vital work. Key tasks include: Design and maintain scalable data environments using AWS technologies (Redshift, Glue, Athena, S3). Develop and optimise ETL/ELT processes for healthcare data. Ensure compliance with UK NHS healthcare more »
Stratford-Upon-Avon, England, United Kingdom Hybrid / WFH Options
Contechs
Data Privacy & Security Senior Specialist 8-month initial contract Hybrid working - Gaydon £31 per hour (Inside IR35) *Applicants MUST have proof of immediate, on-going and valid eligibility to work full time in the UK and travel within the EU.* About the company I am currently recruiting on behalf … of a Luxury Automotive OEM, based in Gaydon, who are seeking a Data Privacy & Security Senior Specialist to join their team Job Description As Data Privacy & Security Senior Specialist, your main responsibilities are: Review & risk assess projects, that handle personal data, in line with the EU and … UK DataProtection Legislation (EU/UK General DataProtection Act, GDPR) Advise colleagues on Privacy requirements Identify and articulate compliance risks, complex data flows, international data transfers, et al. Qualifications/Skills needed Minimum 2 years' experience as a dedicated Privacy professional Legal more »
may be subject to the provision of an up-to-date (not older than 3 months) criminal record certificate. Please note that any personal data that you submit along with your application will be processed by CHAMP and may be processed by any of its global entities as necessary. … These data will be treated in strict compliance with the applicable dataprotection legislation (i.e. the Law of 2 August 2002 on the protection of individuals with regard to the processing of personal data, as amended, and Regulation (EU) 2016/679 of the European … GDPR -, which entered into force on 25 May 2018, as well as any other subsequent regulation). Further details on what is considered personal data, how it is processed by CHAMP as well as your rights in this regard can be found here. Any questions relating to this should more »
may be subject to the provision of an up-to-date (not older than 3 months) criminal record certificate. Please note that any personal data that you submit along with your application will be processed by CHAMP and may be processed by any of its global entities as necessary. … These data will be treated in strict compliance with the applicable dataprotection legislation (i.e. the Law of 2 August 2002 on the protection of individuals with regard to the processing of personal data, as amended, and Regulation (EU) 2016/679 of the European … GDPR -, which entered into force on 25 May 2018, as well as any other subsequent regulation). Further details on what is considered personal data, how it is processed by CHAMP as well as your rights in this regard can be found here . Any questions relating to this more »
and version control. Cloud Migration : Lead the migration of on-premises applications and infrastructure to Azure. Plan and execute migration strategies, considering application dependencies, data transfer, security, and performance optimization. Automation : Develop scripts and automation workflows using PowerShell or other scripting languages to automate infrastructure deployment, configuration, and management … tasks, implementing IaC practices for consistent deployments. Azure Security : Implement Azure security principles, including identity and access management, network security, dataprotection, and compliance requirements. Ensure adherence to security standards and best practices. Monitoring : Set up monitoring rules and alerts using Azure Monitor or similar tools. Define and … projects throughout the lifecycle (Analysis, Architecture, Design, Build, Test & Production), including on-prem systems to cloud migration, Hyperconverged Infrastructure optimization, Microsoft Modern Workplace, Modern DataProtection, and BCP/DR refresh. Proficiency in provisioning Azure resources using IaC tools like Terraform. Hands-on experience with Azure DevOps or more »
teams - desktop, systems & infrastructure) Enterprise Applications Architecture & Security Architecture & Security consists of: Architecture (including Enterprise oversight) Security & Risk Security Operations (including Security Operations Centre) DataProtection & Compliance The Architecture team compromises of 5 team members delivering into the roles of: Enterprise Architect Information Architect Solution Architect(s) Due … delivery across the areas of Solution and Domain Architecture in the fulfilment of business requirements and delivery of Enterprise Technology priorities.Business Architecture Information/Data Architecture Application Architecture Technology Architecture Develop, take ownership of, and maintain policies, procedures, guidance and standards that make up the IT Strategy & Enterprise Architecture … full compliance with all AQA policies and other legislative requirements, including but not limited to HSE/Equal Opportunities/Information & Cyber Security/DataProtection related legislation and policies. Where business needs dictate to undertake other responsibilities which are of a commensurate level and may be outside more »
teams - desktop, systems & infrastructure) Enterprise Applications Architecture & Security Architecture & Security consists of: Architecture (including Enterprise oversight) Security & Risk Security Operations (including Security Operations Centre) DataProtection & Compliance The Architecture team compromises of 5 team members delivering into the roles of: Enterprise Architect Information Architect Solution Architect(s) Due … delivery across the areas of Solution and Domain Architecture in the fulfilment of business requirements and delivery of Enterprise Technology priorities.Business Architecture Information/Data Architecture Application Architecture Technology Architecture Develop, take ownership of, and maintain policies, procedures, guidance and standards that make up the IT Strategy & Enterprise Architecture … full compliance with all AQA policies and other legislative requirements, including but not limited to HSE/Equal Opportunities/Information & Cyber Security/DataProtection related legislation and policies. Where business needs dictate to undertake other responsibilities which are of a commensurate level and may be outside more »
teams - desktop, systems & infrastructure) Enterprise Applications Architecture & Security Architecture & Security consists of: Architecture (including Enterprise oversight) Security & Risk Security Operations (including Security Operations Centre) DataProtection & Compliance The Architecture team compromises of 5 team members delivering into the roles of: Enterprise Architect Information Architect Solution Architect(s) Due … delivery across the areas of Solution and Domain Architecture in the fulfilment of business requirements and delivery of Enterprise Technology priorities.Business Architecture Information/Data Architecture Application Architecture Technology Architecture Develop, take ownership of, and maintain policies, procedures, guidance and standards that make up the IT Strategy & Enterprise Architecture … full compliance with all AQA policies and other legislative requirements, including but not limited to HSE/Equal Opportunities/Information & Cyber Security/DataProtection related legislation and policies. Where business needs dictate to undertake other responsibilities which are of a commensurate level and may be outside more »
teams - desktop, systems & infrastructure) Enterprise Applications Architecture & Security Architecture & Security consists of: Architecture (including Enterprise oversight) Security & Risk Security Operations (including Security Operations Centre) DataProtection & Compliance The Architecture team compromises of 5 team members delivering into the roles of: Enterprise Architect Information Architect Solution Architect(s) Due … delivery across the areas of Solution and Domain Architecture in the fulfilment of business requirements and delivery of Enterprise Technology priorities.Business Architecture Information/Data Architecture Application Architecture Technology Architecture Develop, take ownership of, and maintain policies, procedures, guidance and standards that make up the IT Strategy & Enterprise Architecture … full compliance with all AQA policies and other legislative requirements, including but not limited to HSE/Equal Opportunities/Information & Cyber Security/DataProtection related legislation and policies. Where business needs dictate to undertake other responsibilities which are of a commensurate level and may be outside more »
teams - desktop, systems & infrastructure) Enterprise Applications Architecture & Security Architecture & Security consists of: Architecture (including Enterprise oversight) Security & Risk Security Operations (including Security Operations Centre) DataProtection & Compliance The Architecture team compromises of 5 team members delivering into the roles of: Enterprise Architect Information Architect Solution Architect(s) Due … delivery across the areas of Solution and Domain Architecture in the fulfilment of business requirements and delivery of Enterprise Technology priorities.Business Architecture Information/Data Architecture Application Architecture Technology Architecture Develop, take ownership of, and maintain policies, procedures, guidance and standards that make up the IT Strategy & Enterprise Architecture … full compliance with all AQA policies and other legislative requirements, including but not limited to HSE/Equal Opportunities/Information & Cyber Security/DataProtection related legislation and policies. Where business needs dictate to undertake other responsibilities which are of a commensurate level and may be outside more »
teams - desktop, systems & infrastructure) Enterprise Applications Architecture & Security Architecture & Security consists of: Architecture (including Enterprise oversight) Security & Risk Security Operations (including Security Operations Centre) DataProtection & Compliance The Architecture team compromises of 5 team members delivering into the roles of: Enterprise Architect Information Architect Solution Architect(s) Due … delivery across the areas of Solution and Domain Architecture in the fulfilment of business requirements and delivery of Enterprise Technology priorities.Business Architecture Information/Data Architecture Application Architecture Technology Architecture Develop, take ownership of, and maintain policies, procedures, guidance and standards that make up the IT Strategy & Enterprise Architecture … full compliance with all AQA policies and other legislative requirements, including but not limited to HSE/Equal Opportunities/Information & Cyber Security/DataProtection related legislation and policies. Where business needs dictate to undertake other responsibilities which are of a commensurate level and may be outside more »
teams - desktop, systems & infrastructure) Enterprise Applications Architecture & Security Architecture & Security consists of: Architecture (including Enterprise oversight) Security & Risk Security Operations (including Security Operations Centre) DataProtection & Compliance The Architecture team compromises of 5 team members delivering into the roles of: Enterprise Architect Information Architect Solution Architect(s) Due … delivery across the areas of Solution and Domain Architecture in the fulfilment of business requirements and delivery of Enterprise Technology priorities.Business Architecture Information/Data Architecture Application Architecture Technology Architecture Develop, take ownership of, and maintain policies, procedures, guidance and standards that make up the IT Strategy & Enterprise Architecture … full compliance with all AQA policies and other legislative requirements, including but not limited to HSE/Equal Opportunities/Information & Cyber Security/DataProtection related legislation and policies. Where business needs dictate to undertake other responsibilities which are of a commensurate level and may be outside more »
teams - desktop, systems & infrastructure) Enterprise Applications Architecture & Security Architecture & Security consists of: Architecture (including Enterprise oversight) Security & Risk Security Operations (including Security Operations Centre) DataProtection & Compliance The Architecture team compromises of 5 team members delivering into the roles of: Enterprise Architect Information Architect Solution Architect(s) Due … delivery across the areas of Solution and Domain Architecture in the fulfilment of business requirements and delivery of Enterprise Technology priorities.Business Architecture Information/Data Architecture Application Architecture Technology Architecture Develop, take ownership of, and maintain policies, procedures, guidance and standards that make up the IT Strategy & Enterprise Architecture … full compliance with all AQA policies and other legislative requirements, including but not limited to HSE/Equal Opportunities/Information & Cyber Security/DataProtection related legislation and policies. Where business needs dictate to undertake other responsibilities which are of a commensurate level and may be outside more »
teams - desktop, systems & infrastructure) Enterprise Applications Architecture & Security Architecture & Security consists of: Architecture (including Enterprise oversight) Security & Risk Security Operations (including Security Operations Centre) DataProtection & Compliance The Architecture team compromises of 5 team members delivering into the roles of: Enterprise Architect Information Architect Solution Architect(s) Due … delivery across the areas of Solution and Domain Architecture in the fulfilment of business requirements and delivery of Enterprise Technology priorities.Business Architecture Information/Data Architecture Application Architecture Technology Architecture Develop, take ownership of, and maintain policies, procedures, guidance and standards that make up the IT Strategy & Enterprise Architecture … full compliance with all AQA policies and other legislative requirements, including but not limited to HSE/Equal Opportunities/Information & Cyber Security/DataProtection related legislation and policies. Where business needs dictate to undertake other responsibilities which are of a commensurate level and may be outside more »
teams - desktop, systems & infrastructure) Enterprise Applications Architecture & Security Architecture & Security consists of: Architecture (including Enterprise oversight) Security & Risk Security Operations (including Security Operations Centre) DataProtection & Compliance The Architecture team compromises of 5 team members delivering into the roles of: Enterprise Architect Information Architect Solution Architect(s) Due … delivery across the areas of Solution and Domain Architecture in the fulfilment of business requirements and delivery of Enterprise Technology priorities.Business Architecture Information/Data Architecture Application Architecture Technology Architecture Develop, take ownership of, and maintain policies, procedures, guidance and standards that make up the IT Strategy & Enterprise Architecture … full compliance with all AQA policies and other legislative requirements, including but not limited to HSE/Equal Opportunities/Information & Cyber Security/DataProtection related legislation and policies. Where business needs dictate to undertake other responsibilities which are of a commensurate level and may be outside more »
teams - desktop, systems & infrastructure) Enterprise Applications Architecture & Security Architecture & Security consists of: Architecture (including Enterprise oversight) Security & Risk Security Operations (including Security Operations Centre) DataProtection & Compliance The Architecture team compromises of 5 team members delivering into the roles of: Enterprise Architect Information Architect Solution Architect(s) Due … delivery across the areas of Solution and Domain Architecture in the fulfilment of business requirements and delivery of Enterprise Technology priorities.Business Architecture Information/Data Architecture Application Architecture Technology Architecture Develop, take ownership of, and maintain policies, procedures, guidance and standards that make up the IT Strategy & Enterprise Architecture … full compliance with all AQA policies and other legislative requirements, including but not limited to HSE/Equal Opportunities/Information & Cyber Security/DataProtection related legislation and policies. Where business needs dictate to undertake other responsibilities which are of a commensurate level and may be outside more »
teams - desktop, systems & infrastructure) Enterprise Applications Architecture & Security Architecture & Security consists of: Architecture (including Enterprise oversight) Security & Risk Security Operations (including Security Operations Centre) DataProtection & Compliance The Architecture team compromises of 5 team members delivering into the roles of: Enterprise Architect Information Architect Solution Architect(s) Due … delivery across the areas of Solution and Domain Architecture in the fulfilment of business requirements and delivery of Enterprise Technology priorities.Business Architecture Information/Data Architecture Application Architecture Technology Architecture Develop, take ownership of, and maintain policies, procedures, guidance and standards that make up the IT Strategy & Enterprise Architecture … full compliance with all AQA policies and other legislative requirements, including but not limited to HSE/Equal Opportunities/Information & Cyber Security/DataProtection related legislation and policies. Where business needs dictate to undertake other responsibilities which are of a commensurate level and may be outside more »
teams - desktop, systems & infrastructure) Enterprise Applications Architecture & Security Architecture & Security consists of: Architecture (including Enterprise oversight) Security & Risk Security Operations (including Security Operations Centre) DataProtection & Compliance The Architecture team compromises of 5 team members delivering into the roles of: Enterprise Architect Information Architect Solution Architect(s) Due … delivery across the areas of Solution and Domain Architecture in the fulfilment of business requirements and delivery of Enterprise Technology priorities.Business Architecture Information/Data Architecture Application Architecture Technology Architecture Develop, take ownership of, and maintain policies, procedures, guidance and standards that make up the IT Strategy & Enterprise Architecture … full compliance with all AQA policies and other legislative requirements, including but not limited to HSE/Equal Opportunities/Information & Cyber Security/DataProtection related legislation and policies. Where business needs dictate to undertake other responsibilities which are of a commensurate level and may be outside more »
teams - desktop, systems & infrastructure) Enterprise Applications Architecture & Security Architecture & Security consists of: Architecture (including Enterprise oversight) Security & Risk Security Operations (including Security Operations Centre) DataProtection & Compliance The Architecture team compromises of 5 team members delivering into the roles of: Enterprise Architect Information Architect Solution Architect(s) Due … delivery across the areas of Solution and Domain Architecture in the fulfilment of business requirements and delivery of Enterprise Technology priorities.Business Architecture Information/Data Architecture Application Architecture Technology Architecture Develop, take ownership of, and maintain policies, procedures, guidance and standards that make up the IT Strategy & Enterprise Architecture … full compliance with all AQA policies and other legislative requirements, including but not limited to HSE/Equal Opportunities/Information & Cyber Security/DataProtection related legislation and policies. Where business needs dictate to undertake other responsibilities which are of a commensurate level and may be outside more »
teams - desktop, systems & infrastructure) Enterprise Applications Architecture & Security Architecture & Security consists of: Architecture (including Enterprise oversight) Security & Risk Security Operations (including Security Operations Centre) DataProtection & Compliance The Architecture team compromises of 5 team members delivering into the roles of: Enterprise Architect Information Architect Solution Architect(s) Due … delivery across the areas of Solution and Domain Architecture in the fulfilment of business requirements and delivery of Enterprise Technology priorities.Business Architecture Information/Data Architecture Application Architecture Technology Architecture Develop, take ownership of, and maintain policies, procedures, guidance and standards that make up the IT Strategy & Enterprise Architecture … full compliance with all AQA policies and other legislative requirements, including but not limited to HSE/Equal Opportunities/Information & Cyber Security/DataProtection related legislation and policies. Where business needs dictate to undertake other responsibilities which are of a commensurate level and may be outside more »