This website is being retired.
Content is no longer being updated from 31 March 2026. Find out more.
This website is being retired.
Content is no longer being updated from 31 March 2026. Find out more.
Transformation Directorate
This guidance has been reviewed by the Health and Care Information Governance Working Group, including the Information Commissioner's Office (ICO) and National Data Guardian (NDG).
Have we done a good job? Let us know.
A just culture considers wider systemic issues where things go wrong, enabling professionals and those operating the system to learn without fear of retribution... in a just culture inadvertent human error, freely admitted, is not normally subject to sanction to encourage reporting of safety issues. In a just culture, investigators principally attempt to understand why failings occurred and how the system led to sub-optimal behaviours. However, a just culture also holds people appropriately to account where there is evidence of gross negligence or deliberate acts.
-Professor Sir Norman Williams Gross negligence manslaughter in healthcare report (June 2018)
This guidance supports organisations to understand and embed a just culture in their information governance (IG) and cyber security risk management work, taking a compassionate approach to and learning from any data incidents.
It is for leaders and cyber security and IG professionals in NHS organisations and independent providers, arm’s length bodies and suppliers to the health and adult social care sectors. These include executive board members, data protection officers (DPOs), senior information risk owners (SIROs), Caldicott Guardians and leaders in social care.
Please note this just culture guide:
We know that data incidents will happen. We also know that they rarely occur because of one staff member’s actions. Incidents will have deeper root causes and require a broader response.
In the context of cyber and IG, a just culture is one that supports fairness, openness and learning when addressing identified cyber vulnerabilities, events, attacks, data breaches or near misses, so that staff feel confident to speak up rather than fearing blame.
A just culture recognises that most professionals do not come to work to make mistakes or to act maliciously.
It allows for learning to take place to help prevent recurrence.
What a just culture might look like in this context routinely, during and following an incident is described in the appendix.
A key outcome of a just culture is continuous improvement, underpinned by timely reporting, protection of those reporting and learning lessons.
To help organisations achieve a just culture, NHS England and the Department of Health and Social Care (DHSC) provide a number of support functions to organisations impacted by a data incident. Reporting an incident in a timely manner means faster access to these functions. The DSPT includes a tool for reporting data incidents to the Information Commissioner's Office, DHSC and NHS England.
The support functions are:
They provide:
Note that the IG policy engagement team’s role is advisory; it has no regulatory function. The organisations remain the data controllers or processors as applicable, and it is up to them to make decisions on any issue or incident.
The IG policy engagement team can be contacted by emailing england.igpolicyteam@nhs.net.
They provide:
CSOC plays an advisory and technical support role. Organisations remain responsible for leading their own incident response and will be expected to make local decisions regarding recovery and remediation.
The CSOC team can be contacted by emailing cyber.security@nhs.net or, for immediate advice and guidance related to a cyber security incident, by phoning 0300 303 5222.
A DHSC-led regulatory function looks at incidents, under the Network and Information Systems (NIS) Regulations, to:
While this is a regulatory function, most incidents (including those that have met NIS thresholds) do not result in enforcement action. DHSC’s focus is driving resolution and continuous improvement, while ensuring a safe environment for those who fall victim to or wish to report incidents. This requires effective reporting mechanisms, incident planning, response and recovery, and learning. In return, the DHSC NIS team looks to:
In the National Data Guardian’s (NDG) 10 security standards-aligned DSPT, the relevant assertion to achieving a just culture is 3.2: “your organisation engages proactively and widely to improve information governance and cyber security and has an open and just culture for information incidents”. In the Cyber Assessment Framework (CAF)-aligned DSPT, the relevant outcome is B6.a: “you develop and maintain a positive culture around information assurance”.
Teams must take a considered approach to creating a just culture to ensure cyber and information risk vulnerabilities are not, in the spirit of openness, being unintentionally highlighted to potential aggressors or others who seek to exploit them.
Questions organisations can ask themselves to assess whether they are meeting the requirements of a just culture routinely, during and after an incident are given in the appendix.
Dr H started a new placement in a community health trust. Work pressures meant she did not have time to complete the induction processes, and she began seeing patients on her first day.
Months later, she received an email from an IT supplier requesting her username and password to reset her system account. Dr H completed the linked form before starting work for the day. She later saw a message warning staff that the email she had received was a phishing email, but as the systems continued to work, she did not report that she had responded to the email. Later, trust staff found they could not access their user accounts, and their IT supplier discovered that the system had been compromised.
This was the fourth time that year that the trust had issues with staff falling victim to phishing emails. It was concerned that reporting a fourth incident to the national teams could trigger regulatory action, and initially reported the incident to its integrated care board (ICB). The ICB supported the trust in reporting the incident to NHS England and the DHSC via the DSPT. As the trust shares data with its local acute trust and social care organisations, the ICB also ensured these were not impacted.
NHS England’s CSOC deployed its Certified Incident Response team to support the trust in mitigating the incident and identifying which data, if any, had been compromised.
Following successful remediation of the incident, the Joint Cyber Unit (JCU; NHS England and DHSC) worked with the trust and ICB to understand what had happened and the impact on patient care. JCU established that the incident met the Network and Information Systems (NIS) incident threshold and therefore captured it in the annual NIS report. Open and transparent information sharing helped the JCU fulfil its reporting requirements. As clear, resourced remediation plans were shared, no further NIS action was necessary.
The trust investigated the incident along with the previous IT and cyber security issues, and found that, while Dr H should have reported the incident, the trust also had responsibility. It could have done more to support Dr H to report the incident and prevent it from occurring in the first place. In response, the trust updated its policy to ensure staff have enough time to complete the compulsory cyber security training module before starting work. It also updated its cyber incident plan and committed to send more frequent communications about cyber risks, including phishing emails.
The ICB recognised that it could provide organisations with additional support and resource to prioritise cyber security and meet cyber security standards. The ICB invested in leadership training and raising awareness and understanding of cyber security risks across organisations. It also recognised that organisations with historical cyber security issues would need further support to maintain a secure environment.
NHS England commended the trust for its openness and transparency throughout the incident, while national teams reflected on the reasons trusts may be hesitant to report incidents. Informed by feedback from the trust, NHS England conducted incident response sessions with the Cyber Associates Network to ensure organisations understood the support offer from and regulatory functions of national teams. With permission, NHS England shared details of the incident and remediation actions across the system.