This standard defines a consistent approach to granting and managing proxy access to digital services.
Proxy access is where an authorised person, called a "proxy”, can access a patient's medical information on a digital service to support the patient with their care.
This standard addresses:
-
when it is appropriate to grant proxy access
-
what clinical professionals and staff need to check to grant proxy access
-
redacting sensitive information from a proxy’s view
-
managing and revoking proxy access
-
the requirements clinical systems need to meet in relation to proxy access
This standard must be read in conjunction with the implementation guidance developed to support its practical application, titled Proxy access: advice and guidance.
NHS England will update this standard as and when required. The national Data Alliance Partnership Board (DAPB) will approve publication of all versions. Feedback on this standard is welcome at any time by emailing [email protected].
Last edited: 6 May 2026 1:51 pm
Chapters
- DAPB3051 Identity Verification and Authentication Standard for Health and Care, Authorisation Use Case: Proxy
- Glossary
- Use of the terms "must" and "should" in this guidance
- 1.0 Overview
- 1.1 Purpose of this standard
- 1.2 Who this standard applies to
- 1.3 What this standard does not cover
- 1.4 Compatibility with other standards and guidelines
- 2.1 Types of proxy access: formal and informal proxy access
- 2.2 Types of proxy access: Records access by a clinical professional
- 3.0 Roles and responsibilities
- 4.0 Grant proxy access
- 4.1 Assess if access is appropriate
- 4.1.1 Establish whether access is necessary
- 4.1.2 Establish whether access is relevant
- 4.1.3 Establish whether access is safe
- 4.2 Establish a basis for access
- 4.3 Check evidence relevant to the basis for access
- 4.3.1 Verify the proxy and patient’s identity
- 4.3.2 Understand if the patient has the ability to consent
- 4.3.3 Obtain the patient’s informed consent to proxy access, if appropriate
- 4.3.4 Verify evidence of a basis for access if the patient cannot consent
- 4.4 Redact sensitive information based on what is being shared
- 4.5 Audit decisions about proxy access
- 4.6 Communicate the outcome of a decision to grant or deny proxy access
- 5.0 The scope of proxy access
- 6.0 System audit of proxy access
- 7.0 Managing proxy access
- 7.1 Ongoing reviews of proxy access
- 7.2 Age and development based reviews of access
- 7.3 Time-bound reviews of access
- 7.4 Wider events that materially affect proxy access
- Appendix A: Ways to evidence a basis for access if the patient is not capable of providing informed consent
- Appendix B: Driver diagram articulating the strategic aims of this information standard