13.07.2015 Views

A G E N D A 1. APOLOGIES FOR ABSENCE Ian Metcalfe 2 ...

A G E N D A 1. APOLOGIES FOR ABSENCE Ian Metcalfe 2 ...

A G E N D A 1. APOLOGIES FOR ABSENCE Ian Metcalfe 2 ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Deterring similar breaches by other providersIn order to deter similar breaches by other providers, Monitor will consider how the action we takein one case might also affect the incentives on other providers to comply. For example, Monitormay find it appropriate to adjust the severity of the requirements we impose according to:the extent to which the type of breach under consideration is thought to be widespread inthe health care sector;the extent of harm the type of breach has caused (or is capable of causing) to health careservice users; orwhether previous sanctions have been effective or ineffective in deterring others fromtaking similar action.If Monitor considers that it is necessary to adjust the proposed discretionary requirements in orderto deter similar breaches by other providers, it is likely that Monitor would impose (or increase) avariable monetary penalty. However, in appropriate cases the objective of deterring similarbreaches by other providers may be met through the imposition of, or modifications to, acompliance requirement or a restoration requirement.Restoring the position to what it would have been without the breachMonitor will consider whether it would be desirable and feasible to take steps to restore theposition to what it would have been without the breach. If so, Monitor may impose a restorationrequirement.Restoration could require a provider to give up any gains it has made from a breach and restorethe position of those who have suffered harm as a result. Restoration requirements may befinancial or non-financial.Where a breach of a regulatory requirement causes harm to another party, Monitor considers thata restoration requirement may have a number of advantages. It might be used to ensure thatparties do not profit from a breach, and it may deter others from similar conduct in future. It mayalso compensate any affected parties.However, there may be some practical limits to Monitor’s ability to impose restorationrequirements. For example, it may be difficult to establish which parties (whether individuals orcategories of parties) have been harmed by a breach, or the extent of any such harm.Page 21 of 50

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!