{{org_field_logo}}

{{org_field_name}}

Registration Number: {{org_field_registration_no}}


Internet Access for Staff Policy

1. Purpose

The purpose of this policy is to set out how internet access, online systems, email, cloud services, remote access, and connected devices are authorised, used, secured, monitored, and reviewed by staff at {{org_field_name}}. The policy is designed to support safe, effective, lawful and professional care delivery in a care home setting.

This policy supports compliance with the Health and Social Care Act 2008 and the Health and Social Care Act 2008 (Regulated Activities) Regulations 2014, in particular Regulation 12 (Safe Care and Treatment), Regulation 13 (Safeguarding Service Users from Abuse and Improper Treatment), Regulation 17 (Good Governance), and Regulation 18 (Staffing). It also supports compliance with UK data protection law, including the UK GDPR and Data Protection Act 2018, by requiring secure handling of personal data, appropriate access controls, and transparent, proportionate monitoring of staff use of organisational systems.

The policy aims to ensure that internet access is used in a way that protects residents, staff, visitors, and the organisation from avoidable harm, confidentiality breaches, cyber security risks, misuse of systems, unlawful disclosure of information, and conduct that could undermine safeguarding, dignity, privacy, or public confidence in the service.

2. Scope

This policy applies to all employees, workers, agency staff, contractors, students, volunteers, and any other person authorised to access the internet or digital systems on behalf of {{org_field_name}}.

It applies to use of:

This policy applies at all times when an individual is acting in the course of their work for {{org_field_name}}, whether during normal working hours, on-call duties, or any other period in which organisational systems or data are being accessed.

3. Related Policies

4. Policy Statement and Responsibilities

Purpose of Internet Access for Staff

Internet access is provided to staff at {{org_field_name}} for the following operational purposes:

Access must be directly related to the staff member’s duties and responsibilities.

Internet access and system permissions will be granted on the basis of role, legitimate work need, competence, and organisational approval. Access must be limited to the minimum information and systems necessary for the staff member to carry out their duties safely and effectively. The organisation may restrict, suspend or withdraw internet, email, remote access or device permissions where there is a security concern, safeguarding concern, performance concern, investigation, or any other identified risk to residents, staff, systems or data.

Acceptable Use

Staff must:

Staff must not:

Any misuse of internet access may be treated as misconduct, and where relevant as a safeguarding concern, data security incident, or regulatory matter.

Personal Use

Limited personal use of the internet may be permitted during authorised breaks, provided that it is reasonable, lawful, does not interfere with duties, does not affect staffing responsiveness, does not involve excessive bandwidth use, and does not create any risk to information security, safeguarding, dignity, or the reputation of {{org_field_name}}.

Personal use must never:

Permission for limited personal use is discretionary and may be withdrawn at any time.

Access Control, Authentication and Device Security

The organisation will use role-based access controls so that staff can only access the systems and information necessary for their role. Shared accounts must not be used unless there is a documented exceptional reason authorised by management and subject to appropriate safeguards.

Staff must keep devices physically secure and must not leave devices unattended in resident areas, communal areas, vehicles or any unsecured location. Where devices store or can access personal data, appropriate technical safeguards must be used, including password protection, screen locks, encryption, remote wipe capability where available, and organisation-approved security software.

Lost, stolen, compromised or damaged devices, suspected password compromise, unusual log-in activity, or any suspected unauthorised access must be reported immediately in accordance with the organisation’s data breach and incident reporting procedure.

Information Security and Data Protection

Staff must handle all personal data, special category data, care records, employee information and confidential business information in accordance with UK GDPR, the Data Protection Act 2018, and the organisation’s confidentiality and information governance requirements.

In practice, staff must:

Data security incidents must be reported without delay to the Registered Manager and the Data Protection Officer ({{org_field_data_protection_officer_first_name}} {{org_field_data_protection_officer_last_name}}, and recorded in line with organisational incident procedures.

Mobile Devices, Remote Access and Off-Site Working

Staff who are issued with laptops, tablets, smartphones or other mobile devices, or who are authorised to access organisational systems remotely, must use those devices and systems only in line with this policy and any related cyber security, BYOD and remote working procedures.

Staff must:

Remote or mobile access may be monitored and reviewed for security, audit, safeguarding and governance purposes.

Monitoring, Audit and Privacy

Use of organisational internet services, email, cloud systems, devices and network access may be monitored, logged, reviewed and audited by {{org_field_name}} for legitimate business purposes. These purposes include protecting residents and staff, maintaining cyber security, preventing and detecting misuse, investigating concerns, supporting safeguarding, ensuring business continuity, protecting confidential information, and demonstrating compliance with legal and regulatory requirements.

Monitoring will be carried out in a lawful, proportionate and transparent manner. The organisation will not carry out covert or excessive monitoring unless there is a lawful basis and a properly authorised exceptional reason, such as the investigation of suspected serious misconduct or criminal activity. Access to monitoring information will be restricted to authorised persons who need it for management, investigation, security, HR, safeguarding, audit or legal purposes.

The organisation may monitor or review, for example: website access logs, network activity, email metadata and content where justified, file transfers, system access history, log-in attempts, device compliance information, malware alerts, and use of organisational accounts on work systems. Monitoring data will be retained only for as long as necessary in accordance with retention schedules and investigation requirements.

Staff will be informed through this policy, privacy information, induction and related procedures that monitoring takes place. Monitoring arrangements will be kept under review to ensure they remain necessary, proportionate and consistent with data protection requirements.

Staff Training and Guidance

All staff will receive training, guidance and updates appropriate to their role on the safe and lawful use of internet-enabled systems and devices. This will include, as relevant:

Training will be provided at induction, refreshed at least annually, and repeated sooner where there is a change in systems, threats, incidents, duties, legislation, guidance or identified staff need. Managers will ensure that staff are competent to use the digital systems relevant to their role and are appropriately supervised and supported.

Where staff roles bring them into contact with autistic people and people with a learning disability, training requirements applicable to registered providers in relation to learning disability and autism will also be met at a level appropriate to the member of staff’s role.

Breach of Policy

Any breach of this policy must be taken seriously and reported promptly. Depending on the nature of the breach, the matter may be managed as misconduct, a cyber security incident, a data protection incident, a safeguarding concern, a professional conduct issue, or a combination of these.

Immediate action may include temporary suspension of system or device access, preservation of evidence, password resets, device isolation, management review, incident reporting, safeguarding referral, disciplinary action, and referral to external bodies where required.

Serious breaches may result in formal disciplinary action up to and including dismissal, referral to professional regulators, referral to the local authority safeguarding team, notification to the Information Commissioner’s Office where required, notification to CQC where required under other applicable procedures, and referral to the police where criminal activity is suspected.

Safeguarding Considerations

Misuse of internet access or digital systems may place residents at risk of abuse, neglect, humiliation, discrimination, exploitation, financial abuse, emotional harm, privacy breaches, or improper treatment. This includes, but is not limited to, sharing unauthorised information about residents, accessing or sharing inappropriate content in the workplace, online bullying or harassment, contacting residents or relatives through unauthorised channels, taking or sharing images without lawful authority, and any use of digital systems that undermines dignity, consent, safety or professional boundaries.

Any concern that internet use or digital activity may have harmed, exploited or placed a resident at risk must be treated as a safeguarding matter and reported immediately to the Safeguarding Lead ({{org_field_safeguarding_lead_name}} – {{org_field_safeguarding_lead_role}}) and the Registered Manager, in line with the organisation’s safeguarding procedure.

5. Governance, Oversight and Business Continuity

The Registered Manager is accountable for implementing this policy and ensuring that internet access arrangements support safe care, safeguarding, confidentiality, and effective governance. Day-to-day operational responsibilities may be delegated to named managers, system leads and external IT support providers, but overall accountability remains with the provider and Registered Manager.

The organisation will maintain oversight of internet and digital risks through audits, incident reviews, device and access reviews, training compliance checks, feedback from staff and residents where appropriate, and review of any cyber security alerts, near misses or confirmed breaches. Findings and actions will be recorded and used to improve practice.

The organisation will also maintain business continuity arrangements so that safe care can continue if internet access, email, digital care records, medication systems or other essential systems are unavailable. Staff must follow downtime and contingency procedures to ensure that care, medicines management, communication and record keeping remain safe during outages or cyber incidents.

6. Policy Review

This policy will be reviewed at least annually, and sooner if required by any of the following:

The Registered Manager, Data Protection Officer and any designated IT or information governance lead are responsible for reviewing this policy, communicating changes to staff, and ensuring that compliance is monitored through training, supervision, audits and incident review.


Responsible Person: {{org_field_registered_manager_first_name}} {{org_field_registered_manager_last_name}}
Reviewed on:
{{last_update_date}}
Next Review Date:
{{next_review_date}}
Copyright © {{current_year}} – {{org_field_name}}. All rights reserved.

Leave a Reply

Your email address will not be published. Required fields are marked *