{{org_field_logo}}
{{org_field_name}}
Registration Number: {{org_field_registration_no}}
Building Security and Access Control Policy
1. Purpose
The purpose of this policy is to establish clear procedures for maintaining the security of {{org_field_name}} and ensuring controlled access to the premises. This policy aligns with Care Inspectorate Wales (CIW) regulations, the Social Services and Well-being (Wales) Act 2014, and best practices in safeguarding vulnerable adults. It aims to protect residents, staff, visitors, and property by preventing unauthorised access, ensuring the safety of individuals within the care home, and complying with legal and regulatory requirements.
This policy details how {{org_field_name}} manages access to the building, security measures in place, staff responsibilities, and procedures for handling security breaches.
2. Scope
This policy applies to all residents, staff, agency workers, contractors, visitors, and emergency personnel entering or exiting {{org_field_name}}. It covers:
- Physical security measures to safeguard the premises.
- Controlled access for staff, residents, visitors, and contractors.
- Staff responsibilities in maintaining security.
- Procedures for managing security breaches and unauthorised access.
3. Principles of Building Security
{{org_field_name}} is committed to ensuring a safe, secure, and welcoming environment by following these key principles:
- Safety First: Residents’ security and well-being are the top priority.
- Controlled Access: Access is strictly monitored and regulated for all individuals entering the premises.
- Compliance with CIW Standards: Security measures meet or exceed regulatory requirements.
- Respect and Dignity: Security procedures balance safety with residents’ right to independence and personal choice.
- Continuous Monitoring: Security risks are regularly assessed, and improvements are made as necessary.
4. Security Measures and Access Control
4.1 Secure Entry and Exit Points
All entry and exit points at {{org_field_name}} are controlled to prevent unauthorised access and ensure resident safety. Measures in place include:
- Main Entrance Security: The main entrance remains locked and is accessible via a secure entry system. Visitors must ring the intercom and state their purpose before entry is granted.
- Staff Access: Staff are issued with personal key cards or access codes for authorised entry. Access rights are restricted based on job roles.
- Emergency Exits: Fire exits remain unlocked internally for safety but are alarmed to prevent unauthorised use. These exits are monitored through CCTV.
- Resident Supervision: Residents who are assessed as at risk of wandering or confusion receive appropriate supervision and, where necessary, additional security measures such as discreet monitoring systems.
4.2 Visitor Management and Sign-In Procedures
Visitors, including family members, healthcare professionals, and contractors, must follow the visitor management process:
- Sign-In and Identification: All visitors must sign in upon arrival and provide identification if requested.
- Purpose of Visit Verification: Visitors must state the reason for their visit, and staff will confirm appointments before granting access.
- Escorted Access: Visitors must remain in designated areas and be accompanied by staff unless otherwise approved.
- Visiting Hours: Regular visiting hours are in place to maintain security and operational efficiency, with exceptions for emergencies or compassionate visits.
4.3 Staff Responsibilities and Access Control
Staff members are responsible for maintaining security by:
- Ensuring all doors and security systems are properly secured after use.
- Challenging and reporting any suspicious or unauthorised individuals.
- Wearing ID badges at all times while on duty.
- Not sharing access codes, key cards, or security information with unauthorised individuals.
4.4 Resident Security and Freedom of Movement
While {{org_field_name}} prioritises security, residents have the right to independence and freedom of movement. To balance safety with autonomy:
- Residents who are able to leave the premises independently are assessed for risk, and appropriate permissions are documented.
- Residents requiring supervision are accompanied by staff when leaving the premises.
- Secure outdoor areas, such as enclosed gardens, provide residents with safe outdoor access.
4.5 Monitoring and Surveillance
To enhance security, {{org_field_name}} utilises:
- CCTV Cameras: Installed in key communal areas, entrances, and external perimeters for security monitoring. Footage is recorded and stored securely in compliance with GDPR and data protection laws.
- Intruder Alarms: Activated during non-operational hours to alert staff of any unauthorised entry attempts.
- Regular Security Checks: Staff perform routine checks on entry points, windows, and external areas to ensure security is maintained.
4.6 Managing Security Breaches and Unauthorised Access
If unauthorised access or a security breach occurs, staff must follow these procedures:
- Immediate Response: Staff must calmly assess the situation and take immediate action to prevent risk to residents and staff.
- Alerting Management: The Registered Manager and senior staff must be informed immediately.
- Emergency Services Contact: If a serious security threat occurs, 999 must be called.
- Incident Reporting: A detailed incident report must be completed, including CCTV footage where applicable.
- Review and Prevention: Security measures will be reviewed and strengthened where necessary to prevent recurrence.
4.7 Key Management and Security Codes
To prevent unauthorised access to restricted areas:
- Keys and access cards are only issued to authorised personnel and must be returned when no longer required.
- Lost or stolen keys/cards must be reported immediately, and access codes must be changed if compromised.
- High-risk areas such as medication storage, financial offices, and confidential records rooms have restricted access.
4.8 Contractor and External Service Provider Access
All contractors and service providers must adhere to strict security procedures, including:
- Pre-arranged appointments for non-emergency work.
- Signing in upon arrival and being issued a temporary access pass.
- Being supervised by a designated staff member while on-site.
- Complying with the Health and Safety at Work Policy (CHW16) and security protocols.
4.9 Staff Training on Security Procedures
All staff receive regular training on security protocols, including:
- How to manage visitor access and prevent unauthorised entry.
- Recognising and responding to suspicious behaviour.
- Emergency procedures for security breaches.
- Data protection measures regarding CCTV footage and security reports.
5. Safeguarding and Access Control
Maintaining strict access control is crucial in safeguarding vulnerable residents. Staff must be vigilant and report any concerns related to:
- Unknown or unauthorised individuals attempting to gain entry.
- Residents being coerced or persuaded to leave with unauthorised individuals.
- Suspicious behaviour by visitors, contractors, or other personnel.
All concerns must be reported to the Safeguarding Lead, {{org_field_safeguarding_lead_name}}, and handled according to the Safeguarding Adults from Abuse and Improper Treatment Policy (CHW13).
6. Related Policies
This policy should be read in conjunction with:
- Safeguarding Adults from Abuse and Improper Treatment Policy (CHW13) for managing security risks related to resident safety.
- Health and Safety at Work Policy (CHW16) for staff responsibilities in ensuring security compliance.
- Confidentiality and Data Protection Policy (CHW34) for managing CCTV recordings and visitor logs.
- Emergency and Business Continuity Plan (CHW19) for actions during security emergencies.
- Risk Management and Assessment Policy (CHW18) for evaluating and mitigating security risks.
7. Policy Review
This policy will be reviewed annually or sooner if legislative changes, security incidents, or operational needs require updates. Staff will receive regular updates and training to ensure continued compliance.
Responsible Person: {{org_field_registered_manager_first_name}} {{org_field_registered_manager_last_name}}
Reviewed on: {{last_update_date}}
Next Review Date: {{next_review_date}}
Copyright © {{current_year}} – {{org_field_name}}. All rights reserved.