{{org_field_logo}}

{{org_field_name}}

Registration Number: {{org_field_registration_no}}


Mobile Devices (Phones and Tablets) Policy

1. Introduction

At {{org_field_name}}, mobile devices such as smartphones and tablets play an essential role in delivering high-quality domiciliary care services. They facilitate communication, enable real-time record-keeping, and support staff in accessing essential information while working remotely. However, the use of mobile devices also introduces risks related to data security, misuse, and distractions.

This Mobile Devices Policy outlines how mobile phones and tablets should be used in the workplace, ensuring efficiency, professionalism, and compliance with the General Data Protection Regulation (GDPR), the Data Protection Act 2018, and the Health and Social Care Act 2008. It applies to all employees, contractors, and volunteers who use mobile devices for work purposes, whether company-issued or personal devices.

2. Purpose and Scope

The purpose of this policy is to:

  1. Ensure mobile devices are used responsibly and securely in the provision of domiciliary care.
  2. Protect confidential service user information stored or accessed on mobile devices.
  3. Promote professionalism and prevent misuse of mobile devices during working hours.
  4. Clarify expectations for both company-owned and personal mobile devices used for work purposes.
  5. Ensure compliance with GDPR and data protection regulations.

This policy applies to all employees, including full-time, part-time, and temporary staff, as well as contractors and volunteers who use mobile devices for work-related tasks. It covers both company-issued devices and personal devices used for work purposes under the Bring Your Own Device (BYOD) Policy.

3. Principles of Mobile Device Use

Our approach to mobile device management is based on the following principles:

  1. Professionalism: Devices must be used responsibly and only for work-related purposes during working hours.
  2. Data Security: All mobile devices must be protected by passwords, encryption, and security software to prevent unauthorised access.
  3. Confidentiality: Service user information must remain confidential and never be stored on personal devices without encryption and authorisation.
  4. Minimal Disruption: Mobile devices must not interfere with care delivery or service user well-being.
  5. Accountability: Employees are responsible for the security, maintenance, and appropriate use of their devices.

4. Responsibilities and Expectations

4.1 Registered Manager:

4.2 Line Managers and Supervisors:

4.3 Employees:

4.4 IT Department (if applicable):

5. Use of Company-Owned Mobile Devices

5.1 Device Issuance:

5.2 Acceptable Use:

5.3 Security Measures:

5.4 Monitoring and Auditing:

5.5 Return of Devices:

6. Use of Personal Devices (Bring Your Own Device – BYOD)

Employees may use personal devices for work purposes under the following conditions:

6.1 Registration and Approval:

6.2 Security Requirements:

6.3 Data Storage and Access:

6.4 Device Monitoring and Remote Wiping:

6.5 Costs and Reimbursement:

7. Data Protection and Confidentiality

7.1 Access to Confidential Data:

7.2 Data Storage and Transfer:

7.3 Data Breach Reporting:

8. Appropriate Use During Working Hours

To maintain professionalism and ensure service users receive undivided attention:

8.1 Care Settings:

8.2 Meetings and Training:

8.3 Driving:

9. Lost, Stolen, or Compromised Devices

To protect company and service user data, employees must:

  1. Report lost, stolen, or compromised devices immediately to the IT team and Registered Manager.
  2. Activate remote tracking, locking, or wiping features if enabled.
  3. Change all work-related passwords and monitor for suspicious activity.
  4. Complete an Incident Report Form detailing the circumstances.

The company will assess the incident, implement risk mitigation measures, and, if necessary, report the breach to the ICO within 72 hours.

10. Mobile Device Management (MDM)

To enhance security and manage devices efficiently, the company may implement a Mobile Device Management (MDM) system, allowing the IT team to:

  1. Enforce Security Policies: Apply encryption, password requirements, and remote wiping capabilities.
  2. Manage Applications: Restrict app installations and ensure only approved apps are used.
  3. Monitor Device Health: Track device status, software updates, and security patches.
  4. Remote Lock or Wipe: Protect sensitive data if a device is lost, stolen, or compromised.

Employees will be notified if MDM is applied to company-issued or personal devices used for work purposes.

11. Monitoring and Auditing

To ensure compliance with this policy:

  1. Regular Audits: Company-owned devices will be subject to periodic audits, including usage logs, app installations, and data storage.
  2. Spot Checks: Line managers may conduct spot checks during visits or supervision sessions.
  3. Compliance Monitoring: MDM tools may be used to track security updates, password management, and app usage.
  4. Incident Reporting: Any breach of this policy must be reported immediately, and corrective actions will be taken.

Monitoring will focus solely on work-related activities, respecting employees’ privacy regarding personal use.

12. Breach of Policy

Failure to comply with this Mobile Devices Policy may result in disciplinary action, up to and including termination of employment. Examples of breaches include:

  1. Misuse of Devices: Using devices for personal purposes during working hours without authorisation.
  2. Data Breach: Storing or sharing service user information without encryption or authorisation.
  3. Security Non-Compliance: Failing to protect devices with passwords, encryption, or antivirus software.
  4. Unreported Loss or Theft: Not reporting lost or stolen devices promptly.

Disciplinary action will follow the company’s Disciplinary Policy, with the severity depending on the nature of the breach.

13. Training and Awareness

All staff will receive training on:

  1. Safe and responsible use of mobile devices.
  2. Data protection and confidentiality.
  3. Identifying phishing attacks and other cyber threats.
  4. Reporting breaches and incidents.

Training will be provided during induction and refreshed annually, with additional sessions if new risks or technologies arise.

14. Policy Review and Updates

This Mobile Devices Policy will be reviewed annually or sooner if significant changes occur, such as:

  1. Updates to legislation (e.g., GDPR amendments).
  2. Implementation of new technologies or security systems.
  3. Emerging risks or industry best practices.

Any changes will be communicated to all staff, with training provided where necessary.

15. Employee Acknowledgment

All employees must read, understand, and acknowledge this policy. By signing the Mobile Device Agreement Form, employees confirm that they:

  1. Understand and agree to comply with this policy.
  2. Acknowledge their responsibility for device security and appropriate use.
  3. Understand the consequences of non-compliance.

Responsible Person: {{org_field_registered_manager_first_name}} {{org_field_registered_manager_last_name}}
Reviewed on:
{{last_update_date}}
Next Review Date:
{{next_review_date}}
Copyright © {{current_year}} – {{org_field_name}}. All rights reserved.

Leave a Reply

Your email address will not be published. Required fields are marked *