{{org_field_logo}}

{{org_field_name}}

Registration Number: {{org_field_registration_no}}


Safe Key Holding and Access Management Policy

1. Purpose

The purpose of this policy is to ensure that {{org_field_name}} manages key holding and access to service users’ homes safely and securely in compliance with Care Inspectorate Wales (CIW) regulations, data protection laws, and best practices in domiciliary care. Our primary aim is to protect service users, their property, and their right to privacy, while ensuring that care workers can access homes safely and efficiently when required.

Our objectives are to:

2. Scope

This policy applies to:

3. Legal and Regulatory Framework

This policy must be read and implemented in line with the requirements of the Regulation and Inspection of Social Care (Wales) Act 2016 (‘RISCA’) and the Regulated Services (Service Providers and Responsible Individuals) (Wales) Regulations 2017 (as amended) (‘the Regulations’). We will have regard to Welsh Government statutory guidance for care home and domiciliary support service providers and responsible individuals, and to Care Inspectorate Wales (CIW) guidance, inspection frameworks and Codes of Practice, as applicable to domiciliary support services.

This policy also supports compliance with:

4. Service User Consent and Key Holding Agreements

4.1 Obtaining Consent

4.2 Key Holding Agreement

Before accepting responsibility for a service user’s key, {{org_field_name}} will ensure:

The Key Holding Agreement must also specify:

How we manage this efficiently:

5. Secure Storage and Handling of Keys

5.1 Key Storage in the Office

5.2 Key Storage in the Community

How we manage this efficiently:

5.3 Key Safe / Door Code / Alarm Code Management

Where a key safe, door-entry code, alarm code, or digital access method is used, codes must be treated as confidential personal information. Codes must:

5.4 Key Identification, Data Minimisation and Confidentiality

Key labels/codes must never allow a key to be linked to a person’s name or address without access to a separate secure index. The index linking key codes to service users must be held securely with restricted access. If any key, fob or code record is lost and it is possible to identify the service user/address, this will be treated as a potential personal data breach and managed under our data breach procedure.

6. Accessing Service Users’ Homes Safely

6.1 Procedure for Key Access

6.2 Alternative Access Methods

If a service user refuses key holding, {{org_field_name}} may:

How we manage this efficiently:

7. Recording and Monitoring Key Usage

7.1 Key Log System

Key logs (paper or electronic) must be accurate, complete, and made at the time of the event. Key logs must be stored securely and retained for the required retention period in line with the Regulations and our Records Management Policy. Where logs are electronic, access must be role-based and protected by unique user credentials to provide an audit trail of entries and amendments.

7.2 Reporting Misuse or Unauthorised Access

How we manage this efficiently:

7.3 Records Access and Confidentiality

Access to key-holding records (including the index linking key codes to individuals) is restricted to authorised roles only. Records must be made available promptly for internal audits and for CIW inspection on request. Individuals (or their representatives) will be supported to access information we hold about them in accordance with data protection law and our subject access procedure.

8. Lost, Stolen, or Misplaced Keys

8.1 Immediate Actions for Lost Keys

If a key is lost or stolen:

  1. Report the incident immediately to the Registered Manager.
  2. Inform the service user and assess the risk level.
  3. Arrange for a locksmith to change the lock if necessary.
  4. Conduct an internal review and update procedures to prevent recurrence.

8.2 Preventative Measures

How we manage this efficiently:

8.3 Risk Assessment and Immediate Safeguarding Actions

On notification of a lost/stolen/misplaced key, the Registered Manager (or on-call manager) will complete and record an immediate risk assessment considering: whether the key can be linked to an identifiable address; the individual’s vulnerability; time of day; known risks (e.g., domestic abuse, exploitation); whether alarm codes/door codes are compromised; and whether the individual is alone or at immediate risk. The outcome will determine immediate controls, which may include urgent lock changes, temporary increased monitoring, family contact, safeguarding referral, or police involvement.

8.4 CIW / Commissioner Notification and Duty of Candour Considerations

Where the incident has caused, or is likely to cause, significant risk to the individual’s safety, security, or well-being, or could prevent the service from being provided safely, the Registered Manager will consider whether a notification to CIW (and, where applicable, commissioners/placing authorities) is required under the Regulations. Any notification will be made without delay and in the manner required by CIW. The service will also consider whether the circumstances trigger our duty of candour / openness requirements to ensure the individual is informed transparently and supported.

8.5 Personal Data Breach Management (UK GDPR / Data Protection Act 2018)

If a lost/stolen key, fob, or associated record could identify an individual (directly or indirectly), this will be managed as a potential personal data breach under UK GDPR/Data Protection Act 2018. We will:

9. Emergency Access and Safeguarding Procedures

9.1 Emergency Access to a Service User’s Home

In an emergency (e.g., service user is unresponsive or in distress):

If the individual may lack capacity to make a decision about entry at that time, staff must act in accordance with the Mental Capacity Act 2005 and the individual’s recorded wishes, emergency plan and best-interest decision making, and must document the rationale and actions taken.

9.2 Safeguarding Considerations

How we manage this efficiently:

All emergency access events must be recorded contemporaneously, including the time, reason, actions taken, who was contacted, and outcomes.

10. Staff Training and Compliance

10.1 Key Holding Training

10.2 Compliance Audits

How we manage this efficiently:

11. Related Policies

This policy aligns with:

12. Policy Review

This policy will be reviewed at least annually, and sooner where Welsh Government guidance, CIW requirements, or legislation changes, following any serious incident (including lost keys/security breach), or where audits identify learning. The Responsible Individual will ensure arrangements are in place for policies and procedures to be kept up to date and for staff to have access to, and understand, the current version. The Responsible Individual will also ensure that audits of key holding records and associated learning are incorporated into quality monitoring arrangements.


Responsible Person: {{org_field_registered_manager_first_name}} {{org_field_registered_manager_last_name}}
Reviewed on:
{{last_update_date}}
Next Review Date:
{{next_review_date}}
Copyright © {{current_year}} – {{org_field_name}}. All rights reserved.

Leave a Reply

Your email address will not be published. Required fields are marked *