Welcome

Effective data protection in adult social care requires clear ownership, accurate records of what personal data is held and why, secure and appropriate systems, sensible policies, supplier oversight, staff training, incident preparedness, and evidence that controls work in everyday care settings.
This course is aimed at registered managers, deputy managers, nominated individuals, care home owners, operations managers, quality leads, administrators with information governance duties, data protection leads, Caldicott or confidentiality leads, and other managers working in residential care homes, nursing homes, supported living and adult social care settings.
The legal framework covered is UK-wide: UK GDPR, the Data Protection Act 2018, the common law duty of confidentiality, and ICO guidance. The Data (Use and Access) Act 2025 has amended parts of UK data protection law and ICO guidance is being updated in stages; managers should check the latest ICO pages before making policy decisions. Some examples in this course are England-specific, including CQC Regulation 17, the National Data Guardian's Caldicott Guardian guidance, and the Data Security and Protection Toolkit. Wales, Scotland and Northern Ireland have their own care regulators and records-management expectations, so follow local and nation-specific guidance where relevant.
Why This Course Matters
- Accountability must be demonstrable: managers need records and evidence, not just intentions.
- Care homes handle sensitive information: residents' health, care, family, safeguarding, financial, religious, relationship and end of life details may be highly sensitive.
- Staff need safe systems: reminders alone are insufficient if access controls, training, handovers, devices and reporting routes are poorly designed.
- Suppliers do not remove responsibility: electronic care records, payroll, CCTV, messaging platforms, call handlers, shredding services and AI tools require governance.
- Incidents need leadership: lost paperwork, incorrect disclosures, ransomware, inappropriate access, SARs and safeguarding sharing require timely, recorded decisions.
- Regulators look for well-led services: information governance links to safety, dignity, complaints, safeguarding, records, workforce and continuity of care.
How This Course Will Help You
By the end of the course you should be able to lead data protection and confidentiality governance, allocate and record responsibilities, maintain evidence of accountability, oversee staff access and training, govern suppliers and digital change, manage breaches and subject access requests, and support safe information sharing for care and safeguarding.
Leadership Spine
- Know what you hold: map personal data, purposes, systems, recipients, retention and risks.
- Name who owns it: assign DPO, IG, Caldicott, system, branch and incident responsibilities clearly.
- Design safer practice: use DPIAs, access controls, privacy by design and approved channels before implementing change.
- Assure the basics: check training, audit trails, backups, secure disposal, contracts, records and incident logs.
- Respond well: triage breaches, SARs, complaints, safeguarding sharing and regulator requests promptly and with records.
- Learn visibly: use audits, near-misses, complaints and staff feedback to improve practice.

