Kirklees and Calderdale Care Association
 

Data Security and Protection Toolkit (DSPT) Guidance

The Data Security and Protection Toolkit (DSPT) is a vital annual assessment that helps adult social care providers demonstrate they are handling personal and sensitive data safely.

Completing it can feel complex, especially if you are an smaller provider with limited resources - but it doesn’t have to be.

This guide has been designed specifically for independent adult social care providers in the UK. It takes you through the DSPT step by step, explaining each question in clear, straightforward language.

You’ll find:

  • Practical explanations of what each question is really asking
  • Simple examples tailored to care settings, from care homes to home care services
  • Tips and resources to help you provide the right evidence without unnecessary extra work

By the end, you’ll not only feel confident about completing the DSPT, but also understand how good data security supports safer, more effective care for the people you support.

Reference Category Level Question
1.1.5 Staffing and Roles AS Your organisation's approach to security is owned and directed by senior responsible individuals, with regular discussions driven by individuals who have overall accountability for security.
2.1.1 Staffing and Roles AS Does your organisation have an induction process that covers data security and protection, and cyber security?
2.2.1 Staffing and Roles AS Do all employment contracts, and volunteer agreements, contain data security requirements?
3.1.1 Staffing and Roles SM Has a training needs analysis covering data security and protection, and cyber security, been completed in the last twelve months?
3.2.1 Staffing and Roles SM Have at least 95% of staff, directors, trustees and volunteers in your organisation completed training on data security and protection, and cyber security, in the last twelve months?
3.4.1 Staffing and Roles SM Have the people with responsibility for data security and protection received training suitable for their role?
4.1.1 Staffing and Roles AS Does your organisation have an up to date record of staff, and volunteers if you have them, and their roles?
1.1.1 Policies and procedures AS What is your organisation's Information Commissioner's Office (ICO) registration number?
1.1.2 Policies and procedures AS Does your organisation have an up to date list of the ways in which it holds and shares different types of personal and sensitive information?
1.1.3 Policies and procedures AS Does your organisation have a privacy notice?
1.2.4 Policies and procedures Is your organisation compliant with the national data opt-out policy?
1.3.1 Policies and procedures AS Does your organisation have up to date policies in place for data protection and for data and cyber security, aligned with good practice guidance and (where applicable) national policies?
1.3.2 Policies and procedures SM Does your organisation monitor your own compliance with data protection policies and regularly review the effectiveness of data handling and security controls?
1.3.7 Policies and procedures AS Does your organisation's data protection policy describe how you keep personal data safe and secure?
1.3.8 Policies and procedures AS Does your organisation's data protection policy describe how you identify and minimise risks to personal data when introducing, or changing, a process or starting a new project involving personal data?
1.4.1 Policies and procedures AS Does your organisation have a timetable which sets out how long you retain records for?
1.4.2 Policies and procedures AS If your organisation uses third parties to destroy records or equipment that hold personal data, is there a written contract in place that has been reviewed in the last twelve months? This contract should meet the requirements set out in data protection regulations.
1.4.3 Policies and procedures AS If your organisation destroys any records or equipment that hold personal data, how does it make sure that this is done securely?
10.1.2 Policies and procedures AS Does your organisation have a list of its suppliers that handle personal information, the products and services they deliver, and their contact details?
1.3.12 Data Security AS How does your organisation make sure that paper records are safe when taken out of the building?
1.3.13 Data Security AS Briefly describe the physical controls your buildings have that prevent unauthorised access to personal data.
5.1.1 Data Security SM If your organisation has had a data breach or a near miss in the last year, has the organisation reviewed the process that may have allowed the breach to occur?
6.1.1 Data Security AS Does your organisation have a system in place to report data breaches?
6.1.2 Data Security AS If your organisation has had a data breach, were the management team notified, and did they approve the actions planned to minimise the risk of a recurrence?
6.1.3 Data Security AS If your organisation has had a data breach, were all individuals who were affected informed?
7.1.1 Data Security AS Do you have a digital asset register detailing your organisation's hardware and software , which is kept up to date?
7.1.2 Data Security SM Does your organisation have a business continuity plan that covers data and cyber security?
7.2.1 Data Security SM How does your organisation test the data and cyber security aspects of its business continuity plan?
1.3.11 IT Systems and devices AS If staff, directors, trustees and volunteers use their own devices (e.g. phones) for work purposes, does your organisation have a bring your own device policy and is there evidence of how this policy is enforced?
1.3.14 IT Systems and devices SM What does your organisation have in place to minimise the risks if mobile phones are lost, stolen, hacked or used inappropriately?
4.2.4 IT Systems and devices AS Does your organisation have a reliable way of removing or amending people's access to IT systems when they leave or change roles?
4.3.1 IT Systems and devices AS Have all the administrators of your organisation's IT system(s) signed an agreement to hold them accountable to higher standards?
4.5.3 IT Systems and devices SM Multi-factor authentication is used on all remotely accessible and privileged user accounts user accounts on all systems, with exceptions only as approved by your board or equivalent senior management.
4.5.4 IT Systems and devices AS How does your organisation make sure that staff, directors, trustees and volunteers use good password practice?
6.2.1 IT Systems and devices AS Do all the computers and other devices used across your organisation have antivirus/antimalware software which is kept up to date?
6.3.2 IT Systems and devices SM Have staff, directors, trustees and volunteers been advised that use of public Wi-Fi for work purposes is unsafe?
7.3.1 IT Systems and devices AS How does your organisation make sure that there are working backups of all important data and information?
7.3.2 IT Systems and devices AS All emergency contacts are kept securely, in hardcopy and are up-to-date.
7.3.4 IT Systems and devices SM Are backups routinely tested to make sure that data and information can be restored?
8.1.4 IT Systems and devices SM Are all the IT systems and the software used in your organisation still supported by the manufacturer or the risks are understood and managed?
8.2.1 IT Systems and devices SM If your answer to 8.1.4 (on IT systems and software being supported by the manufacturer) was that software risks are being managed, please provide a document that summarises the risk of continuing to use each unsupported item, the reasons for doing so and a summary of the action your organisation is taking to minimise the risk.
8.3.5 IT Systems and devices AS How does your organisation make sure that the latest software updates are downloaded and installed promptly?
9.1.1 IT Systems and devices SM Does your organisation make sure that the passwords of all networking components, such as a Wi-Fi router, have been changed from their original passwords?
9.5.2 IT Systems and devices SM Are all laptops and tablets or removable devices that hold or allow access to personal data, encrypted?
10.2.1 IT Systems and devices SM Do your organisation's IT system suppliers have cyber security certification?