Welcome to PlanLog. PlanLog is part of Agency Care Staff Ltd (Agency Care Staff Ltd t/a PlanLog). Your privacy is important to us, and we are committed to protecting the personal information you share with us. This Privacy Policy explains how we collect, use, store, and protect your data when you use our website, mobile application, and related services.
1. Who We Are
PlanLog is a digital care management platform designed to assist care providers in planning, monitoring, and optimising service user care. Our platform helps organisations streamline operations while maintaining compliance and high-quality care standards.
Device and Usage Data, including IP address, browser type, operating system, app events, and usage logs
Location Data for Staff in the Field: when staff use the PlanLog app while delivering care outside a fixed office location, we may collect precise or approximate device location data
Location Data for Analytics: we may collect approximate user location data, including location inferred from IP address or device data, for analytics and service improvement
Cookies and Tracking Technologies
2.3 Third-Party Data
Integrated services, such as NHS APIs
Partners and affiliates
3. How We Use Your Information
Provide and maintain services
Improve performance and security
Monitor staff attendance, visits, and activity when staff are delivering care in the field
Analyse how users access and use the platform, including regional usage patterns, to improve our services
Process payments and subscriptions
Send important notifications
Provide technical support
Ensure legal compliance
We do not sell or rent your personal data.
4. How We Share Your Data
With Your Consent: authorised data sharing
Service Providers: IT providers, payment processors, hosting providers, and other operational suppliers
Analytics Providers: trusted analytics providers who help us understand usage trends and service performance
Legal Compliance: response to lawful requests
All third parties must comply with applicable data protection regulations.
5. Data Security
Encryption for sensitive data
Restricted access controls
Regular security audits
Note: No system is completely secure. We will notify users of breaches promptly where required.
6. Data Retention
We retain data only for as long as necessary for operational, contractual, legal, and regulatory purposes, after which it is securely deleted or anonymised.