Confidentiality at the Front Desk and on the Telephone

Practical privacy, identity checks and safe disclosure in GP first-contact work

  • Reputation

    No token earned yet.

    Reach 50 points to earn the Peridot (Trainee Level).

  • CPD Certificates

    Certificates

    You have CPD Certificates for 0 courses.

  • Exam Cup

    No cup earned yet.

    Average at least 80% in exams to earn the Bronze Cup.

Launch offer: Certificates are currently free when you create a free account and log in. Log in for free access

Confidentiality on the telephone

GP practice reception desk with staff and patients

Telephone conversations may seem private, but the call handler cannot see who else can hear. A patient might be on speakerphone, using a shared device, calling from work, beside a controlling partner, or otherwise unable to speak freely.

Managing confidentiality on the phone begins with identity checks and influences every choice about what to say, whether to leave a voicemail, what to send by SMS and how to record and respond to safe-contact concerns.

Check before discussing details

  • Confirm identity using local procedure before sharing personal information.
  • Check the caller can speak freely if the topic is sensitive or the caller seems hesitant.
  • Use approved wording for voicemails, SMS and missed-call messages.
  • Be cautious with speakerphone or when someone else answers for the patient.

Voicemail and missed calls

A voicemail may be heard by anyone with access to the phone. Even a brief phrase such as "your test result is back" can be sensitive. Use the practice's approved wording and safe-contact notes rather than improvising.

If a patient has asked for no voicemail or no texts, treat that as an important instruction and follow local procedure.

Before leaving a message, think about who might hear or read it.

Social engineering: Keep I.T. Confidential cyber security campaign | NHS England

Video: 1m 58s · Creator: NHS England Digital. YouTube Standard Licence.

This NHS England Digital video describes social engineering - using deception to gain access to data, systems, information or premises - and warns that this can put patient data at risk.

Examples include callers pretending to be an employee, asking someone to hold a door open, posing as a friend on social media, or researching an organisation to appear legitimate. The video gives five practical tips to reduce this risk.

Be cautious if a browser warns that a site is untrusted; it may be a phishing site. Treat red padlocks or warnings that a connection is not private as signs to stop. Never share login details or passwords, because ICT teams should not request them. Avoid posting work information on personal social media and contact the local ICT team for advice if unsure. The closing message is that confidentiality must be protected both offline and online.

Was this video a good fit for this page?

Scenario

A patient says, "Please do not leave messages. My brother checks my phone and I do not want him knowing I called."

What should happen next?

 

Ask Dr. Aiden


Rate this page


Course tools & details Study tools, course details, quality and recommendations
Funding & COI Media Credits