Digital & Social Boundaries

Digital tools speed care but magnify risk. Professional distance needs to extend to phones, messaging, social media and online identities where roles and tone can blur rapidly. [1][2]
Core principles for online conduct
Keep all patient communication on approved channels that create an audit trail. [2] Avoid sharing personal contact details, and decline friend or follow requests with a standard, respectful script. [5][1] Do not post identifiable cases, images or timing/location clues online. [1][5]
Messaging and case discussion
Personal apps create uncontrolled copies, unknown backups and weak access control. [4][5] Case discussion should occur on authorised platforms with encryption and role-based access. [2][3] Delete temporary files after upload and avoid screenshots that bypass audit trails. [2]
Social media presence
Separate personal and professional profiles and use privacy settings, but never rely on them for patient confidentiality. [1][5]
Treat every post as potentially public. [1]
Avoid comments about patients, colleagues or employers that undermine trust. [1]
Device and account hygiene
Unique logins, multi-factor authentication and short auto-locks support confidentiality. [7][4] Devices should be encrypted and shared accounts avoided. [5][4] Disabling message previews on lock screens reduces accidental disclosures in public areas or domiciliary settings. [5]
Two practical lists for daily use
Do
- Use approved email or referral systems; verify recipients; use minimum identifiers. [2]
- Store images only on sanctioned platforms; decline friend requests with a polite script. [3][1]
- Log any digital near-misses promptly. [6]
Don't
- Give personal numbers or move data to personal cloud. [5]
- Discuss cases in open social posts or allow family access to work devices. [1][4]
- Keep patient images on personal phones even "temporarily." [5][4]
Phrases that hold boundaries online
Short phrases keep tone warm but firm. "For privacy and safety I can only communicate through our practice channels," resets expectations. "I can't discuss identifiable cases here; let's use the approved platform," protects both parties and points to a solution. [1][2]
Auditing without blame
Access logs and random message samples on approved systems can be reviewed. [2] Recurrent errors such as missing identifiers in subject lines or attachments sent to the wrong clinic are best shared quickly with fixes, not public shaming. [6]
When digital contact is clinically indicated
Tele-optometry or remote advice may be appropriate. Obtain consent, use the approved platform, and record identity checks and the limits of remote assessment. [3][2] Schedule in-person follow-up where uncertainty remains and avoid ad-hoc video calls from personal accounts. [3][4]
Recording decisions
If a boundary issue arises online, document who contacted whom, what was requested, when the boundary was set, and why a given platform was chosen. [6] Add any training or policy changes to the decision log so future audits see how learning was applied. [6]
Domiciliary and community constraints
Homes and public spaces add eavesdroppers and shared Wi-Fi. Avoid patient login screens within view, and position devices with backs to walls. Where connectivity is poor, capture only essential data offline and sync securely back at base rather than improvising with personal apps. [5][4]
Staff wellbeing online
Boundary pressure can arrive as after-hours messages or personal enquiries. A rota-based inbox means individuals are not singled out. Publishing response times-and sticking to them-helps so silence does not prompt staff to reply from personal accounts. [6][2]
References (numbered in text)
- Social media and online behaviour, College of Optometrists (College of Optometrists) Find (opens in a new tab)
- Using mobile messaging, NHS Transformation Directorate (NHS England / NHS Transformation Directorate) Find (opens in a new tab)
- Using video conferencing and consultation tools, NHS Transformation Directorate (NHS England / NHS Transformation Directorate) Find (opens in a new tab)
- Bring your own device (BYOD) guidance, NHS Transformation Directorate (NHS England / NHS Transformation Directorate) Find (opens in a new tab)
- Mobile devices, home or remote working and removable media, Information Commissioner's Office (ICO) Find (opens in a new tab)
- A just culture guide, NHS England (NHS England) Find (opens in a new tab)
- Multi-factor authentication (MFA) policy, NHS England Digital (NHS England) Find (opens in a new tab)
References are included to demonstrate that all the content in this course is rigorously evidence-based, and has been prepared using trusted and authoritative sources.
They also serve as starting points for further reading and deeper exploration at your own pace.

