Scenarios: Digital Boundaries

Digital shortcuts often fail under scrutiny. Practised responses help teams keep pace without leaking identifiers.
References (numbered in text)
- Using mobile messaging - NHS Transformation Directorate (NHS England) Find (opens in a new tab)
- Personal data breaches: a guide - Information Commissioner's Office (ICO) Find (opens in a new tab)
- Pseudonymisation - Information Commissioner's Office (ICO) Find (opens in a new tab)
- Using social media as a medical professional - General Medical Council (GMC) Find (opens in a new tab)
- The Caldicott Principles - National Data Guardian (GOV.UK) Find (opens in a new tab)
- Khaled El Emam, Elizabeth Jonker, Luk Arbuckle, Bradley Malin — A Systematic Review of Re-Identification Attacks on Health Data. PLoS One. 2011. Find (opens in a new tab)
- Patient Safety Incident Response Framework - NHS England (published 23 July 2024) Find (opens in a new tab)
References are included to demonstrate that all the content in this course is rigorously evidence-based, and has been prepared using trusted and authoritative sources.
They also serve as starting points for further reading and deeper exploration at your own pace.

