I need to draft some guidance notes for one of our teams who deal with applications for funding by (or on behalf of) children with communications difficulties. They are faced with telephone enquiries giving, seeking or wanting to discuss sensitive personal information. I want to provide a suitable routine for them to use which gives acceptable security but still allows work to proceed. If anyone is willing to share their protocols/advice for dealing with this sort of situation I'd be most grateful. Many thanks. Jim ---------------------------------------------- Jim Whitaker Head of Information Management and Internal Communications British Educational Communications and Technology agency Millburn Hill Road Science Park Telephone 024 7679 7452 Coventry 024 7641 6994 (Ext 3341) CV4 7JJ Fax 024 7684 7071 ********************************************************************** This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager. This footnote also confirms that this email message has been swept by MIMEsweeper for the presence of computer viruses. www.mimesweeper.com ********************************************************************** ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving message please send to the list owner [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^