Premium Essay

Confidentiality, Privileges, Mandated Reporting and Duty to Warn

In:

Submitted By alxistiha
Words 1443
Pages 6
CONFIDENTIALITY, PRIVILEGES, MANDATED REPORTING AND DUTY TO WARN Name of Student Institutional affiliation

Abstract
In this paper, I will be focusing on a brief summary of a therapy video that delves into counseling. Actors in this video are looking at real life cases involving high court ruling on issues such as confidentiality, privilege, reporting and the duty to warn. I will also look at my own findings in statures and laws as far as North Carolina is concerned. Additionally, I will give a summary of each. Finally, I will discuss my reflection and how I can put these into action in my counseling career.

The presentation of this video is quite interesting. It gives room for actors to look deeper into real cases and get a deeper grasp in the areas of confidentiality, privilege, reporting and duty to warn. It also gives a more vivid picture of how the above mentioned things, though looking similar, are quite different in a myriad of ways.
The very first case to be looked into was of a young boy who was taken to hospital by his foster parents. His conditions were not good at all for he had bruises on his spine and another bruise slightly below his eye. The nurse happened to questioned her about the same. She said it was as a result of being jostled in seat in the car. The nurse kind of didn’t make any note of this observation. Moreover, she happened to fail to call CPS to report the possible abuse for she was much in agreement of what the foster mother told her.
Four days later, Dominic was for the second time brought to the hospital. This time, he suffered from head trauma. Unfortunately, he passed on. The nurse, was in hot soup. She was accused of failing to report Dominic’s abuse. The nurse might have ignored the clause that gives health professionals the mandate to report any

Similar Documents

Premium Essay

Vignette 1

...Ethical Vignette Paper 1 Liberty University Abstract As a Professional Counselor in the United States of America there are regulations in each state regarding being a mandated reporter. For instance, duty to warn, duty to report and learning when to breach confidentiality will be discussed in this paper. This particular paper summarizes the video, Legal and Ethical Issues for Mental Health Professionals, Vol. 1: Confidentiality, Privilege, Reporting and Duty to Warn (2008), ACA Code of Ethics (2005) and Virginia Board of Counseling state board rules/regulations that applies to confidentiality, privilege, reporting and duty to warn. As future Licensed Professional Counselor, a demonstration of how the state of Virginia Board of Counseling’s board rules/regulations will be applied to my future practices as a professional counselor. After reviewing the video there are legalities and clinical judgment’s a Licensed Professional Counselor must be aware of when rendering services in the mental health field (www.psychotherapy.net). Psychotherapy.net (2008) video discussed different steps were discussed such as duty to report, confidentiality, and privilege to discuss a client’s information. As mandated reporters, health care providers and mental health providers must report all forms of child and elderly abuse. The video presentation provided a case in which a child was brought into the emergency room by his foster mother and he had quarter-size bruises on his arms, the...

Words: 1680 - Pages: 7

Premium Essay

Ethical Vinegette

...the actors discuss real life cases where the Supreme Court Judge had to rule on topics such as: exceptions to confidentiality, privilege, reporting, and the duty to warn. This writer will also discuss her finding s about the statures and laws as they pertain to North Carolina and give a summary of each. Finally the writer will discuss her reflection and how she could put these to action in her counseling career. Summary The video presentation was very interesting. It allowed actors to discuss real cases to give a better understanding about Confidentiality, Privilege, Reporting, and the Duty to Warn. It gave a clear picture of how these things, though they may sound similar are quite different in many ways. The first case was about a young boy was taken to the hospital by his foster parents. He was unconscious with bruises down the spine of his back and a bruise under his eye. When the nurse questioned her about it she stated that it was from being jostled in his car seat. The nurse did not make any note of that observation nor did she call CPS to report possible abuse as she believed what she was told by the foster mother. Dominic was then brought back to the hospital four days later suffering from head trauma and then died. Nurse Brown was being charged with a crime for failure to report the abuse. It is noted that health care professionals are mandated to report suspected child abuse or they could be charged with a crime. Nurse Brown defended her position by...

Words: 1311 - Pages: 6

Free Essay

Page

...DOMESTIC CHANGING HEORY CHANGING PRACTICE 1. Introduction Throughout our world, violence confronts us daily. We hear about it on the news. We read about it in newspapers and on the Internet. We experience it subtly and overtly in all cultures and across nations in incidents ranging from ethnic slurs to hate crimes to violence carried out in the name of ideology. Such incidents of violence tend to be easily seen as they fall within the public domain. Less visible, however, but often more devastating, is the domestic violence that occurs within the family and often against women. The International Council of Nurses (ICN) (2001) notes in a summary of research done on four continents that as many as 20 to 50 percent of all women in the studies reported experiencing partner violence. But what are the links among domestic violence, health care profession, nurses, and ethics? In moral philosophy, there is a long tradition of debate on whether true moral dilemmas can exist, some arguing that it will always be possible to decide which obligation should prevail. On this concept regardless of the abstract possibility of an ideal resolution and the pragmatic reality that decisions are made and people have to live with them. An ethical dilemma presents a choice that must be made between two mutually exclusive courses of action, each of which is perceived to rest on a moral obligation that carries significant weight for the actor confronting the dilemma. According to Draucker...

Words: 14007 - Pages: 57

Premium Essay

Essay

...Ethics and Professional Responsibility Study Unit By Michael Wilson, Esq. Reviewed By Brian Bastyr, Esq. About the Author Michael Wilson is a freelance writer and college instructor who has had wide legal and educational experience. He graduated with his Bachelor of Arts degree in English from the University of Kentucky in 1976 and three years later received his law degree from the same school. He has been a partner in a law firm, a solo practitioner, and has done work in General and Family Mediation. He has also been a fulltime instructor in Paralegal Studies at Sullivan College, Lexington, KY, where he has taught such classes as Legal Research, Advanced Legal Writing and Appellate Practice, and Wills and Estates. He was given the “Teacher of the Year” award in 1997. Mr. Wilson has also had a number of papers published on legal topics in both scholarly and popular journals. About the Reviewer Brian Bastyr is a senior attorney editor for West Group, a legal publishing company. He earned a bachelor’s degree at the University of Illinois, and a Juris Doctor from the University of Illinois College of Law. He is currently a member of the Illinois bar, and has published a number of articles in legal journals. All terms mentioned in this text that are known to be trademarks or service marks have been appropriately capitalized. Use of a term in this text should not be regarded as affecting the validity of any trademark or service...

Words: 22897 - Pages: 92

Premium Essay

Sscp Study Notes

...SSCP Study Notes 1. Access Controls 2. Administration 3. Audit and Monitoring 4. Risk, Response, and Recovery 5. Cryptography 6. Data Communications 7. Malicious Code Modified version of original study guide by Vijayanand Banahatti (SSCP) Table of Content 1.0 ACCESS CONTROLS…………………………………………………………...... 03 2.0 ADMINISTRATION ……………………………………………………………... 07 3.0 AUDIT AND MONITORING…………………………………………………...... 13 4.0 RISK, RESPONSE, AND RECOVERY………………………………………....... 18 5.0 CRYPTOGRAPHY……………………………………………………………....... 21 6.0 DATA COMMUNICATIONS…………………………………………………...... 25 7.0 MALICIOUS CODE……………………………………………………………..... 31 REFERENCES………………………………………………………………………........ 33 1.0 ACCESS CONTROLS Access control objects: Any objects that need controlled access can be considered an access control object. Access control subjects: Any users, programs, and processes that request permission to objects are access control subjects. It is these access control subjects that must be identified, authenticated and authorized. Access control systems: Interface between access control objects and access control subjects. 1.1 Identification, Authentication, Authorization, Accounting 1.1.1 Identification and Authentication Techniques Identification works with authentication, and is defined as a process through which the identity of an object is ascertained. Identification takes place by using some form of authentication. Authentication Types Example Something you know...

Words: 17808 - Pages: 72

Premium Essay

Lwc1 Course Notes

...FUNDAMENTALS OF BUSINESS LAW & ETHICS INTRODUCTION TO CONTRACTS What is the definition of a contract? a promise that the law will enforce 4 Parts of a Contract Agreement: one party must make a valid offer, and the other party must accept it. Consideration: there has to be bargaining that leads to an exchange between the parties. Legality: the contract must be for a lawful purpose. Capacity: the parties must be adults of sound mind. Describe the various types of contracts. bilateral: BOTH parties make a promise. This is the most common and is used for services, sale of goods and almost anything else. A promise for a promise... unilateral: ONE party makes a promise the the other party can accept only by doing something. This is a less common contract. express: In an express contract the two parties explicitly state all important terms of their agreement. This is the majority of contracts. implied: In an implied contract, the words and conduct of the parties indicate the intended agreement. This is less common. executory: one or more parties has not fulfilled obligations executed: all parties have fulfilled their obligations valid: satisfies all of the law's requirements unenforceable agreement: the parties intend to form a valid bargain but a court declares that some rule of law prevents enforcing it voidable: the law permits one party to terminate the agreement void agreement: neither party can enforce, usually because the purpose of the deal is illegal or...

Words: 27321 - Pages: 110

Premium Essay

Maxwell Report

...ACKNOWLEDGEMENTS EXECUTIVE SUMMARY INTRODUCTION CHAPTER 1: A CONSULTATIVE INQUIRY CHAPTER 2: THE SAFETY CONSENSUS PART 1: NEW CHALLENGES FOR OHS 1 3 5 6 15 15 20 24 24 29 46 46 54 60 71 96 96 100 110 120 135 141 159 163 169 177 177 186 192 192 215 222 227 233 233 258 272 284 284 293 328 347 350 354 354 357 360 363 383 387 392 392 397 401 403 412 414 CHAPTER 3: THE CHANGING LABOUR MARKET CHAPTER 4: NEW AND EMERGING RISKS PART 2: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: PART 3: THE REGULATORY STRUCTURE A BIFURCATED AUTHORITY RELATIONS WITH GOVERNMENT THE NEED FOR A TRIPARTITE MECHANISM DUPLICATION AND THE REGULATORY BURDEN GENERAL DUTIES: SCOPE AND LIMITS CHAPTER 9: THE ROBENS MODEL: HISTORICAL BACKGROUND...

Words: 160731 - Pages: 643

Premium Essay

Garments Sector

...Company Profile: The Levant Sweater LTD is a sweater manufacturing company. This company is a professional apparel manufacturer. We are engaged in all kinds of garment, such as men’s sweater, women’s sweater, children’s sweater etc. With the advanced technologies, rich management experience, exquisite production process and unique, creative design thoughts, our products enjoys good reputations both at home and abroad. All the products we provide are professionally designed and skillfully manufactured. We also accept customized orders to meet your specific requirements. If anyone interested in any of our series of products, or need any related items, please contact us with details of your specific orders. We warmly welcome domestic and foreign friends to cooperate with us based on mutual benefits. The Levant Sweat LTD has strongly believed in some truths which are: 1. Trustworthiness 2. Clear Dealings 3. Always Customers first 4. Quality 5. On time 6. Honesty, and 7. Eternal Relationship. The Levant Sweater LTD clearly follows the terms and condition of Bangladesh Government. The entire act and laws posted by the Government been strongly followed in our terms and condition of company. An agreement to this effect was signed between the Bangladesh Export Processing Zones Authority (BEPZA) and The Levant Sweater Ltd. Basic Information | | Company Name | The Levant Sweater LTD | Business type | Manufacturing | Product/Service...

Words: 29296 - Pages: 118

Premium Essay

Paper

...Management of Information Security Third Edition This page intentionally left blank Management of Information Security Third Edition Michael Whitman, Ph.D., CISM, CISSP Herbert Mattord, M.B.A., CISM, CISSP Kennesaw State University ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Management of Information Security, Third Edition Michael E. Whitman and Herbert J. Mattord Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information...

Words: 229697 - Pages: 919

Premium Essay

Software Engineer

...action. alternative dispute resolution procedures. the management of human resources. organizational rules. PART 5 Enhancing Employee-Management Relations Managing Human Resources, 14e, Bohlander/Snell - © 2007 Thomson South-Western 549 550 PART 5 Enhancing Employee-Management Relations n this chapter we discuss employee rights, workplace privacy, and employee discipline. Managers note that these topics have a major influence on the activities of both employees and supervisors. Robert J. Deeny, an employment attorney, has stated that employee rights and workplace privacy will “continue to be the hottest employment law topics into the twenty-first century.”1 For example, while drug testing, e-mail privileges, and employee monitoring are routinely debated, employers are now using location awareness technology, global positioning systems (GPSs), and companyprovided cell phones to track and locate...

Words: 20644 - Pages: 83

Premium Essay

Security

...www.GetPedia.com National Institute of Standards and Technology Technology Administration U.S. Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

Words: 93588 - Pages: 375

Premium Essay

The Handbook

...National Institute of Standards and Technology Technology Administration U.S. Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made...

Words: 93564 - Pages: 375

Premium Essay

Corporate Governance

...THE INDONESIA CORPORATE GOVERNANCE MANUAL First Edition IFC Advisory Services in Indonesia In Partnership with: THE INDONESIA CORPORATE GOVERNANCE MANUAL First Edition Jakarta, January 2014 i Disclaimer IFC, a member of the World Bank Group, creates opportunity for people to escape poverty and improve their lives. We foster sustainable economic growth in developing countries by supporting private sector development, mobilizing private capital and providing advisory services. The Indonesia Corporate Governance Manual (CG Manual) was commissioned by IFC as part of the Indonesia Corporate Governance Program that IFC is implementing in Indonesia since 2012. This manual is distributed with the understanding that neither the authors, nor the organizations, countries they represent, nor the publisher are engaged in rendering legal or financial advice. The material in this Manual is set out in good faith for general guidance, and no liability can be accepted for any possible loss or expense in incurred as a result of relying on the information contained herein. This publication is not intended to be exhaustive. It should not be relied upon as a basis for formulating business decisions. On all financial issues and questions, an accountant, auditor, or other financial specialist should be consulted. A lawyer should be consulted on all legal issues and questions. As the laws in the Republic of Indonesia are constantly changing, legal rules referred...

Words: 131549 - Pages: 527

Premium Essay

Impotent Music

...INFORMATION RESOURCE GUIDE Computer, Internet and Network Systems Security An Introduction to Security i Security Manual Compiled By: S.K.PARMAR, Cst N.Cowichan Duncan RCMP Det 6060 Canada Ave., Duncan, BC 250-748-5522 sunny@seaside.net This publication is for informational purposes only. In no way should this publication by interpreted as offering legal or accounting advice. If legal or other professional advice is needed it is encouraged that you seek it from the appropriate source. All product & company names mentioned in this manual are the [registered] trademarks of their respective owners. The mention of a product or company does not in itself constitute an endorsement. The articles, documents, publications, presentations, and white papers referenced and used to compile this manual are copyright protected by the original authors. Please give credit where it is due and obtain permission to use these. All material contained has been used with permission from the original author(s) or representing agent/organization. ii T eofContent abl 1.0 INTRODUCTION........................................................................................................................................................... 2 1.1 BASIC INTERNET TECHNICAL DETAILS ........................................................................................................................ 2 1.1.1 TCP/IP : Transmission Control Protocol/Internet Protocol .........................................

Words: 134858 - Pages: 540

Premium Essay

Cima 05

...H8032-Prelims.QXD 7/1/06 11:08 AM Page i CIMA’S Official Learning System CIMA Certificate in Business Accounting, 2006 Syllabus Certificate Level Fundamentals of Ethics, Corporate Governance and Business law David Sagar Larry Mead Philippa Foster Back H8032-Prelims.QXD 7/1/06 11:08 AM Page ii CIMA Publishing is an imprint of Elsevier Linacre House, Jordan Hill, Oxford OX2 8DP, UK 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA First edition 2006 Copyright © 2006 Elsevier Ltd. All rights reserved No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the publisher Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone (ϩ44) (0) 1865 843830; fax (ϩ44) (0) 1865 853333; e-mail: permissions@elsevier.com. Alternatively you can submit your request online by visiting the Elsevier web site at http://elsevier.com/locate/permissions, and selecting Obtaining Permission to use Elsevier material Notice No responsibility is assumed by the publisher for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions or ideas contained in the material herein. British Library Cataloguing in Publication...

Words: 249182 - Pages: 997