SlideShare une entreprise Scribd logo
1  sur  23
Confidentiality and the Use of Technology: Implications for Student Service Providers Dee Kempson MSW ACSW IDOE School Social Work Consultant [email_address]
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Dilemma ,[object Object]
Legislation:  FERPA ,[object Object],[object Object],[object Object],[object Object]
FERPA - revision ,[object Object],[object Object],[object Object],[object Object]
Privileged Communication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HIPPA  Security Rule 2005 ,[object Object],[object Object],[object Object]
Children’s Online Privacy Protection Act (COPPA) 2000 ,[object Object],[object Object],[object Object]
Ethical Codes ,[object Object],[object Object],[object Object]
Ethical Standards for School Counselors: ASCA 2004 ,[object Object],[object Object],[object Object]
ASCA Ethics continued.. ,[object Object],[object Object],[object Object],[object Object]
Handling Confidential Information in the Age of Technology ,[object Object],[object Object],[object Object],[object Object],[object Object]
Best Practices for Securing Computerized Information ,[object Object],[object Object],[object Object],[object Object],[object Object]
Best practices continued.. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Continued.. ,[object Object],[object Object]
Continued.. ,[object Object],[object Object],[object Object]
Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object]
What to do in the event that you have been subpoenaed to court. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What to do in the event that a parent demands information regarding the content of counseling sessions ,[object Object],[object Object],[object Object],[object Object]
Continued… ,[object Object],[object Object],[object Object],[object Object]
Continued .. ,[object Object],[object Object]
What to do when there is a request for client information from a colleague ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)Sanjeev Bharwan
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011darichardson
 
Mha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialityMha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialitysolifen2
 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA TrainingJonathan Montes
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awarenessCharles Taft
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowCompliancy Group
 
Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016Lance King
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA ComplianceCBIZ, Inc.
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information securityHiggi123
 
Hipaa101 updated
Hipaa101 updatedHipaa101 updated
Hipaa101 updatedkkurapat
 

Tendances (20)

HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
 
UNA HIPAA Training 8-13
UNA HIPAA Training   8-13UNA HIPAA Training   8-13
UNA HIPAA Training 8-13
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011
 
HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
 
Mha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialityMha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentiality
 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA Training
 
HIPAA Basics by Brian Fleetham
HIPAA Basics by Brian FleethamHIPAA Basics by Brian Fleetham
HIPAA Basics by Brian Fleetham
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awareness
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
 
HIPAA
HIPAAHIPAA
HIPAA
 
Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA Compliance
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information security
 
Patients Rights and Regulations
Patients Rights and RegulationsPatients Rights and Regulations
Patients Rights and Regulations
 
Confidentiality Training
Confidentiality Training Confidentiality Training
Confidentiality Training
 
Hipaa101 updated
Hipaa101 updatedHipaa101 updated
Hipaa101 updated
 

Similaire à Confidentiality and Technology

General Counsel Presentation
General Counsel PresentationGeneral Counsel Presentation
General Counsel PresentationChristine Klocke
 
Student data privacy manifesto
Student data privacy manifestoStudent data privacy manifesto
Student data privacy manifestoCaitlin Sharp
 
Telecommunications policy 2010 2011
Telecommunications policy 2010 2011Telecommunications policy 2010 2011
Telecommunications policy 2010 2011Tedd Wilson
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Library privacy and the privacy audit
Library privacy and the privacy auditLibrary privacy and the privacy audit
Library privacy and the privacy auditRachel Gordon
 
509_Syllabus_Spring HYBRID
509_Syllabus_Spring HYBRID509_Syllabus_Spring HYBRID
509_Syllabus_Spring HYBRIDVirginia Proscia
 
509_Syllabus_Spring HYBRID
509_Syllabus_Spring HYBRID509_Syllabus_Spring HYBRID
509_Syllabus_Spring HYBRIDTitilayo Gureje
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security cschumley
 
Health Policy DecisionsIdarmis Miyares St. Thomas University
Health Policy DecisionsIdarmis Miyares St. Thomas UniversityHealth Policy DecisionsIdarmis Miyares St. Thomas University
Health Policy DecisionsIdarmis Miyares St. Thomas UniversityJeanmarieColbert3
 
Va child safety & confidentiality 2019.pptx
Va child safety & confidentiality   2019.pptxVa child safety & confidentiality   2019.pptx
Va child safety & confidentiality 2019.pptxeward018
 
Interim ferpa-ppt-for-registrar-site-6-24-14-1
Interim ferpa-ppt-for-registrar-site-6-24-14-1Interim ferpa-ppt-for-registrar-site-6-24-14-1
Interim ferpa-ppt-for-registrar-site-6-24-14-1UConnPub
 
Staff training session
Staff training sessionStaff training session
Staff training sessionmander5208
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalLea Bailey
 

Similaire à Confidentiality and Technology (20)

General Counsel Presentation
General Counsel PresentationGeneral Counsel Presentation
General Counsel Presentation
 
Student data privacy manifesto
Student data privacy manifestoStudent data privacy manifesto
Student data privacy manifesto
 
Telecommunications policy 2010 2011
Telecommunications policy 2010 2011Telecommunications policy 2010 2011
Telecommunications policy 2010 2011
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Library privacy and the privacy audit
Library privacy and the privacy auditLibrary privacy and the privacy audit
Library privacy and the privacy audit
 
509_Syllabus_Spring HYBRID
509_Syllabus_Spring HYBRID509_Syllabus_Spring HYBRID
509_Syllabus_Spring HYBRID
 
509_Syllabus_Spring HYBRID
509_Syllabus_Spring HYBRID509_Syllabus_Spring HYBRID
509_Syllabus_Spring HYBRID
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security
 
Health Policy DecisionsIdarmis Miyares St. Thomas University
Health Policy DecisionsIdarmis Miyares St. Thomas UniversityHealth Policy DecisionsIdarmis Miyares St. Thomas University
Health Policy DecisionsIdarmis Miyares St. Thomas University
 
Va child safety & confidentiality 2019.pptx
Va child safety & confidentiality   2019.pptxVa child safety & confidentiality   2019.pptx
Va child safety & confidentiality 2019.pptx
 
Interim ferpa-ppt-for-registrar-site-6-24-14-1
Interim ferpa-ppt-for-registrar-site-6-24-14-1Interim ferpa-ppt-for-registrar-site-6-24-14-1
Interim ferpa-ppt-for-registrar-site-6-24-14-1
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
Data Breach Response Checklist
Data Breach Response ChecklistData Breach Response Checklist
Data Breach Response Checklist
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 final
 
P R I V A C Y I S S U E S
P R I V A C Y  I S S U E SP R I V A C Y  I S S U E S
P R I V A C Y I S S U E S
 
Privacy Issues
Privacy IssuesPrivacy Issues
Privacy Issues
 
Data Breach Response Checklist
Data Breach Response ChecklistData Breach Response Checklist
Data Breach Response Checklist
 

Dernier

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Confidentiality and Technology

  • 1. Confidentiality and the Use of Technology: Implications for Student Service Providers Dee Kempson MSW ACSW IDOE School Social Work Consultant [email_address]
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.