Academic literature on the topic 'Client confidentiality'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Client confidentiality.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Client confidentiality"

1

Snyder, Herbert, and Reed McKnight. "Client Confidentiality and Fraud." Business and Professional Ethics Journal 23, no. 1 (2004): 245–57. http://dx.doi.org/10.5840/bpej2004231/231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ezhova, E. V. "SOME PROBLEMS OF ENSURING THE PROTECTION OF ATTORNEY-CLIENT PRIVILEGE IN THE CRIMINAL PROCESS OF RUSSIA AND BELARUS." Juvenis scientia, no. 9 (September 30, 2018): 41–43. http://dx.doi.org/10.32415/jscientia.2018.09.08.

Full text
Abstract:
The article deals with the basic guarantees of protection of attorney-client confidentiality in criminal proceedings. A comparative analysis of the legislative norms of the Russian Federation and the Republic of Belarus regulating the legal regime of attorney-client confidentiality is carried out. The article presents the legal positions of the constitutional Court of the Russian Federation on the issue under consideration, which contributed to the amendments to the criminal procedure law of Russia aimed at providing additional guarantees for the protection of attorney-client confidentiality. The author concludes that the practice of application of the rules containing guarantees of protection of attorney-client confidentiality testifies, on the one hand, to the need to strengthen the protection of citizens' rights to ensure the confidentiality of information provided to the lawyer, and, on the other hand, to the importance of preventing abuse of the right to protection by lawyers and their clients
APA, Harvard, Vancouver, ISO, and other styles
3

Woodall, Jean. "Adventure Training and Client Confidentiality." Advances in Developing Human Resources 3, no. 1 (February 2001): 21–25. http://dx.doi.org/10.1177/15234220122238210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Uys, Leana R. "Confidentiality and HIV/AIDS in South Africa." Nursing Ethics 7, no. 2 (March 2000): 158–66. http://dx.doi.org/10.1177/096973300000700209.

Full text
Abstract:
Keeping the diagnosis of a client confidential is one of the cornerstones of professional practice. In the case of a diagnosis such as HIV/AIDS, however, the ethics of this action may be challenged. Such a decision has a range of negative effects, for example, the blaming of others, supporting the denial of the client, and complicating the health education and care of the patient. It is suggested that the four ethical principles should be used to explore the ethics of such decisions, and that professional regulatory bodies and organizations should support professionals in situations where the client’s sexual partner is informed against the wishes of the client.
APA, Harvard, Vancouver, ISO, and other styles
5

Brasel, Kelsey R., and Brian E. Daugherty. "Cook and Thomas, LLC: Balancing Auditor Liability, Client Confidentiality, and the Public Interest." Issues in Accounting Education 32, no. 1 (October 1, 2015): 17–32. http://dx.doi.org/10.2308/iace-51318.

Full text
Abstract:
ABSTRACT In this case students are asked to assume the role of Alex Trifold, CPA, an audit partner for the public accounting firm, Cook and Thomas, LLC, who holds going concern information about an audit client that may impact other entities audited by Cook and Thomas. The case study illustrates how adherence to auditing standards may place auditors in a difficult situation when balancing the auditor's risk of litigation, the clients' rights to confidentiality, and the auditor's duty to the public. Additionally, the case provides exposure to prior litigation cases against auditors with unfavorable outcomes when auditors chose to protect their client's confidentiality, and, conversely, in cases where auditors chose to protect the greater public interest. The case requires students to engage in critical thinking by providing their viewpoints as to the optimal balance of limiting auditor liability, adhering to client confidentiality requirements, and simultaneously serving the public interest. The case study is appropriate for both undergraduate and graduate auditing courses.
APA, Harvard, Vancouver, ISO, and other styles
6

Rubanowitz, Daniel E. "Public attitudes toward psychotherapist-client confidentiality." Professional Psychology: Research and Practice 18, no. 6 (December 1987): 613–18. http://dx.doi.org/10.1037/0735-7028.18.6.613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Anonymous. "Confidentiality-Protecting Yourself and Your Client." Journal of Psychosocial Nursing and Mental Health Services 26, no. 6 (June 1988): 34. http://dx.doi.org/10.3928/0279-3695-19880601-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sim, Julius. "Client Confidentiality: Ethical Issues in Occupational Therapy." British Journal of Occupational Therapy 59, no. 2 (February 1996): 56–61. http://dx.doi.org/10.1177/030802269605900204.

Full text
Abstract:
Confidentiality is a central ethical concern in occupational therapy practice and one that is emphasised in professional codes of ethics. This article examines the conceptual and moral basis of confidentiality, and relates it to the fundamental ethical principles of respect for autonomy, respect for persons and non-maleficence. The moral conflicts that may arise between the requirement of confidentiality on the one hand, and the need to safeguard the interests and welfare of others on the other hand, are explored with reference to the Tarasoff case. Both consequentialist (outcome-based) and deontological (duty-based) perspectives are examined. It is argued that confidentiality should be given a special status within the client-therapist relationship and, up to a certain critical threshold, should be protected from considerations of general welfare. It is argued that, whilst confidentiality may on occasions be breached in the interests of others, it Is rarely permissible to do so in the client's own Interest. In conclusion, occupational therapists are urged to give a high regard to confidentiality and to cultivate the virtue of discretion in their professional practice.
APA, Harvard, Vancouver, ISO, and other styles
9

Ordway, Ann M., and Arielle F. Casasnovas. "A Subpoena: The Other Exception to Confidentiality." Family Journal 27, no. 4 (August 21, 2019): 352–58. http://dx.doi.org/10.1177/1066480719868701.

Full text
Abstract:
A good deal of attention is paid in counselor education programs to the significance of confidentiality and the rare categories of exception that would compel the counselor to break that sacred vow. The exceptions identified are danger to self, danger to others, and child abuse. In some states, additional mention is made of situations involving elder abuse. Rarely, however, do counselor educators discuss the impact of litigation on the sanctity of the counselor–client relationship and the ability of a subpoena to pierce the cloak of confidentiality that otherwise protects a client’s innermost thoughts and raw vulnerability. This article is an examination of the long arm of the court system and, by extension, the role of a subpoena as the often overlooked, other, exception to confidentiality. The effect of court involvement initiated either by the counselor’s client or by an opposing party on the counselor–client relationship should be clearly addressed in informed consent discussions and written documents to avoid unforeseen complications when a counselor receives and responds to a subpoena.
APA, Harvard, Vancouver, ISO, and other styles
10

Cain, Paul. "The Limits of Confidentiality." Nursing Ethics 5, no. 2 (March 1998): 158–65. http://dx.doi.org/10.1177/096973309800500207.

Full text
Abstract:
Two conditions are commonly taken to constitute an obligation of confidentiality: information is entrusted by one person to another; and there is an express understanding that this will not be divulged. This conception of confidentiality, however, does not match much of the practice of health care. Health care practitioners would, for example, hold themselves to be under an obligation of confidentiality in situations where neither of these conditions obtain. The discussion proposes, therefore, two additional grounds for confidentiality. This is in order to clarify, in general terms, the scope of this obligation (i.e. to clarify at what point confidentiality can be said to have been broken). The ‘limits of confidentiality’, it is argued, are set by the wishes of the client or, where these are not known, by reference to those whose right and need to know relate to the care of the client. Anonymous references to the client outside this limit may not be breaches of confidence; whether they are or not depends, it is suggested, on if such reference is responsible.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Client confidentiality"

1

Gonzalez, Laura. "The effects of confidentiality on the working alliance /." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=79771.

Full text
Abstract:
The present study investigated how the issues of perceived and desired confidentiality are related to the working alliance between adolescent clients and their counselors. Fifty-one students between the ages of 14 and 18 years were recruited through two school boards in Canadian cities. Results indicated that adolescents preferred greater levels of confidentiality than they thought they would actually get in hypothetical situations, but preferred significantly less in actual situations. In addition, the level of confidentiality adolescents preferred in both hypothetical and actual situations did not impact the working alliance. The level of confidentiality adolescents thought they would get in hypothetical situations was a significant predictor of the working alliance. In actual situations, however, the level of confidentiality did not impact the working alliance. Theoretical and practical implications for counselors and other researchers, limitations of this study, and future research directions are discussed.
APA, Harvard, Vancouver, ISO, and other styles
2

Henziger, Eric. "The Cost of Confidentiality in Cloud Storage." Thesis, Linköpings universitet, Databas och informationsteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148907.

Full text
Abstract:
Cloud storage services allow users to store and access data in a secure and flexible manner. In recent years, cloud storage services have seen rapid growth in popularity as well as in technological progress and hundreds of millions of users use these services to store thousands of petabytes of data. Additionally, the synchronization of data that is essential for these types of services stands for a significant amount of the total internet traffic. In this thesis, seven cloud storage applications were tested under controlled experiments during the synchronization process to determine feature support and measure performance metrics. Special focus was put on comparing applications that perform client side encryption of user data to applicationsthat do not. The results show a great variation in feature support and performance between the different applications and that client side encryption introduces some limitations to other features but that it does not necessarily impact performance negatively. The results provide insights and enhances the understanding of the advantages and disadvantages that come with certain design choices of cloud storage applications. These insights will help future technological development of cloud storage services.
APA, Harvard, Vancouver, ISO, and other styles
3

Berry-Harris, Traci Aaron. "Examining therapists' perceptions of confidentiality across various therapeutic environments, professional organizations, and client development (an exploratory study) /." Morgantown, W. Va. : [West Virginia University Libraries], 2007. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4982.

Full text
Abstract:
Thesis (Ph. D.)--West Virginia University, 2007.
Title from document title page. Document formatted into pages; contains vi, 149 p. Includes abstract. Includes bibliographical references (p. 117-125).
APA, Harvard, Vancouver, ISO, and other styles
4

Dowman, Nadia. "Reporting obligations: A challenge for South African lawyers." University of Western Cape, 2019. http://hdl.handle.net/11394/7574.

Full text
Abstract:
Magister Legum - LLM
“Threats to the independence of the legal profession have become a preoccupation for bar leaders, regulators and academics, driven by the dual pressures of globalization and the changing business structure of the profession.”1 Money laundering is a transnational economic crime that has plagued the world economy for many decades. It is a crime that eluded the attention of most world leaders. Hence, it is this elusiveness and this non-interest in money-laundering as a serious economic crime, that afforded many individuals such as former dictators and military leaders in developing countries the chance to avoid prosecution for depleting the economic resources of their particular state.2
APA, Harvard, Vancouver, ISO, and other styles
5

Holmberg, Daniel, and Victor Nyberg. "Functional and Security Testing of a Mobile Client-Server Application." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148710.

Full text
Abstract:
Today’s massive usage of smartphones has put a high demand on all application developers in the matter of security. For us to be able to keep using all existing and new applications, a process that removes significant security vulnerabilities is essential. To remove these vulnerabilities, the applications have to be tested. In this thesis, we identify six methods for functional and security testing of client-server applications running Android and Python Flask. Regarding functional testing, we implement Espresso testing and RESTful API testing. In regards to the security testing of the system, we do not only implement fuzz testing, sniffing, reverse engineering and SQL injection testing on a system developed by a student group in a parallel project, but also discover a significant security vulnerability that directly affects the integrity and reliability of this system. Out of the six identified testing techniques, reverse engineering exposed the vulnerability. In conjunction with this, we verified that the system’s functionality works as it is supposed to.
APA, Harvard, Vancouver, ISO, and other styles
6

Frans, Cameron Benjamin. "Impact of Cleint Record Keeping on the Legal Profession in South Africa." University of the Western Cape, 2017. http://hdl.handle.net/11394/6389.

Full text
Abstract:
Magister Legum - LLM (Criminal Justice and Procedure)
The combating of money laundering has become crucial since it has escalated from a domestic to an international problem and vice versa. South Africa, in an attempt to combat money laundering has enacted anti-money laundering (AML) and anti-terrorism legislation. The legislation consists of the Prevention of Organised Crime Act 121 of 1998 (POCA); the Financial Intelligence Centre Act 38 of 2001 (FICA); and the Protection of Constitutional Democracy against Terrorist and Related Activities Act 33 of 2004 (POCDATARA). In essence POCA and POCDATARA criminalise money laundering and terrorist financing. FICA requires certain professions, such as the legal profession to maintain specific controls. Such controls include AML measures, combating the financing of terrorism (CFT) and also require the keeping of confidential client records, the filing of suspicious transaction reports (STR's) and certain cash transaction reports (CTR's).
APA, Harvard, Vancouver, ISO, and other styles
7

Veeder, Stacy B. "Confidentiality expectations and willingness to disclose personal information to a health-care provider." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Barquissau, Eric. "L’évaluation de la qualité de la relation client en ligne par les utilisateurs d’espaces clients de sites web : une application dans le secteur bancaire et dans le secteur de la téléphonie mobile." Thesis, Paris 10, 2013. http://www.theses.fr/2013PA100205.

Full text
Abstract:
Internet a profondément changé la manière dont les entreprises interagissent avec leurs clients. Le développement d’une relation client en ligne a mené les organisations à repenser l’idée qu’elles se faisaient de cette relation, ainsi que leurs pratiques en termes de marketing relationnel. Cette recherche vise à mieux comprendre la manière dont les utilisateurs d’espaces clients de sites web évaluent la qualité de la relation client en ligne, et inclut une dimension importante dans l’évaluation de la qualité de la relation en ligne, l’appropriation de l’espace client.Une étude qualitative a été menée auprès de 15 personnes, afin d’étudier les variables permettant de construire le modèle de recherche et de proposer une échelle de mesure de l’appropriation des espaces clients de sites web. Par la suite, un modèle de recherche a été créé et un questionnaire en ligne a été administré. Un échantillon final se composant de 534 personnes, utilisatrices d’espaces clients de sites web dans le secteur bancaire et dans le secteur de la téléphonie mobile, a permis de tester les hypothèses de recherche. Il en résulte que l’appropriation de l’espace client du site web joue un rôle médiateur entre deux variables - la facilité d’utilisation perçue et l’utilité perçue - et la qualité de la relation client en ligne, que ce soit pour les utilisateurs d’espaces clients de sites web dans le secteur bancaire ou dans le secteur de la téléphonie mobile. De même, la sécurité/confidentialité perçue de l’espace client du site web exerce une influence positive sur la qualité de la relation client en ligne. L’hypothèse postulant que l’interactivité perçue de l’espace client du site web exerce une influence positive sur la qualité de la relation client en ligne est partiellement validée. En revanche, la présence sociale de l’espace client du site web n’exerce pas une influence positive sur la qualité de la relation client en ligne
The Internet has dramatically changed the way companies interact with their customers. Because of the importance of e-customer relationship management, companies have to reconsider their strategies in terms of relationship marketing. The purpose of this research is to investigate the way users of personal websites’ accounts evaluate e-relationship quality within two sectors: the banking sector and the mobile phone sector. This research deals with an important concept: appropriation.A qualitative study has been conducted in order to build a research model and to create a measurement scale to study the appropriation of a personal websites’ account. Therefore, an online survey (N=534) was conducted to test the hypothesis. The findings suggest that the appropriation of a personal websites’ account is a mediating variable between perceived ease of use, perceived usability and relationship quality, both in the banking sector and in the mobile phone sector. In the same way, privacy has a positive influence on e-relationship quality. Moreover, perceived interactivity has a positive influence on e-relationship quality, but that particular hypothesis is partially validated. Finally, social presence does not have a positive influence on e-relationship quality
APA, Harvard, Vancouver, ISO, and other styles
9

Cherrueau, Ronan-Alexandre. "Un langage de composition des techniques de sécurité pour préserver la vie privée dans le nuage." Thesis, Nantes, Ecole des Mines, 2016. http://www.theses.fr/2016EMNA0233/document.

Full text
Abstract:
Un service du nuage peut employer des techniques de sécurités pour assurer la sécurité de l’information. Ces techniques protègent une donnée personnelle en la rendant inintelligible pour toutes personnes autres que l’utilisateur du service. En contrepartie, certaines fonctionnalités ne peuvent plus être implémentées. Par exemple, la technique du chiffrement symétrique rend les données inintelligibles, mais empêche le calcul sur ces données.Cette thèse avance qu’un service du nuage doit composer les techniques pour assurer la sécurité de l’information sans perdre de fonctionnalités. Elle se base sur l’étude de la composition de trois techniques qui sont le chiffrement, la fragmentation verticale et les calculs côté client. Cette étude montre que la composition sécurise sans perdre de fonctionnalités, mais complexifie l’écriture du service. La thèse propose alors un nouveau langage pour l’écriture de services du nuage qui assurent la sécurité des données personnelles par compositions des techniques de sécurité.Ce langage est muni de lois algébriques pour dériver,systématiquement, un service local sans protection vers son équivalent sécurisé du nuage. Le langage est implémenté en Idris et profite de son système de type expressif pour vérifier la composition correcte des techniques de cryptographie. Dans le même temps, un encodage traduit le langage en ProVerif, un vérificateur de modèle pour l’analyse automatique des propriétés de sécurité sur les protocoles cryptographiques. Cette traduction vérifie alors la sécurité des données personnelles dans le service
A cloud service can use security techniques to ensure information privacy. These techniques protect privacy by converting the client’s personal data into unintelligible text. But they can also cause the loss of some functionalities of the service. For instance, a symmetric-key cipher protects privacy by converting readable personal data into unreadable one. However, this causes the loss of computational functionalities on this data.This thesis claims that a cloud service has to compose security techniques to ensure information privacy without the loss of functionalities. This claim is based on the study of the composition of three techniques: symmetric cipher, vertical data fragmentation and client-side computation. This study shows that the composition makes the service privacy preserving, but makes its formulation overwhelming. In response, the thesis offers a new language for the writing of cloud services that enforces information privacy using the composition of security techniques. This language comes with a set of algebraic laws to systematically transform a local service without protection into its cloud equivalent protected by composition. An Idris implementation harnesses the Idris expressive type system to ensure the correct composition of security techniques. Furthermore, an encoding translates the language intoProVerif, a model checker for automated reasoning about the security properties found in cryptographic protocols. This translation checks that the service preserves the privacy of its client
APA, Harvard, Vancouver, ISO, and other styles
10

Andersson, Frida. "Lojalitetsplikt i uthyrningsbranschen : - En uppsats om lojalitetsförhållandet mellan kundföretag och inhyrd arbetskraft." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-33654.

Full text
Abstract:
During the last part of the 20th century many companies has started to build their organizations on knowledge and information instead of manufacturing of products.  Today it is easier to communicate and spread information. At the same time the numbers of untraditional employments like temporary employments and workers from staffing agencies are increasing. Many organizations have higher employee turnover now than before. This allows more people to have access to confidential information, whose spreading might cause great damage for the employer. This essay aims to look into the protection of confidential information for the client against offenses from staffing agency workers that are working within the clients’ organization. Protection of confidential information is included in the duty of loyalty in terms of confidentiality, protection of trade secrets and competition clauses. Duty of loyalty lies within the employment contract between the agency employer and the staffing agency. Therefore the agency employer has no duty to be loyal against the client. For the agency worker to be able to perform the required work duties he or she might be provided with confidential information. Spreading of this information could cause damage for the client. Can the rules of justice that regulates duty of loyalty be applied on the relationship between the client and the agency worker?  What are the consequences of the rules that exist today? This essay is written with a juridical method and with sociology of law perspective. Other parts of the duty of loyalty is not included as well as the duty of loyalty for the employer. The conclusion is that the staffing agency is responsible for indemnity towards the client if an agency employer reviles confidential information about the clients’ organization.  Some rules of justice can be interpreted as an expression that duty of loyalty lays between the client and the agency worker. For example, the agency worker is bound by confidentiality in terms of the conditions at the clients’ organization.  Suggestions of changes in the regulations about protection of confidential information will force the agency worker to pay indemnity to the client if he or she reviles confidential information.   In staffing agencies there are twice as many immigrants than in the regular labor market. The rules of duty of loyalty can contribute to a holdback for immigrants that are working in staffing agencies. Immigrants will be at bigger risk of standing outside the general labor market than people born in Sweden because of static discrimination.
Företag har under senare delen av 1900-talet gått från traditionell varuproduktion till att allt mer bygga sin verksamhet på information och kunskap. Den tekniska utvecklingen har gjort det lättare att överföra och sprida kunskap i samhället vilket ökar sårbarheten hos företagen. Icke- traditionella anställningar såsom tidsbegränsade anställningar och inhyrd arbetskraft ökar och företag har en högre personalomsättning nu än tidigare. Fler personer får tillgång till företagsspecifik information och spridning av den skulle kunna skada arbetsgivaren. I min uppsats undersöker jag skyddet av hemlig information för arbetsgivare som hyr in arbetskraft från ett personaluthyrningsföretag. Skydd för hemlig information ingår i den så kallade lojalitetsplikten i form av tystnadsplikt, skydd för företagshemlighet och konkurrensklausuler. Lojalitetplikt föreligger i anställningsavtalet mellan uthyrd arbetstagare och uthyrningsföretaget men arbetstagarens arbetsprestation utförs hos kunden. Kan regleringar kring lojalitetsplikt tillämpas på förhållandet mellan kund och inhyrd arbetstagare? Vad blir konsekvenserna av de regler som finns idag? Uppsatsen är skriven med juridisk metod som har sin utgångspunkt i rättskälleläran samt med rättssociologisk angreppssätt. Andra delar av lojalitetsplikt såsom upplysningsskyldighet, bisysslor eller kritikrätt behandlas inte i uppsatsen, ej heller lojalitetsplikt för arbetsgivaren. Slutsatsen är att uthyrningsföretaget står för den uthyrde arbetstagarens handlingar mot kundföretaget eftersom det föreligger lojalitetsförpliktelser i uthyrningsavtalet mellan kund och uthyrare. Uthyraren står för exempelvis skadestånd om en arbetstagare röjer eller utnyttjar en företagshemlighet hos kunden. Vissa regleringar ger uttryck för att det föreligger lojalitetsplikt mellan kund och inhyrd arbetstagare. Exempelvis är den uthyrda arbetstagaren bunden av tystnadsplikt vad det gäller förhållanden hos kunden. I ett förslag från regeringen på kommande ändringar i lagstiftningen kommer den inhyrde arbetstagaren bli direkt skadeståndsansvarig vid röjande eller utnyttjande av företagshemlighet hos kunden. I uthyrningsbranschen finns dubbelt så stor andel utlandsfödda arbetstagare som på arbetsmarknaden generellt. På grund av hur regleringen kring lojalitetsplikt ser ut idag kan den bidra till inlåsningseffekter för utlandsfödda arbetstagare som arbetar i uthyrningsbranschen. Skilda villkor för svensk- och utlandsfödda såsom statisk diskriminering på arbetsmarknaden gör att utlandsfödda arbetstagare löper större risk än svenskfödda arbetstagare att få stå utanför den traditionella arbetsmarknaden.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Client confidentiality"

1

Carol, Gorenberg, and National Association of Social Workers, eds. Client confidentiality and privileged communications. 2nd ed. Washington, D.C: NASW Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Client incest and the lawyer's duty of confidentiality. [Chicago]: American Bar Association, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Horwitz, Kenneth M. The new cpa-client confidentiality privilege: Opportunity or risk? New York: Research Institute of America, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Horwitz, Kenneth M. The new cpa-client confidentiality privilege: Opportunity or risk? New York: Research Institute of America, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Evertsz, Jari. Therapist and client attitudes towards discrete areas of threat to therapeutic confidentiality. [Guildford]: [University of Surrey], 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pattenden, Rosemary. The law of professional-client confidentiality: Regulating the disclosure of confidential personal information. Oxford: Oxford University Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Virginia. General Assembly. Secretary of Health and Human Resources. Report of the Secretary of Health and Human Resources on the impact of laws protecting client confidentiality on cooperative relationships of agencies working to address problems of children and families : to the Governor and the General Assembly of Virginia. Richmond: Commonwealth of Virginia, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lucas, Michael. PGP & GPG: Assurer la confidentialite de son courrier e lectronique. Paris: E ditions Eyrolles, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Guidance, Institute of Careers, ed. Client confidentiality. Stourbridge: ICG, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pattenden, Rosemary, and Duncan Sheehan. Law of Professional-Client Confidentiality. Oxford University Press, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Client confidentiality"

1

Jenkins, Peter. "Client confidentiality and data protection." In The Handbook of Professional, Ethical and Research Practice for Psychologists, Counsellors, Psychotherapists and Psychiatrists, 53–64. 3rd edition. | Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429428838-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rosenthal, Howard. "Beyond Confidentiality: Professional Counselors and Therapists Have a Duty to Warn." In Before You See Your First Client, 77–78. New York: Routledge, 2021. http://dx.doi.org/10.4324/9781003169048-32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Thaman, Stephen C. "Confidentiality of Attorney-Client Communications in the United States." In Ius Comparatum - Global Studies in Comparative Law, 395–440. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43123-5_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Thaman, Stephen C., and Lorena Bachmaier. "Attorney-Client Confidentiality as a Fair Trial Right in Criminal Proceedings." In Ius Comparatum - Global Studies in Comparative Law, 589–610. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-48675-4_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Barret, Bob, Karen Strohm Kitchener, and Scott Burris. "Suicide and confidentiality: With the client with advanced AIDS: The case of Phil." In Ethics in HIV-related psychotherapy: Clinical decision making in complex cases., 299–314. Washington: American Psychological Association, 2001. http://dx.doi.org/10.1037/10399-016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sasakura, Hiroki. "The Continuing Evolution of Right to Counsel and Confidentiality of Attorney-Client Communications in Japan." In Ius Comparatum - Global Studies in Comparative Law, 177–204. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43123-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ciriani, Valentina, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati. "Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients." In Data and Applications Security XXIII, 225–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03007-9_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Herring, Jonathan. "5. Confidentiality." In Legal Ethics. Oxford University Press, 2017. http://dx.doi.org/10.1093/he/9780198788928.003.0005.

Full text
Abstract:
This chapter discusses the principle of confidentiality. It explains the protection of lawyer-client communications and it discusses professional guidance on confidentiality. It goes on to examine the rule of legal professional privilege and the circumstances in which lawyers have a duty to disclose. The chapter discusses when a lawyer is permitted to breach confidence. In doing so, it looks at the broader ethical foundation for the duty of confidence.
APA, Harvard, Vancouver, ISO, and other styles
9

Barnett, Jeffrey E., and Jeffrey Zimmerman. "It Is Best to Provide Minimal Information When a Referral Source Requests Information About a Client." In If You Build It They Will Come, edited by Jeffrey E. Barnett and Jeffrey Zimmerman, 123–27. Oxford University Press, 2019. http://dx.doi.org/10.1093/med-psych/9780190900762.003.0022.

Full text
Abstract:
It is a common occurrence for mental health practitioners to receive requests for information about clients from their referral sources. Concerns about safeguarding each client’s confidentiality may result in a misunderstanding about how to respond to these requests. This chapter addresses mental health professionals’ ethical, legal, and clinical obligations to both their clients and referral sources. How to address these obligations so that clients’ best interests are served is explained. This includes discussing the role of the informed consent process with clients, educating referral sources on confidentiality obligations, and explaining how to work collaboratively with other treatment providers, so that client treatment is coordinated. Client expectations, diversity issues, striking a balance between competing needs, and applying a thoughtful decision-making process to determine which information to share and how to best share it are all addressed.
APA, Harvard, Vancouver, ISO, and other styles
10

"3.12 CLIENT CARE AND PROFESSIONAL CONDUCT Confidentiality." In Family & Matrimonial Law, 395–96. Routledge-Cavendish, 2000. http://dx.doi.org/10.4324/9781843143871-88.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Client confidentiality"

1

Henziger, Eric, and Niklas Carlsson. "The Overhead of Confidentiality and Client-side Encryption in Cloud Storage Systems." In UCC '19: IEEE/ACM 12th International Conference on Utility and Cloud Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3344341.3368808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arslan, Çetin, and Didar Özdemir. "The Protection of Confidential Business Information by Criminal Law." In International Conference on Eurasian Economies. Eurasian Economists Association, 2017. http://dx.doi.org/10.36880/c08.01824.

Full text
Abstract:
The Turkish Penal Code (TPC) no.5237 embodies “the reveal of confidential business information and documents” as a crime. However, neither article 6 of the TPC titled “definitions” nor the legal justification of the article contains the definition of the confidential business information or commercial secret. The abrogated Turkish Commercial Code no.6762 disposes the reveal of this kind of information as an act of unfair competition. In a similar vein, the current Turkish Commercial Code no.6102 assumes the illegal acquisition and the reveal of business secrets as acts of unfair competition and subjects them to criminal sanction. Also the article 562 of the TCC no.6102 disposes that if the auditors reveal the confidential business information of the auditee company, they are punished according to the article 239 of the TPC. The Proposal of Code on Business, Bank and Client Secrets refers to the article 239 of the TPC in case of the violation of the confidentiality obligation. Finally, the Act of the Protection of Competition no.4054 brings a confidentiality obligation for the Council and staff members. In this study, we will try to explain first the notion of confidential business information or commercial secret, then the penal norms about the confidential business information and the confidentiality obligation and last, the elements of the crime disposed in the article 239 of the TPC which is referred by most of the other penal norms in this respect.
APA, Harvard, Vancouver, ISO, and other styles
3

Deakin, Barry. "Model Tests in Support of the Design of a 50 Meter Barque." In SNAME 13th Chesapeake Sailing Yacht Symposium. SNAME, 1997. http://dx.doi.org/10.5957/csys-1997-005.

Full text
Abstract:
This paper describes a programme of model tests and computer predictions which was designed to assist in the selection of a hull design for a new ship, and ensure that it would meet the owner's requirements. Whilst that is a common requirement of model tests, this case was unusual because the subject was a 50 metre wooden sailing ship for disabled crews, and a choice had to be made with regard to a wide range of operational requirements. The paper describes the background to the project, the scope of the testing, the presentation of the results, and their implications for the design. A general outline of the whole project is given, rather than details of specific tests or results, because of the dual limitations of space and confidentiality to the client, Tony Castro Ltd. It is hoped that the paper will provide an illustration of the range of investigations which are now available to assist in the design stages of any sailing vessel.
APA, Harvard, Vancouver, ISO, and other styles
4

Pytlar, Theodore S. "Status of Existing Biomass Gasification and Pyrolysis Facilities in North America." In 18th Annual North American Waste-to-Energy Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/nawtec18-3521.

Full text
Abstract:
A search of websites for firms in the United States and Canada identifying themselves as gasification or pyrolysis system suppliers indicates that there are a number of existing facilities where their technologies are installed. According to the websites, the companies’ existing installations focus on processing biomass and industrial residuals, rather than mixed refuse. The biomass processed, according to the websites includes yard waste, wood, and wastewater treatment sludge. The existence of these facilities provides a potential opportunity for communities in areas with a high density of development, who experience difficulties in siting “traditional” facilities for processing these biomass wastes. Such traditional facilities include yard waste and sludge composting, wood mulching, sludge drying, chemical treatment or pelletization, and combustion-based waste-to-energy. As a result of these facility siting difficulties, these communities often resort to long-haul trucking of the biomass wastes to processing facilities or landfills. Certain potential advantages associated with gasification and pyrolysis technologies could ease the siting difficulties associated with the traditional technologies, due to smaller facility footprints, reduced odors, and the potential for energy production through combustion of syngas/synfuel to power internal combustion engines or produce steam using boilers. Lower stack emissions may result as compared to direct combustion of biomass wastes. Locally sited biomass gasification facilities could reduce the environmental impacts associated with long-haul trucking and generate an energy product to meet nearby demand. Research has been conducted by the Author on behalf of client communities to identify gasification and pyrolysis facilities in the United States and Canada that are in actual operation in order to assess their potential for processing biomass wastes and for providing the advantages listed above. Website reviews, interviews with company representatives, and facility visits were conducted in order to assess their potential for development to meet the biomass management objectives of the communities. The information sought regarding design and operating parameters included the following: • Year of start-up. • Availability. • Process description. • Design throughput. • Actual throughput. • Energy product. • Energy generation capability and technology. • Residuals production and characteristics. • Emissions. • Construction and operating costs. In addition, the system suppliers’ business status was addressed in terms of their readiness and capabilities to participate in the development of new facilities. Confidentiality requirements imposed by the system suppliers may prevent the identification of the company name or facility location and certain details regarding the system designs.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography