Kinds of Situation When Confidentiality Protocols Must Be Breached.

999 words 4 pages
TDA 31-3.3 Justify the kinds of situation when confidentiality protocols must be breached.
Adults who work with children and young people will come to know most of the personal information like date of birth, address and contact details and also sensitive information like behavioural issues, some medical information, family background, whether parents are divorcing and so on. It is the responsibility of the adult to keep this information confidential. They must protect the identity of the child they work with and that of their families and carers. They must do everything in their power to protect the privacy of every child and adult.
This can be done by keeping their personal information safe and secure. They can pass it on those who
…show more content…

The circumstances where seeking permission is not necessary would be: * Place a child at risk of harm; or * Place an adult at risk of serious harm; or * Prejudice the prevention, detection or prosecution of a serious crime ; or * Lead to unjustified delay in making enquiries about allegations of serious harm.
Confidential information can be shared if there is sufficient public interest. The question of whether there is a sufficient public interest must be judged by the practitioner on the facts of each case. In deciding about information sharing, you must weigh up what might happen if the information is shared against what might happen if it is not, and make a decision based on professional judgement.
Information should be shared appropriately and securely, taking care of the following points: * Only share what is necessary to achieve the purpose, distinguishing clearly between fact and opinion. * Share only with the person who really needs to know the information. * Make sure the information is accurate and up-to-date. * Understand the limits of any consent given and especially if the information has been provided by a third party. * Check who will see the information and share the information in a secure way. For example, confirm the identity of the person you are talking to; ensure a conversation or phone


  • Tda 2.5
    2572 words | 11 pages
  • Tda 3.1 Communcation
    2411 words | 10 pages
  • Qualitative Research Methods
    5203 words | 21 pages
  • National Security Outline
    40730 words | 163 pages