Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Aristotle: Ethics
'Chief Good' is,
'that which all things aim at,...
The knowledge of it
must have great weight;
and like archers, with a mark in view,
we shall be more likely
to hit upon what is right.
values
determine what is
right and what is wrong, and
Doing what is right or wrong
is what we mean by
ethics
to behave ethically is
to behave in a manner that is
consistent with what is generally considered
to be right or moral
Ethical behavior
is the bedrock of mutual trust
to behave ethically is
to behave in a manner that is
consistent with what is generally considered
to be right or moral
Ethical behavior
is the bedrock of mutual trust
Values
are the rules by which we
make decisions about
right and wrong, should and shouldn't, good
and bad.
They also tell us which are
more or less important,
which is useful when
we have to trade off
meeting one value over another.
Ethical Dilemmas
allfreeessays.com
A Summary Of
Forester-Miller, H., & Davis, T.E.
(1995).
A PractitionerS Guide
To Ethical Decision Making.
Alexandria, Va: American Counseling Association
Ethical Dilemmas
(1) identify the problem;
(2) apply your Code of Ethics;
(3) determine the nature and dimensions of the
dilemma;
(4) generate potential courses of action;
(5) consider the potential consequences of all
optionsthen determine a course of action;
(6) evaluate the selected course of action;
(Three Tests)
(7) implement this action.
Ethical Dilemmas
(1) identify the problem
gather data;
be specific and objective:
ethical?
Legal?
Clinical?
Ethical Dilemmas
Ethical Dilemmas
(3) determine the nature and
dimensions of the dilemma;
conflicting values?
Legal, ethical or moral obligations?
What principles apply?
What is your bias
(what answer are you hoping for)?
Ethical Dilemmas
(4) generate potential courses of action;
brainstorm
consult
survey
Ethical Dilemmas
(5) consider the potential consequences
of all options and
then determine a course of action
Ethical Dilemmas
(6) evaluate the selected course of action;
Stadler (1986): Three tests
Test of Justice:
would you treat others the same in this situation
Test of Publicity:
would want your behavior reported in the press.
Test of Universality:
would you recommend same course of action
to another counselor in the same situation
Ethical Dilemmas
(Return to step 1
if solutions arent satisfactory)
(7) implement this action.
Document!
Media of communication
and data storage
Competency to practice
Vocal/person-to-person
Human brain expanded to
accommodate gossip.
Eavesdropping (non-electronic)
Information can be shared.
Information can misremembered,
misrepresented, lied about, forgotten
Stone Tablets
Long-lasting
Hard to shred
Hard to redact
But at least its set in stone
Paper
Fax
Invented around 1850
Phone
Land line
Susceptible to being tapped
Voice mail
Extension line
*67/callbacks
Cellular Phone
Password protected?
Would a family member ever pick up
see text messages/caller ID?
Can be intercepted
Voice Mail
Text Messaging
Evolving Etiquette, style
Rules elucidated
because they are broken!
Abbreviations
A3Anytime, anywhere, anyplace
AAFAs a matter of fact
AAKAsleep at keyboard
AAMOIAs a matter of interest
AAPAlways a pleasure
AARAt any rate
AASAlive and smiling
ACKAcknowledge
ADDAddress
ADNAny day now
ADRAddress
AEAPAs early as possible
RLReal life
RPRole play
RMERolling my eyes
ROFLRolling on floor laughing
ROTFLRolling on the floor laughing
ROTFLUTSRolling on the floor laughing unable to speak
RSNReal soon now
RTFMRead the f***ing manual
RUOKAre you okay?
SALSuch a laugh
SCStay cool
SETESmiling Ear-to-Ear
SICNRSorry, I could not resist
SIG2R Sorry, I got to run
SISSnickering in silence
SITStay in touch
SLAPSounds like a plan
SMHIDScratching my head in disbelief
SNAFUSituation normal all fouled up
SOSignificant other
SOLSooner or later
SOMYSick of me yet?
SOTMGShort of time, must go
SPKSpeak
SPSTSame place, same time
SRYSorry
SSSo sorry
SSDDSame stuff, different day
SSINFSo stupid it's not funny
STR8Straight
STWSearch the Web
SUITMSee you in the morning
SULSee you later
SUPWhat's up?
SYLSee you later
T+Think positive
TAThanks a lot
TAFNThat's all for now
TAMTomorrow a.m.
TBCTo be continued
TBDTo be determined
TBHTo be honest
TCTake care
TGIFThank God it's Friday
THXThanks
THNXThanks
THNQThank-you
TIAThanks in advance
TIADTomorrow is another day
TLK2UL8RTalk to you later
TMBText me back
TMIToo much information
TMOTTrust me on this
TMWFITake my word for it
TNSTAAFLThere's no such thing as a free lunch
TPMTomorrow p.m.
TPTBThe powers that be
TSTBThe sooner, the better
TTFNTa ta for now
TTTTThese things take time
TTYLTalk to you later
TTYSTalk to you soon
TUThank you
TYThank you
TYT Take your time
TYVMThank you very much
UCMUYou crack me up
UGTBKYou've got to be kidding
UKTRYou know that's right
ULUpload
URYour / You're
UVUnpleasant visual
UWYou're welcome
VEGVery evil grin
VFMValue for money
VGCVery good condition
VIPVery important person
VMVoice mail
VSFVery sad face
WAMWait a minute
WAN2TLKWant to talk
WAYFWhere are you from?
W/BWrite back
WBWelcome back
WCWho cares
WCAWho cares anyway
WIBNIWouldn't it be nice if
WDALYICWho died and left you in charge
WDYKWhat do you know
Computer
Password required to boot up?
Password-protected files
Password Protected/encrypted
Bit Locker (Windows 7/Vista
Enterprise and Ultimate)
Virtual disk encryption: free otfe
Password complexity/security
Backup
Hard to erase hard drive (drill bit)
Firewall
Windows pretty good, but hackers target
Wifi
Mom:
You dont know where thats been!
Email:
You dont know where thats going.
Alert to viruses
Phishing
Advantages
Expanded access/ geographical availability
email avoids scheduling issues
no pressure to think quickly
precise recordkeeping
computer doesnt interrupt or react in a
triggering manner;
travel time & expense,
agopraphobia/social phobics/other trust
issues; anxiety/stigma; comfort of home;
may feel safer
Disadvantages
Instant Messaging?
Hybrid of email and text
Blogs
Personal
Professional
Internet
Password complexity
Unknown sites may try your password
elsewhere
Phishing:
realistic/official/urgent looking
Facebook
Privacy Settings
Friends Only
Friends of Friends (who knows who?)
Groups/Fans of../specialty pages
may reveal your personal information
Professional-only page
How do you respond to Wall posts
Twitter
Dont mix professional and personal;
could have separate accounts
(but keep them straight!)
Tweets are publicly visible by default;
however, senders can restrict
to just their followers
What would you use it for?
Yahoo Listserv
Members Only
Best Practices sharing
Brainstorming
Resource referrals
Avoid unnecessary client information.
Is your email secure?
e-counseling
Medicare Fraud, Waste and Abuse
Compliance definition includes
Providing services over the
telephone or Internet and billing
using face-to-face codes
BUT individual /group psychotherapy
codes are specified for telehealth
e-counseling
Medicare: Remote Patient Face-To-Face,
Interactive Services
e-counseling
Skype/video
www.ismho.org
(International Society for Mental Health Online)
http://acto-uk.org/
(Association for Counselling and Therapy Online)
e-counseling
California claims jurisdiction over any activity in CA
e-counseling
Some states: have created limited or
special licenses to practice telemedicine
which offer out-of-state providers a
restricted license for infrequent or
irregular contacts.
Many, but not all, licensing laws allow
temporary practice by persons not licensed
in that jurisdiction
e-counseling
e-counseling
e-counseling or ?
What if you call it something else, like
Coaching
"You can NOT do the things described as
being within the purview of a professionunless you are licensed to practice that
profession.
If someone says they are a life coach
but is providing psychological services,
they are practicing psychology"whether
they call themselves a psychologist or not."
Stephen T. DeMers, Ed.D.
American Psychological
Association
American Association of Marriage and Family
Therapists
Electronic media
referenced in a few areas by
adding to a list of various ways
services may be delivered and
to which admonishments apply.
A.12.d. Access
Counselors provide reasonable access to computer
applications
When providing technology-assisted distance counseling
services.
A.12.e. Laws and Statutes Counselors ensure that the use of
technology does not violate the laws of any local, state,
national,
or international entity and observe all relevant statutes.
A.12.f. Assistance Counselors seek business, legal, and
technical
assistance when using technology applications, particularly
when the use of such applications crosses state or national
boundaries.
Special thanks to
Jeremy Peterson
Micro Center
4/11/12
Appendix
SAMPLE: Standards for
Communication
If you have a life threatening emergency, and your are unable
to reach me, I suggest you call Life Crisis Services Hot Line
(647-4357), Behavioral Health Response(800-811-4760), or
911.
Paper:
Paper records created in intake, therapy
sessions, or related correspondence will be maintained in a
client file. The client file will only be accessible to me and
you, unless explicit permission is granted by you, or there is
a requirement under law to disclose information (consistent
with limits of confidentiality reviewed at intake, and my
Notice of Privacy Practices.) On occasion, I may contract
with staff to assist with billing and other administrative
matters, and they would also have access to files.
Appendix
SAMPLE: Standards for
Communication
Telephone: Messages left on my voice mail are secure,
accessible only by me with a password. You can normally
expect a response within 24 hours. If you are requiring a
more urgent response, follow instructions on the voice mail
message to flag it as an urgent message, and I will respond
appropriately. If there are occasions when I may be out of
the office and checking my voice mail less frequently, I will
leave special notice and instructions in the voice mail
message.
If you give me a phone number, as a general contact
number, or a call back number in a voice mail message, I will
assume it is acceptable to leave a message at that number
with basic information, such as an answer to a question or
scheduling information, unless you advise me otherwise.
Appendix
SAMPLE: Standards for
Communication
Fax: Faxes are received by me in an electronic form and access is
password protected, only viewed by me. I can typically be expected
to access a fax message within 24 hours. Response will be
determined by the priority I determine. If you require a particularly
prompt response, talk with me directly to make arrangements.
Email Email is received by me and access is password protected, only
viewed by me. I can typically be expected to access an email
message within 24 hours. Response will be determined by the
priority I determine. You should normally expect I will respond at
the next session. If you require a particularly prompt response, talk
with me directly to make arrangements. I will assume that your
email communication is safe and secure if I choose to respond by
email, unless you advise me otherwise. Email can be a convenient
way of passing along information you want to remember to discuss
in a session, or even as a way of journaling for emotional
expression. It is not a usually a good choice for addressing a crisis.
Appendix
SAMPLE: Standards for
Communication
Text Messaging (SMS): Text Messages appear on my phone as soon as
they are received. However, I may not read the message until a later
time. If a response is requested, I will typically respond within 24
hours. If a response is not explicitly requested, I will choose whether
to respond. Text messages may be convenient to communicate simple
information such as scheduling, but is not usually a good medium for
discussing emotional or cognitive issues.
Social Media (e.g. Facebook, Twitter, Linked In, etc):
As a
matter of policy, I do not join a clients Social Media Network, or
include a client in Social Media Networks I may participate in. This
helps maintain the privacy and personal boundaries of our therapeutic
relationship.
In-person: There may be occasions when we unexpectedly run into
each other outside of the office, such as at a store, or event, etc. I
will typically ignore or not acknowledge knowing a client to protect
your privacy. This may seem awkward, but it also avoids the
awkwardness of deciding how to explain to someone how we know
each other.