Client understands that this is a group program and that there will be an initial group conversation around group integrity and community standards around confidentiality and respect. Client understands that by signing this agreement, Client agrees that s/he will not share identifying information about others in the group. To maintain the integrity of the group, Client also agrees not to disseminate any of the direct materials (i.e., videos, questions from other group members, materials) with anyone else. Client also agrees that the purpose of this program is to focus on developing their own leadership and to not provide undesired input to others. Instructor will not share any identifiable information about Client. Client understands that the behavior of each group member is their own. This agreement is an attempt to provide you and your fellow group members with as much protection of confidentiality as possible. It is important to note that confidentiality cannot be guaranteed and depends on fellow group members’ adherence to the terms in this agreement. Client retains every right to share only as much as they feel comfortable. Instructor retains the right to remove any group member for actions that violate group standards. Instructor also retains right to remove any group member if, for any reason, Instructor decides that program is not in best interest of Client and/or group.
Instructor often speaks and writes about leadership, stress, and emotional intelligence. Many of the things with which people struggle are highly similar (e.g., uncertainty, relationship problems, insecurity, betrayal, anxiety). Any information/anecdotes shared about clients are always “composites” and are never true representations of actual clients. Client understands that sharing composites of clients is a common professional practice. Client also understands that Instructor is not responsible and cannot, in any form, be held accountable for the actions of other members outside the group forums. Client understands that all program interactions occur through common applications (e.g., Zoom, Gmail, Facebook, Dropbox, etc.) and that information security can be expected to the extent these applications provide it.