Confidentiality Examples: The 3 Privacy Measures to Know
By Tibor Moes / Updated: June 2023
Confidentiality Examples
Picture this: you’re a bank vault. The precious metals and jewels you store are the intimate, sensitive secrets people have shared with you. Just like a bank has a responsibility to safeguard these treasures, confidentiality is about keeping the secrets of others locked away safely.
Summary
Confidentiality refers to the act of maintaining privacy by keeping shared or accessed information restricted. It’s a key principle in numerous professions like law, medicine, and counseling, obliging individuals to safeguard secrets entrusted to them, thereby preserving trust and protecting sensitive information.
Example 1: The Therapy Session of Joyce Brothers (1955). TV personality and psychologist Dr. Joyce Brothers applied confidentiality in her famous TV sessions, setting an early precedent for therapy on public platforms. Despite being a public figure, she upheld the strict confidentiality of her therapy clients, exemplifying the importance of trust in mental health care.
Example 2: Watergate Scandal (1972). Confidentiality was at the core of this political scandal. ‘Deep Throat,’ an anonymous source for journalists Woodward and Bernstein, maintained his identity confidential for over 30 years until he voluntarily revealed himself as Mark Felt, the Associate Director of the FBI.
Example 3: The HIPAA Act (1996). The Health Insurance Portability and Accountability Act (HIPAA) is a landmark US legislation ensuring the confidentiality of patient health information. It mandates that healthcare providers and associated parties maintain patient data privacy, showcasing confidentiality’s central role in protecting individuals’ sensitive health information.
Don’t become a victim of cybercrime. Protect your devices with the best antivirus software and your privacy with the best VPN service.
Confidentiality Examples In-Depth
The Therapy Session of Joyce Brothers (1955)
Imagine you’re settling down in front of your black and white TV set in 1955. You’re tuning in to watch the new sensation, Dr. Joyce Brothers, America’s sweetheart psychologist. Not only does she answer questions about love, life, and everything in between, but she also brings psychological therapy into American living rooms for the first time.
You might ask, how can therapy sessions, often filled with private revelations and deeply personal stories, be broadcast on public television? Here’s where confidentiality, our vital principle, steps into the spotlight.
Dr. Joyce Brothers had a unique challenge. She was bringing therapy, a private and personal journey, into a public platform. But she had a secret weapon: confidentiality. While she tackled subjects of general interest on her TV sessions, she made sure to keep any personal counseling completely private. Despite her public persona, Dr. Brothers strictly maintained the confidentiality of her therapy clients.
Imagine you are one of her clients. You might be worried about your problems being discussed on television. But with Dr. Brothers, your secrets are safe. She treated her professional obligation of confidentiality with the utmost seriousness, ensuring that the trust between her and her clients remained unbroken.
But why is this important? It set an early precedent for how therapists, and other professionals in similar roles, could navigate the new world of television while still maintaining client confidentiality. Dr. Brothers showed the world that while the mediums we use to communicate might change, the principles of trust and confidentiality remain steadfast.
In a time when therapy was often misunderstood and stigmatized, she helped to normalize it by bringing it into popular media. Yet, she never let this public exposure interfere with the sacred pact of confidentiality between a therapist and client.
The practice of Dr. Joyce Brothers stands as a testament to how confidentiality can be maintained even when work intersects with public and popular media. She showed that no matter how famous the psychologist, or public the platform, confidentiality must always be upheld. Her example continues to inform the practices of therapists who appear on modern platforms, reminding them that the public’s curiosity should never compromise a client’s right to privacy.
Watergate Scandal (1972)
Think of yourself as an audience member in a thrilling spy movie. The theater is dark, the music is suspenseful, and on the screen, a mysterious figure is whispering secrets that could topple a presidency. This isn’t fiction, though—it’s real life. The year is 1972, the movie? The Watergate Scandal, and our ‘James Bond’ character is an individual known only as “Deep Throat.”
“Deep Throat” wasn’t just a character cooked up by Hollywood, but a very real, anonymous source who proved instrumental in the investigative journalism that uncovered the Watergate Scandal. In the political whirlpool of Washington D.C., “Deep Throat” became the confidential informant for two young reporters, Bob Woodward and Carl Bernstein, from the Washington Post.
But what was this scandal about? Imagine you are the President of the United States, and you’ve just found out that members of your party have been arrested for breaking into the opposing party’s headquarters, apparently to tap their phones and steal documents. Sounds like a nightmare, right? Well, that’s what President Richard Nixon faced. He was not directly involved, but the cover-up that ensued implicated his administration and led to his resignation—the first-ever resignation by a U.S. President.
Back to our clandestine source, “Deep Throat.” His whispers in the shadows drove the story forward, giving Woodward and Bernstein vital leads, confirming suspicions, and often guiding the journalists through the maze of political deceit. They never revealed the source’s identity, living up to their promise of confidentiality, even as the world speculated.
For over 30 long years, “Deep Throat” remained a mystery. Then, in 2005, the truth finally surfaced. The man behind the guise was Mark Felt, the Associate Director of the FBI at the time of the Watergate Scandal. His reasons for maintaining confidentiality were numerous. Revealing his identity could have ended his career, jeopardized the ongoing investigation, and put him and his family in potential danger. His example embodies the essence of confidentiality: the courage to keep a secret, the strength to protect others, and the patience to wait for truth’s eventual reveal.
The Watergate Scandal and the role of “Deep Throat” demonstrate the power of confidentiality in maintaining justice and truth. By honoring their commitment to “Deep Throat,” Woodward and Bernstein upheld a key principle of journalism and showed that confidentiality isn’t just about keeping secrets—it’s about protecting the integrity of truth and trust.
The HIPAA Act (1996)
Picture this: you’re in a doctor’s waiting room, nervously awaiting your turn. You start thinking about the private, sometimes intimate information you’re about to share with your doctor. What ensures that this information remains confidential? That’s where the HIPAA Act steps in.
The HIPAA Act is a bit like a superhero, standing guard to protect our private health information from prying eyes. Signed into law in 1996, this US legislation has had a profound impact on how healthcare providers handle patient information. It acts as a sturdy, protective shield for patients, ensuring that the information they share with their healthcare providers remains confidential.
But what does this really mean? Imagine being a healthcare provider – a doctor, a nurse, or an administrative staff. You have access to patients’ medical histories, their current health issues, their medications, and much more. HIPAA mandates that you cannot share this information without the patient’s explicit consent.
And there’s more. HIPAA not only safeguards oral and written information but also extends to electronic data. So, when your doctor jots down notes on their computer or sends electronic records to a specialist, HIPAA’s protective shield ensures this digital information remains private too.
But why is HIPAA so important? Imagine the reverse – a world without HIPAA. Your personal health information could be shared without your consent, potentially leading to discrimination, embarrassment, or even identity theft. HIPAA helps prevent these situations by setting a national standard for the protection of sensitive health information.
But HIPAA isn’t a static law. As technology evolves, so does HIPAA. For example, with the advent of social media and the rise in electronic health records, HIPAA rules have been updated to address these modern issues. This ensures that no matter how health information is stored or shared, your privacy remains protected.
HIPAA underscores the fundamental principle of confidentiality, highlighting its critical role in maintaining trust between patients and healthcare providers. It reminds us that whether we’re patients sharing our health secrets, or healthcare providers entrusted with these secrets, confidentiality is an enduring principle that safeguards our privacy and dignity.
Conclusion
From the shadowy corners of political intrigue to the reassuring presence of a television psychologist, and even the very clinics and hospitals we entrust with our health, confidentiality emerges as a steadfast principle. It acts as an invisible bond, connecting the promise of trust with the practice of discretion. Whether it’s a secret informant during the Watergate Scandal, Dr. Joyce Brothers safeguarding her clients’ trust, or the HIPAA Act protecting patients’ health information, these examples highlight the power and significance of confidentiality. As our society continues to evolve and adapt, let us remember the enduring importance of confidentiality. It’s more than just about keeping secrets; it’s about upholding trust, respecting privacy, and preserving the dignity of individuals.
How to stay safe online:
- Practice Strong Password Hygiene: Use a unique and complex password for each account. A password manager can help generate and store them. In addition, enable two-factor authentication (2FA) whenever available.
- Invest in Your Safety: Buying the best antivirus for Windows 11 is key for your online security. A high-quality antivirus like Norton, McAfee, or Bitdefender will safeguard your PC from various online threats, including malware, ransomware, and spyware.
- Be Wary of Phishing Attempts: Be cautious when receiving suspicious communications that ask for personal information. Legitimate businesses will never ask for sensitive details via email or text. Before clicking on any links, ensure the sender's authenticity.
- Stay Informed. We cover a wide range of cybersecurity topics on our blog. And there are several credible sources offering threat reports and recommendations, such as NIST, CISA, FBI, ENISA, Symantec, Verizon, Cisco, Crowdstrike, and many more.
Happy surfing!
Frequently Asked Questions
Below are the most frequently asked questions.
What is the significance of confidentiality?
Confidentiality plays a crucial role in maintaining trust, promoting open communication, and preserving an individual’s privacy and dignity. It’s especially vital in professions such as healthcare, law, and counseling where sensitive information is routinely handled.
What happens when confidentiality is breached?
Breaching confidentiality can lead to serious consequences, both professionally and legally. This may include disciplinary action, loss of professional licensure, lawsuits, or even criminal charges in some cases. For the person whose confidentiality has been breached, it can lead to emotional distress, loss of trust, and potential harm depending on the information leaked.
How can confidentiality be maintained?
Confidentiality can be maintained through various means. This includes adhering to professional codes of conduct, implementing stringent data protection measures, obtaining consent before sharing information, and ensuring that only necessary personnel have access to confidential information. Training and awareness among staff about the importance of confidentiality is also crucial.

Author: Tibor Moes
Founder & Chief Editor at SoftwareLab
Tibor is a Dutch engineer and entrepreneur. He has tested security software since 2014.
Over the years, he has tested most of the best antivirus software for Windows, Mac, Android, and iOS, as well as many VPN providers.
He uses Norton to protect his devices, CyberGhost for his privacy, and Dashlane for his passwords.
This website is hosted on a Digital Ocean server via Cloudways and is built with DIVI on WordPress.
Security Software
Best Antivirus for Windows 11
Best Antivirus for Mac
Best Antivirus for Android
Best Antivirus for iOS
Best VPN for Windows 11
Cyber Technology Articles
3G
4G
5G
Active Directory (AD)
Android
Android Examples
Android Types
Authentication Types
Biometrics Types
Bluetooth
Bot
Bot Types
Buffering
Cache
Cache Types
CAPTCHA
CAPTCHA Examples
CAPTCHA Types
CDN
Cloud Computing
Cloud Computing Examples
Cloud Computing Types
Compliance
Compliance Examples
Computer Cookies
Confidentiality
Confidentiality Examples
CPU
CPU Examples
CPU Types
Cryptocurrency
Cryptocurrency Examples
Cryptocurrency Types
Dark Web
Data Breach
Data Broker
Data Center
Data Center Types
Data Integrity
Data Mining
Data Mining Examples
Data Mining Types
Dedicated Server
Deepfake
Digital Certificate
Digital Footprint
Digital Footprint Examples
Digital Rights Management (DRM)
Digital Signature
Digital Signature Examples
Digital Signature Types
Domain
Endpoint Devices
Ethical Hacking
Ethical Hacking Types
Facial Recognition
Fastest Web Browser
General Data Protection Regulation
GPU
GPU Examples
GPU Types
Hard Disk Drive (HDD) Storage
Hardware
Hardware Examples
Hardware Types
Hashing
Hashing Examples
Hashing Types
HDMI
HDMI Types
Hosting
Hosting Types
Incognito Mode
Information Assurance
Internet Cookies
Internet Etiquette
Internet of Things (IoT)
Internet of Things (IoT) Examples
Internet of Things (IoT) Types
iOS
iOS Examples
iOS Types
IP Address
IP Address Examples
IP Address Types
LAN Types
Linux
Linux Examples
Linux Types
Local Area Network (LAN)
Local Area Network (LAN) Examples
LTE
Machine Learning
Machine Learning Examples
Machine Learnings Types
MacOS
MacOS Examples
MacOS Types
Modem
Modem Types
Netiquette
Netiquette Examples
Network Topology
Network Topology Examples
Network Topology Types
Operating System
Operating System Examples
Operating System Types
Password Types
Personal Identifiable Information (PII)
Personal Identifiable Info Examples
Port Forwarding
Private Browsing Mode
Proxy Server
Proxy Server Examples
QR Code Examples
QR Code Types
Quantum Computing
Quick Response (QR) Code
RAM Examples
RAM Types
Random Access Memory (RAM)
Router
Router Examples
Router Types
SD Wan
Server
Server Examples
Server Types
Shareware
Shareware Examples
Shodan Search Engine
Software
Software Examples
Software Types
Solid State Drive (SSD) Storage
SSD vs HDD
Static vs Dynamic IP Address
TCP vs IP
Tokenization
Tor Browser
Torrenting
URL
URL Examples
URL Types
USB
USB Types
Virtual Private Server (VPS)
Web Browser
Web Browser Examples
Web Browser Types
Web Scraping
Website
Website Examples
Website Types
WEP vs WPA vs WPA2
What Can Someone Do with Your IP
Wi-Fi
Wi-Fi Types
Windows
Windows Examples
Windows Types