Privacy of personal information is an important principle to JM Nutrition. The trust placed in us by our clients is absolutely essential to our success. We understand that and do all we can to earn and protect that trust.
We are committed to collecting, using and disclosing personal information responsibly and only to the extent necessary for the services we provide. We are open and transparent about how we handle personal information. This document describes our privacy policies.
Personal health information is information about an identifiable individual. Personal health information includes information that relates to:
We use a number of support workers and consultants that may, in the course of their duties, have limited access to personal health information we hold. These include but are not limited to computer consultants, office security and maintenance, bookkeepers and accountants, lawyers, contractors, credit card companies, website managers and custodial staff.
We restrict their access to any personal information we hold. All your personal health information is private, confidential and secure. We also have their assurance that the support workers and consultants follow appropriate privacy principles.
We collect, use and disclose personal information in order to serve our clients. For our clients, the primary purpose for collecting personal health information is to provide nutritional counselling service.
For example, we collect information about a client’s health history, including their family history, physical condition and function and social situation in order to help us assess what their nutrition care needs are, to advise them of their options and then to provide the nutrition care they choose to have. A second primary purpose is to obtain a baseline of health and social information so that in providing ongoing health services we can identify changes that are occurring over time.
We also collect, use and disclose personal health information for other purposes.
The most common examples of these purposes are as follows:
We understand the importance of protecting personal information. For that reason, we have taken the following steps:
Individuals have the right (with some exceptions) to access personal information about themselves held by the organization and to know what the organization has done with it. This ensures that the personal information is adequate, correct and up to date.
Clients have the right to request a correction of erroneous information held by the organization. The purpose is to maintain appropriate and accurate information on clients.
We need to retain personal information for some time to ensure that we can answer any questions you might have about the services provided and for our own accountability to external regulatory bodies. We keep our client files for at least ten years from the date of the last client interaction or from the date the client turns 18. We destroy paper files containing personal health information by cross-cut shredding. We destroy electronic information by deleting it in a manner that it cannot be restored. When hardware is discarded, we ensure that the hardware is physically destroyed or the data is erased or overwritten in a manner that the information cannot be recovered.
The organization develops and maintains an internal complaint system and makes external recourse publicly available in order to be able to receive, investigate and respond to complaints. Every effort is made to investigate and decide a simple complaint within 30 days. For more complex complaints, the person investigating or deciding the complaint will advise the person making the complaint within 30 days of how long it will likely take to investigate and decide it.
While we will take precautions to avoid any breach of your privacy, if there is a loss, theft or unauthorized access of your personal health information we will notify you. Upon learning of a possible or known breach, we will take the following steps, as applicable:
Step 1: Respond immediately by implementing the organization’s privacy breach protocol.
Step 2: Containment: Identify the scope of the potential breach and take steps to contain it.
Step 3: Notification: Identify those individuals whose privacy was breached and notify them of the breach.
Step 4: Investigation and Remediation
Depending on the circumstances of the breach, we may notify and work with the Information and Privacy Commissioner of Ontario. If we take disciplinary action against one of our practitioners (or revoke or restrict the privileges or affiliation of one of our practitioners) for a privacy breach, we are required to report that to the practitioner’s regulatory College. We may also report the breach to the relevant regulatory College if we believe that it was the result of professional misconduct, incompetence or incapacity.