top of page

What We

The Baby Boy Project

Empower Minority Males Through Our "Baby Boy Project"

The "Baby Boy Project" works Soley off of donations and volunteers. 

Please contact us to Donate or see our Support Us Page to donate!

Respite Services

Respite Care services are designed to assist individuals who are unable to independently care for themselves. These services are offered for a temporary and limited duration, typically when the regular caregivers or family members responsible for the participant's care require relief or are temporarily absent. The aim of Respite Care is to provide a brief but essential break to primary caregivers, allowing them to tend to their own needs, rest, and rejuvenate.

Family Training & Support

Training and Support for the Unpaid Caregiver, commonly referred to as Family Support and Training (FST), is a service provided for an individual who is providing unpaid support, training, companionship or supervision for the youth. The intent of the service is to provide education and support to the caregiver that preserves the family unit and increases confidence, stamina and empowerment.

Habilitation Support

The primary objective of Habilitation services is to elevate the participant's overall level of functioning, enrich their quality of life, and facilitate the development and utilization of effective social skills. 

Skills Training and Development

Skills Training and Development is a process that includes in-person interactions with a member and/or their family or caregivers. This process aims to help the member acquire skills such as self-care, daily life management, and problem-solving. These skills are developed in individual or group settings, taking place at home or within the community. The main focus is on overcoming psychological and social obstacles.

Confidentiality Policy

At Identity Outreach Program Corp., we are committed to maintaining the privacy and confidentiality of all clients accessing our mental health services. We recognize the sensitive and personal nature of the information shared during the course of treatment, and we adhere to the following guidelines to safeguard the confidentiality of our clients.

1. Privacy Protection: All client information, including personal details, assessments, treatment plans, and progress notes, will be kept secure and protected from unauthorized access.

2. Confidentiality Agreement: All staff, volunteers, and affiliated professionals associated with Identity Outreach Program Corp., are required to sign a confidentiality agreement, pledging to uphold the strict confidentiality of client information.

3. Limits of Confidentiality: While we prioritize confidentiality, there are specific situations where we may be legally or ethically obligated to breach confidentiality. These include instances where there is a risk of harm to the client or others, suspected abuse or neglect of a minor, or when required by court order or law.

4. Informed Consent: Clients or their legal guardians will be informed of the limits of confidentiality during the intake process. They will have the opportunity to provide informed consent regarding the disclosure of certain information in cases where it is necessary for the client's well-being.

5. Sharing of Information: With the client's consent, we may collaborate and share relevant information with other professionals or agencies involved in their care to ensure a coordinated and comprehensive approach to treatment.

6. Data Protection: We follow applicable data protection laws and regulations to ensure the confidentiality and security of electronic and paper-based client records. 7. Training and Awareness: All staff and volunteers receive ongoing training and guidance on maintaining client confidentiality and the importance of privacy protection.

8. Client Rights: Clients have the right to access their own personal information and request corrections or updates when necessary.

9. Retention and Disposal: Client records will be retained in accordance with applicable laws and regulations and disposed of securely once they are no longer required.

bottom of page