Hello! I’m Roy of Person Centered Tech. We know that you want to focus on your clients, so we provide articles, tools, and continuing education on how to best serve clients in the digital world.

(Sign up for other free articles addressing topics such as: telemental health, HIPAA, and practical technology tools!)


Excited Woman Working At Desk In Design StudioWhen the HITECH Act was enacted in 2009, it introduced to HIPAA a fun concept called “breach notification.” In effect, that means that when a security “breach” happens — such as a laptop with health records on it being stolen or lost — the affected clients need to be notified as does the federal government. If breach notification is your bag, you can read all about HIPAA’s breach notification rule in our article here.

Laptops and other mobile devices get stolen or lost rather frequently. However, there are great ways to secure these devices so that even if they are stolen, the bad guy can’t reasonably get in. Given that fact, shouldn’t there be some exception to the breach notification rule if the lost computer or smartphone is really well secured?

As you probably guessed, there is such an exception in the breach notification rule. That kind of exception is called a “safe harbor.” This safe harbor applies to more than just computers, of course. And, quite importantly, it only affects breach notification. That’s a pretty big deal, however. If your computer is secured to the safe harbor’s standards, and you lose it or it gets stolen, not having to report that breach to anyone can be a real life saver!

Sounds great! How do I get the safe harbor conditions on my computer or phone?

The safe harbor is attained by making all the health information on the computer or smartphone totally unreadable — and that means encryption.

We can’t just use any encryption, however. Legal safe harbor standards in general are an “A+” level of standard.

Enter “full device encryption.” Accept no substitutes and don’t settle for anything less. This means that every little bit and byte on your computer or phone is encrypted and only your one special encryption password can unlock it all, regardless of what any bad guy does to try to get in.

So how do I get full device encryption on my stuff? How much is this going to cost me??

Woman on couch with laptop being excitedIt could very well be free!

If you have a Mac whose operating system isn’t several years old, you can get full disk encryption simply by going to your security settings and activating FileVault2. 

For Windows, there is also an encryption program called Bitlocker. You can’t buy BitLocker separately. It only comes with the Pro version of Windows. In our experience, most therapists need to upgrade their Windows to the Pro version in order to get BitLocker.

On an iPhone, you simply need to set a strong passcode. That’ll do it. On Android phones, you need to turn on encryption in the security settings. And, of course, you need to set a strong passcode. Encryption on smartphones requires a little more thought and preparation than on computers, but it still works well. If you’re not sure about it’s effectiveness, see our article on why FBI vs. Apple was important for health care providers all over the US.

This free, informative article is brought to you by Hushmail,
who is offering our readers 15% off for life!
Wondering why this is here? See our sponsorship policy for details.

Hushmail Image

Roy with coffee mugRoy says: Hushmail is one of several secure email options that serves health care practitioners like us. Hushmail is highly trusted, affordable, includes secure forms for your web page, and has earned a recommendation from us for use by mental health professionals. Learn more about Hushmail for Healthcare and get 15% off for life.
(Disclosure: Roy now does a small amount of consulting for Hushmail to make their product better for mental health professionals.)

So you said that cheap or free software is the “good news.” Is there bad news?

The semi-bad news is that setting up full disk encryption is sometimes something you want skilled help with. If you’ve got a good tech helper, ask them to set it up with you. Or you can go to a professional geek or your local Apple store for assistance.

Also, the downside of full disk encryption is that it might be harder to share your computer with others. Remember that unlocking the whole machine will require your password every time you turn on the computer. You can certainly work around this, but it will require planning.

So that’s it? I just install the software and I get the safe harbor?

Lovely HarborIt’s almost that simple. Of all the techie things you can do to protect your clients’ information, full-disk encryption is probably the easiest and least expensive way to simplify your security efforts. You do still need to behave in ways that support the encryption, though. For example, the encryption is unlocked while you’re using your devices. You need to lock it up again in order to qualify for the safe harbor.

Those details are a little outside the scope of this article. We discuss them a lot in our courses and in our weekly Office Hours, however.

We have developed a 1-hour CE course, as well as a number of walkthrough videos, to make it as easy as possible for therapists to achieve the easiest and most effective security methods they can for their computers and smartphones. Guidance on using full-disk encryption, plus walkthrough videos that explicitly show you how to set it up on your computer, are included in the course. The course is called HIPAA Investigation Repellent: Easy Ways to Prevent Most Security Breaches.

However you find your way to getting your gear qualified for the safe harbor in HIPAA’s breach notification rule, we strongly encourage you to do it. If all of us start using encryption in this simple and easy way, our clients and our society will be much safer.

 

Kiddo with hand on tablet screenIt’s Not Too Late to Join Our Telemental Health Certificate Program Live Trainings!

Get certification of completing a standards-based telemental health program taught by one of the top experts in the nation.

Learn More


Person Centered Tech: we will demystify the legal and technical topics that are required of your profession and provide you with education and tools required to help make your business successful for you, and digitally safe for your clients. PCT is here to help you achieve your personal gold standard of client-centered care in privacy and security.


Person Centered Tech’s membership filters the noise of technology through education, customizable tools, expert consulting with direct answers and tried and tested recommendations to provide you with a clear, manageable pathway to provide excellence in care — all while you get your CE hours!


Get Our Articles and Free Resources by Email

green arrow pointing down Sign up to get authoritative articles in your Inbox, our whole collection of mental health private practice forms for tech ethics and HIPAA, consent forms for email and texting, 2 free CE hours, and much more!