As we’ve already stated several times in this training, therapists tend to be highly focused on the confidentiality of information and thus can easily forget about its availability. Antimalware, firewalls, and trusted WiFi can protect availability of information a little bit. However, the most reliable method, by far, of protecting information availability is to keep […]
If your computer touches protected health information at all, you want to make sure it is using antimalware software and a firewall. Also, at this point, let’s recognize that smartphones and tablets (e.g. iPads and Android tablets) are computers. So when we say “computer,” we mean everything that is computer-like. Antimalware Antimalware is software that […]
When it comes to good security (and HIPAA compliance), authentication is the lesser-known cousin to encryption. Authentication is best known as passwords. It is much more than just passwords, however, and the HIPAA Security Rule standards hold it up high as a security concept of great importance.
Everyone loves apps these days, and mental health practices are no exception. One thing that remains a conundrum, however, is how to evaluate when a service is appropriate for your HIPAA needs. That’s why we created this handy-dandy guide, all with checklists and evaluation questions for you to employ.
What does HIPAA consider to be “personally identifying information”? Will the deidentification techniques we learned in grad school ethics classes (e.g. using clients’ initials instead of full names) be enough for HIPAA?
Some clinicians who use Android phones for their practices may have suffered a client privacy breach to Facebook Messenger. We explain what happened and what to do about it.
If you’ve considered becoming a full member of Person Centered Tech, there’s never been a better time than now to join! We have just added monthly payment plans, and the Middle Adopter tier of membership is about to close to new members on March 31st. The membership service is finally becoming what we always intended […]
HIPAA requires all practices to create security policies and procedures as part of the compliance process. What does that look like for different practices, and how is it accomplished? Therapy tech expert Roy Huggins, LPC NCC explains.
The world of email is getting better at creating secure and HIPAA-friendly ways to use the communication method. We show you the 3 types of email security so you can make an informed choice.
If your computer touches protected health information at all, you want to make sure it is using full device encryption. Let’s recognize that smartphones and tablets (e.g. iPads and Android tablets) are computers. So when we say “computer,” we mean everything that is computer-like. Full-Device Encryption, or “FDE” FDE can actually stand for […]