Can I do telemental health with clients in other countries? What does insurance want from therapists who work online? All these and more will be answered!
In tech circles, “cloud” does have a rather specific meaning. For our purposes, however, we’ll define “the cloud” this way: “The Cloud” = “Other People’s Computers” Cloud services center around providing software services — and sometimes information storage services — on computers in well-connected data centers. Some Examples If you’re not sure whether or not […]
Windows and Macintosh computers allow you to make separate user accounts for everyone who might use the device. The Windows Surface tablet also allows this. So wherever you can make separate accounts for people, you should do so. Keeping It Separated There are a couple advantages to creating unique user accounts for everyone who might […]
As we’ve already stated several times in this training, therapists tend to be highly focused on the confidentiality of information and thus can easily forget about its availability. Antimalware, firewalls, and trusted WiFi can protect availability of information a little bit. However, the most reliable method, by far, of protecting information availability is to keep […]
If your computer touches protected health information at all, you want to make sure it is using antimalware software and a firewall. Also, at this point, let’s recognize that smartphones and tablets (e.g. iPads and Android tablets) are computers. So when we say “computer,” we mean everything that is computer-like. Antimalware Antimalware is software that […]
When it comes to good security (and HIPAA compliance), authentication is the lesser-known cousin to encryption. Authentication is best known as passwords. It is much more than just passwords, however, and the HIPAA Security Rule standards hold it up high as a security concept of great importance.
Everyone loves apps these days, and mental health practices are no exception. One thing that remains a conundrum, however, is how to evaluate when a service is appropriate for your HIPAA needs. That’s why we created this handy-dandy guide, all with checklists and evaluation questions for you to employ.
What does HIPAA consider to be “personally identifying information”? Will the deidentification techniques we learned in grad school ethics classes (e.g. using clients’ initials instead of full names) be enough for HIPAA?
Some clinicians who use Android phones for their practices may have suffered a client privacy breach to Facebook Messenger. We explain what happened and what to do about it.
If you’ve considered becoming a full member of Person Centered Tech, there’s never been a better time than now to join! We have just added monthly payment plans, and the Middle Adopter tier of membership is about to close to new members on March 31st. The membership service is finally becoming what we always intended […]