Engaging in HIPAA Security and Digital Confidentiality as a Mental Health Professional

Course Materials

What You Already Know About Security
How to Tune in Emotionally
Your Risk Management Lens
The Ethical and Legal Context
Module 1 Wrap Up
Module 2: Grasping the Basics of HIPAA Security Rule Compliance
Covered Entity Status
What the HIPAA Security Rule Says
Steps to HIPAA Security Compliance
Who/What Can Be HIPAA-Compliant?
Personally-Identifying Information
Business Associates and Business Associate Agreements
What the HIPAA Security Rule’s Scope Means to You
Workforce Management Standards
Module 2 Wrap Up
Module 3: Understanding Basic Technical Concepts
Moving vs. Sitting Data
What Is the Internet?
What Is Encryption?
What Is Authentication?
Tie in to HIPAA and Ethics
Module 3 Wrap Up
Module 4: Using Email, Text, Phone, and Video in a HIPAA-Compliant Manner
Types of Email
Different Ways to Text
Secure vs. Nonsecure Communication
Types of Phone Service
Videoconferencing Options
Your Communications Policy
Module 4 Wrap Up
Module 5: Handling Security Incidents and Breaches
Incidents vs. Breaches
Safe Harbor from Breach Reporting
Let Breach Notification Serve as Your Guide
Module 5 Wrap Up
Module 6: Protecting Your Technological Devices
Potential Threats
Digitally Protecting Your Devices
Using Encryption
Using Secure WiFi
Backing Up Your Data
Choosing Unique Logins
Physically Protecting Your Devices
Module 6 Wrap Up
Module 7: Using Cloud Services Effectively and Safely
What Is the Cloud?
How Safe Is the Cloud?
Advantages of Cloud Services
Your Role in Cloud Security
Data Synchronization
Financial Institutions in the Cloud
Module 7 Wrap Up
Module 8: Analyzing Information Risks
Trace the Information
Assess the Technology
Engage in Compliance
Module 8 Wrap Up
Course Wrap Up

Engaging in HIPAA Security and Digital Confidentiality as a Mental Health Professional

9 CE Hours. Legal-Ethical CE. Self-Study Course. 

Developed and presented by Roy Huggins, LPC NCC

CE Approvals by the American Psychological Association (APA), the National Board for Certified Counselors (NBCC), and
Ohio CSWMFT, and the Texas Counseling and Social Work Boards
California clinicians: CE approval is through APA and NBCC

This course will help you unlock your inherent superpowers and harness the technology ninja skills that have long been dormant in you…until now!

kid superhero wearing a cape

$219.00
This course is included with our membership at no additional cost! View membership options and save money here.
You are not currently logged in to this site. Need to log in? Click here→

Digital technology has never before held such incredible promise for running a mental health practice and serving our clients. At the same time, however, it has never carried such a myriad of difficult-to-perceive risks around our clients’ privacy, our clinical boundaries, and potential liability for our practices.

Both HIPAA and mental health professional ethics have laid out extensive standards and rules for handling this world of high potential reward and numerous potential pitfalls. For mental health professionals, however, applying those abstract standards to the real world of modern practice tech is a big leap. This course will not only help you make that leap with concrete guidance and help, but it will also teach simple and essential conceptualization skills that will “teach you to fish.” It will empower you to perform the necessary tasks of complying with HIPAA’s Security Rule and protecting clients and your practice.

This is a comprehensive, introductory-level course for counselors, marriage and family therapists, clinical social workers, and counseling and clinical psychologists to support HIPAA Security compliance with particular attention to technology and digital ethics. The course uses a combination of video, articles, and learning activities with the intention that you can apply what you learn in order to perform partial risk analysis, and to make choices around technology adoption/use that will enable you to achieve and maintain compliance with the HIPAA Security Rule and relevant ethical codes.

9 CE Hours. Self-Study Course.

Educational Objectives

  • Describe the most effective personal way to approach security and risk management
  • Explain the terminology involved in the HIPAA Security Rule and the steps to compliance
  • Identify the most basic technical concepts that you must be able to apply in order to navigate HIPAA security and digital confidentiality
  • State guidelines for using email, text, phone, and video in a HIPAA-compliant manner
  • Explain how to handle security incidents and breaches, including notification
  • Describe how to protect against common threats to the technological devices you may use in practice
  • Identify ways to use cloud services to maximize effectiveness in practice as well as maintain HIPAA compliance
  • Explain how to apply knowledge of HIPAA, technology, and data transmission to effectively analyze risks to the security and privacy of client information
  • List the components of a risk analysis process

Syllabus

  1. Getting Into a Security Mindset
    • Relating your existing skillset around security to the HIPAA way of doing security.
    • Emotional norming regarding how you relate to security activities and to security regulations.
    • Relating your existing risk management skills to the way HIPAA uses risk management.
    • Explaining our ethical and legal contexts for engaging in security activities.
  2. Grasping the Basics of HIPAA Security Rule Compliance
    • Determining who is subject to HIPAA
    • Learning what the HIPAA Security Rule requires
    • Performing the steps to become compliant with HIPAA’s Security Rule
    • Critically analyzing what it means when a product says it is “HIPAA Compliant”
    • Determining what kind of information is personally identifying
    • Understanding Business Associates and Business Associate Agreements
    • Grasping the scope of HIPAA as it pertains to your practice
    • Learning HIPAA Security’s workforce management standards
  3. Understanding Basic Technical Concepts
    • Conceptualizing the difference in HIPAA Security standards for “data in motion” vs. “data at rest”
    • Conceptualizing an Internet transmission and how it impacts HIPAA Security standards
    • Conceptualizing encryption and its application to HIPAA Security Standards
    • Conceptualizing authentication and its application to HIPAA Security Standards
  4. Using Email, Text, Phone, and Video in a HIPAA-Compliant Manner
    • Comparing the different types of secure (and nonsecure) email
    • Understanding what is meant by “texting” and how it impacts HIPAA compliance
    • HIPAA and ethical standards of secure communication vs nonsecure communication with clients
    • Comparing the different types of phone service and their relationship to HIPAA Security standards
    • Understanding videoconferencing options and their relationship to HIPAA Security standards
    • Using Communications Policies with clients for ethical and HIPAA-compliance purposes
  5. Handling Security Incidents and Breaches
    • Understanding how a security “incident” becomes a security “breach”
    • Qualifying for the safe harbor in HIPAA’s breach notification rule
    • Using HIPAA’s breach notification rule to guide compliance strategy
  6. Protecting Your Technological Devices
    • Identifying potential threats to the security of protected health information on your devices
    • Digitally protecting your devices to comply with HIPAA Security standards
    • Using encryption to protect information on your devices and comply with HIPAA Security standards
    • Using secure WiFi to protect information on your devices and comply with HIPAA Security standards
    • Backing up your data to protect information on your devices and comply with HIPAA Security standards
    • Choosing unique logins to protect information on your devices and comply with HIPAA Security standards
    • Physically protecting your devices to protect information on your devices and comply with HIPAA Security standards
  7. Using Cloud Services Effectively and Safely
    • Understanding what “the cloud” is
    • Evaluating cloud services for security
    • Using cloud services to help achieve HIPAA Security compliance
    • Doing your part to keep your cloud services secured to HIPAA Security standards
    • Identifying and using (or preventing) “data synchronization” to achieve HIPAA Security standards
    • Learning how financial services in the cloud relate to HIPAA Security and the Business Associate Rule
  8. Analyzing Information Risks
    • Tracing where your information is
    • Assessing your technology
    • Engaging in HIPAA Security Rule compliance

$219.00
This course is included with our membership at no additional cost! View membership options and save money here.
You are not currently logged in to this site. Need to log in? Click here→

Course Author/Presenter

Roy Huggins, LPC NCCRoy Huggins, LPC NCC, is a counselor in private practice who also directs Person-Centered Tech. Roy worked as a professional Web developer for 7 years before changing paths, and makes it his mission to grow clinicians’ understanding of the Internet and other electronic communications mediums for the future of our practices and our professions.

Roy is an adjunct instructor at the Portland State University Counseling program where he teaches Ethics, and is a member of the Zur Institute advisory board. He has acted as a subject matter expert on HIPAA, security and clinical use of technology for Counseling licensure boards and both state and national mental health professional organizations. He has co-authored or authored 2 book chapters, and he routinely consults with mental health colleagues on ethical and practical issues surrounding tech in clinical practice. He served for 5 years on the board of the Oregon Mental Health Counselors Association and then the Oregon Counseling Association as the Technology Committee Chair.

He really likes this stuff.

Course Materials Co-Developer

Kelly ArthurKelly Arthur, MA, MS, NCC, LPC & LMFT Intern, CADC I is a therapist in private practice in Portland. She moonlights as Person Centered Tech’s instructional designer, drawing from a skill base that hearkens back to her former life in corporate America.

Arthur leveraged her graduate-level training and extensive experience in instructional design to create the structure, learning objectives, and review exercises for this course.

Accuracy, Utility, and Risks Statement: The contents of this program are based primarily on publications from the federal Department of Health and Human Services, and on the ethics codes of these professional organizations: AAMFT, ACA, APA, NASW, NBCC. Contents are also guided by statements from leadership in those organizations. Some interpretation and analysis presented is made by the presenter, in consultation with knowledgeable colleagues and expert consultants. Statements about applications to technology are according to presenter’s understanding of the technology at the time of the program. The presenter may not know how to apply all principles discussed to every technology type or product. This program discusses strategies for complying with HIPAA and covered ethics codes, and for improving security. It may not include information on all applicable state laws. Misapplication of the materials, or errors in the materials, could result in security problems, data breaches, or non-compliance with applicable laws or ethics codes.

Conflicts of Interest: Person Centered Tech sells services and tools for HIPAA compliance, including a risk analysis tool and security policies and procedures templates.

Commercial Support: This program has no commercial support.

This course is subject to our cancellation/refund policy and complaint policy.

ACEP LogoPerson Centered Tech, LLC is approved by the American Psychological Association to sponsor continuing education for psychologists. Person Centered Tech, LLC maintains responsibility for this program and its content.

ACEP LogoPerson-Centered Tech, LLC has been approved by NBCC as an Approved Continuing Education Provider, ACEP No. 6582. Programs that do not qualify for NBCC credit are clearly identified. Person-Centered Tech, LLC is solely responsible for all aspects of the programs.

State Approvals

Pre-approved by the Texas Social Work Board (#6357) and Texas Counseling Board (#1883)

Ohio CSWMFT Pre-Approved Provider #: RCST071601

California clinicians: CE approval is through APA and NBCC.


$219.00
You are not currently logged in to this site. Need to log in? Click here→