How to Have an Ethical and HIPAA-Compliant Web Presence Episode 2: Message Boards, Social Media, and Listservs

1 CE Credit Hour. Legal-Ethical. Continuing Education Session Replay

Developed by: Roy Huggins, LPC NCC
Presented By: Roy Huggins, LPC NCC; Liath Dalton

Course Description

Spider on a Web

In this session, we answer commonly-asked questions about legal-ethical considerations around social media for professional purposes and also for personal purposes as a professional who needs to consider issues of boundary ethics.

This presentation is developed and presented at a beginner level for counselors, marriage and family therapists, clinical social workers, and counseling and clinical psychologists. We will help learners understand primary considerations and sound risk management solutions for using social media networks including Facebook, LinkedIn, and Twitter. We will also discuss similar issues as they arise in the use of professional email listservs.

Educational Objectives

  • Separate personal and professional online presences according to professional ethics codes and guidelines
  • Use social media discussion fora to elicit referrals and other professional help while maintaining ethics and HIPAA-compliance considerations
  • Describe confidentiality and boundary ethics considerations in using professional messaging boards, groups, and listservs

Syllabus

  1. What social media services are mental health professionals using personally and professionally?
    • Overview of common social networks
    • How do clinicians use them professionally and personally?
  2. How are mental health professionals using social media services for professional purposes and what are the ethical benefits and risks?
    • Consultation and referral requests
    • Discussion of professional news and issues
    • Discussing fees
    • Using online discussion groups and email listservs
  3. Are any social media networks more or less ethically risky than others?
    • Ethics code references that explicitly cover use of social media
    • The basic ethical risks that arise when using social media
    • Common ethical pitfalls in each network
  4. What technical and behavioral steps can and can’t be taken to reduce the risk of ethical violations in social media?
    • Privacy settings
    • Moderating comments
    • “Professionalism-compatible” posting and behavio

References

  • American Association of Marriage and Family Therapists. (2015). Code of Ethics . Alexandria, VA: Author.
  • American Counseling Association. (2014). ACA Code of Ethics. Alexandria, VA: Author.
  • American Psychological Association. (2010). American Psychological Association Ethical Principles of Psychologists and Code of Conduct . Washington, DC: Author.
  • National Association of Social Workers. (2017). Code of Ethics . Washington, DC: Author.
  • National Board for Certified Counselors. (2012). Code of Ethics . Greensboro, NC: Author.
1 CE Credit Hour.
$19.00

Presented/Developed By

Roy Huggins, LPC NCCRoy Huggins, LPC NCC, is a counselor in private practice who also directs Person-Centered Tech. Roy worked as a professional Web developer for 7 years before changing paths, and makes it his mission to grow clinicians’ understanding of the Internet and other electronic communications mediums for the future of our practices and our professions.

Roy is an adjunct instructor at the Portland State University Counseling program where he teaches Ethics, and is a member of the Zur Institute advisory board. He has acted as a subject matter expert on HIPAA, security and clinical use of technology for Counseling licensure boards and both state and national mental health professional organizations. He has co-authored or authored 2 book chapters, and he routinely consults with mental health colleagues on ethical and practical issues surrounding tech in clinical practice. He served for 5 years on the board of the Oregon Mental Health Counselors Association and then the Oregon Counseling Association as the Technology Committee Chair.

He really likes this stuff.

Liath Dalton is a Ph.D candidate in Religious Studies. She began her academic career at Reed College and continued her graduate work at the University of Cape Town.

Liath is the Deputy Director for Person Centered Tech and runs our HIPAApropriateness review program. Through her combination of experience evaluating products for their utility and security in regards to how they can meet risk management needs and providing guidance to members around what product options will best meet their specific practice needs, Liath has an intimate knowledge of both what the practice tech needs are for mental health professionals and what it takes for a product to meet those needs.

Program Notices

Accuracy, Utility, and Risks Statement: The contents of this program are based on publications and reports from the federal Department of Health and Human Services and consultation with experts on HIPAA Security standards and their implementation; statements from ethics committee authorities at the major professional associations; and personal study from the program developers. Some interpretation and analysis presented is made by the presenter, in consultation with knowledgeable colleagues and expert consultants. Statements about applications to technology are according to presenter’s understanding of the technology at the time of the program. The presenter may not know how to apply all principles discussed to every technology type or product. This program discusses strategies for complying with HIPAA and covered ethics codes. It may not include information on all applicable state laws. Misapplication of the materials, or errors in the materials, could result in security problems, data breaches, or non-compliance with applicable laws or ethics codes.

Conflicts of Interest: None.

Commercial Support: None.

This course is subject to our cancellation/refund policy and complaint policy.

1 CE Credit Hour.
$19.00
Spider on a Web

1 CE Credit Hour. Legal-Ethical. Continuing Education Session Replay

$19.00

You are not currently logged in to this site. Need to log in? Click here→