Technology & Private Practice: Understanding the Legal & Ethical Challenges Bianca Puglia, Ph.D., LPC, NCC/Puglia Counseling Services Panagiotis Markopoulos,

Slides:



Advertisements
Similar presentations
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
Advertisements

HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
NAU HIPAA Awareness Training
Voice over the Internet Protocol (VoIP) Technologies… How to Select a Videoconferencing System for Your Agency Based on the Work of Watzlaf, V.M., Fahima,
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Privacy, Security, Confidentiality, and Legal Issues
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
TELEPSYCHOLOGY GUIDELINES Ohio Psychological Association Convention October 25, 2007.
ATA Practice Guidelines for Video- based Online Mental Health Services “The guidelines pertain to telemental health conducted between two parties, and.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Informed Consent and HIPAA Tim Noe Coordinating Center.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
Kenneth B Simons, MD Chair, WI MEB Chair, FSMB SMART Workgroup.
THE COMMUNICATIONS AND TECHNOLOGY COMMITTEE - OHIO PSYCHOLOGICAL ASSOCIATION Leading the Way in Developing Telepsychology Guidelines.
New Data Regulation Law 201 CMR TJX Video.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Providing Best Practice Compliance Solutions for Employer Groups.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
University Health Care Computer Systems Fellows, Residents, & Interns.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Issues in Supervision and Consultation Deborah Smith, PhD Michelle March, PhD Corey, 8e, © 2011, Brooks/ Cole – Cengage Learning.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
FERPA AND HIPAA COMPLIANCE AS COMMUNITY PARTNERS Written and presented by Nicole M. Thompson School Board Attorney, School Board of the City of Richmond.
Technology & Counseling Erie County School Counselors – January 21, 2009.
Western Asset Protection
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Corey, 8e, ©2011, Brooks/ Cole – Cengage Learning Chapter 9 Issues in Supervision and Consultation.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Installation and Maintenance of Health IT Systems System Security Procedures and Standards Lecture a This material Comp8_Unit6a was developed by Duke University,
Computers in the Ambulatory Care Setting
Protecting PHI & PII 12/30/2017 6:45 AM
FERPA AND HIPAA COMPLIANCE AS COMMUNITY PARTNERS
East Carolina University
The Ethics of Telepsychology
Privacy & Confidentiality
HIPAA.
By: Eamon Callahan and Wilston Johnston
HIPAA.
Health Insurance Portability and Accountability Act
Move this to online module slides 11-56
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
Final HIPAA Security Rule
Health Insurance Portability and Accountability Act
HIPAA Security Standards Final Rule
Drew Hunt Network Security Analyst Valley Medical Center
The Health Insurance Portability and Accountability Act
Presentation transcript:

Technology & Private Practice: Understanding the Legal & Ethical Challenges Bianca Puglia, Ph.D., LPC, NCC/Puglia Counseling Services Panagiotis Markopoulos, M.A., PLPC/Doctoral student, University of New Orleans

Code of Ethics & Technology 2014 ACA CODE OF ETHICS  H.1.a. Knowledge and Competency Counselors who engage in the use of distance counseling, technology, and/or social media develop knowledge and skills regarding related technical, ethical, and legal considerations (e.g. special certifications, additional course work).  H.2.a. Informed consent and disclosure Clients have the freedom to choose whether to use distance counseling, social media, and/or technology within the counseling process.  H.2.b. Confidentiality maintained by the counselor Counselors acknowledge the limitations of maintaining the confidentiality of electronic records and transmissions. They inform clients that individuals might have authorized access to such records or transmissions.  H.2.d. Security Counselors use current encryption standards within websites and/or technology-based communications that meet applicable legal requirements. Counselors take reasonable precautions to ensure the confidentiality of information transmitted through any electronic media.

Code of Ethics & Technology (cont.)  H.3. Client Verification Counselors who engage in the use of distance counseling, technology, and/or social media to interact with clients take steps to verify the client’s identity at the beginning and throughout the therapeutic process.  H.4.a. Benefits and Limitations Counselors inform clients of the benefits and limitations of using technology applications in the provision of counseling services. Such technologies include, but are not limited to, computer hardware and/or software, telephones and applications, social media and Internet-based applications and other audio and/or video communication, or data storage devices or media.  H.4.b. Professional Boundaries in Distance Counseling Counselors understand the necessity of maintaining a professional relationship with their clients. Counselors discuss and establish professional boundaries with clients regarding the appropriate use and/or application of technology and the limitations of its use within the counseling relationship (e.g., lack of confidentiality, times when not appropriate to use).  H.5.a. Records Counselors maintain electronic records in accordance with relevant laws and statutes. Counselors inform clients on how records are maintained electronically. This includes, but is not limited to, the type of encryption and security assigned to the records, and if/for how long archival storage of transaction records is maintained.

HIPPA COMPLIANCE  Privacy Rule -- Protection of individually identifiable health information. Three types of covered entities: a. Health Plans b. Health care clearinghouses c. Health care providers  Security Rule -- Confidentiality, Integrity, & availability of electronic protected health information (e-PHI).  What is “encryption”? “Encryption is the conversion of data into a form that cannot be read without the decryption key or password. It is important to encrypt data stored locally on your mobile device (data at rest) and data sent by your mobile device (data in motion) so that it is protected from unauthorized users” (healthit, 2016).

HIPPA COMPLIANCE (cont.)  Enforcement-OCR: The Security Rule requires covered entities to maintain reasonable and appropriate administrative, technical, and physical safeguards for protecting e-PHI.  Audits: What is going on currently? enforcement/audit/index.html#when

HIPAA Technology & Software  Certified Health IT Product List  Practice Management Software MER/ EHR (comprehensive service for all aspects of practice) Examples: MyClientsPlus; Simple Practice  Scheduling : Jituzu; Yellow Schedule  List of reviews of Software programs : software/ software/

HIPAA Technology & Software (cont.)  Flash drives: a) Golden Key with Secure Flash b) IronKey Medical Healthcare c) Kanguru Medical Healthcare f) CE Secure

HIPAA Technology & Software (cont.)  Cell Phones Remotely lock your cell-phone or erase-data from your cell phone a. Android device: your-android- phone/ b. iPhone device:

HIPAA Technology & Software (cont.)  Gatekeeper Wireless Bluetooth Computer Lock Black/dp/B016N9UVW8/ref=sr_1_2?ie=UTF8&qid= &sr=8- 2&keywords=gatekeeper+wireless+bluetooth+computer+lock  Cloud Storage Example:  HIPAA companies: 4secur HealthBI HushmailHushmail – offers free accounts Neomailbox Luxsci SendIncSendInc – offers free accounts More information at: companies/

HIPAA Technology & Software (cont.)  Videoconferencing Software

Distance Counseling Distance Counseling American Mental Health Counselors Association Code of Ethics  B.6 Telehealth, Distance Counseling and the Use of Social Media Counselors only engage in distance counseling when they are licensed in the state of the client. Counselors only provide distance counseling when they have had training, experience, and supervision to do so.  Types of Distance Counseling:  Mental health counselors should advise clients about the risks of exchanging s. It is recommended to include a disclaimer when sending s. Refer to the most update to date HIPAA regulations. transmissions are part of the client record; copies should be maintained in the client file.  Text messages: Text messages are not a secure form of communication therefore texting of personal information should be discouraged. Text messages are considered a part of the client record, and should be kept in the client file.  Online scheduling: Any online scheduling software should be encrypted and secure. If not, counselors should disclose to clients the fact that the software is not encrypted and therefore is not confidential.  Chat Rooms: Counselors should not include chat rooms, because these may imply that a counselor is able to intervene in the event that a crisis is mentioned.

Distance Counseling (cont.)  Distance Counseling (cont.) a. American Association of State Counseling Boards (AASBB) b. State Counseling Boards

Useful Resources WEBSITES  A) Healthit.gov (HIPAA and Health IT)  B) U.S. Department of Health & Human Services Health Information Technology technology/index.html  Healthcare Dive (Healthcare & Health IT News)

Useful Resources (cont.) LISTERVS  OCR Privacy & Security Listservs: A) Privacy List Serv Visit the OCR-PRIVACY-LIST for a summary of archived announcements OCR-PRIVACY-LIST -OR- Subscribe, delete or update your subscription to the OCR Privacy Listserv  B) Security List Serv Visit the OCR-SECURITY-LIST for a summary of archived announcements OCR-SECURITY-LIST -OR- Subscribe, delete or update your subscription to the OCR Security Listserv

Q&A

Contact Information  Bianca Puglia, Ph.D., LPC, NCC Puglia Counseling Services  Panagiotis Markopoulos, M.A., PLPC Doctoral student, University of New Orleans

References  American Mental Health Counselor Association. (2015). Code of ethics. Retrieved from  Healthit.gov. (2016). What is encryption? Retrieved from  Herlihy, B., & Corey, G. (2014). ACA ethical standards casebook (7 th ed.). Alexandria, VA: American Counseling Association.  U.S. Department of Health and Human Services. (2016). HIPAA for professionals. Retrieved