approaches designed for in-person implementation when providing services. c. Therapists must maintain the integrity of the application of the testing and assessment process and procedures when using telecommunication technologies. When a test is conducted via teletherapy, therapists must ensure that the integrity of the psychometric properties of the test or assessment procedure, including reliability and validity, and the conditions of administration indicated in the test manual are preserved when adapted for use with such technologies. d. Therapists must be cognizant of the specific issues that may arise with diverse populations when administering assessment measures and make appropriate arrangements to address those concerns, such as language or cultural issues; cognitive, physical, or sensory skills or impairments; or age may impact assessment. In addition, therapists must consider the use of a trained assistant, or proctor, to be on premise at the remote location in an effort to help verify the identity of the client(s), provide needed on-site support to administer certain tests or subtests, and protect the security of the testing and/or assessment process. e. Therapists must use test norms derived from telecommunication technologies administration if such are available. Therapists must recognize the potential limitations of all assessment processes conducted via teletherapy and be ready to address the limitations and potential impact of those procedures. f. Therapists must be aware of the potential for unsupervised online testing, which may compromise the standardization of administration procedures and take steps to minimize the associated risks. When data are collected online, security should be protected by the provision of usernames and passwords. Therapists must inform their clients of how test data will be stored and the electronic database that is backed up. Regarding data storage, ideally secure test environments use a three-tier server model consisting of an internet server, a test application server, and a database server. Therapists should confirm with the test publisher that the testing site is secure and that it cannot be entered without authorization. g. Therapists must be aware of the limitations of “blind” test interpretation, that is, interpretation of tests in isolation without supporting assessment data and the benefit of observing the test taker. These limitations include not having the opportunity
to make clinical observations of the test taker, such as test anxiety, distractibility, or potentially limiting factors such as language, disability, or to conduct other assessments or interviews that may be required to support the test results. standards as all other technology-assisted services. Telesupervision must be held to the same standards of appropriate practice as those in in-person settings. b. Before using technology in telesupervison, supervisors must be competent in the use of those technologies. c. Supervisors must take the necessary precautions 18. Telesupervision a. Therapists must hold supervision to the same to protect the confidentiality of all information transmitted through any electronic means and maintain competence. d. The type of communications used for telesupervision must be appropriate for the types of services being supervised, the clients and the supervisee needs. e. Telesupervision is provided in compliance with the supervision requirements of the relevant jurisdiction(s). Supervisors must review state board requirements specifically regarding face-to-face contact with supervisee as well as the need for having direct knowledge of all clients served by their supervisee. f. Supervisors must: g. (i) determine that telesupervision is appropriate for supervisees, considering professional, cognitive, cultural, intellectual, emotional, and physical needs h. (ii) inform supervisees in writing of the potential risks and benefits associated with telesupervision and of both the supervisor’s and supervisees' responsibilities for minimizing such risks. i. (iii) ensure the security of their communication medium j. (iv) only commence telesupervision after appropriate education, training, or supervised experience using the relevant technology. k. Supervisors must be aware of statutes and regulations of relevant jurisdictions regarding sexual interactions with current or former supervisees. l. Communications may be synchronous or asynchronous. Technologies may augment traditional in-person supervision, or be used as stand-alone supervision. Supervisors must be aware of the potential benefits and limitations in their choices of technologies for particular supervisees in particular situations.
EMERGENCY PLANS TO SAFEGUARD TELEMENTAL HEALTH SERVICES
Contingency plans must be developed, written, and signed that give consent to service as well as outline procedures to handle technical difficulties and/or crisis situations. If the counselor or therapist is not in the same location as the client or family, then there must be a plan to handle emergency situations in the client’s home or employment area. This requires that the practitioner identifies and collaborates with professional contacts in facilities that are immediately available to assist the client, if needed. These resources should include professional colleagues’ contact information, crisis hotlines, mental health outreach programs, clinics, hospitals, mental health facilities, and law enforcement agencies. These contacts must also be shared with clients and included in their treatment or counseling plans. Procedures that effectively outline when and how
to contact these resources, as well as when to call 911, must be written out and discussed with the client. Crisis contingency plans must also be included in the informed consent documents signed by the client. Any informed consent would include the client’s understanding of all of the risks involved in technology, long-distance service, and HIPAA outlines the national standards developed by the Department of Health and Human Services (HHS, 2016) to secure electronic protected health information (ePHI) that is “created, received, used, or maintained by a covered entity.” The security of a client’s health information may be at risk when using mobile devices because the data is stored within the device in its onboard memory through the implementation of the crisis plan. HIPAA Standards for Mobile Devices
Page 29
Book Code: PCUS1525
EliteLearning.com/Counselor
Powered by FlippingBook