Last updated:

File Encryption for Counselors: Protecting Client Trust & HIPAA Compliance

The therapeutic alliance relies entirely on one core promise: confidentiality. In the analog days, a locked filing cabinet in a soundproof office was usually enough to keep that promise. But in a digital practice, the “locked door” has become much harder to define.

While most therapists rely on secure Electronic Health Records (EHRs) for daily notes, the reality is that file encryption for counselors involves much more than just your EHR login. You likely generate countless files outside that system—court letters drafted in Word, intake forms saved to your desktop, or archived records on external drives.

These “homeless” files are your biggest vulnerability.

The stakes are higher than ever. According to the Astra Security 2024 report, 56% of all cyber insurance claims came from small-to-medium businesses (SMBs), with healthcare practices being frequent targets. Hackers don’t just target hospitals; they target anyone with valuable data.

This guide walks you through exactly how to secure your digital practice, satisfy HIPAA and ACA ethics, and protect your clients’ most sensitive data using simple file encryption.

Many counselors view data security as an IT annoyance, but it is fundamentally a matter of professional ethics and legal standing.

The ACA Code of Ethics

The American Counseling Association (ACA) is explicit about digital security. Section H.2.d of the Code of Ethics mandates that counselors must use encryption and security measures when transmitting or storing confidential information electronically. Failing to encrypt sensitive files isn’t just a technical oversight; it is an ethical violation that can jeopardize your licensure.

HIPAA & The “Addressable” Myth

A common misconception regarding the HIPAA Security Rule is the term “addressable.” Many private practitioners interpret this as “optional.” This is dangerous.

“Addressable” simply means you have flexibility in how you implement a safeguard, provided it is reasonable and appropriate. Legal experts note that in 2025, claiming encryption is “not reasonable” is virtually impossible. With the low cost and high availability of modern tools, encryption is effectively a requirement. If you experience a breach and your files were unencrypted, regulators will likely view this as “willful neglect.”

The Real Cost of Non-Compliance

The financial risks are staggering. According to the 2024 HPSO Counselor Liability Report, the average cost of a professional liability claim involving a data breach has risen to $157,492.

Beyond the fines, there is the reputational devastation. HIPAA’s Breach Notification Rule requires you to notify every affected client if their unencrypted data is exposed. Sending a letter to your clients admitting that their deepest traumas may be in the hands of hackers is a conversation no therapist wants to have.

Where Counselors Are Most Vulnerable (Beyond the EHR)

You might be thinking, “I use SimplePractice or TherapyNotes, so I’m safe.” While your EHR is secure, your vulnerability lies in “Shadow IT”—the files and processes that exist outside that secure ecosystem.

The “Shadow IT” Problem

Data leaks often happen in the mundane workflows of private practice:

  • Downloading archived records to your “Downloads” folder.
  • Drafting letters to courts, psychiatrists, or lawyers in Microsoft Word.
  • Keeping raw psychotherapy notes (process notes) separate from the medical record on your local drive.

Real-World Scenario: The Cloud Sync Error

Consider Dr. Elena, a private practice psychologist. She diligently synced her “My Documents” folder to a standard cloud service for backup. She didn’t realize this folder included a subfolder of “Psychotherapy Notes.”

When her cloud account credentials were compromised in a phishing attack, the hackers gained access to unencrypted PDFs of her most sensitive session notes. Because Dr. Elena relied on the cloud provider’s standard encryption (encryption-at-rest), the provider held the keys. Once the hackers had her login, they had the keys.

The Lesson: Counselors need client-side encryption. This means encrypting files on your computer before they are uploaded. If Dr. Elena had done this, the hackers would have found only scrambled, unreadable data.

Real-World Scenario: The Physical Theft

Then there is Mark, a Licensed Mental Health Counselor (LMHC). Mark kept digital archives of closed client files on an external USB hard drive in his home office. During a break-in, his laptop and the USB drive were stolen.

Mark’s laptop was password-protected, but the external drive was not. The thief now has access to seven years of client history, discharge summaries, and billing ledgers.

The Lesson: A Windows or Mac login password does not protect external drives. If the drive is removed from the premises, the data is open to anyone who plugs it in—unless it is specifically encrypted.

Types of Encryption: What Therapists Need to Know

Understanding the difference between locking your computer and locking your files is critical for a secure practice.

Full-Disk Encryption (The Baseline)

Full-disk encryption protects your data if your physical device is stolen. On Windows, this is often handled by BitLocker; on Mac, it’s FileVault.

When your computer is turned off, the data is scrambled. However, this has a major limitation: it only protects the device itself. Once you log in, everything is unlocked. If you email a file or upload it to the cloud, full-disk encryption offers no protection.

File-Level Encryption (The Vault)

File-level encryption involves wrapping individual files (PDFs, Word docs, folders) in a digital safe. You create a password for a specific file or folder.

The crucial distinction here is portability. Unlike full-disk encryption, this protection travels with the file. If you email an encrypted file to a lawyer, or upload it to Google Drive, it remains unreadable to hackers, cloud providers, and email snoops. Only someone with the specific password can decrypt it.

Why Office Passwords Aren’t Enough

A common question is, “Can’t I just password-protect the Word doc?”

The answer is no.

Let’s look at Sarah, a trauma therapist. She emailed a “password-protected” Word document containing a treatment plan to a psychiatrist. She texted him the password. Later, the psychiatrist’s email was hacked.

The hacker easily accessed the document. Why? Because standard Microsoft Office password protection is notoriously weak and can be cracked by modern hacking tools in minutes. Furthermore, having the password in a text message (which is often backed up to the cloud) created a second point of failure. HIPAA compliance requires robust standards, such as AES-256 encryption, which standard Office features do not reliably provide.

Special Focus: Psychotherapy Notes vs. Progress Notes

For mental health professionals, the distinction between progress notes (medical record) and psychotherapy notes (process notes) is vital.

HIPAA affords Psychotherapy Notes higher protection. They are specifically designed to be the therapist’s private analysis and must be kept separate from the client’s general medical record.

Many EHRs have a section for these, but some therapists prefer to keep them completely offline to ensure they are never subpoenaed as part of the general record.

The Encryption Solution: Keeping these notes in a secure, encrypted folder on your local drive provides the physical and digital separation required by law. By using a tool like sekura.app, you can maintain a digital “locked drawer” that is inaccessible to anyone else—even if they have access to your EHR or your physical computer. This allows you to honor the heightened privacy requirements of process notes without managing a complex second record system.

How to Implement File Encryption in Private Practice

Securing your files doesn’t require an IT degree. Here is a practical, four-step process.

Step 1: The Audit

Identify where ePHI (electronic Protected Health Information) lives outside your EHR. Check your:

  • Downloads folder
  • Desktop
  • Documents folder
  • External hard drives or USB sticks

Step 2: Select the Right Tool

You need a tool that uses AES-256 encryption.

  • The Old Way: Tools like Veracrypt are free and powerful, but they are technically difficult. They require you to create “volumes,” “mount drives,” and manage complex settings.
  • The Modern Solution: sekura.app is designed for non-technical users. It offers a simple drag-and-drop interface, requires no installation, and runs entirely offline. It bridges the gap between high-level security and ease of use.

Step 3: The Process

Integrate encryption into your workflow:

  • Archiving: Before moving old client files to an external drive, encrypt the entire folder.
  • Sharing: Before emailing a referral letter or court summary, encrypt the file.

Step 4: Key Management

Encryption is only as good as the password (key) you use. Do not write passwords on sticky notes. Use a secure Password Manager (like 1Password or Bitwarden) to store the decryption passwords for your archived files.

Do You Need a BAA for Encryption Software?

This is one of the most confusing aspects of compliance for private practices. Do you need a Business Associate Agreement (BAA) for your encryption tool?

The Distinction:

  • Cloud Storage (Google Drive, Dropbox, iCloud): YES. You absolutely need a BAA because these companies store your data on their servers. They have physical access to the hard drives holding your client info.
  • Local Encryption Tools (sekura.app): Generally, NO. If the software runs locally on your machine (offline) and the vendor never sees your data, passwords, or keys, they are not a “Business Associate” under HIPAA definitions.

Using a local encryption tool like sekura.app simplifies your compliance stack. Since the software processes data on your own device and never transmits it to the cloud, you maintain full control/custody of the data.

Frequently Asked Questions (FAQ)

Is Google Workspace HIPAA compliant? Only if you sign the BAA and configure it correctly. Even then, Google holds the encryption keys (encryption-at-rest). For sensitive documents like psychotherapy notes, relying solely on Google is risky. Additional local encryption is recommended for maximum security.

How do I send a file to a client who isn’t tech-savvy? Never send raw attachments containing PHI. The best practice is to encrypt the file, send it via email, and provide the password via a separate channel (like a phone call or secure text). Alternatively, use a secure client portal.

If my laptop is stolen but has a login password, is it a breach? Likely, yes. Login passwords do not encrypt data; they just hide the desktop. A thief can bypass a login password and access the hard drive data directly. If the disk itself wasn’t encrypted (using BitLocker, FileVault, or file encryption), it is a reportable breach.

What happens if I lose my decryption password? With true, secure encryption (like AES-256 used by sekura.app), there are no “backdoors.” If you lose the password, the data is gone forever. While this sounds scary, it is the definition of true security—if there were a way to recover it without the password, hackers could use that same method to steal your data.

Conclusion: Security is Self-Care for Your Practice

Encryption protects your license, your bank account, and most importantly, your client’s vulnerability. In a year where 300 million patient records were exposed, taking steps to secure your data is no longer optional.

Don’t wait for a lost laptop or a phishing email to expose your practice. File encryption is the digital equivalent of the sound machine by your door—it ensures that what happens in therapy, stays in therapy.

Start securing your external files today with sekura.app—the easiest way to encrypt client data without technical headaches.

[Start Encrypting Now - Free]

Protect your files with sekura.app

AES-256 encryption for your sensitive files. Simple drag-and-drop interface, works on Mac and Windows.

Download Sekura Free

Sekura is listed on

AlternativeToCapterraG2Product HuntStackSharePrivacyTools.io