Last updated:

File Encryption for Therapists: A Guide to HIPAA Compliance & Client Safety

The “Therapeutic Alliance” is the bedrock of your practice. It is an agreement rooted entirely in trust. Your clients share their deepest fears, traumas, and secrets with you because they believe that the therapy room—and the records you keep—are a sanctuary.

If a credit card number is stolen, it can be cancelled. If a client’s mental health history, session transcripts, or addiction recovery notes are leaked, the damage is irreversible. The trust is broken, and the therapy is effectively destroyed.

This isn’t a hypothetical fear. In the notorious Vastaamo data breach, hackers stole the records of 33,000 psychotherapy patients. Unlike typical financial crimes, the attackers didn’t just sell the data—they emailed patients directly, threatening to publish their session notes unless a ransom was paid.

Many therapists operate under a false sense of security, believing their Electronic Health Record (EHR) system covers every digital base. But there is a dangerous gap in most private practices: local files.

Court letters, insurance audits, process notes, and exported backups often live on your laptop’s hard drive or in your “Downloads” folder. These files are outside the protective bubble of your EHR. File encryption for therapists is the digital lock that secures these vulnerable assets, ensuring that even if your device is stolen, your client’s privacy remains intact.

Why Mental Health Data Carries the Highest Risk

In the eyes of a cybercriminal, a therapy practice is a “toxic” asset mine. Healthcare data is valuable not just for identity theft, but for extortion. The sensitive nature of mental health records makes them perfect leverage for blackmail.

The financial stakes are staggering. According to the 2024 IBM Cost of a Data Breach Report, the average cost of a healthcare breach has hit $9.77 million—the highest of any industry for the 14th consecutive year.

But you might think, “I’m just a small solo practice; hackers don’t care about me.” The data suggests otherwise. The HIPAA Journal reported a 278% increase in ransomware attacks on healthcare organizations over a five-year period. Small practices are increasingly viewed as “soft targets” because they often lack the sophisticated IT defenses of large hospital systems.

The Danger of Process Notes

There is a specific vulnerability in therapy practices that general medical offices don’t face: the distinction between progress notes and process notes.

  • Progress Notes: These are the official clinical records (symptoms, diagnosis, treatment plan) that typically live inside your secure EHR (like SimplePractice or TherapyNotes).
  • Process Notes: These are your private, informal notes—hunches, feelings, and detailed observations used to analyze the session.

Because process notes are often excluded from the official medical record for privacy reasons, many therapists type them in Microsoft Word or Apple Pages and save them locally on their desktop. Without encryption, these highly sensitive documents are sitting in plain text, readable by anyone who gains access to your computer.

What is Encryption and how does it protect your files?

Real-World Scenarios: Where Encryption Saves the Practice

To understand the value of encryption, we have to look at what happens when things go wrong—and how encryption changes the outcome.

Scenario A: The “Lost Laptop” (Dr. Sarah)

Dr. Sarah is a solo practitioner who occasionally works from home. She downloads a folder of “process notes” and a few court evaluations to her laptop to work on them over the weekend. While stopping for coffee, her car is broken into, and her bag—containing the laptop—is stolen.

  • Without Encryption: This is a catastrophe. Because the files were accessible, she must assume a breach occurred. Under HIPAA, she is required to report the theft to the HHS Office for Civil Rights (OCR), potentially face an investigation, and notify every client whose data might have been on that machine. The reputational damage is immediate.
  • With Encryption: The outcome is entirely different. According to APA Services Guidance, if the device or files were encrypted, the data is rendered unreadable to the thief. This acts as a “Safe Harbor.” Dr. Sarah generally does “not have to worry about breach notification” and can focus on replacing her hardware rather than saving her license.

Scenario B: The “Vastaamo” Nightmare

In the Vastaamo case mentioned earlier, hackers accessed the patient database. The tragedy wasn’t just the intrusion; it was that the files were readable.

  • The Lesson: If files are encrypted at rest (meaning they are encrypted while sitting on the hard drive, not just during transmission), they appear as useless gibberish to a hacker. Even if a bad actor steals the files, they cannot open them, read them, or use them for blackmail without the decryption key.

Scenario C: The “Cloud Sync” Mistake (Mark)

Mark, a clinical social worker, uses a standard cloud storage service to sync intake forms between his office and home computer. He assumes the cloud is secure. However, a malware infection on his home computer encrypts his local files and syncs the corrupted versions to the cloud, locking him out of his own data.

  • The Lesson: Relying solely on cloud synchronization is risky. If Mark had used local encryption tools to secure his intake folder before syncing, the malware couldn’t have compromised the contents of those files, and the data would remain secure regardless of the cloud provider’s vulnerabilities.

Compliance can feel like a maze of legalese, but regarding encryption, the directives are becoming increasingly clear.

The HIPAA Security Rule

Under HIPAA, encryption is classified as an “addressable” implementation specification. Many therapists misinterpret “addressable” as “optional.” This is a dangerous mistake.

“Addressable” means you must implement encryption unless you can prove that an alternative measure provides equivalent security. In the context of mobile devices (laptops, tablets, USB drives), there is virtually no equivalent alternative to encryption. If you store ePHI (electronic Protected Health Information) on an unencrypted laptop that gets stolen, the HHS Office for Civil Rights (OCR) may view this as “willful neglect.”

The penalties for willful neglect are severe. Tier 3 and Tier 4 violations can carry fines ranging from $50,000 to $1.5 million per year.

Ethical Obligations

Beyond the law, your professional code of ethics demands digital vigilance.

  • NASW Code of Ethics (Standard 1.07m): Explicitly states that social workers “should use applicable safeguards (such as encryption, firewalls, and passwords) when using electronic communications.”
  • APA Stance: As Debra Kawahara, PhD, President of the American Psychological Association (2025), noted regarding privacy standards: “This policy is about safeguarding the most intimate aspects of who we are… It’s essential that ethical standards keep pace with technology, defending the fundamental right to mental privacy for all.”

The BAA Question

A common confusion arises regarding Business Associate Agreements (BAA). If you store data in the cloud (Google Drive, Dropbox), the provider must sign a BAA because they “host” your data.

However, local encryption software (like sekura.app) that runs entirely on your desktop and does not transmit data to the cloud typically does not require a BAA in the same way. The software is a tool you use, not a custodian of your records. The outcome—files that are mathematically impossible to read without a password—is what satisfies the compliance requirement.

The “EHR Gap”: Why You Still Need Local Encryption

Most advice for therapists stops at “Get a HIPAA-compliant EHR.” While platforms like SimplePractice or TherapyNotes are excellent, they are not a silver bullet. They protect data on their servers, but they cannot protect data once you export it.

Consider your actual weekly workflow. You likely download files for:

  • Court Reports: Drafting custody evaluations or forensic reports in Word.
  • Insurance Audits: Downloading batches of session notes to submit for review.
  • Backups: Periodically exporting your client data to ensure you aren’t locked in to one vendor.
  • Letters: Writing letters of support for gender-affirming care or emotional support animals.

The moment you click “Download” or “Export,” that file leaves the secure fortress of your EHR and lands in your “Downloads” folder. At that exact moment, it is unencrypted. If your laptop is lost, or if malware scans your documents folder, that data is exposed.

You need a dedicated file encryption tool to bridge this gap, securing specific files and folders that live on your device “at rest.”

How to Implement Encryption in a Private Practice

You don’t need to be an IT expert to secure your practice. Here is a three-layer approach to protecting client data.

Step 1: Full Disk Encryption (FDE)

This is your baseline defense. It encrypts the entire hard drive so that if the computer is turned off and stolen, the thief cannot access the OS.

  • Windows Users: Enable BitLocker.
  • Mac Users: Enable FileVault.
  • Note: This is essential, but it has a weakness. If you are logged in and walk away, or if malware strikes while you are using the computer, the drive is “unlocked” and accessible.

Step 2: Individual File/Folder Encryption (The Second Layer)

For sensitive client data—especially process notes, backups, and court reports—you need a second layer of defense. This protects specific files even if your computer is unlocked.

Using a tool like sekura.app, you can create a secure vault for your practice:

  1. Create a folder named “Client Exports” or “Process Notes.”
  2. Drag the folder into the app to encrypt it.
  3. Set a strong, unique password.

Now, even if someone accesses your computer, they cannot open those specific files without the second password.

How to Password Protect a Folder

Step 3: Secure Transfer

Never email unencrypted attachments. Standard email is not secure. If you must send a file (e.g., to a lawyer or a client), encrypt the file before attaching it. This ensures that even if the email is intercepted, the attachment remains unreadable. Alternatively, use a secure client portal for all document exchanges.

FAQ: Common Questions from Therapists

Does my EHR (SimplePractice/TherapyNotes) cover all my encryption needs? No. Your EHR protects data stored on their servers. It does not protect files you download to your computer, such as PDF exports, invoices, or Word documents. You are responsible for securing any data that lives on your local device.

Can I just password-protect a Word document? No. The built-in “Encrypt with Password” feature in older versions of Microsoft Office is notoriously easy to crack. While newer versions are better, they are often not considered sufficient for HIPAA compliance on their own. You should use software that uses AES-256 encryption, the industry standard.

What is AES-256 Encryption?

Is Google Drive or Dropbox HIPAA compliant? Only if you have a paid business plan and you have signed a Business Associate Agreement (BAA) with them. Even with a BAA, many security experts recommend using Cloud vs. Local Encryption strategies—encrypting your files locally before uploading them to the cloud—to ensure “zero-knowledge” privacy.

What is the difference between process notes and progress notes regarding security? Progress notes are part of the medical record and usually stay in the EHR. Process notes are your private thoughts and often live outside the EHR to keep them separate. Because they are often stored as local Word documents, process notes are uniquely vulnerable to theft and require specific encryption measures.

Conclusion

Encryption is not just technical jargon; it is the digital manifestation of client confidentiality. In a world where data breaches cost an average of $9.77 million and ransomware attacks are up nearly 300%, relying on hope is not a strategy.

Your license, your reputation, and most importantly, your clients’ safety depend on your ability to keep secrets. By recognizing the gap between your EHR and your local files, you can take control of your data security.

Don’t let a lost laptop or a moment of carelessness end your practice. Start by auditing your “Downloads” and “Documents” folders today, and use a tool like sekura.app to lock down your sensitive files. It’s a small step that provides massive peace of mind.

Protect your files with sekura.app

AES-256 encryption for your sensitive files. Simple drag-and-drop interface, works on Mac and Windows.

Download Sekura Free

Sekura is listed on

AlternativeToCapterraG2Product HuntStackSharePrivacyTools.io