A. Differentiate between TMH and non-TMH practice
B. Distinguish between various technological modalities
C. Evaluate and select technologies for TMH
D. Explain the benefits and risks of different TMH modalities
E. Explain the public health need for TMH
F. Identify the different settings for TMH practice
G. Know security aspects of different technologies
H. Know terminology relevant to TMH
I. Know the terms related to technology
J. Know the TMH requirements toward ongoing training, knowledge, and supervision
K. Know hardware, software, and internet connection needs
L. Understand contraindications for TMH
M. Understand the history of TMH
N. Understand the need for various options for local area supports
A. Clarify expectations for TMH sessions
B. Facilitate the TMH disclosure and informed consent process in an ethical manner
C. Establish a policy for social media
D. Establish protocol to clarify bounds and requirements of the practitioner when client is in crisis
E. Explain benefits and risks of different TMH modalities
F. Explain challenges and risks of TMH (e.g., technology failure, confidentiality, private connection)
G. Prepare a protocol for management of technical difficulties
H. Establish and adhere to verification protocols for safety and privacy
I. Establish and adhere to verification protocols for identity and location
J. Prepare a protocol for establishing local resources and an emergency contact
A. Address concerns of clients related to TMH
B. Apply required technology security protocols
C. Apply setting-specific security needs
D. Conduct ongoing assessment of the client’s personal resources and abilities
E. Consider risk factors (e.g., domestic violence, suicidality, homicidality, systemic challenges)
F. Demonstrate to the client how to access technology of choice
G. Determine client resources and abilities in relation to TMH
H. Develop rapport with clients across TMH modalities
I. Establish client identity in a virtual environment
J. Establish client safety prior to session
K. Evaluate ongoing effectiveness of TMH
L. Familiarize self with client local, state, and national community resources
M. Implement screening for suitability to engage in TMH
N. Model practitioner TMH etiquette within different modalities
O. Obtain and maintain adequate documentation
P. Perform ongoing client risk assessments
Q. Troubleshoot technical difficulties and poor quality of communication
R. Monitor ongoing informed consent
A. Adhere to the Client’s Bill of Rights
B. Conduct technology risk assessment
C. Demonstrate appropriate response to data loss
D. Demonstrate appropriate response to security breaches
E. Understand and maintain HITECH compliance
F. Explain Protected Health Information (PHI)
G. Follow rules and regulations related to storing and destroying session recordings and documentation
H. Follow rules and regulations related to recording sessions
I. Follow state and federal laws directing TMH practice
J. Know order of authority between state-level and federal regulations
K. Know risks of security breaches
L. Know the consequences of noncompliance
M. Know the importance of business associate agreements
N. Know the types of safeguards (technological, administrative, and physical) for risks and threats
O. Know what constitutes a breach
P. Know who can and cannot access PHI and when
Q. Understand and maintain HIPAA (covered entities, privacy rule, security rule, privacy officer)
A. Consider the risks to diverse populations of using various emergency management systems
B. Understand and apply best practices in TMH
C. Utilize resources available to troubleshoot TMH issues
D. Document ethically
E. Follow ethical guidelines related to screening and intake
F. Follow ethical guidelines with social media
G. Maintain confidentiality with respect to TMH modality
H. Follow ethical guidelines pertaining to practitioner values and biases
I. Operate within your scope of practice
J. Sustain ethical clinician relationships/boundaries
K. Use technology ethically
A. Apply best practices in culturally appropriate crisis intervention
B. Assess if client is in crisis
C. Create an emergency management plan
D. Employ de-escalation strategies in crisis
E. Identify the signs of a crisis F. Initiate involuntary commitment process
G. Maintain elements of a safety plan
H. Manage a list of active client-local emergency resources
I. Follow a protocol for establishing local resources and an emergency contact
J. Determine additional risk factors involved related to diverse populations when utilizing various emergency management systems

