Privacy Rights and Information

Limits of Confidentiality

Confidentiality is the cornerstone of therapy. Your verbal and written communication with me is held in the strictest confidence and will only be disclosed to other parties with your written authorization. (Please consider the limits of confidentiality in electronic communications, outlined in more detail below) Exceptions to this include your presentation of imminent danger to self or others; knowledge of suspected child abuse, neglect, or abandonment; knowledge of suspected elder/vulnerable adult abuse, neglect, naming me in a lawsuit; claiming emotional harm or damages in a lawsuit with another entity, or by a court order signed by a judge (a subpoena alone will not result in disclosure).

Electronic Communication

Additionally, communication with me via any online or electronic means (e.g. email, text, video chat) is limited in security and thus your confidentiality may not be guaranteed. In the event of an injury, illness, or other unexpected emergency situation that results in me becoming unavailable, your basic contact information (name and contact numbers or email) may be provided to a fellow therapist or associated professional. This will allow for your timely notification of appointment cancellations, as well as provide you with an opportunity to obtain further information regarding your continued care.

Sharing information

Considering all of the above exclusions, if it is still appropriate, upon your request, I will release information to any agency/person you specify unless I conclude that releasing such information might be harmful in any way.

Confidentiality and Social Interactions

Should we run into each other socially in person or online, I will never acknowledge working with you. In order to protect our relationship, I cannot accept invitations to social events or social media requests.

While you are welcome to visit my professional social media pages or website, I would discourage you from leaving messages there or “following/subscribing” simply to better protect your privacy and anonymity.


Should you need physical or emotional assistance (e.g. approaching a psychological emergency but not at the threshold of needing to be hospitalized or feeling dizzy but not in need of an ambulance), I may but am not required to, contact listed people you provide if I am concerned for your safety. In the case that I have dire concerns for your safety, I will do all that I can to protect you, including calling 911 or other emergency responders.


Confidentiality of Email, Chat, Cell Phone, Video, and Fax Communication. I use secure and encrypted video software for our sessions, and secure email and text systems for other communications. However, I want you to be aware that if you do not also use secure/encrypted programs on your side of the communication, the communications may not be secure. As a result, I start at a place of sharing as little as possible via these channels and will adapt to your comfort, with documentation, as we proceed.

Security laws state that clients have the freedom to request or opt into less secure means of communication if they are aware of the risks, comfortable with them, and find it helpful to do so. I also want to acknowledge that while I regularly check in on the security of all of our ways of communicating, I also cannot guarantee the absolute security of our work online. Please ensure that you too are doing your utmost to protect your privacy by considering who has access to your email, text messages, and so on before choosing online therapy.


We partner with Grow Therapy which provides electronic medical billing, which requires access to health information to bill and receive payment for services. Your PHI (protected health information) can include identifying information combined with billing payment information. Information is stored in secured HIPPA compliant databases that are encrypted and authenticate user identities. Although, Grow Therapy and Talk Indy utilize procedures to ensure safeguards and security, there is always a risk of information being breached. In the event that occurs, you will be notified and steps will be taken to mitigate and correct the breach immediately.