<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>ABALogix Blog</title>
    <link>https://blog.abalogix.com/</link>
    <description>Thoughts and perspectives</description>
    <pubDate>Tue, 07 Apr 2026 09:54:07 +0000</pubDate>
    <item>
      <title>GSuite Confidential</title>
      <link>https://blog.abalogix.com/gsuite-confidential?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[I recently read a post on a Facebook group focused on Applied Behavior Analysis where a group member had asked whether or not GSuite’s confidential mode was appropriate for transmission of PHI. &#xA;&#xA;Before I delve into my answer let’s define some terminology. !--more--&#xA;&#xA;GSuite confidential is a feature Google released in Q2 2019 to allow its customers to send emails that expire after a period of time and can require a single use passcode to unlock the contents of the email. &#xA;&#xA;Does confidential mode improve the overall security of this email? Let’s break  down what&#39;s happening: &#xA;&#xA;A user is generating an email using GSuite confidential mode and selecting an expiry date. &#xA;Email expiry can only be set as low as 1 day by default unless the email is expired on demand.&#xA;Users also have the option of requiring a single use passcode to open the email. &#xA;&#xA;------&#xA;&#xA;Passcodes sent via SMS&#xA;&#xA;Unfortunately SMS (aka text messaging) is not a particularly safe or secure means of transmitting data - even if its a single use passcode. Why? Simple put the increase of SIM card hijacking has effectively made SMS an insecure means of receiving any type of passwords. &#xA;&#xA;In short SIM card hijacking is a means by which a criminal attempts to take ownership of a victims account by means of social engineering - or convincing a telcos provider to transfer an active line from the victims phone to one in their possession.. &#xA;&#xA;There are a number of companies working to solve this issue and US telcos providers have banded together to develop ZenKey as a means to deter this from occurring but the fact remains that SMS is not a secure means of sharing information. &#xA;&#xA;-----&#xA;&#xA;Email expiry&#xA;&#xA;It’s great that GSuite allows users to expire an email but what happens if you accidentally send the email with PHI to the wrong recipient? Confidential mode does allow you to expire the email on demand but at that point you’re already in violation of HIPAA. &#xA;&#xA;Why is that? Simply put the PHI you’re sending in the email is only encrypted in transit. A criminal could in theory get access to a recipients phone via SIM hijacking - use that to password reset the account you sent the email to with PHI to and view PHI. &#xA;&#xA;-----&#xA;&#xA;Alternative solutions&#xA;&#xA;Okay so dizzying technical jargon aside - should confidential mode be used to send PHI. From my professional perspective - no. The risk of having a data breach is too high and while confidential mode is certainly a handy tool - it’s not worth risking your patients PHI just for some flexibility. &#xA;&#xA;PauBox or Virtru. &#xA;&#xA;Both provide encrypted email solutions that integrate with GSuite and are HIPAA certified. &#xA;&#xA;Better yet use a HIPAA compliant document management system like eFileCabinet or SmartVault and avoid sending PHI over email all together. &#xA;&#xA;----------&#xA;&#xA;Looking for a HIPAA compliant mileage logging solution that won’t break the bank? Look no further  - Milelogix is affordable and easy to use. Sign up for a free trial today!&#xA;&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p>I recently read a post on a Facebook group focused on Applied Behavior Analysis where a group member had asked whether or not GSuite’s confidential mode was appropriate for transmission of PHI.</p>

<p>Before I delve into my answer let’s define some terminology. </p>

<p>GSuite confidential is a feature Google released in Q2 2019 to allow its customers to send emails that expire after a period of time and can require a single use passcode to unlock the contents of the email.</p>

<p>Does confidential mode improve the overall security of this email? Let’s break  down what&#39;s happening:</p>
<ul><li>A user is generating an email using GSuite confidential mode and selecting an expiry date.</li>
<li>Email expiry can only be set as low as 1 day by default unless the email is expired on demand.</li>
<li>Users also have the option of requiring a single use passcode to open the email.</li></ul>

<hr/>

<h2 id="passcodes-sent-via-sms" id="passcodes-sent-via-sms">Passcodes sent via SMS</h2>

<p>Unfortunately SMS (aka text messaging) is not a particularly safe or secure means of transmitting data – even if its a single use passcode. Why? Simple put the increase of SIM card hijacking has effectively made SMS an insecure means of receiving any type of passwords.</p>

<p>In short SIM card hijacking is a means by which a criminal attempts to take ownership of a victims account by means of social engineering – or convincing a telcos provider to transfer an active line from the victims phone to one in their possession..</p>

<p>There are a number of companies working to solve this issue and US telcos providers have banded together to develop <a href="https://myzenkey.com/">ZenKey</a> as a means to deter this from occurring but the fact remains that SMS is not a secure means of sharing information.</p>

<hr/>

<h2 id="email-expiry" id="email-expiry">Email expiry</h2>

<p>It’s great that GSuite allows users to expire an email but what happens if you accidentally send the email with PHI to the wrong recipient? Confidential mode does allow you to expire the email on demand but at that point you’re already in violation of HIPAA.</p>

<p>Why is that? Simply put the PHI you’re sending in the email is only encrypted in transit. A criminal could in theory get access to a recipients phone via SIM hijacking – use that to password reset the account you sent the email to with PHI to and view PHI.</p>

<hr/>

<h2 id="alternative-solutions" id="alternative-solutions">Alternative solutions</h2>

<p>Okay so dizzying technical jargon aside – should confidential mode be used to send PHI. From my professional perspective – <strong>no</strong>. The risk of having a data breach is too high and while confidential mode is certainly a handy tool – it’s not worth risking your patients PHI just for some flexibility.</p>

<p>PauBox or Virtru.</p>

<p>Both provide encrypted email solutions that integrate with GSuite and are HIPAA certified.</p>

<p>Better yet use a HIPAA compliant document management system like eFileCabinet or SmartVault and avoid sending PHI over email all together.</p>

<hr/>

<p>Looking for a HIPAA compliant mileage logging solution that won’t break the bank? Look no further  – <a href="https://abalogix.com">Milelogix</a> is affordable and easy to use. <a href="https://abalogix.app/register">Sign up</a> for a free trial today!</p>
]]></content:encoded>
      <guid>https://blog.abalogix.com/gsuite-confidential</guid>
      <pubDate>Fri, 01 Nov 2019 19:22:26 +0000</pubDate>
    </item>
    <item>
      <title>Messaging apps in the workplace</title>
      <link>https://blog.abalogix.com/messaging-apps-in-the-workplace?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[The Wall Street Journal ran a piece last month titled “Do Messaging apps fit into the workplace?” and I couldn’t help but wonder whether this applies to home health providers like ABA practitioners. Messaging apps are fairly ubiquitous so it’s hard to imagine a work setting that doesn&#39;t have some form of chat or messaging software in place. !--more--&#xA;&#xA;I’ve mentioned a list of HIPAA compliant apps like Google Meet and Skype for Business in my ABA Tech Starter guide but generally those tools extend beyond the purview of messaging. &#xA;&#xA;Messaging apps like WhatsApp, Facebook Messenger and the newly released Instagram Threads make it ridiculously easy for users to communicate. While I understand that sometimes employees want to blow off steam by complaining to other coworkers I don’t think that using the aforementioned messaging apps are appropriate for these reasons. &#xA;---&#xA;&#xA;Now you see me now you ...&#xA;&#xA;Privacy oriented messaging apps like Signal have built in features where the message is removed from the sender and receiver after a specific period of time. This is fine if you’re trying to make sure no one is copying your fantasy football strategy but risky for health practitioners. Even if your employees aren’t submitting PHI using these messaging tools - how can you prove to an auditor that isn’t happening? &#xA;&#xA;With an ephemeral messaging scheme you really can’t.&#xA;---&#xA;&#xA;Super fast thumbs&#xA;&#xA;One of the nice things about messaging apps is that it’s a fairly rapid way of sending and receiving information. Pick an existing contact or just use an existing message thread and start typing away rapidly. Beyond getting chronic thumb pain, this rapid means of communication can also open the doorway for employees to start getting into arguments and devolving an entire discussion into a gossip gram. &#xA;---&#xA;&#xA;Gossip Gram&#xA;&#xA;I’m sure you’ve run into situations before where something happens at work and the gossip mill kicks off. We’re all human and asking someone not to gossip is almost like asking them not to think or breath. That said having apps with automatically disappearing messages poses a risk to a health provider. What happens if the discussion is regarding a patient? What used to be referred to as water cooler conversations are now being done over these messaging apps. &#xA;&#xA;Can you be 100% sure PHI isn’t being exposed? &#xA;---&#xA;&#xA;Training&#xA;&#xA;Communication is a complex field. One could argue that messaging apps don’t really encourage real communication as there is a complete lack of tone, body language and shared attention. That said, while I do think health providers should allow employees to use messaging tools the following should be considered: &#xA;&#xA;Use the right messaging tool. Signal, Facebook Messenger, WhatsApp and Instagram Threads are consumer grade messaging tools that are inappropriate for the workplace. Use tools like Google Meet, Slack or Skype For Business that allow you to maintain an audit trail of messages sent across the wire. Don’t forget to get a BAA from their respective vendors. &#xA;Set the right expectations with your employees. Help them understand that these messaging tools are to be used for business communication purposes only.&#xA;Provide HIPAA certification training to your employees. Give them the confidence to know what types of information are appropriate to be shared via these messaging tools. &#xA;Provide an alternative to messaging apps to allow your employees to blow off steam. Schedule team building events like Escape rooms to encourage teamwork and collaboration. &#xA;&#xA;---&#xA;Looking to reduce employee stress and increase satisfaction? Provide MileLogix as an employee benefit to automatically generate mileage logs. Sign up for a free trial today!&#xA;&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p>The Wall Street Journal ran a piece last month titled <a href="https://www.wsj.com/articles/do-messaging-apps-fit-into-the-workplace-not-always-comfortably-11568772000">“Do Messaging apps fit into the workplace?”</a> and I couldn’t help but wonder whether this applies to home health providers like ABA practitioners. Messaging apps are fairly ubiquitous so it’s hard to imagine a work setting that doesn&#39;t have some form of chat or messaging software in place. </p>

<p>I’ve mentioned a list of HIPAA compliant apps like Google Meet and Skype for Business in my <a href="https://blog.abalogix.com/aba-tech-starter-guide">ABA Tech Starter guide</a> but generally those tools extend beyond the purview of messaging.</p>

<p>Messaging apps like WhatsApp, Facebook Messenger and the newly released Instagram Threads make it ridiculously easy for users to communicate. While I understand that sometimes employees want to blow off steam by complaining to other coworkers I don’t think that using the aforementioned messaging apps are appropriate for these reasons.</p>

<hr/>

<h2 id="now-you-see-me-now-you" id="now-you-see-me-now-you">Now you see me now you ...</h2>

<p>Privacy oriented messaging apps like Signal have built in features where the message is removed from the sender and receiver after a specific period of time. This is fine if you’re trying to make sure no one is copying your fantasy football strategy but risky for health practitioners. Even if your employees aren’t submitting PHI using these messaging tools – how can you prove to an auditor that isn’t happening?</p>

<p>With an ephemeral messaging scheme you really can’t.</p>

<hr/>

<h2 id="super-fast-thumbs" id="super-fast-thumbs">Super fast thumbs</h2>

<p>One of the nice things about messaging apps is that it’s a fairly rapid way of sending and receiving information. Pick an existing contact or just use an existing message thread and start typing away rapidly. Beyond getting chronic thumb pain, this rapid means of communication can also open the doorway for employees to start getting into arguments and devolving an entire discussion into a gossip gram.</p>

<hr/>

<h2 id="gossip-gram" id="gossip-gram">Gossip Gram</h2>

<p>I’m sure you’ve run into situations before where something happens at work and the gossip mill kicks off. We’re all human and asking someone not to gossip is almost like asking them not to think or breath. That said having apps with automatically disappearing messages poses a risk to a health provider. What happens if the discussion is regarding a patient? What used to be referred to as water cooler conversations are now being done over these messaging apps.</p>

<p>Can you be 100% sure PHI isn’t being exposed?</p>

<hr/>

<h2 id="training" id="training">Training</h2>

<p>Communication is a complex field. One could argue that messaging apps don’t really encourage real communication as there is a complete lack of tone, body language and shared attention. That said, while I do think health providers should allow employees to use messaging tools the following should be considered:</p>
<ol><li>Use the right messaging tool. Signal, Facebook Messenger, WhatsApp and Instagram Threads are consumer grade messaging tools that are inappropriate for the workplace. Use tools like Google Meet, Slack or Skype For Business that allow you to maintain an audit trail of messages sent across the wire. Don’t forget to get a BAA from their respective vendors.</li>
<li>Set the right expectations with your employees. Help them understand that these messaging tools are to be used for business communication purposes only.</li>
<li>Provide HIPAA certification training to your employees. Give them the confidence to know what types of information are appropriate to be shared via these messaging tools.</li>
<li>Provide an alternative to messaging apps to allow your employees to blow off steam. Schedule team building events like Escape rooms to encourage teamwork and collaboration.</li></ol>

<hr/>

<p>Looking to reduce employee stress and increase satisfaction? Provide <a href="https://abalogix.com/products/milelogix/">MileLogix</a> as an employee benefit to automatically generate mileage logs. <a href="https://abalogix.app/register">Sign up</a> for a free trial today!</p>
]]></content:encoded>
      <guid>https://blog.abalogix.com/messaging-apps-in-the-workplace</guid>
      <pubDate>Mon, 07 Oct 2019 04:14:44 +0000</pubDate>
    </item>
    <item>
      <title>Bring your own device - or doom?</title>
      <link>https://blog.abalogix.com/bring-your-own-device-or-doom?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[Bring your own device is a popular way of getting employees to sync work emails and data on their personal devices. &#xA;&#xA;That said I’d like to present a case against implementing a BYOD policy.!--more--&#xA;---&#xA;It&#39;s not really secure&#xA;&#xA;Proponents of BYOD programs argue that it’s secure because both Apple iOS and Google Android allow IT administrators to set policies on the phone to prevent employees from copying/pasting data and installing non approved applications on the work profile. &#xA;&#xA;Herein lies the problem - the employee is still using their own device and can install applications at will in their personal profile. While both iOS and Android have done a good job of separating personal and work profiles - you still run the risk of a rogue application running in the background that can potentially have access to work profile data. &#xA;&#xA;--&#xA;&#xA;Remote Wipe&#xA;&#xA;Many BYOD policies come with a strict remote wipe clause. Basically if the IT admin deems it necessary the device can and will get remotely wiped. Imagine a scenario where this happens “accidentally”. Now you have to explain to your employee why all their pictures of their grandma’s 80th birthday are gone … forever.&#xA;&#xA;Even if it doesn’t happen accidentally. What happens if the device is stolen or lost? How much time do you give the employee to find the device? An hour? Three hours? Do you really want to risk client data or worse yet PHI being exposed to the public?&#xA;&#xA;With a work assigned device - if its reported lost or stolen it can be wiped immediately. No need to worry about Nana’s birthday pictures getting deleted either.&#xA;&#xA;--&#xA;&#xA;At will termination&#xA;&#xA;Okay so your employees are really good at making sure their BYOD devices aren’t lost or stolen. They’re using good password creation policies and not installing rogue applications that can spy on your data and they’re on a corporate VPN when using public WIFI networks.&#xA;&#xA;What happens when either they quit or you fire them? Some BYOD policies state that upon termination the employee will have their phones wiped. Others assume that post employment, if access to various services like email, shared drives, data collection systems are disabled there’s no way for an employee to access those systems. &#xA;&#xA;Wrong&#xA;&#xA;Consider this: In order to make apps run faster, many of them employ the use of a cache. A cache is like a virtual area on your device where large amounts of data that doesn’t change often (like data collection for a session that happened 2 weeks ago) can be stored and accessed quickly.  &#xA;&#xA;Good mobile apps that deal with PHI completely remove these cache files when data is no longer needed. Unfortunately all of this is highly dependent on the app developer. There’s no guarantee the data is actually removed short of completely wiping the device.&#xA;&#xA;I’ll ask again - do you really want to risk PHI being exposed?&#xA;&#xA;--&#xA;&#xA;Employee privacy&#xA;&#xA;Let’s face it, even though some people claim privacy is completely gone - it’s still kind of a big deal. While some employees may accept the idea of their device being remotely wiped at will - no one is going to be truly comfortable with their personal device being monitored and controlled by their employer 24x7.&#xA;&#xA;--&#xA;&#xA;Okay so you’re convinced but you still want to provide mobile devices to your employees to use. &#xA;&#xA;Buy a bunch of Android tablets managed with a strict device policy. &#xA;Sign up for a telcos provided WIFI hotspot. &#xA;Use a secure corporate VPN on the tablet. &#xA;&#xA;---&#xA;Looking to reduce employee stress and increase satisfaction? &#xA;&#xA;Provide MileLogix as an employee benefit to automatically generate mileage logs. &#xA;&#xA;Sign up for a free trial today!]]&gt;</description>
      <content:encoded><![CDATA[<p>Bring your own device is a popular way of getting employees to sync work emails and data on their personal devices.</p>

<p>That said I’d like to present a case <strong>against</strong> implementing a BYOD policy.</p>

<hr/>

<h2 id="it-s-not-really-secure" id="it-s-not-really-secure">It&#39;s not really secure</h2>

<p>Proponents of BYOD programs argue that it’s secure because both Apple iOS and Google Android allow IT administrators to set policies on the phone to prevent employees from copying/pasting data and installing non approved applications on the work profile.</p>

<p>Herein lies the problem – the employee is still using their own device and can install applications at will in their personal profile. While both iOS and Android have done a good job of separating personal and work profiles – you still run the risk of a rogue application running in the background that can potentially have access to work profile data.</p>

<p>—</p>

<h2 id="remote-wipe" id="remote-wipe">Remote Wipe</h2>

<p>Many BYOD policies come with a strict remote wipe clause. Basically if the IT admin deems it necessary the device can and will get remotely wiped. Imagine a scenario where this happens “accidentally”. Now you have to explain to your employee why all their pictures of their grandma’s 80th birthday are gone … <strong>forever</strong>.</p>

<p>Even if it doesn’t happen accidentally. What happens if the device is stolen or lost? How much time do you give the employee to find the device? An hour? Three hours? Do you really want to risk client data or worse yet PHI being exposed to the public?</p>

<p>With a work assigned device – if its reported lost or stolen it can be wiped <strong>immediately</strong>. No need to worry about Nana’s birthday pictures getting deleted either.</p>

<p>—</p>

<h2 id="at-will-termination" id="at-will-termination">At will termination</h2>

<p>Okay so your employees are really good at making sure their BYOD devices aren’t lost or stolen. They’re using good password creation policies and not installing rogue applications that can spy on your data and they’re on a corporate VPN when using public WIFI networks.</p>

<p>What happens when either they quit or you fire them? Some BYOD policies state that upon termination the employee will have their phones wiped. Others assume that post employment, if access to various services like email, shared drives, data collection systems are disabled there’s no way for an employee to access those systems.</p>

<p><strong>Wrong</strong></p>

<p>Consider this: In order to make apps run faster, many of them employ the use of a cache. A cache is like a virtual area on your device where large amounts of data that doesn’t change often (like data collection for a session that happened 2 weeks ago) can be stored and accessed quickly.</p>

<p>Good mobile apps that deal with PHI completely remove these cache files when data is no longer needed. Unfortunately all of this is highly dependent on the app developer. There’s no guarantee the data is actually removed short of completely wiping the device.</p>

<p>I’ll ask again – do you really want to risk PHI being exposed?</p>

<p>—</p>

<h2 id="employee-privacy" id="employee-privacy">Employee privacy</h2>

<p>Let’s face it, even though some people claim privacy is completely gone – it’s still kind of a big deal. While some employees may accept the idea of their device being remotely wiped at will – no one is going to be truly comfortable with their personal device being monitored and controlled by their employer 24x7.</p>

<p>—</p>

<p>Okay so you’re convinced but you still want to provide mobile devices to your employees to use.</p>
<ul><li>Buy a bunch of Android tablets managed with a strict device policy.</li>
<li>Sign up for a telcos provided WIFI hotspot.</li>
<li>Use a secure corporate VPN on the tablet.</li></ul>

<hr/>

<p>Looking to reduce employee stress and increase satisfaction?</p>

<p>Provide <a href="https://abalogix.com/products/milelogix/">MileLogix</a> as an employee benefit to automatically generate mileage logs.</p>

<p><a href="https://abalogix.app/register">Sign up</a> for a free trial today!</p>
]]></content:encoded>
      <guid>https://blog.abalogix.com/bring-your-own-device-or-doom</guid>
      <pubDate>Fri, 20 Sep 2019 22:34:31 +0000</pubDate>
    </item>
    <item>
      <title>Not all mileage trackers are created equally</title>
      <link>https://blog.abalogix.com/not-all-mileage-trackers-are-created-equally?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[Many mileage trackers out on the market offer similar features. Some even do your laundry. &#xA;&#xA;Sadly they don&#39;t but wouldn’t it be cool if they did? &#xA;&#xA;Mileage trackers generally fall into these categories ...  !--more--&#xA;&#xA;Everything but the kitchen sink &#xA;&#xA;I’m talking about those mileage trackers that not only come with a mobile app - but an actual device you insert into your vehicle called an OBD, short for onboard diagnostics. OBD’s range from $25 all the way up to $100. &#xA;&#xA;That’s not including the time spent trying to install the device in your vehicle either. &#xA;&#xA;To top it off - can you imagine having to tell your staff that just to track and log their mileage they have to install a “device” in their car? &#xA;&#xA;I don’t think so.&#xA;--&#xA;Requires a GPS running all the time&#xA;&#xA;GPS (global positioning system) is amazing. I couldn’t imagine a world without it. Unfortunately it’s not foolproof. Stuck in an area where there isn&#39;t a line of sight to your mobile device? Then you’re sort of out of luck. &#xA;&#xA;Some solutions require a mobile device with a GPS running all the time to accurately track mileage. I’ve got two words for you - low battery. &#xA;&#xA;If you’ve got a decent smartphone it’ll disable GPS and pretty much run in bare minimum mode so you can at the very least make a phone call or three. &#xA;&#xA;So much for accurate mileage tracking.&#xA;&#xA;--&#xA;&#xA;Uses a hybrid of cell tower location and GPS&#xA;&#xA;Some of these mileage trackers use the combination of both GPS and the closest cell tower you’re located near, to track mileage. Beyond this being the ultimate privacy killer - your accuracy will vary. &#xA;&#xA;Some of the mileage trackers use nearby WIFI (open/public WIFI) to also determine location. &#xA;&#xA;Not particularly comforting especially if we’re shooting for data privacy here.&#xA;--&#xA;&#xA;Uses calendar location data with Google and Bing Maps&#xA;&#xA;Bonus points for not requiring any funky hardware to install in your car or relying on a stable GPS signal. Accuracy is excellent as well. Unfortunately most of these scheduling solutions rely heavily on Google and Bing Maps to calculate mileage and drive time. &#xA;&#xA;Neither of those services are HIPAA compliant and you run the risk of exposing your PHI to advertisers and companies that purchase this data. &#xA;&#xA;Don’t take my word for it. Read Google Maps terms of service   - section 3.2.2.&#xA;--&#xA;Uses calendar location data with a private mapping engine&#xA;&#xA;The only way to be sure that your client PHI (address data) isn’t being leaked is to rely on a HIPAA compliant mileage tracker that uses a private mapping engine where none of your data is sold,copied or transmitted to the public - ever. &#xA;&#xA;--&#xA;MileLogix is a HIPAA compliant, calendar based mileage tracker that uses a private mapping engine to calculate mileage and drive time. &#xA;&#xA;Interested in trying it out? &#xA;&#xA;Sign up for a free trial today!&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p>Many mileage trackers out on the market offer similar features. Some even do your laundry.</p>

<p>Sadly they don&#39;t but wouldn’t it be cool if they did?</p>

<p>Mileage trackers generally fall into these categories ...  </p>

<h2 id="everything-but-the-kitchen-sink" id="everything-but-the-kitchen-sink">Everything but the kitchen sink</h2>

<p>I’m talking about those mileage trackers that not only come with a mobile app – but an actual device you insert into your vehicle called an <a href="https://en.wikipedia.org/wiki/On-board_diagnostics">OBD</a>, short for onboard diagnostics. OBD’s range from <a href="https://www.amazon.com/OBD-Car-Doctor-Bluetooth-Scanner/dp/B07BQVHMYP">$25</a> all the way up to <a href="https://www.amazon.com/BlueDriver-Bluetooth-Professional-iPhone-Android/dp/B00652G4TS/ref=sr_1_4">$100</a>.</p>

<p>That’s not including the time spent trying to install the device in your vehicle either.</p>

<p>To top it off – can you imagine having to tell your staff that just to track and log their mileage they have to install a “device” in their car?</p>

<p>I <em>don’t</em> think so.
—</p>

<h2 id="requires-a-gps-running-all-the-time" id="requires-a-gps-running-all-the-time">Requires a GPS running all the time</h2>

<p><a href="https://en.wikipedia.org/wiki/Global_Positioning_System">GPS</a> (global positioning system) is amazing. I couldn’t imagine a world without it. Unfortunately it’s not foolproof. Stuck in an area where there isn&#39;t a line of sight to your mobile device? Then you’re sort of out of luck.</p>

<p>Some solutions require a mobile device with a GPS running all the time to accurately track mileage. I’ve got two words for you – <strong>low battery</strong>.</p>

<p>If you’ve got a decent smartphone it’ll disable GPS and pretty much run in bare minimum mode so you can at the very least make a phone call or three.</p>

<p>So much for accurate mileage tracking.</p>

<p>—</p>

<h2 id="uses-a-hybrid-of-cell-tower-location-and-gps" id="uses-a-hybrid-of-cell-tower-location-and-gps">Uses a hybrid of cell tower location and GPS</h2>

<p>Some of these mileage trackers use the combination of both GPS and the closest cell tower you’re located near, to track mileage. Beyond this being the ultimate privacy killer – your accuracy will vary.</p>

<p>Some of the mileage trackers use nearby WIFI (open/public WIFI) to also determine location.</p>

<p>Not particularly comforting especially if we’re shooting for data privacy here.
—</p>

<h2 id="uses-calendar-location-data-with-google-and-bing-maps" id="uses-calendar-location-data-with-google-and-bing-maps">Uses calendar location data with Google and Bing Maps</h2>

<p>Bonus points for not requiring any funky hardware to install in your car or relying on a stable GPS signal. Accuracy is excellent as well. Unfortunately most of these scheduling solutions rely heavily on Google and Bing Maps to calculate mileage and drive time.</p>

<p>Neither of those services are HIPAA compliant and you run the risk of exposing your PHI to advertisers and companies that purchase this data.</p>

<p>Don’t take my word for it. Read Google Maps <a href="https://cloud.google.com/maps-platform/terms/">terms of service</a>   – <strong>section 3.2.2</strong>.
—</p>

<h2 id="uses-calendar-location-data-with-a-private-mapping-engine" id="uses-calendar-location-data-with-a-private-mapping-engine">Uses calendar location data with a private mapping engine</h2>

<p>The only way to be sure that your client PHI (address data) isn’t being leaked is to rely on a HIPAA compliant mileage tracker that uses a private mapping engine where none of your data is sold,copied or transmitted to the public – <strong>ever</strong>.</p>

<p>—
<a href="https://abalogix.com/products/milelogix/">MileLogix</a> is a HIPAA compliant, calendar based mileage tracker that uses a private mapping engine to calculate mileage and drive time.</p>

<p>Interested in trying it out?</p>

<p>Sign up for a <a href="https://abalogix.app/register">free trial</a> today!</p>
]]></content:encoded>
      <guid>https://blog.abalogix.com/not-all-mileage-trackers-are-created-equally</guid>
      <pubDate>Wed, 21 Aug 2019 06:42:06 +0000</pubDate>
    </item>
    <item>
      <title>ABA Tech Starter Guide</title>
      <link>https://blog.abalogix.com/aba-tech-starter-guide?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[As a new ABA business owner it can be overwhelming to get your agency off the ground. You struggle on a daily basis with getting new clients, hiring RBT&#39;s and dealing with complex billing procedures. While technology can help with many of the aforementioned challenges - the myriad of choice can often be daunting. !--more--&#xA;&#xA;I wrote this tech starter guide to help budding ABA business owners and experienced ones who want a set of proven technology that can act as a force multiplier to their agency. &#xA;&#xA;Regardless of the type of software you&#39;re selecting to use - if you’re going to be storing any kind of protected health information - you need to make sure the solution you’re using is HIPAA compliant and that the vendor will sign a BAA. &#xA;&#xA;Here are some are highly recommended software solutions for ABA business owners just starting out that I&#39;ve split into several categories. If you need the TL;DR skip to the end of the guide.&#xA;&#xA;---&#xA;&#xA;Office Suite&#xA;&#xA;While Microsoft is certainly the 800 lb gorilla in this space I am quite partial to Google Suite (GSuite) for a number of reasons. GSuite has an interface that’s a lot easier to use and in general their documentation is much more facilitated to users who are new to managing users and groups. &#xA;&#xA;Best of all if you allow your employees to use their own devices (BYOD) you can create a policy which restricts the types of apps they can use with their work profile. &#xA;&#xA;If you do setup a BYOD program I highly recommend having a policy whereby if an employee loses their mobile device - you’ll issue a remote wipe to ensure no chance of PHI ever being put into the wrong hands.&#xA;&#xA;If you do sign up for GSuite make sure you request a BAA from Google. &#xA;&#xA;---&#xA;&#xA;Telehealth&#xA;&#xA;Another reason why I love GSuite is that it comes with Google Meet. Google Meet is a HIPAA compliant video/chat solution that you can use in your sessions.  As an added bonus Google Meet also includes a conference bridge that people can dial into. &#xA;&#xA;Honorary mentions go out to Skype for Business and VSee.&#xA;&#xA;---&#xA;&#xA;Laptop&#xA;&#xA;If you’re looking for a low cost, secure, easy to use laptop then look no further than a Chromebook. Google has put a tremendous amount of effort into making their Chromebooks secure by including features like full disk encryption and automatic security updates. &#xA;&#xA;Chrome OS is designed to prevent malware from infecting your system. Best of all it fully integrates with GSuite so you can manage your employee laptops easily. &#xA;&#xA;Once you start hiring employees sign up for Chrome OS Enterprise to restrict application installs (no one needs to be playing Candy Crush during work hours) and make sure all your laptops in the field are updated with the latest security patches.&#xA;&#xA;My only issue with Chromebooks are that they typically have a 3 to 4 year security patch lifespan - which may not be an issue given that Chromebooks are typically within a $200-$400 price range. Many of them come with touchscreens so your laptop can double as a tablet as well.&#xA;&#xA;As for a vendor - most of them offer the same bells and whistles. I’m partial to Lenovo’s because their laptops are well built and offer a much more professional aesthetic than other Chromebook vendors.&#xA;&#xA;---&#xA;&#xA;Tablets&#xA;&#xA;Hands down the best tablets that are out there are the ones made by Apple. If you can afford to buy iPads I highly recommend doing so. That said with a premium quality tablet comes a premium sticker price. &#xA;&#xA;The alternative are Android tablets. Avoid tablets that come with a lot of bloatware on them like the ones made by Samsung or Huawei. I recommend the Lenovo Tab - they come with stock editions of Android so you’ll get a brisk experience using the device.&#xA;&#xA;---&#xA;&#xA;GPS Navigation&#xA;&#xA;Some of you might be wondering why this category of software is here especially with the advent of Google and Bing Maps. These are great consumer grade solutions but remember that an address is considered one of the 18 types of PHI. &#xA;&#xA;Don’t take any chances of having your client addresses get exposed to the public domain. Use an offline mapping solution and leave Google and Bing Maps for trips to the beach.&#xA;&#xA;---&#xA;&#xA;Security Training&#xA;&#xA;Required training videos is something most people dread to have to watch. That said there’s a lot of important information to disseminate about best security practices and HIPAA compliance. &#xA;&#xA;I recommend using a vendor like KnowBe4. Best of all they have a ton of free tools that let you test how security savvy your employees are.&#xA;&#xA;If you want to save money and just want to train your employees on how to avoid malware attacks then consider PhishMe Free instead.&#xA;&#xA;---&#xA;&#xA;Whew - that was a lot of information to go over. Here’s a handy table summarizing everything I’ve talked about. &#xA;&#xA;| Office Suite | Telehealth         | Laptop            | Tablets              |Offline GPS Navigation           | Security Training |&#xA;|--------------|--------------------|-------------------|----------------------|--------------------------|-------------------|&#xA;| Google Suite | Google Meet        | Lenovo Chromebook | Apple iPad           | Tomtom Go Mobile         | KnowBe4           |&#xA;| Office 365   | Skype for Business | HP Chromebook     | Lenovo Tab (Android) | Mapfactor GPS Navigation | PhishMe           |&#xA;&#xA;---&#xA;&#xA;Looking for a fast, easy to use mileage tracker that&#39;s HIPAA compliant? Look no further. &#xA;&#xA;Sign up for a free trial of MileLogix today!&#xA;&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p>As a new ABA business owner it can be overwhelming to get your agency off the ground. You struggle on a daily basis with getting new clients, hiring RBT&#39;s and dealing with complex billing procedures. While technology can help with many of the aforementioned challenges – the myriad of choice can often be daunting. </p>

<p>I wrote this tech starter guide to help budding ABA business owners and experienced ones who want a set of proven technology that can act as a force multiplier to their agency.</p>

<p>Regardless of the type of software you&#39;re selecting to use – if you’re going to be storing any kind of <a href="https://en.wikipedia.org/wiki/Protected_health_information">protected health information</a> – you need to make sure the solution you’re using is HIPAA compliant and that the vendor will sign a <a href="https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/business-associates/index.html">BAA</a>.</p>

<p>Here are some are highly recommended software solutions for ABA business owners just starting out that I&#39;ve split into several categories. If you need the <a href="https://en.wikipedia.org/wiki/Wikipedia:Too_long;_didn%27t_read">TL;DR</a> skip to the end of the guide.</p>

<hr/>
<ul><li>Office Suite</li></ul>

<p>While Microsoft is certainly the 800 lb gorilla in this space I am quite partial to <a href="https://gsuite.google.com/">Google Suite</a> (GSuite) for a number of reasons. GSuite has an interface that’s a lot easier to use and in general their documentation is much more facilitated to users who are new to managing users and groups.</p>

<p>Best of all if you allow your employees to use their own devices (BYOD) you can create a policy which restricts the types of apps they can use with their work profile.</p>

<p>If you do setup a BYOD program I highly recommend having a policy whereby if an employee loses their mobile device – you’ll issue a remote wipe to ensure no chance of PHI ever being put into the wrong hands.</p>

<p>If you do sign up for GSuite make sure you request a <a href="https://support.google.com/a/answer/3407074?hl=en">BAA</a> from Google.</p>

<hr/>
<ul><li>Telehealth</li></ul>

<p>Another reason why I love GSuite is that it comes with <a href="https://gsuite.google.com/products/meet/">Google Meet</a>. Google Meet is a HIPAA compliant video/chat solution that you can use in your sessions.  As an added bonus Google Meet also includes a conference bridge that people can dial into.</p>

<p>Honorary mentions go out to Skype for Business and VSee.</p>

<hr/>
<ul><li>Laptop</li></ul>

<p>If you’re looking for a low cost, secure, easy to use laptop then look no further than a <a href="https://cloud.google.com/chrome-enterprise/chromebooks/">Chromebook</a>. Google has put a tremendous amount of effort into making their Chromebooks secure by including features like full disk encryption and automatic security updates.</p>

<p>Chrome OS is designed to prevent malware from infecting your system. Best of all it fully integrates with GSuite so you can manage your employee laptops easily.</p>

<p>Once you start hiring employees sign up for <a href="https://cloud.google.com/chrome-enterprise/os/">Chrome OS Enterprise</a> to restrict application installs (no one needs to be playing Candy Crush during work hours) and make sure all your laptops in the field are updated with the latest security patches.</p>

<p>My only issue with Chromebooks are that they typically have a 3 to 4 year security patch lifespan – which may not be an issue given that Chromebooks are typically within a $200-$400 price range. Many of them come with touchscreens so your laptop can double as a tablet as well.</p>

<p>As for a vendor – most of them offer the same bells and whistles. I’m partial to Lenovo’s because their laptops are well built and offer a much more professional aesthetic than other Chromebook vendors.</p>

<hr/>
<ul><li>Tablets</li></ul>

<p>Hands down the best tablets that are out there are the ones made by Apple. If you can afford to buy iPads I highly recommend doing so. That said with a premium quality tablet comes a premium sticker price.</p>

<p>The alternative are Android tablets. Avoid tablets that come with a lot of bloatware on them like the ones made by Samsung or Huawei. I recommend the Lenovo Tab – they come with stock editions of Android so you’ll get a brisk experience using the device.</p>

<hr/>
<ul><li>GPS Navigation</li></ul>

<p>Some of you might be wondering why this category of software is here especially with the advent of Google and Bing Maps. These are great consumer grade solutions but remember that an address is considered one of the 18 types of PHI.</p>

<p>Don’t take any chances of having your client addresses get exposed to the public domain. Use an offline mapping solution and leave Google and Bing Maps for trips to the beach.</p>

<hr/>
<ul><li>Security Training</li></ul>

<p>Required training videos is something most people dread to have to watch. That said there’s a lot of important information to disseminate about best security practices and HIPAA compliance.</p>

<p>I recommend using a vendor like <a href="https://www.knowbe4.com">KnowBe4</a>. Best of all they have a ton of free tools that let you test how security savvy your employees are.</p>

<p>If you want to save money and just want to train your employees on how to avoid malware attacks then consider <a href="https://cofense.com/free/">PhishMe Free</a> instead.</p>

<hr/>

<p>Whew – that was a lot of information to go over. Here’s a handy table summarizing everything I’ve talked about.</p>

<table>
<thead>
<tr>
<th>Office Suite</th>
<th>Telehealth</th>
<th>Laptop</th>
<th>Tablets</th>
<th>Offline GPS Navigation</th>
<th>Security Training</th>
</tr>
</thead>

<tbody>
<tr>
<td>Google Suite</td>
<td>Google Meet</td>
<td>Lenovo Chromebook</td>
<td>Apple iPad</td>
<td>Tomtom Go Mobile</td>
<td>KnowBe4</td>
</tr>

<tr>
<td>Office 365</td>
<td>Skype for Business</td>
<td>HP Chromebook</td>
<td>Lenovo Tab (Android)</td>
<td>Mapfactor GPS Navigation</td>
<td>PhishMe</td>
</tr>
</tbody>
</table>

<hr/>

<p>Looking for a fast, easy to use mileage tracker that&#39;s HIPAA compliant? Look no further.</p>

<p>Sign up for a free trial of <a href="https://abalogix.app/register">MileLogix</a> today!</p>
]]></content:encoded>
      <guid>https://blog.abalogix.com/aba-tech-starter-guide</guid>
      <pubDate>Wed, 07 Aug 2019 05:49:48 +0000</pubDate>
    </item>
  </channel>
</rss>