What Will Happen to Your Clients?

Most of us have documents like a will, power of attorney and other estate planning instruments either already in place or at least on our “I’ll get to that eventually” list. Far fewer have given much thought to how we would want our clients to be taken care of in the case of our demise or anything else that would cause a sudden interruption in our ability to provide services.

I attended an ethics workshop recently where the presenter related a story of a colleague who had died suddenly. Several of the remaining office partners went into his office to try to determine which clients needed to be notified. According to the presenter, the deceased therapist’s records were “a mess.” They found a paper appointment book that looked like what the therapist had been using for scheduling. However, entries just said, “Joe” or “A.G.” – mostly likely as a HIPAA privacy precaution. Although nice for confidentiality, the colleagues had no way of knowing which calendar entries might be clients and which might be other types of appointments. Furthermore, since no contact information was listed in the calendar, they had no way of contacting anyone. They saw evidence of some charts, but they were scattered. A few were sitting out in a pile on the desk – but were these current clients or ones who had recently terminated? There were two locked filing cabinets that they suspected held additional charts, but none of the colleagues knew where to find the keys. Financial records were found in an online accounting program, but again, there was no way to know which entries were clients and specifically, which ones were current clients who would need to be contacted.

As therapists, in addition to HIPAA’s privacy and security laws, we also have ethical mandates. Although ethical guidelines vary a bit depending on your state and also your discipline, most require us to have some sort of plan for the appropriate transfer of records in situations that would otherwise result in an interruption of service for our clients. The therapist in the example above appears to have been making some attempts to comply with HIPAA (with the possible exception of the charts that were sitting out) but seems to have given no thought to the ethical obligations he also had to his clients. Imagine how traumatic it must have been for those clients who couldn’t be notified to show up for their appointments and then find out that their therapist had died.

EHRs offer a perfect solution to this problem. With an EHR, all data pertaining to all clients can be stored in one place. Although it’s typically not wise to share your username and password with others, better EHRs will have the ability for you to add users to your account. A user would have their own username and password, and you would have a record of when they access your account and what they do there. Making one or more colleagues users on your account would allow them to access your records in emergency situations and see both your calendar and all client charts. In the situation described above, the colleagues would have been able to see at a glance which clients were scheduled for the next few weeks and have a way to contact them. Although learning that their therapist had died would still most likely be difficult, hearing the news in a personal way from someone who knew their therapist and who might be in a position to offer to see them is certainly better than just having a note on the door when they arrive for their appointment.

Encrypted Email:
Your Role in Keeping it Safe

Some people like to point out that encrypted email isn’t all it’s cracked up to be. “After all,” they warn, “as soon as someone has access to your username and password, it no longer matters whether your email is encrypted or not.” Well . . . yes. That’s an accurate statement. However, to use that line of reasoning would be like telling us not to bother locking our homes or cars. After all, as soon as someone gets access to your keys, those locks become useless.

Although we certainly COULD decide to throw caution to the wind, most of us see the value in at least taking reasonable precautions to protect our personal property. When it comes to client PHI (Protected Health Information) – whether it’s in email or in other types of documents – we’re mandated by HIPAA/HITECH to: 1) maintain written policies stating how we intend to keep PHI both private and secure and 2) to make sure we follow those policies.

The nice thing about the way the HIPAA laws are written is that the authors realize that each of us has our own unique situation. Our office setups are different (e.g., single practitioner, multi-practitioner, agency); we use different email clients (e.g., Outlook, Gmail, Yahoo, Hushmail, PSYBooks); we access it with different types of devices (e.g., computer, tablet, smartphone). Furthermore, technology changes so rapidly that the way we do our email this year may be totally different from what we do next year. This is why, rather than give us a strict set of rules we all have to follow, HIPAA wisely instructs us to write – and use – our own policies. In that spirit, this article will give you some general principals to use in developing your email safety plan.

Good email safety can be divided into two broad categories:

  1. Password Safety
  2. Computer/Device Safety

(For our purposes, the words “computer” or “device” are used interchangeably to refer to anything you might be using to access your email, e.g., a desktop or all-in-one computer, laptop, tablet or smartphone.)

In terms of Password Safety, the picture below pretty much sums up two of the most common problems:

Password Safety

In other words:

  • Don’t make your password something easy to guess – such as 123456, “password”, names of pets or family members.
  • Don’t leave your password in places others can easily see or discover.

Another good tip in the Password Safety category is:

  • Change your password frequently.

I call this the “Keep’em guessing” precaution. Actually, if your password never gets compromised, this really isn’t necessary. However, it’s a small thing to do, and may foil some unauthorized access attempts if it has.

For Computer/Device Safety, the suggestions below will go a long way in securing your email as well as any other client PHI you access on your device:

  • Don’t store any client emails or other PHI on your computer/device.
  • Don’t leave your screen accessible for others to see.
  • Don’t store your username and/or password in your browser.
  • Clear your browser history frequently.

We’ll discuss each separately:

Don’t Store Client Emails or Other PHI on Your Computer/Device

Coupled with password safety, this may be the #1 thing you can do to keep your devices secure. The good news here is that most of us – whether we realize it or not – are using web-based email programs these days, which pretty much takes care of this issue for you. Web-based email is NOT stored on your computer. Instead, your browser (e.g., Chrome, Firefox, Edge, Safari, IE) is used to access your email program (e.g., PSYBooks, Gmail, Hushmail, Outlook.com, Yahoo, Comcast) on the Web. The good news here is that once you log out of your browser, your email doesn’t remain on your computer. The exception is if you download attachments or save specific emails to some type of file. Those ARE stored on your computer or other device unless you saved them to a cloud-based storage system. Downloading them to your computer could leave you open for a PHI breach, should your device ever be lost or stolen.

If you are using a desktop application for your email (e.g., the original Outlook as opposed to the one you access through Outlook.com), it’s a whole different issue. With desktop apps, EVERYTHING is stored on your computer. This means that, unless you use encryption software to encrypt your entire device, anyone who gets their hands on your device automatically has access to your email.

Don’t Leave Your Screen Accessible for Others to See

If you want to be squeaky-clean here, you could shut down your computer each time you leave you office. However, that’s hard on computers and, in most cases, isn’t warranted. Other options are to simply log out of your email program or, in the case of web-based email, close your email program’s tab in your browser. If you’re not going to be gone long – turning off your monitor or locking your office door (assuming your screen can’t be seen through any office windows) might be other alternatives.

Don’t Store Your Username and/or Password in Your Browser

Browsers and other programs try to be helpful by asking us if we want them to remember our username and/or password. Depending on the site you’re visiting, it might be just fine to say yes and it CAN be a helpful feature. However, never, ever, EVER agree to that when client data is involved – which includes the email system you use with your clients. The reason is simple: if your browser has this information saved for you, a potential bad guy doesn’t even have to try to guess your password or hack into your system. You’re handing it to them on a silver platter and they can log in as easily as you can. And, as was mentioned in the opening paragraph of this article, the strongest encryption in the world can’t protect against someone who has access to your password.

Clear Your Browser History Frequently

This is another advantage of web-based email. Each browser has a way that you can clear your web-browsing history – often referred to as your “cache”. The advantage of doing this is that if someone gains access to your computer right after you cleared your cache, they’re not going to know which program you use for your email, much less how to get into it. How often you do this is up to you, although clearing your cache is also part of good computer care in general. You’ll be able to browse much faster with a recently cleared cache.


Remember, safe email consists of the following:

  • Data in motion encryption
  • Data at rest encryption
  • Safe email habits

When you use PSYBooks’ encrypted email, the first two are taken care of for you. Hopefully, this article will help you with your part of the equation, i.e., safe email habits.

Encrypted Email – Just How Safe Is It?

PSYBooks’ email not only meets but actually surpasses the HIPAA specifications for encrypted email. HIPAA’s rules for email encryption are broad, giving developers the maximum amount of freedom. This is as it should be. Those who are responsible for writing and maintaining HIPAA/HITECH laws cannot also be expected to keep up with rapid changes in the world of technology the way developers do. Therefore, although HIPAA wisely states that email containing client PHI (Protected Health Information) should be encrypted, it doesn’t specify exactly how that should be done.

If you compare email to snail mail, there are two possible times your mail is vulnerable: 1) when it’s on route to you and 2) after it’s been delivered. Most developers interpret the HIPAA specifications as meaning they should encrypt the first phase of mail delivery which, in computer terms, is called “data in motion”. Many encrypted email services stop there. They feel they’ve done their job. However, to date, there have been no breaches in the data in motion phase as long as 2048-Bit SSL encryption is used. In fact, experts feel that data in motion under 2048 encryption is uncrackable now and will be for many years yet to come. The implication here is that although data in motion encryption is certainly necessary, it is hardly sufficient.

Conversely, all PHI data breaches so far have occurred in the second stage, i.e., before it’s sent or after it’s been delivered. Computer parlance refers to this phase as “data at rest”. When you think about it, this second stage can include a lot of possibilities. Going back to the snail mail analogy, someone might steal your mail from your mailbox; you might lose or misplace it once you’ve brought it in; your home or office could have a fire or flood that would destroy not only your mail but everything else; your child could accidently scoop your mail into their backpack and lose it at school, your office manager could leave sensitive mail sitting out for other patients to see, someone might break into your home or office and steal or destroy your mail, etc. The possibilities are endless.

This is also true with email. There are numerous ways that data at rest can be compromised. The most frequent culprits, surprisingly enough, aren’t hackers, but rather, are theft and/or loss. For this reason, PSYBooks encrypts email both in motion and at rest. In fact, we even take it a step further in that we also encrypt any attachments you or your clients send via email. This means that, for example, you can now share any client data you want via PSYBooks email and be assured that even if our servers WERE hacked (which is an extremely remote possibility), your email would not be decipherable – it’s secure.

However, the email safety story doesn’t really stop there. Achieving 100% safety with email actually depends on three things:

  • Data in motion encryption
  • Data at rest encryption
  • Safe email habits

PSYBooks has you covered for the first two. The last one is up to you. Actually, you may be surprised to see how easy it is to have unsafe email habits. Most of us are probably guilty of at least a few on a fairly routine basis. We’ll give you some tips for practicing “safe email” in the next post.

Are Digital Records Better Than Paper?

The Original EHR Prototype

Video Managing Client Files: Digital vs Paper (Video duration: 1:55)

At it’s simplest, digital record-keeping could simply mean a Word doc, Excel sheet or PDF that you’ve saved on your computer, tablet, phone, thumb drive or other type of digital storage device. There are advantages to digital record-keeping even at this elementary level. For example, with digital records, you no longer have to contend with bulging filing cabinets, finding adequate long-term storage, or shredding – all of which are factors with paper health records. Additionally, it’s relatively easy to make backup copies of digital files to guard against some type of disaster, whereas making copies of paper records is costly, both in terms of time and money and also, effectively doubles the number of filing cabinets or other physical storage space you need.

However, if you move beyond the Word doc level of digital record-keeping and start exploring practice management systems, the advantages become even more apparent. What gives practice management systems (also called EHRs or EMRs) their oomph is that they’re built using relational databases, which gives you the ability to filter. This means, as the cartoon suggests, that these kinds of programs are interactive. You can click a button and find out how many sessions you conducted in a certain time frame, how much you made, which clients still owe you money (including how much and for how long), which insurance payments are outstanding, which ones may have gotten hung up at the clearinghouse and why – the possibilities are endless.

Additionally, most (but not all) practice management systems have the ability to connect to insurance companies. This means, you can do all of your efiling in one place – you don’t have to go to each insurance company’s site to file. Depending on the particular system, you may also be able to get detailed information about where an insurance claim is in the payment process, retrieve ERAs and perform other time-consuming tasks you might normally do with the insurance company either over the phone or at their website.

All in all, maintaining digitial records, especially within a practice management system or EHR can save you both time and money and also tend to be safer than maintaining paper files.

Types of EHRs: The Shared Chart Model

There are several factors to consider when choosing an EHR. Previously, we discussed some of the disadvantages of behavioral health therapists using EHRs that are specifically designed for the medical profession. Eliminating the large group of medical EHRs helps narrow the field quite a bit. However, even within the category of behavioral health EHRs, there are other factors to consider. For example, one thing you may not be aware of is a concept I refer to as the “shared chart model”. In a nutshell, agencies tend to need and use shared chart models, while those of us in private practice typically don’t.

The best way to describe the shared chart concept is to think through the workflow in a typical behavioral health agency compared to that of private practice. In an agency, a patient’s chart typically belongs to the agency. Clinicians come and go; cases get transferred from one professional to the next; the same consumer is often seen by several different people within the agency (e.g., front office personnel, an intake worker, a psychiatrist, the individual therapist, possibly a group and/or family therapist, etc.) In such settings, it makes sense for each consumer to have ONE chart – either paper or digital – that anyone within the agency can access, i.e., a shared chart model.

In contrast, when you’re in private practice – even if you practice with a large number of other clinicians in the same building – your clients’ charts – paper or digital – typically belong to YOU. They are not shared with others in the practice unless you specifically make arrangements for that. If a client named John Doe sees me for individual therapy, Dr. Smith for medications, and Joe Green for group, each of us would maintain separate charts for John. We might (or might not) choose to share our charts with one another – or even to allow one another to make notations on John in our chart. But bottom line is that I “own” my chart for John, Dr. Smith owns her chart, and Joe Green owns his.

Now the question becomes, “Why do I care whether my EHR uses a shared chart model or not? I’m going to be the only one using it so it should be a moot point.” In some ways, you’re absolutely right. If you are currently using an EHR that has a shared chart model and you love it, GREAT! No need to change. However, if you don’t currently have an EHR and are considering getting one, the thing to consider about shared chart model EHRs is that they’re typically more complex and more difficult to learn. Because they’re specifically created for agencies, even though they may be just for the behavioral health profession, they actually more closely resemble large scale medical EHRs in complexity, price, and learning curve. If you’re just starting out, you’re probably going to be happiest with an EHR made just for private practice, rather than one that caters more to agencies.

You can learn more about some of the problems with medical/agency EHRs in the post below:

Are Web-Based EHRs Safe?

The most common reason people give for being reluctant to switch to a web-based EHR is safety. When we’re charged with protecting something – in this case, our clients’ records – most of us intuitively feel safer with something we can see and touch; something physical within our own office where we can maintain control of security ourselves. However, despite this subjective sense of safety, Hurricane Katrina taught us all a valuable lesson about the danger of keeping client records on paper. Floods, tornadoes, fires and other types of disasters can destroy paper records in a heartbeat. If you do maintain paper records, at the very least, you should have backup copies of everything – and those copies should be stored at a completely different location – preferably far away from where your paper records are stored.

The question then becomes, what kind of copies do you make and where do you store them? You can certainly use a copy machine and make paper copies of your records, but that’s both costly and cumbersome in terms of paper, ink, and additional space to store everything. Digital records, on the other hand require little to no room to store, although it can be time-consuming to scan all of your paper documents to get them into digital format. Once you have them in digital format, what do you do with them? All types of digital storage media (computers, external hard drives, thumb drives, CDs, etc.) degrade over time. This means if you choose to store your digital files on some type of physical media that you maintain yourself, you’ll have the task every few years of making copies of your copies to ensure that all of your client data is still good. All of this becomes rather daunting, no matter how you look at it.

An obvious solution is to just not generate paper documents. Keep all – or at least most – of your client records in digital format on the Web from the very beginning. This is a huge leap for many – it’s changing the way they’ve done things comfortably their entire careers and, intuitively, it just doesn’t feel safe. However, before just assuming that records kept on the web are less safe than records kept in your office, let’s look at some facts:

Data States on the Web: Data in Motion vs Data at Rest

There are two possible states for data on the web:

  • “Data in motion” is the term used to describe data as it travels back and forth between the computer issuing the request (e.g., you at your personal computer or tablet) and the server you’re trying to reach (e.g., a web-based EHR).
  • “Data at rest” is when the data is just sitting there on either your computer or the server.

Security Issues with Data in Motion

As long as the website you’re accessing starts with “https” instead of just “http”, data in motion is generally safe. The https protocol indicates that the website is working in conjunction with another protocol, Secure Sockets Layer (SSL), to transport data safely. Here are some facts about SSL:

It appears, then, that data in motion – as long as the website you’re using has SSL – is generally accepted as being secure. When we hear of data being hacked and/or of large data breaches, the culprit is with data at rest.

Security Issues with Data at Rest

To review, data at rest is when the data is just sitting on a computer or other device. The device might be your own personal computer, tablet or even your phone – or it might be the computer (i.e., server) where your web app lives. (Servers are just computers that have certain software on them that enable them to “serve” a web page to you when you request it. In other words, you type www.google.com into your web browser and one of Google’s servers opens that page, i.e., “serves” it to you.)

Consider this: if you’re storing client records on your computer, even if it’s in a desktop EHR (i.e., the program is actually installed on your computer), there are two possible places data at rest might be vulnerable: your computer and the server. However, if you’re using a web-based EHR – unless you specifically download files from the app or store other client records on your computer – NO client data is stored on your machine. All of your client data is on the web. This effectively eliminates 50% of the possible concerns for data at rest breaches. The initial implication here is that, contrary to popular belief, web apps may actually be SAFER ways to store client records. But let’s dig a little deeper.

Most of us fear hackers. We hear about them in the news, they’ve successfully hacked into some pretty scary – and presumably secure – websites, so we assume they’re the major worry with data breaches on the web. However, this is not the case. Hacking actually accounts for a very small percentage of reported healthcare data breaches. One author who has analyzed healthcare breach data notes that the media most often involved in breach incidents are laptops and paper, i.e., NOT servers.

The HITECH Act requires the Secretary of HHS to post a list of breaches of unsecured protected health information affecting 500 or more individuals. To make it easier to see trends, I downloaded the entire list into an Excel sheet so I could group breaches by type and came up with the following table (this data was collected from 2009-2013):

Notice that theft and loss account for 72% of the reported breaches. The thing that most people fear – hacking and/or IT incidents – only accounted for 2% of the breaches. Also, although I didn’t include the “Location of Breach” column in the table, glancing at the original data seems to confirm what the above author concluded, i.e., that the largest percentage of these thefts or losses are from either paper records or laptops.

Furthermore, as of mid 2015, none of the EHRs made specifically for behavioral health practitioners in private practice had ever reported a breach of any kind, nor had any of the clearinghouses used by EHRs reported breaches. This certainly isn’t meant to imply that it couldn’t happen. However, as you can tell from the data presented so far, most breaches are caused by people – people stealing or misplacing client files or data, people disposing of records improperly, people missending emails, people leaving records in public view and failing to secure them properly. It makes sense then, that companies with larger number of employees will be more likely to have breaches. Companies that specialize in behavioral health EHRs tend to be small, which, in some ways may serve to minimize their risk.

Also, even though the data shows that hacking incidents are fairly uncommon, if I were a hacker and I wanted to obtain healthcare data, I’d choose a target where I stood to garner the most records – insurance companies, large hospital complexes, etc. Even IF, for some reason, I wanted to target EHRs, I’d go after the large scale medical EHRs. I wouldn’t waste my time with EHRs that are specifically made for behavioral health. Could it happen? Yes. Is it likely? No.

What We’ve Covered So Far:

  • Data in motion is secure. Data breaches, when they occur, happen with data that’s just sitting on either your computer or a server.
  • If you use a web-based EHR as opposed to a desktop application, that eliminates your computer, i.e., 50% of the security risk.
  • Most healthcare data breaches occur as a result of either theft or loss. The most common items that are lost or stolen are laptops and paper records.
  • As of mid-2015, no behavioral health EHR made just for private practice had reported breaches of any type.
  • Hacking or other IT incidents only account for about 2% of all breaches. Furthermore, there’s some reason to think that behavioral health EHRs made just for private practice might be unlikely targets for hackers.


Nothing is 100% safe. If you store your client records in your office – either as paper records or on your computer – your office could catch fire and burn. If you had gone to the trouble to keep backup copies of everything in your home, a tornado or other natural disaster could destroy both your home and your office. The same can be said for digital records stored by EHR companies.

However, EHRs that use reputable web server companies have built-in protections provided by the companies themselves, that are difficult to replicate by individuals. For example, PSYBooks is stored on servers that are provided by Amazon. AWS (Amazon Web Server) data centers have military grade perimeter control as well as other natural boundary protection. Physical access is strictly controlled by professional security staff utilizing video surveillance, state of the art intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication no fewer than three times to access data center floors. All visitors and contractors are required to present identification and are signed in and monitored. Furthermore, Amazon offers backup servers at “redundant co-location facilities the are geographically dispersed” to help ensure that even if a catastrophic event happened in one part of the country, you would have a backup available in another part of the country. It’s pretty unlikely that any of us in private practice would be able to match Amazon’s level of security for the computers we maintain in our homes or offices.

It seems reasonable to conclude that despite the fact that nothing is 100% safe, using web-based EHRs made just for behavioral health providers in private practice may well be the safest option you can choose.

Your Personal File Storage

VIDEO: File Storage

In addition to being able to store files for each client, you can also upload and store your own digital records in an area set aside just for you. It’s important to note that files are maintained separately. Client files are stored in their charts – separate from all other clients and also separate from your personal files. This is one of the ways PSYBooks adheres to HIPAA/HITECH guidelines.

Client file storage is separate from therapist file storage

PSYBooks allows you to store files in various categories for better organization. You can use the default categories or create your own. The default category list looks like this:

Add/Edit File Categories

However, you are free to add new categories and also to reorder, edit or delete the existing ones. You may want to store things such as your HIPAA policies and documentation, any forms you use in your practice, statements you send to clients, as well as your policies and testing materials. In addition, you could also create categories to store materials for books, articles or other publications you’re writing, images and other files you use on your website – pretty much anything you want. It’s your area to customize to fit your personal needs.

File Storage for Each Client

VIDEO: File Storage

Each of your charts in PSYBooks has a Files tab where you can upload files specifically to that client’s chart. For example, initially you might want to upload scanned copies of their intake forms, insurance cards and/or driver’s license. Later on, you may want to upload copies of releases and consents, EOBs, reports or testing results. If you want, you can also keep copies of routine things you generate such as statements, insurance claims or receipts. Should your client request a PHI report, you can also upload that to their chart so you’ll have a record of what you gave them. There are several advantage to storing these kinds of documents in PSYBooks:

  • Everything pertaining your client files can be stored in one place with one login. You don’t have to maintain separate storage either on your own computer (unless you want to) or with another company for documents pertaining to you clients.
  • PSYBooks has a built-in organizational system in that each client already has a chart with it’s own Files tab. You can create as many different categories within that Files tab as you need to customize file storage to meet the needs of your practice.
  • You have the peace of mind of knowing that your documents are being stored in a way that’s HIPAA/HITECH compliant and that meets HIPAA encryption standards.
  • You can go completely paperless if you choose. Once your files have been converted to digital and stored securely on PSYBooks, there is no need to maintain copies of the corresponding paper documents unless you want to.

PSYBooks’ Add File Form looks like this:

Add File Form

The first line lets you browse your computer for the file you want. Once you find your file, PSYBooks will automatically populate the Document Name field with the name of your existing file. However, you can change the name to anything you want. The next line allows you to select a category for your file. This is an optional tool to help you keep your files organized. The last line allows you to set a permission level for the file, thereby specifying which types of users are allowed to view the file.

Managing Your PSYBooks Subscription

PSYBooks has a tab in the Libraries called Therapists that is devoted to administrative types of tasks for your practice. One of the tools on this page is the Manage Subscription tool. It looks like this:

Manage Subscription tool

Once you click the tool, the form that opens looks like this:

Manage Subscription tool

The Manage Subscription tool is divided into two sections: Billing Info and Add/Remove Features. The Billing Info section allows you to see things like your current subscription type and features, when your next payment is due, your payment history and how much storage space you have used.

Add/Remove Features is where you can add or remove a PSYBooks feature. Almost all features in PSYBooks are free, but when we release one that is optional and requires an additional fee, it will be listed here. The fake subscriber in the screenshot, Jane Therapist, does not currently have any additional features. If she did, those features would be listed in the Billing Info section at the top of the Manage Subscription tool. Also, in the Add/Remove Features section, the features Jane has would have a trash can icon instead of a plus which would allow her to remove the feature from her account.

New Features

We love coming up with new features for PSYBooks. It’s probably the most fun thing we do. When we release a new feature, your account will automatically get the update. If it’s a substantial release, we’ll email you and/or notify you next time you sign in to give you a brief description of the new feature and what it does.

Some things that fall into the new feature category are modifications of an existing tool or section of PSYBooks. We see a way to make something better so we change it. Other new features are brand new things we’ve never offered before. Although some new features can be completed reasonably quickly, others are quite involved. Depending on the complexity, the amount of time it takes to develop a new feature can vary from a week or so to several months.

We get some of our ideas for new features from you. PSYBooks comes with a bug reporting tool that also doubles as a feature request tool. The “Find a Bug?” tool will appear in the bottom right corner of each page of your app. When you click it, a window opens with a dropdown box where you can choose the type of issue you’re reporting. One of the choices in the dropdown box is “New feature request”. Click that, briefly describe your idea, and we’ll consider it. Our goal is to make PSYBooks as good as we possibly can for our customers so we appreciate knowing what you want and need.

New feature request tool