 The topic we are going to talk about today is Records and Cyber Confidentiality. During the recent time, the importance of records and cyber confidentiality has increased immensely. Rapid changes in the ways we store, retrieve and transmit data including sensitive, clinical and financial material raise many new types of confidentiality concerns. As we all know, the biggest threat or security aspect in cyber age is the safety of the data. You can restore the information you want from a tab or a button. So this makes a point that the information which is sensitive, which is of clinical nature, which is of financial nature, should be kept safe in such a way that it cannot reach the common people unsecuredly. Use of the internet for communication provides great convenience as well as at time it provides considerable unresolved confusion and controversy related to the rights and obligations of users. This clearly means that at time, such kind of information which is not meant to be provided to many other people can easily be provided to them with just one click. So it means that the way we are going to store the data should be a very confidential way. So today we will talk about how we can secure and save the data that is sent on the internet at this cyber age. How we can use effective passwords. How we can make portable devices sure that they cannot be accessed by those people for whom they were not meant to be used. Vast amount of information can now be stored in a small easily and transported electronic, magnetic and optical devices that can often be misused, stolen and misplaced. Students have known that about two decades ago, when there was a drive called floppy, that was the first invention in which to store the data and make it portable easily and easily. Gradually with the passage of time, many of you may not have ever been used with the floppy because floppy is not used nowadays and different data cables are used instead. Different portable devices are used instead with which people store their data and they can easily keep it with them. Small USBs can be used if you want to keep a lot of data. They also have better devices for that. So nowadays, different types of portable devices are stored in that data. And that can easily be transmitted from one computer to another in one laptop to another computer. So as we are seeing easy access to that data, by the way, the chance of this is very high that your USB can easily be stolen, it can be misplaced and if you leave it somewhere by mistake, then your data is afraid to leak. So it makes sense that how we can protect that data into even USB, how it can be password protected and what methods can be used to keep it safe. Mental health professionals making use of new technology must remain thoughtful and cautious about the hazards to confidentiality that may result. Special attention should be given to create strong passwords, backwards and inscriptions. The way the internet is being used in the world, the same way USBs and different portable devices are used to keep the data. Similarly, mental health professionals also save their data, they save their files electrically. And with electronic safety, they have to use different types of measures so that confidential data, which we have been talking about throughout the lectures, that our ethical concerns are that the data cannot just open it with everyone. So how the mental health professionals are going to keep those information very safe and how they cannot be transmitting that information to anyone who they should not know, whether they are family, relatives or as general information on social media, no one can open them. The most secure passwords, now talking about that what kind of the passwords we use, which may not be easily retrieved. Always remember, there are some passwords which are very general, that can be probably your date of birth, that can maybe your family name, that can be probably the name of your pet and the name of your friend and something like that. So generally when any such device is being stolen, people generally try those passwords which seems to be very common, right? So in those cases, the combination of the passwords should be a very tricky one. It may involve at times the uppercase, the lowercase and things like that, that may be changed periodically and are not tapped to be easily gauged by any computer monitor. Using a locking code for all phones, tablets and setting computers and desktops to auto lock if idle for a period of time helps to maintain security of data. It means to say that if you enable any password on your computer, that if it has not been used for a period of let's say 15 minutes or 10 minutes, these settings can be done personally by yourself. So when it is not touched, the keyboard or screen will be automatically locked. So these kind of information, storage ways are very helpful and with the help of this, mental health professionals enter their sensitive data as if a patient's data is entered and for a period of time they have moved from one place to another room or they are doing their personal work. So no one else can be able to retrieve that data in clinic in absence of that mental health professional. So this is the way the data is being kept, secured and saved in most of the cases. If a portable device routinely have confidential material stored in it or a software program or application should be used to help and track the computer to give a command to erase the stored data remotely in event of a theft. For instance, if this is a portable device like a tablet or a phone or something like a computer which is a laptop probably or if it has been stolen, in that case there are certain programs in which you can give a command from one link that these certain files may be deleted out of that machine. So in that case, if you have kept the data for safe and security and that device has been stolen, you can delete and erase it. So these are few of the ways by the combination of a stringent password by providing a password to that machine and then by providing the programming which may delete the files in case of theft are some of the possible ways which mental health professionals use to keep their data safe and secure.