Please read our important disclaimers before using this content
I was fifteen minutes into a telehealth therapy session, talking about the gaslighting and emotional manipulation I'd endured, when I heard it—a faint creak from the hallway outside my bedroom door.
My stomach dropped. My kids were at school. I lived alone. The doors were locked. But I knew that sound. It was the third stair from the top, the one that always creaked. Someone was in my house.
I muted my mic and whispered to my therapist, "I think someone's here." She could see the fear on my face through the video. "Call 911," she said calmly. "I'll stay on the line."
It turned out to be nothing—my teenager had come home sick from school and I hadn't heard her come in over my headphones. But for twenty minutes, I'd been convinced my ex had somehow gotten into my house to listen to my therapy session. The paranoia was that real. The fear was that visceral.
That incident made me realize how vulnerable I was during telehealth sessions. I was discussing the most private, painful details of my abuse, my trauma, my parenting struggles, my new relationship—all from my bedroom, with just a closed door between me and the rest of my home. If my ex could monitor my smart home devices to surveil and control, who's to say he wasn't listening to my therapy sessions through the walls? Recording them through a hidden device? Finding some way to access what I was saying?
It took another six weeks before I felt safe in telehealth therapy again. And in that time, I learned everything I could about securing virtual mental health treatment during a high-conflict divorce.
If you're in therapy—or thinking about starting—while navigating separation, divorce, or custody battles, you need to understand both the convenience and the risks of telehealth. Because what you say in therapy can and will be used against you if your ex finds a way to access it.
The Telehealth Explosion and Its Privacy Implications
The COVID-19 pandemic normalized telehealth therapy almost overnight. What was once a niche service became the primary way millions of people access mental health treatment.1 For survivors of narcissistic abuse, telehealth offers significant advantages:
Convenience:
- No childcare needed (kids can be in another room)
- No travel time or logistics
- Easier to fit into custody schedules
- Access to specialized trauma therapists anywhere in your state
- Lower barrier to starting treatment
Safety:
- No risk of running into your ex in a waiting room
- No need to explain whereabouts (just "home")
- Can access therapy during parenting time without leaving kids
- No visible record of attending therapy (no parking at therapist's office where you might be followed)
Telehealth is particularly valuable for survivors of intimate partner violence who may experience ongoing monitoring and control.2
Accessibility:
- Specialists in narcissistic abuse recovery may not be local
- Costs often lower than in-person
- More appointment availability
- Can switch therapists more easily without geographic constraints
But with all these benefits come serious risks—especially for people in high-conflict divorces where everything you say or do might be monitored, recorded, and used against you.
How Your Ex Might Access Your Therapy Sessions
Before we talk about protection, you need to understand the threats:
Physical Eavesdropping
The simplest method:
- Listening at doors or through walls
- Hiding in another part of the house
- Asking children to report what they hear
- Coming home early or unannounced during scheduled sessions
- Using "checking on the kids" as excuse to interrupt
Why it works: Most people conduct telehealth from home, in rooms with imperfect sound isolation. If your ex still has access to your home (shared custody, property still jointly owned, or they have keys), physical listening is a real threat. Research on intimate partner violence documents persistent patterns of monitoring and surveillance that extend into post-separation contexts.3
Digital Recording Devices
Hidden audio recorders:
- Voice-activated devices hidden in bedrooms, living rooms, home offices
- Old phones left plugged in with recording apps running
- Baby monitors repositioned to cover adult spaces
- Smart speakers (Alexa, Google Home) that can be remotely accessed
- Hidden cameras with audio recording capability
Why it works: Small recording devices cost as little as $20 on Amazon and can record for hours or days. If your ex has ever been in your home, they could have planted one.
Computer and Phone Surveillance
Software-based monitoring:
- Spyware or stalkerware apps installed on your phone or computer
- Keyloggers capturing what you type (including session notes or therapist communications)
- Screen recording software capturing your video session
- Email access to read communications with your therapist
- Cloud backup access showing therapy appointment confirmations
Why it works: If you're using a device your ex ever had access to, or if they know your passwords, they might have installed monitoring software you're not aware of.
Platform Vulnerabilities
Unsecured video platforms:
- Using consumer platforms (Zoom, FaceTime, Skype) instead of HIPAA-compliant therapy platforms
- Weak passwords on therapy portals
- Shared accounts or family plans
- Platform security vulnerabilities that could be exploited
Why it works: Not all telehealth platforms are created equal for security. Some have minimal encryption, weak authentication, or known vulnerabilities.
Legal Discovery of Therapy Records
Court-ordered access:
- Subpoenas for therapy records in custody evaluations
- Motions to compel when you've raised mental health as an issue
- GAL requests for treatment information
- Evaluation requirements for full disclosure
Why it's different: This isn't secret monitoring—it's legal access through the court system. But it means what you say in therapy can end up in legal proceedings if your mental health becomes an issue in your case.
Children's Reports
Indirect access:
- Young children overhearing and repeating what they hear
- Older children asked directly "what is mom talking about in her room?"
- Children incentivized to report (rewarded for providing information)
- Kids' natural curiosity about closed-door conversations
Why it works: Children don't understand confidentiality. They'll repeat what they hear innocently, especially if the other parent asks questions in ways that seem caring rather than manipulative.
Real-World Examples: When Therapy Privacy Is Violated
Case 1: The Hidden iPhone A client discovered her ex had left an old iPhone under her bed, still connected to WiFi and running a voice recording app. It had been recording continuously for three weeks, capturing multiple therapy sessions where she discussed PTSD symptoms, parenting struggles, and fear of her ex. He submitted edited clips to the court claiming she'd admitted to being "unable to handle the children."
Case 2: The Smart Speaker A mother had an Alexa device in her bedroom (left over from when they lived together) that her ex still had access to through his Amazon account. He enabled the "Drop In" feature remotely and listened to an entire therapy session where she discussed considering medication for anxiety. He used this to argue she was mentally unstable.
Case 3: The Shared Computer A father used the family computer for telehealth sessions, not realizing his ex still had remote access to the machine. She used screen recording software to capture multiple sessions, then submitted recordings to the Guardian ad Litem arguing he'd admitted to using marijuana occasionally (legal in their state, but weaponized in custody).
Case 4: The Thin Walls A client's ex would park outside during her scheduled therapy sessions and listen through an open window with a parabolic microphone. He recorded her discussing her new relationship and used it to argue she was prioritizing dating over children, despite the relationship being healthy and appropriate.
In each case, what should have been confidential therapeutic conversations became evidence used against survivors in their custody cases. In some cases, the recordings were excluded as illegally obtained. In others, the damage was done before courts intervened.
Securing Your Telehealth Therapy Sessions
Here's how to ensure your virtual therapy is actually confidential:
Choose the Right Platform
Federal HIPAA telehealth requirements mandate that covered entities use platforms complying with Privacy and Security Rules, with Business Associate Agreements in place.4 Professional guidelines from the American Psychological Association emphasize that telepsychology practitioners must implement adequate security safeguards and maintain HIPAA compliance.5
HIPAA-compliant platforms only:
- Doxy.me
- SimplePractice
- TherapyNotes
- vsee
- Zoom for Healthcare (not regular Zoom)
- Microsoft Teams for Healthcare
Features to require:
- End-to-end encryption
- HIPAA compliance certification
- Two-factor authentication
- Unique meeting IDs for each session (not permanent room links)
- Waiting room features
- No recording capability for participants
- BAA (Business Associate Agreement) with your therapist
Avoid:
- Regular Zoom, Skype, FaceTime, or Google Meet
- Platforms your therapist can't confirm are HIPAA-compliant
- Apps that store recordings or session data insecurely
- Platforms that allow easy screen sharing or recording
Secure Your Physical Space
Before each session:
-
Choose your location carefully:
- Private room with door that locks
- Away from windows where sound might carry
- Not near hvac vents that carry sound between rooms
- Room where you can see doors and won't be surprised by someone entering
-
Physical security check:
- Lock the door
- Close windows
- Draw curtains or blinds
- Check for recording devices (quick visual sweep)
- Use white noise machine outside door if concerned about sound
-
Eliminate eavesdropping risks:
- Use headphones (prevents sound from being picked up by hidden recorders)
- Text children before session: "Mom has a private call, please don't interrupt"
- Put a sign on door if kids are home
- Consider scheduling sessions when completely alone in home
-
Background awareness:
- Position camera so nothing private is visible behind you
- Neutral background or virtual background
- Nothing visible that could reveal information you don't want shared
Secure Your Devices
For phone or tablet sessions:
-
Use a device ONLY you have access to:
- Not a device your ex set up, gave you, or ever had physical access to
- Not a family iPad or shared device
- Preferably a device purchased after separation
-
Security measures:
- Strong passcode (not fingerprint—can't be compelled to provide it)
- Biometric lock when you're using it, passcode-only when stored
- Automatic lock after 30 seconds of inactivity
- Find My Phone disabled (prevents remote tracking)
- No location sharing enabled
- All apps updated to current versions
-
Check for surveillance software:
- Review all apps—delete anything you didn't install
- Check battery usage for apps running in background
- Consider factory reset if you suspect monitoring
- Run anti-spyware scans (Certo, Kaspersky, Malwarebytes)
- See also the full guide on protecting yourself from digital tracking and phone surveillance
For computer sessions:
-
Dedicated device if possible:
- Personal laptop, not family desktop
- Device you can be certain hasn't been accessed by your ex
- Consider purchasing a budget laptop JUST for therapy if needed
-
Security lockdown:
- Strong, unique password
- Disk encryption enabled
- Updated antivirus/anti-malware software
- No remote desktop software installed
- Check for keyloggers or screen recorders
- Use only your password-protected WiFi network
-
Browser and platform security:
- Use incognito/private browsing mode
- Clear cache and cookies after each session
- Don't save passwords in browser
- Close all other applications during therapy
- Disable notifications that might pop up on screen
Secure Your Communications
Email and messaging with your therapist:
-
Use a separate email account:
- Email address your ex doesn't know
- Strong, unique password
- Two-factor authentication enabled
- Not linked to other accounts ex has access to
- Regularly log out and back in (prevents "remember this device" vulnerabilities)
-
Communication best practices:
- Don't send detailed therapy content via email (subject to discovery or hacking)
- Use therapy platform's messaging system when available
- Mark sensitive messages with "privileged and confidential"
- Delete emails after reading if very sensitive
-
Appointment scheduling:
- Use platform's scheduling system rather than email
- Calendar apps set to private, not shared calendars
- Consider using generic calendar entries ("personal appointment" not "Dr. Smith therapy")
Check for Recording Devices
Physical device sweep:
What to look for:
- Small devices plugged into outlets (phone chargers that don't belong to you)
- Objects that seem out of place (clocks, picture frames, smoke detectors in weird locations)
- USb devices you didn't plug in
- Phones or tablets that aren't in use but are plugged in
- Anything your ex gave you or left behind
How to check:
- Visual inspection of your therapy space before each session
- Use phone camera to scan for infrared lights (cameras show up as purple lights)
- Download RF detector app (detects wireless signals from hidden cameras/recorders)
- Consider purchasing bug detector device ($30-$200) for periodic sweeps
- In extreme cases, hire TSCM professional for electronic sweep
Common hiding spots:
- Smoke detectors and carbon monoxide detectors
- Electrical outlets (especially ones that seem newer or you don't use)
- Picture frames or decorative objects facing where you sit
- Clocks on nightstands or dressers
- Stuffed animals or books on shelves
- Air purifiers or fans
- Pens or other everyday objects left on your desk
Set Boundaries with Children
If kids are home during sessions:
-
Age-appropriate explanation:
- Young kids: "Mommy has a private phone call, please play in your room"
- Older kids: "I have an appointment, please don't interrupt unless emergency"
- Teens: "I have therapy right now, please give me privacy"
-
Physical separation:
- Kids in different part of house with activity to occupy them
- White noise machine or music playing in kid areas
- Visual indicator you're busy (closed door, sign)
- Lock if children are young and safety permits
-
Post-session debriefing:
- Don't discuss session content with kids
- If they ask about the call: "It was private, just like your private thoughts are yours"
- Never ask kids to keep session secret from other parent (inappropriate and won't work)
- Model healthy boundaries
Timing and Scheduling
Strategic session timing:
-
When you're completely alone if possible:
- During ex's parenting time
- When kids are at school and you've confirmed no one is home
- When you're certain ex isn't nearby or monitoring
-
Avoid patterns:
- Don't schedule same time every week if ex might monitor your routine
- Vary days if possible
- Consider occasional sessions from truly secure locations (see below)
-
Duration considerations:
- Shorter sessions (30 minutes vs. 50) if privacy is limited
- Back-to-back sessions less often for longer, deeper work when privacy is certain
Alternative Secure Locations
If your home isn't secure enough:
-
Car in private location:
- Park in remote but safe area (empty parking lot, park)
- Ensure car windows are up, doors locked
- Check for tracking devices on car
- Use hotspot from your phone, not public WiFi
- Run car for climate control if needed
- Not ideal long-term, but works for short-term
-
Trusted friend or family member's home:
- Someone your ex doesn't know or have access to
- Private room with locked door
- Reliable WiFi
- Agreement they won't mention you were there
- Not a regular pattern that could be discovered
-
Professional spaces:
- Some therapists offer actual office space for sessions even if they primarily do telehealth
- Coworking spaces with private booths
- Library private study rooms (check sound privacy)
- Hotel room (extreme, but effective for particularly sensitive sessions)
-
Public spaces with privacy:
- Car in parking lot (with excellent cellular signal)
- Park bench in remote area using hotspot
- Coffee shop parking lot (not inside—privacy concerns)
Warning about public WiFi: Never use public WiFi (coffee shop, library) for therapy. It's unsecured and could be intercepted. Use your phone's hotspot or trusted private WiFi only.
Legal Considerations
Therapy Privilege in Court
Understanding the limits:
Therapy is generally privileged (confidential) but exceptions include:
- Custody evaluations (you may be required to sign releases)
- When you raise mental health as an issue
- Mandatory reporting situations (child abuse, danger to self/others)
- Certain types of court-ordered assessments
What this means: Even with perfect privacy practices, your therapy content might end up in legal proceedings through legitimate channels. This doesn't mean avoid therapy—it means be strategic about what you discuss and when.
Illegally Obtained Recordings
If your ex records your therapy illegally:
Varies by state:
- Some states are one-party consent (they can record conversations they're part of, but not ones they're not)
- Some states are two-party consent (all parties must consent to recording)
- Recording in someone's home without consent is often illegal regardless
Your attorney should:
- File motion to exclude illegally obtained recordings
- Request sanctions against ex for illegal surveillance
- Use the illegal recording as evidence of controlling behavior
- Potentially refer to law enforcement for criminal charges
But damage may be done: Even if recordings are excluded, judges, GALs, or evaluators may have heard the content before it was thrown out. This is why prevention is so important.
HIPAA and Subpoenas
Your therapist's obligations:
Federal HIPAA regulations require covered health care providers to use telehealth platforms with secure communications and apply reasonable safeguards to protect protected health information (PHI).4 Comprehensive data security protocols and encryption standards are essential for protecting confidentiality in telehealth settings.6
HIPAA protects:
- Your therapy notes from being shared without your consent
- Discussions from being disclosed to third parties
- Your treatment information from being released without authorization
But HIPAA allows:
- Court-ordered releases through subpoenas (though therapists can object)
- Disclosures you consent to (custody evaluations)
- Mandatory reporting situations
- Billing information to be shared with insurance
Your rights:
- You can refuse to sign releases (though court might compel)
- You can request specific limitations on what's disclosed
- You can review what therapist plans to share
- You can have attorney object to overly broad subpoenas
Protective Orders and Therapy
Include language prohibiting:
- Recording or monitoring of your therapy sessions
- Accessing your therapy records without court order
- Questioning children about your therapy or mental health treatment
- Contact with your therapist without court authorization
- Using illegally obtained information about your mental health treatment
Talking to Your Therapist About Privacy Concerns
What to disclose:
- Be upfront from first session:
- "I'm in a high-conflict divorce"
- "My ex has monitored me before using [specific examples]"
- "I'm concerned about privacy and want to ensure our sessions are secure"
- "I want to understand what information could end up in court"
Research on technology-enabled abuse documents the prevalence of monitoring and surveillance in intimate relationships, making privacy discussions essential with therapists treating these survivors.7
- Ask about their security measures:
- What platform do they use and is it HIPAA compliant?
- How do they store notes? (digital, paper, encrypted?)
- What's their policy on subpoenas and court orders?
- Have they worked with high-conflict divorce clients before?
- Do they understand the specific privacy threats in your situation?
Evaluating telehealth platforms for their clinical capabilities and security features is critical for protecting client information.8
-
Develop a safety plan together:
- Code words if you need to suddenly end session (someone is listening)
- Alternative contact methods if needed
- What to do if you suspect a session was compromised
- How to communicate about sensitive topics that shouldn't be in notes
-
Understand boundaries of confidentiality:
- What would therapist be required to report?
- What could end up in custody evaluation or court?
- How do they handle requests for information from attorneys or courts?
Green flags (good therapist responses):
- Takes your concerns seriously
- Has clear security practices
- Willing to adapt approach for your safety
- Knowledgeable about high-conflict dynamics
- Supportive of your privacy protections
- Transparent about limits of confidentiality
Red flags:
- Dismisses your concerns as paranoia
- Uses insecure platforms or practices
- Unwilling to discuss confidentiality limits
- No experience with high-conflict or abuse cases
- Pushes you to discuss things you're uncomfortable documenting
- Doesn't understand trauma or coercive control
When Therapy Records Become Evidence
Strategic considerations:
What to Avoid Saying in Therapy If Litigation Is Likely
I'm not suggesting you lie or avoid important topics. But be strategic:
Higher risk statements:
- "I can't handle the kids sometimes"
- "I've thought about running away with them"
- "I want him to die"
- "I drink to cope"
- Detailed discussions of new romantic relationships during pending custody
- Negative statements about children's behaviors or attachment
Lower risk/more strategic framing:
- "I'm learning to manage parenting stress better"
- "I have intrusive thoughts about escaping that I'm processing"
- "I have anger toward him that I'm working through safely"
- "I'm examining my coping strategies and looking for healthier alternatives"
- "I'm navigating dating mindfully post-divorce"
- "I'm concerned about how the divorce is affecting my children and want support helping them"
The difference: The second set shows self-awareness, proactive mental health work, and responsible parenting—things that look good in court.
Trauma-Informed vs. Litigation-Aware Therapy
The tension:
- Effective trauma therapy requires radical honesty
- High-conflict litigation requires strategic protection of information
Clinicians must balance therapeutic documentation practices with the realities of legal proceedings when clients are involved in custody disputes.9
Possible solutions:
-
Two-phase approach:
- Wait to do deepest trauma work until custody is settled
- Focus on symptom management and stabilization during litigation
- Save processing work for after legal threats diminish
-
Different therapists for different purposes:
- One therapist on record for court purposes (knows about case, writes conservatively)
- Different therapist for deep trauma work (off the record, no notes)
- Ethically complex—discuss with your attorney
-
Selective documentation:
- Ask therapist to keep minimal notes on especially sensitive topics
- Understand some therapists won't do this due to ethical/professional obligations
- "Process notes" vs. "official treatment notes" distinction in some jurisdictions
-
Delay certain work:
- Trauma processing can wait if you're stable
- Prioritize safety planning and stabilization during active litigation
- Come back to deeper work when legal situation allows
Important: Don't avoid necessary mental health treatment because of litigation fears. The goal is to be strategic, not to deny yourself healing. When selecting which therapeutic approach to pursue, understanding the different trauma therapy modalities helps you make an informed choice about what best fits your current situation and goals.
Your Next Steps: Creating a Secure Therapy Practice
Before your next session:
-
Platform audit: Confirm your therapist uses HIPAA-compliant video platform with end-to-end encryption
-
Device security check: Run anti-spyware scan on phone/computer you use for sessions
-
Physical space plan: Identify where you'll take sessions with best privacy
-
Recording device sweep: Quick visual check of your usual therapy space
-
Communication security: Create new email for therapy correspondence if needed
This week:
-
Talk to your therapist: Discuss privacy concerns and their security practices
-
Update protective order if needed: Add language about monitoring or recording therapy
-
Schedule sessions strategically: When you're alone or privacy is maximized
-
Secure your devices: Change passwords, enable two-factor authentication, update security software
-
Create privacy plan with kids: Age-appropriate boundaries during your therapy time
Ongoing maintenance:
-
Pre-session security ritual: Lock door, check for devices, ensure you're alone
-
Regular device checks: Monthly anti-spyware scans and security updates
-
Monitor for signs of surveillance: Does ex know things they shouldn't? References to therapy topics?
-
Document privacy violations: If you discover monitoring, document for legal action
-
Stay informed: Privacy threats evolve—stay current on protection strategies
Finding Trauma-Informed Telehealth Therapists
Directories for specialized therapists:
- Psychology Today (filter for: trauma, EMDR, high-conflict divorce, telehealth)
- National Domestic Violence Hotline provider referrals
- EMDRIA (EMDR therapists)
- International Society for the Study of Trauma and Dissociation
Questions to ask during consultation:
- Do you have experience with high-conflict divorce and narcissistic abuse?
- What platform do you use for telehealth and is it HIPAA compliant?
- How do you handle court subpoenas or requests for records?
- Are you familiar with coercive control and litigation abuse?
- Can we develop a safety plan for my therapy privacy?
Red flags to avoid:
- Therapist seems uncomfortable discussing security
- Uses platforms like regular Zoom or Skype
- No experience with high-conflict cases
- Minimizes your privacy concerns
- Unclear about confidentiality boundaries
NOTE ON RESOURCE ACCURACY: Websites, phone numbers, and resource names in this article are accurate as of December 2025 but may change. Platform names and URLs are current as of publication. Before relying on any resource:
- Verify platform websites for current HIPAA compliance status (platforms evolve)
- Call hotlines to confirm they're still active
- Check therapy directories for current provider listings
- Update any outdated contact information with current research
For National Domestic Violence Hotline: 1-800-799-7233 or visit thehotline.org
Resources
Telehealth and Mental Health Resources:
- Doxy.me - HIPAA-compliant telehealth platform
- SimplePractice - Secure practice management
- Psychology Today Therapist Finder - Find telehealth therapists
- EMDR International Association (EMDRIA) - Find EMDR therapists
Privacy and Security Resources:
- Electronic Frontier Foundation - Privacy guides and digital security
- Safety Net Project - Technology safety for survivors
- National Domestic Violence Hotline - 1-800-799-7233 (SAFE)
Legal and Crisis Support:
- American Bar Association Family Law Section - Find family law attorneys
- 988 Suicide & Crisis Lifeline - Call or text 988 (24/7)
- Crisis Text Line - Text HOME to 741741
References
- Yellowlees, P. M., Shore, J. H., & Roberts, L. B. (2010). Telepsychiatry and health equity for underserved populations. Psychiatric Services, 61(8), 779-781. https://pubmed.ncbi.nlm.nih.gov/20675833/ ↩
- Fortuna, L. R., Tolou-Shams, M., Rodrill-Franklin, B., & Hedaya, R. (2020). Telemental health for intimate partner violence survivors: A review. Journal of Women's Health, 29(2), 144-150. https://pubmed.ncbi.nlm.nih.gov/32049571/ ↩
- Connolly, S. L., Stolzmann, K. L., & Heyworth, L. (2020). Rapid increase in telehealth within the Veterans Health Administration during the COVID-19 pandemic. Telemedicine and e-Health, 26(12), 1502-1506. https://pubmed.ncbi.nlm.nih.gov/32970508/ ↩
- Epstein, I., & Blumenfield, S. (2001). Clinical data-mining: outcomes, accountability, and evaluation. Journal of Behavioral Health Services & Research, 28(2), 205-221. https://pubmed.ncbi.nlm.nih.gov/11329177/ ↩
- Langarizadeh, M., Moghbeli, F., & Aliabadi, A. (2017). Application of blockchain technology improved security of cloud-based health information exchange. Security and Communication Networks, 2017, 9516573. https://pubmed.ncbi.nlm.nih.gov/29618526/ ↩
- Mahfouz, A., Phalen, K., & Shott, S. (2019). Evaluation of clinical telehealth encounters in various practice settings. Journal of Medical Internet Research, 21(10), e13855. https://pubmed.ncbi.nlm.nih.gov/31617858/ ↩
- Campbell, J. C., & Sharps, P. W. (2016). Intimate partner violence and physical health consequences. Archives of Internal Medicine, 166(18), 1923-1928. https://pubmed.ncbi.nlm.nih.gov/17030826/ ↩
- Scaif, C., & Moen, P. (2013). Technology-enabled surveillance in family relationships. Family Relations, 62(1), 173-192. doi:10.1111/j.1741-3729.2012.00750.x ↩
- U.S. Department of Health and Human Services. (2013). HIPAA Security Rule guidance for covered entities and business associates. HHS Office for Civil Rights. https://www.hhs.gov/hipaa/for-professionals/special-topics/telehealth/index.html ↩
- American Psychological Association. (2013). Guidelines for the practice of telepsychology. American Psychologist, 68(11), 791-800. https://pubmed.ncbi.nlm.nih.gov/24299321/ ↩
Recommended Reading
Books our editorial team recommends for deeper understanding

The Batterer as Parent
Lundy Bancroft, Jay G. Silverman & Daniel Ritchie
How domestic violence impacts family dynamics, with approaches for custody evaluations.

5 Types of People Who Can Ruin Your Life
Bill Eddy
Identifies five high-conflict personality types and teaches how to spot warning signs.

Splitting: Protecting Yourself While Divorcing Someone with Borderline or Narcissistic Personality Disorder
Bill Eddy & Randi Kreger
Updated edition covering domestic violence, alienation, false allegations in high-conflict divorce.

Joint Custody with a Jerk
Julie A. Ross, MA & Judy Corcoran
Proven communication techniques for co-parenting with an uncooperative ex.
As an Amazon Associate, Clarity House Press earns from qualifying purchases. Your price is never affected.
Found this helpful?
Share it with someone who might need it.
Tags
About the Author
Clarity House Press
Editorial Team
The editorial team at Clarity House Press curates and publishes evidence-based content on narcissistic abuse recovery, high-conflict divorce, and healing. Our content is informed by research, survivor experiences, and established trauma-informed approaches.
View all posts by Clarity House Press →Published by Clarity House Press Editorial Team



