VSee is trusted by the Navy SEALS, Lockheed Martin, IBM & others. It makes video conferencing plus screen sharing secure (256 bit AES), easy and free. From the Tech Closeup TV archive, segment on trends in the video conferencing industry featuring a company called VSee. VSee is a Video Conferencing software. Learn more about it's pricing, reviews, features, integrations and also get free demo.
to Download these Instructions on how to Join my VSee Messenger Network, Download the Program for your Initial Visit.New Users:
Click New Users & Existing Users Link to:

- Sign up. This also adds you to my network
- Download the program
- Open the program and become familiar with the program.
- Go into Settings and set up your Audio and Video
Do this way in advance of our meeting time so you have plenty of time to set up the program and become familiar with it.
On the day we meet you will need to log into the program following the instructions on the right for Existing Users.
You will not be able to get in by signing directly into the app itself during this overload time. You must Save this Page so you can return to this web page and click the New Users & Existing Userslink. Or, you can copy the link in the browser window and save it somewhere you will remember it.
Existing Users:
VSee Initially made their messenger free but when the pandemic hit they were overwhelmed with people using it. When people tried to sign into the App directly they were getting messages to pay for the service. I do not know if they are still doing so. As long as you are joining me there will be no charge.
If you get a message to pay use this link: New Users & Existing Users and sign in under Existing User on the right. VSee then knows you are in my network and you get in for free.
To join a Telehealth visit you must have:
- Quiet place where there is not background noise so we can both hear each other.
Vsee Video Conferencing Review
I often use the chat box to share links or documents with you with added resources that can be helpful for you. I am unable to do so if you are on a phone.Download Instructions
- Accept my Invitation & Downlod the VSee App
- Log Into VSee Messenger
- Audio, Video & General Settings
Once you download and set up the program you can use the Test Call to test your camera and microphone settings.
You can upload all of the intake forms you filled out prior to our first meeting in the chat box. Then we will be ready to get them finalized and go over any questions you have in our first session.
Do not sign them until we meet together so I can walk you through to signing process.
System Requirements
- Internet Connection – VSee recommends you have 500kbps for stable internet connection. You will need a Minimum of 200kbps upload and download to run VSee. You can go to speedtest.net to test your upload and download speeds.
- You will have a more stable and secure connection if your internet is hardwired into your computer or tablet.
- If you are using Wifi and there are other people in your household using the internet that:
- You have the primary use so your do not lose connection (if you have fast enough speed to support more than one person at a time).
- Or there is no one else using the internet during your appointment.
After you have signed up for your appointment, please download the program and familiarize yourself with how it works, PRIORto the meeting.
Once you have Accepted my Invitation, Downloaded the Program and configured your Video & Audio settings, there is a TEST CALL in the contacts section that you can use to test how your settings are working.
Click here for the VSee Knowledge Base for information on how to download the program, audio and video settings, etc.
Is VSee video conferencing HIPAA compliant?
VSee video chat helps you to be HIPAA compliant in two ways:
1) It protects data privacy in that all audio/video communication is securely encrypted.
2) VSee offers the HIPAA-required Business Associate Agreement where VSee agrees to be responsible for keeping all patient information secure and to immediately report any breach of personal health information.
Wondering how HIPAA and BAAs fit in with Canada health privacy laws?
Check out this blog post summarizing the important differences.
Check out VSee HIPAA Compliant Telemedicine Solutions
Table of Content:
What You Need To Know About HIPAA
HIPAA and Health IT
HIPAA is a federal law that protects the privacy of your personal health information. At the same time, it allows health care providers and certain related operations enough access to the information they need to do their jobs effectively. HIPAA includes several rules and provisions that set guidelines and requirements for the administration and enforcement of HIPAA.
The relevant ones for the implementation of health information technology and the exchange of protected health information in an electronic environment are the Privacy Rule and the Security Rule, as well as the HITECH Act which further enforced the two in 2009.
*State laws may have more stringent requirements than federal laws, however, in cases of conflict, federal
law supersedes state law.
Highlights Of The Privacy Rule, The Security Rule, and the HITECH Act
- The Privacy Rule, applies to protected health information (PHI) in any form whether paper, oral, electronic, etc. While it requires covered entities to put in place “administrative, physical, and technical safeguards” for protecting PHI, it differs from the Security Rule in that it discusses the cases in which PHI can be used, when authorization is required and what are patients’ rights with respect to their health information. (Page 8335 of the final Security Rule)
Summary of Privacy Rule
- The Privacy Rule, applies to protected health information (PHI) in any form whether paper, oral, electronic, etc. While it requires covered entities to put in place “administrative, physical, and technical safeguards” for protecting PHI, it differs from the Security Rule in that it discusses the cases in which PHI can be used, when authorization is required and what are patients’ rights with respect to their health information. (Page 8335 of the final Security Rule)
- The Security Rule applies only to protected health information in electronic form (E-PHI) and builds on the Privacy Rule requirements of “administrative, physical, and technical safeguards.”Unlike the Privacy Rule which is more concerned about patients’ rights and how health information is used and released, the Security Rule sets standards on the processes and technical security measures that should be taken to keep PHI private.It discusses acceptable ways to “implement basic safeguards to protect E-PHI from unauthorized access, alteration, deletion, and transmission.” (Page 8335 of the final Security Rule)* Under the Security Rule, paper to-paper faxes, person-to-person telephone calls, video teleconferencing, or messages left on voice-mail do not count as E-PHI because they did not exist in electronic form before the transmission.
Thus those activities are not covered by [the Security Rule]” (Page 8342 of the final Security Rule). In contrast, the Privacy Rule applies to all forms of PHI.
In particular, it calls for attention to:
- risk analysis and management
- administrative, technical, and physical safeguards
- organizational requirements
- policies, procedures, and documentation requirements
The US Department of Health & Human Services (HHS) now also offers a Security Risk Assessment (SRA) tool to help organizations ensure they are compliant with HIPAA’s administrative, technical, and physical safeguards and to expose areas where their PHI may be at risk
The figure below gives you an idea of the security measures covered by the Security Rule. (from the paper “Reassessing Your Security Practices in a Health IT Environment: A Guide for Small Health Care Practices”)
- The HITECH Act essentially added teeth to the HIPAA Privacy and Security Rules by specifying levels of violations and penalties for violations. It also requires periodic audits to ensure that covered entities and business associates are complying with the HIPAA Privacy and Security Rules and Breach Notification.
[Jump to Table of Content]
Who Is Required To Comply With HIPAA?
Not all operations that handle health-related information must follow HIPAA law (such as many schools, state agencies, law enforcement agencies, or municipal offices). Under HIPAA the 2 groups that must follow HIPAA rules are
- covered entities – health care providers, health plans, and health clearinghouses
- business associates – a person or group providing certain functions or services for a covered entity which require access to identifiable health information, such as a CPA firm, an attorney, or an independent medical transcriptionist
More business associate FAQs here
VSee would be considered the business associate of a covered entity that uses VSee to communicate private health information with a client.
Is A Software Vendor Considered a Business Associate Under HIPAA?
It depends. If a vendor or subcontractor transmits, maintains, or has routine access to protected health information (PHI) when providing its services to a covered entity then it is considered a business associate. For example, a vendor that hosts the software containing patient information on its own server or accesses patient information when troubleshooting the software, then it is considered a business associate and must have a business associate agreement with the covered entity as specified under the HIPAA Privacy Rule 45 C.F.R. § 164.504(e).
The only exception under HITECH section 13408 is in the case of a data transmission organization that acts as a conduit, in that it only transports information but does not access it, such as the US Postal Service or its electronic equivalent — Internet Service Providers (ISPs), a telecommunication company, etc.
While these may have access to PHI, they only access PHI on a random or infrequent basis as necessary for the performance of the transportation service or as required by law: “[D]ata transmission organizations that do not require access to protected health information on a routine basis would not be treated as business associates” (p. 22)
While VSee never has access to any information, health or otherwise, that you may observe, transmit, or receive by using VSee, it is still considered a business associate because it is used to transmit private health information over the Internet. To be HIPAA-compliant, a covered entity using VSee for this purpose must have a Business Associate agreement with VSee.
U.S. Department of Health on Software Vendors
How is HIPAA involved in your use of video conferencing?
Vsee Video Call
Videoconferencing may involve the electronic exchange of health information which is protected under HIPAA law. Security considerations with video conferencing may involve making sure unauthorized third parties cannot record or “listen in” on a video conferencing session, making sure recorded video conferencing sessions are stored and identified in a secure and proper manner, or having a procedure for initiating and receiving video calls. Other video collaboration features affecting security may include text chat, screen-sharing, and file transfer.
Videoconferencing would only be one small piece to consider when establishing and maintaining HIPAA-compliant IT security standards as described by the Privacy Rule and the Security Rule.
How does VSee allow you to comply with the HIPAA Privacy and Security Rules?

VSee has several characteristics that make it easy to protect the confidentiality of protected health information:
Vsee Video Conferencing
- Peer-to-Peer sessions
VSee uses a managed peer-to-peer architecture, where video (and other media) are streamed directly from endpoint to endpoint. Information is never stored on any VSee servers or intercepted by VSee in any way. The VSee management server is only used for address lookup, connection brokering, and system/user administration. This prevents information leakage between point A and point B.
- Encryption
Encryption adds another layer of security of VSee. All VSee traffic is encrypted with FIPS 140-2 compliant 256-bit Advanced Encryption Standard. This keeps your videoconference absolutely confidential.
Vsee Messenger
[Jump to Table of Content]
Is VSee certified for use under HIPAA?
Certification of health technology is regulated under the HITECH Act by the Office of the National Coordinator for Health Information Technology (ONC)in collaboration with the National Institute of Standards and Technology (NIST). HIPAA rules do “not assume the task of certifying software and off-the-shelf products” (p. 8352 of the Final Security Rule) neither do they set criteria for or accredit independent agencies that do HIPAA certifications.
In short, this means that the third-party HIPAA certification groups you may use are not regulated by any federal accreditation agency.
Currently, HITECH only provides for the testing and certification of Electronic Health Records (EHR) programs
and modules. The certification is generally used to qualify health operations for Medicare and Medicaid EHR
Incentive Programs.
VSee is not an EHR software or module.
[Jump to Table of Content]
Does VSee Offer A HIPAA Business Associate Contract?
VSee signs HIPAA Business Associate Agreements with our new Free Version VSee Clinicminimum purchase of a VSee Annual Waiting Room subscription (Pro subscription available for solo practitioners).
[Jump to Table of Content]
How do i clear downloads on my macsoftfreethsoft.
Does data have to be encrypted to be HIPAA compliant?
The Security Rule does not require encryption if an entity can prove it is not reasonable or appropriate to do so. However, it is a good idea to encrypt data whenever possible because in the case that there is a data breach, proper encryption exempts HIPAA-covered entities from the Breach Rule (section 13402 of the HITECH Act), which requires notification of PHI that has not been secured (i.e. encrypted) according to the security guidance publication (74 FR 19006 on April 27, 2009):
- “While covered entities and business associates are not required to follow the guidance, the specified technologies and methodologies, if used, create the functional equivalent of a safe harbor, and thus, result in covered entities and business associates not being required to provide the notification otherwise required by section 13402 in the event of a breach.” (p. 19008)
Encryption processes that have been tested and meet the guidance standard:
- (i) “Valid encryption processes for data at rest are consistent with NIST Special Publication 800–111, Guide to Storage Encryption Technologies for End User Devices.” (p. 19009-10)
- (ii) “Valid encryption processes for data in motion are those that comply with the requirements of Federal Information Processing Standards (FIPS) 140–2. These include, as appropriate, standards described in NIST Special Publications 800–52, Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations; 800–77, Guide to IPsec VPNs; or 800–113, Guide to SSL VPNs, and may include others which are FIPS 140–2 validated.” (p. 19009-10)
VSee does not store any of your data. All VSee traffic is encrypted with FIPS 140-2 compliant 256-bit Advanced Encryption Standard.
Official Documentation For HIPAA
HIPAA – Health Insurance Portability and Accountability Act of 1996, Public Law 104-191, the complete suite of HIPAA Administrative Simplification Regulations can be found at 45 C.F.R.Part 160, Part 162, and Part 164
The Privacy Rule – “Standards for Privacy of Individually Identifiable Health Information” and is found at 45 CFR Part 160 and Subparts A and E of Part 164.
The Security Rule – “Security Standards for the Protection of Electronic Protected Health Information” and is found at 45 CFR Part 160 and Subparts A and C of Part 164.
Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules – 45 C.F.R. Parts 160 and 164
Other references
Using Skype for Telehealth
Is Video Chat HIPAA Compliant?
What Makes VSee Video Chat Secure
HIPAA and Canadian Health Information Privacy
