Counseling and Psychotherapy

At HarmonyUs, Inc. we do not subscribe to the traditional forms of counseling interventions. Our process is egalitarian, team oriented and customized to each individual’s needs. We use everything from talk, to art therapy, to empowerment field trips, to hypnosis, to transference resolution therapy. Our entire professional staff meets weekly to discuss cases, thus ensuring that there is a panel of experts in various fields to help better serve you in your growing process.

Individual Counseling is one on one counseling that is direct, active, personal, and focused on increasing the individual client’s self-understanding and adjustment to changes in their world. Whatever the source, holistic psychotherapy works to restore the balance between mind, spirit, and body. It is a blending of ancient eastern methodologies with modern western psychotherapies that reach into your inner self and helps you experience a better life with less pain, disharmony, and stress. At HarmonyUS, we are devoted to helping you restore strength and balance to where you can begin to engage life again on a level to where you will feel enriched. We work to help you release the negativity around you and focus on positive aspects and behaviors designed to enrich your life. Our goal is simply to help you experience more joy and well-being in your everyday living.


Psychotherapy is therapeutic interaction or treatment contracted between a trained professional and a client, patient, family, couple, or group. Simply, Psychotherapy is a general term for treating mental health problems by talking with a psychiatrist, psychologist or another mental health provider. During psychotherapy, one hopes to learn about their condition and moods, feelings, thoughts, and behaviors, how to take control of one’s life and respond to challenging situations with healthy coping skills. The problems addressed are psychological in nature and can vary in terms of their causes, influences, triggers, and potential resolutions. Accurate assessment of these and other variables depends on the practitioner’s capability and can change or evolve as the practitioner acquires experience, knowledge, and insight.


A branch of psychotherapy that works with families and couples in intimate relationships to nurture change and development. It tends to view change in terms of the systems of interaction between family members. It emphasizes family relationships as an important factor in psychological health.

Couples therapy is a form of therapy used to treat relationship distress for both individuals and couples. Couples may meet together and individually during this process. The Gottman Method is the primary form of relationship therapy that we use.This method of therapy was developed out of research to help partners: Increase respect, affection, and closeness. Breakthrough and resolve conflict when they feel stuck. The Gottman Method is effective for all relationship types.


A branch of psychotherapy in which its main treatment involves placing patients in groups and, under the guidance of a trained therapist or coach, encouraging them to discuss their problems with each other. This process is designed to recreate the family dynamic experience and is one of the best forms of treatment for those who have limited outside support systems, have had traumatic relationship experiences or who have difficulty with some interpersonal connections or boundaries.

Play therapy is a form of counseling or psychotherapy that uses play to communicate with and help people, especially children, to prevent or resolve psychosocial challenges. This is thought to help them towards better social integration, growth, and development.

Play therapy can also be used as a tool of diagnosis. A play therapist observes a client playing with toys (play-houses, pets, dolls, etc.) to determine the cause of the disturbed behavior. The objects and patterns of play, as well as the willingness to interact with the therapist, can be used to understand the underlying rationale for behavior both inside and outside the session.

According to the psychodynamic view, people (especially children) will engage in play behavior in order to work through their interior obfuscations and anxieties. In this way, play therapy can be used as a self-help mechanism, as long as children are allowed time for “free play” or “unstructured play.” Normal play is an essential component of healthy child development.

One approach to treatment is for play therapists to use a type of desensitization or relearning therapy to change disturbing behavior, either systematically or in less formal social settings. These processes are normally used with children but are also applied with other pre-verbal, non-verbal, or verbally-impaired persons, such as slow-learners, or brain-injured or drug-affected persons.

Services Include:

Peace of mind that we are there for you when or where you need us

Concierge therapy means we give you priority appointment times. You move to the front of the waiting list as a new client. Even if you don’t have an appointment we will fit you in within 48 hours of contact if you need to talk.24/7 accesses to your therapist via Private Phone Number

In Person Mental Health advocacy for inpatient hospitalizations (Tampa Bay area only unless travel expenses and per diem covered)

You receive priority email replies.

Off business hour appointments are available to you.

Want to run something by us? We will get back to you within 24 hours.

Includes 3 one hour sessions $100 charge per clinical hour following the first three ($100 savings per hour)

Services cannot be combined with other offers, discount plans, or insurance.

No extra charges for letters, emails or reports

If you need to contact your therapist outside of session for a concern or issue and you cannot afford the VIP Concierge service. You will benefit from the Harmony Concierge Texting service.

This has a multitude of applications such as reality checking for addiction, working through in the moment anxiety, or needing to reach out for support.

Services Include:

Concierge Texting means we will provide answers to your query within a few hours of you sending a secure message over a HIPPA compliant platform from 10am to 8pm. Please keep in mind the therapists’ work schedules and private lives may interfere with answering right away.

Telemedicine and Digital Therapy

Telemental health or telebehavioral health is the process of providing behavioral therapy or psychotherapy remotely, typically utilizing HIPAA-compliant video conferencing or text-based messaging.

Tele-Behavioral Health enables HarmonyUS to deliver clinical Behavioral Health services at a distance via electronic communications. Sometimes called telemedicine, mHealth, e-care, or telecare, the term “telehealth” covers a variety of clinical services provided using telecommunications and related technologies.

Harmony Telemedicine Criteria

Client must be moderate to low risk for suicide based upon initial assessment. Client must have a Primary Care or Psychiatrist that the coach or counselor may speak with for continuity of care and background. An Individual Safety Plan for Emergencies must be developed with the client in the first session which will include: What to do if I feel Suicidal? Who is my Emergency Contact? Who is my Psychiatrist and Primary Care Physician? What is my closest Hospital? What is our alternative if technology fails?

Telemedicine Video System

Harmony uses Secure Video for our Digital Medicine Platform. was founded in 2012 by a team of behavioral health and technology experts in the San Francisco Bay Area. We’ve worked together since 1999 and have a passion for developing clinical technology systems that are simple, intuitive and pragmatic. We saw a need for a videoconference system that would be quickly implemented and adapted to the workflows of any medical environment – hospitals, networks, clinics, individuals and more. This would allow existing medical organizations to offer telehealth services – as opposed to sub-contracting for a specialty network that happened to work via video. We knew that the technology could now support this “do-it-yourself” approach, but the workflows needed to be designed correctly and it needed to be supported as a service, not just technology. We formed SecureVideo to meet this need. Our mission is to support medical professionals as they harness technology to transform healthcare.  

Equipment Requirements



Please view operating system and bandwidth requirements on the system requirements page on our main website.

Why do providers use Digital Health Platforms?


What do providers already using video think?


Some of the benefits providers have cited from working in video include:
  • Reduced no-shows
  • Ability to work from home
  • More billable sessions because of less “chit chat” with patients
  • Great way fill “non-prime” time slots
  • Reduced office expense
  • Physical safety

Telemedicine Studies:


Do you have evidence on videoconferencing effectiveness?


Here are two studies:
  • A study of nearly 100,000 mental health patients at the U.S. Department of Veterans Affairs demonstrated an approximately 25% reduction in hospitalization after initiation of video services.(Linda Godleski, M.D.; Adam Darkins, M.D., M.P.H.; John Peters, M.S. Psychiatric Services 2012; doi: 10.1176/
Outcomes of 98,609 U.S. Department of Veterans Affairs Patients Enrolled in Telemental Health Services, 2006–2010
  • Practice-based collaborative care is a complex evidence-based practice that is difficult to implement in smaller primary care practices that lack on-site mental health staff. Telemedicine-based collaborative care virtually co-locates and integrates mental health providers into primary care settings. The objective of this randomized, multisite trial was to compare the outcomes of patients assigned to practice-based and telemedicine-based collaborative care. (John C. Fortney, Ph.D.; Jeffrey M. Pyne, M.D.; Sip B. Mouden, M.S., C.R.C.; Dinesh Mittal, M.D.; Teresa J. Hudson, Pharm.D.; Gary W. Schroeder, Ph.D.; David K. Williams, Ph.D.; Carol A. Bynum, Ph.D.; Rhonda Mattox, M.D.; Kathryn M. Rost, Ph.D. Am J Psychiatry 2013;:. 10.1176/appi.ajp.2012.12050696)

HIPAA Security Rule


This is a close read of the HIPAA Security Rule.  The following article provides an outline of the different sections and compliance requirements for each one.  We intend this to offer a way to get started.  You may want to assign a Privacy Officer to examine this and all HIPAA rules thoroughly and help you put an action plan in place.       Answer
HIPAA established the Security Rule to ensure that all covered entities have implemented safeguards to protect the confidentiality, integrity, and access of PHI. There are two types of implementation specifications: “required” and “addressable.”  Wherever the Security Rule reads “required,” that specification must be implemented; whereas, if it says “addressable,” there is some wiggle room in exactly how you comply with that specific standard. To meet the addressable specifications you can either a) implement as directed in the rule; b) implement one or more alternatives that will give you the same results; c) not implement at all.  If you decide on the latter, it’s advisable to create documentation that outlines how you came to that decision; i.e., the factors you considered and the results of a risk assessment you used to base your decision. It’s important to emphasize that the addressable specifications are not optional.  You just have a little more flexibility in how you implement those pieces. The Security Rule has three parts: 1)   Technical Safeguards 2)   Physical Safeguards 3)   Administrative Safeguards Technical Safeguards HIPAA Technical Safeguards include:
  1.      Access control
  2.      Audit controls
  3.      Integrity
  4.      Person or entity authentication
  5.      Transmission Security
There are four required standards to meet under the Technical Safeguards.
  1.     Access Control:  Unique User ID-  Every user must be assigned a unique ID that is used to track activity.
  2.     Access Control:  Emergency Access Procedure- Have procedures that allow you to access ePHI in the case of an emergency.
  3.     Audit Control  Activity Oversight- You must have a system in place to record and review all ePHI activity logs.
  4.     Person or Entity Authentication-  You must confirm that a person who desires access to ePHI is who they say they are.
There are also five addressable Technical Safeguard standards.
  1.    Access Control: Automatic Log-off-  Set up auto log off systems for all workstations.
  2.    Access Control:  EncryptionHave a system to encrypt and decrypt ePHI.
  3.    IntegrityMechanism to Authenticate ePHI- Authenticate ePHI to verify its integrity.
  4.    Transmission security:  Integrity Oversight- Ensure that ePHI is not modified without detection.
  5.    Transmission securityEncryption Control- Develop a system that encrypts ePHI whenever  deemed appropriate.
For reference: HIPAA Security Technical Safeguards  Physical Safeguards  The four standards to address here are:
  1.     Facility Access Controls
  2.     Workstation Use
  3.     Workstation Security
  4.     Device and Media Controls
Under these sections, there are four required implementation standards to note:
  1.      Workstation Use – you must create policies and procedures that outline the proper functions to be performed by electronic devices and the appropriate business use of workstations.
  2.      Workstation Security- similar to the one above, this standard asks you to implement safeguards for workstations that contain ePHI and limit access to authorized users.
  3.      Device and Media Control- Media Re-Use- implement procedures for ePHI removal before the device or media is available for re-use.
  4.      Device and Media Control- Disposal- Implement policies and procedures for the final disposal of ePHI and any hardware associated with its storage.
Next, you have six remaining addressable Physical Safeguard implantation standards:
  1.      Facility Access Controls: Contingency Operations- Create and implement a disaster plan for emergencies to restore any lost data.
  2.      Facility Access Controls: Facility Security Plan- Implement policies and procedures to protect the facility and it’s equipment from access, tampering, and/or theft.
  3.      Facility Access Controls: Access Control and Validation Procedures-  Implement procedures to control and validate a person’s facility access based on their role or function; i.e., staff and visitor badges, control of access to software testing & editing.
  4.      Facility Access Controls: Maintenance Records-  Implement policies and procedures to document repairs and upgrades to the physical components related to security; i.e. Hardware, locks, bolts, and doors.
  5.     Device and Media Controls: Accountability-  Maintain documentation for hardware and electronic media
assigned to people responsible for them.
  1.     Device and Media Controls: Data Backup and Storage-  Create a retrievable, exact copy of ePHI, as needed, before movement of equipment or hardware.
For reference: HIPAA Security Series, Security Standards: Physical Safeguards (PDF) Administrative Safeguards The administrative piece is vital when starting a HIPAA compliance program.  Over half of the HIPAA Security requirements are under this section.  The administrative safeguards are “administrative actions, policies and procedures to manage the selection, development, implementation and maintenance of security measures to protect ePHI and to manage the conduct of your workforce in relation to protected information.” You are required to designate a privacy officer, complete document a risk assessment annually, train employees, review policies and procedures, and complete Business Associate Agreements or BAAs, with all your partners handling PHI. There are nine standards in the Administrative Safeguards section.  They are:
  1.     Security Management Process
  2.     Assigned Security Responsibility
  3.     Workforce Security
  4.     Information Access Management
  5.     Security Awareness and Training
  6.     Security Incident Procedures
  7.     Contingency Plan
  8.     Evaluation
  9.     Business Associate Contracts and Other Arrangements
There are eleven required Administrative safeguard standards.
  1.     Security Management Process: Risk Assessment-  Conduct and document a risk analysis to review ePHI storage and use to assess where their are vulnerabilities in your systems.
  2.     Security Management Process: Risk Management-  Implement measures to reduce a risks
  3.     Security Management Process: Sanction Policy-  Implement appropriate sanctions against employees who fail to comply with security protocols
  4.     Security Management Process: Information Systems Activity Reviews-  Regularly review system activity, logs, audit trails, and the like.
  5.     Assigned Security Responsibility: Officers-  Designate in house HIPAA Security and Privacy Officers.
  6.      Information Access ManagementMultiple Organizations-  Ensure that ePHI is not accessed by other partner entities like a parent company, a subsidiary, contractors, or subcontractors- that shouldn’t have access.
  7.     Security Incident Procedures: Respond and Document-  Respond and document all security incidents.
  8.     Contingency Plans: Contingency Plans-  Implement policies and procedures that ensure the availability of ePHI backups and the retrieval of any lost data.
  9.     Contingency Plans: Emergency Mode-  Establish procedures to allow for critical business operations to protect ePHI in the event of an emergency.
  10. Evaluations:  Perform cyclical evaluations to make changes to in your business operations should any HIPAA laws change.
  11. Business Associate Agreements (BAAs):  Implement contractual agreements to ensure your partners’ compliance with all HIPAA laws.  Choose partners who have similar agreements in with others in place.
There are also seven addressable standards under the Administrative Safeguards.
  1.     Workforce Security: Employee Oversight-  Implement policies and procedures to ensure all members of your workforce have appropriate access when their role calls for it and has that access removed when necessary.
  2.     Information Access: Access Authorization-  Implement policies and procedures for granting access to ePHI that monitor and allow access to ePHI.
  3.     Security Awareness and Training: Security Updates-  Cyclically send security reminders to about security and privacy policies to all employees.
  4.     Security Awareness and Training: Protection Against Malware-  Create policies and procedures that safeguard your systems against malicious software.
  5.     Security Awareness and Training: Log-in Oversight-  Implement monitoring of logins and reports of inconsistencies within your systems.
  6.     Security Awareness and Training: Password Controls-  Assure that there are systems in place for creating, protecting, retrieving, and editing passwords.
  7.     Contingency Plans: Update and Review-  Assess the relative criticality of specific applications and data in support of other contingency plan components.
For reference: HIPAA Security Series, Security Standards: Administrative Safeguards (PDF) Content pulled from Secure Video Information Website 

*Insurance does not cover specialty programs