DOMA "D" Logo

How DOMA Achieves

HIPAA Compliance

DOMA is compliant with HIPAA (Health Insurance Portability and Accountability Act of 1996) regulation protecting private health information records.

About HIPAA Compliance

Who is required to comply with HIPAA?

According to HIPAA, any Covered Entity and Business Associates that use and store PHI must ensure its safety throughout its handling. It is required that any reasonable threats to the security of PHI be protected against, including physical, technical, and administrative threats.

You can learn more about HIPAA on the US Department of Health & Human Services website.

HIPAA Regulations protect private health information records by requiring:

HIPAA’s rules all center around Protected Health Information (PHI) and Electronic Protected Health Information (ePHI). PHI is individually identifiable information that centers around past, present, and future sensitive patient health information.

This includes:

  • Medical Records
  • Diagnoses
  • Treatments
  • Prescriptions
  • Test Results
  • As well as other Personally Identifiable Information (PII)

HIPAA Compliance at DOMA

We follow the HIPAA Regulations for safeguarding Protected Health Information (PHI) and Personal Identifiable Information (PII) throughout the handling of your documents.

In addition​ to extensive employee training, we make facility security a priority. Conversion Rooms are restricted, requiring key-card entry. In our Secure Document Conversion Rooms, cell phones, and all other forms of recording devices are prohibited, further protecting PII and PHI.

Employees undergo training in 12-month cycles, which includes:

  • PII
  • PHI
  • Cybersecurity Best Practices
  • Password Security
  • Facility Security
DX Software Medical Mock-up on Laptop

HIPAA Compliant Software Platform

DX Engage was built from the ground up to be secure

When you use our software as your Content Services Platform (CSP), you can rest easy knowing our platform is HIPAA compliant. Our DOMA DX software incorporates the following protocols to ensure your data is safe: 

  • Multi-Factor User Authentication
  • Access Management, such as Time-Outs
  • High-level Encryption
  • Regular Patches
  • Proactive Threat Protection
  • Audit Trails
  • Physical Security (Within DOMA)
  • Backup, Disaster Recovery, & Version Control

Join DOMA Technologies' Email List

Please complete this form to start receiving our Newsletter. Keep up to date on offers, expert articles, and news.