HIPAA’s rules all center around Protected Health Information (PHI) and Electronic Protected Health Information (ePHI). PHI is individually identifiable information that centers around past, present, and future sensitive patient health information.
This includes:
According to HIPAA any Covered Entity and Business Associates that use and store PHI must ensure its safety throughout its handling. It is required that any reasonable threats to the security of PHI be protected against including physical, technical, and administrative threats.
You can learn more about HIPAA on the US Department of Health & Human Services website.
Initial Cybersecurity Training occurs for all employees during the on-boarding process. Including:
When you use our software as your content services platform (CSP) you can rest easy knowing our platform is HIPAA compliant. Our DOMA DX software incorporates the following protocols to ensure your data is safe:
841 Seahawk Circle Virginia Beach, VA
Please complete this form to start receiving our Newsletter. Keep up to date on offers, expert articles, and news.