We fulfill all the requirements of the Health Insurance Portability and Accountability Act of 1996.

We pride ourselves in fulfilling the requirements of the Health Insurance Portability and Accountability Act of 1996, its subsequent amendments, and any related legislation such as the Health Information Technology for Economic and Clinical Health (HITECH) Act.

What you need to know

The Health Insurance Portability and Accountability Act was enacted on August 21, 1996 and signed into law by President Bill Clinton.

Information Protection

HIPAA compliance encompasses limitations on uses and disclosures of PHI and ePHI safeguards against inappropriate uses and disclosures, and individuals’ rights with respect to their health information.

PHI and ePHI

PHI (Protected Health Information) or ePHI (Electronic Protected Health Information). PHI includes any IIHI that is transmitted by electronic media, maintained in electronic media, transmitted or maintained in any other form or medium.

Our secure environment

Firewall

A firewall refers to a hardware or software system that is used to secure a network, via a set of rules that control the traffic that’s entering and exiting it. We have firewalls fully implemented on our platform.

Encrypted VPN

An encrypted VPN is technology that essentially creates a tunnel between two devices (typically the server and the client). The data is encrypted entering the tunnel and decrypted as it exits it.​

Two-factor Authentication

We utilize a security check that uses two different forms of authentication to confirm the identity of the user.

Private Hosted Environment

In a private hosted environment, the data is all in its own place, so it is not being shared or intermingled with the information of other apps or hosting users.

All Landmark personnel have completed HIPAA training provided by a third-party consulting firm specializing in HIPAA compliance.

Contact

© 2009-2020 Landmark Associates, Inc.