HIPAA EMR Basics

Emrproofing.com believes that patient / client confidentiality is of utmost importance. All client / patient transcription related procedures, voice, and data storage and document management conforms or exceeds HIPAA regulations.

The following is a partial list of the rules and regulations that we strictly adhere to:

EMRPROOFING.COM files and directories on computers are configured in a way as to prevent unauthorized viewing, deleting, or copying.
To prevent unauthorized use, security devices are employed to prevent theft and / or vandalism of any information stored on our systems.

Client-related documents are sent to and from computers using a minimum of 128-bit encryption.

EMRPROOFING.COM stores patient and client names in a database that uses secure and encrypted technologies.

EMRPROOFING.COM has administrative procedures in place to guard data integrity, patient confidentiality, and document availability. (Information Access Control and Access Authorization)
Hard-copy documents and sound files related to clients / patients are disposed of with shredding and deleting.

Technical evaluations are performed on a routine basis to make sure all systems meet or exceed specified security requirements.
We make sure our clients, when exchanging electronic data know how to protect the confidentiality of the data exchanged.

Emergency Contingency plans are in effect to facilitate continuity of operations.

All persons, administrators, editors and transcribers, who have access to any sensitive information, patient records, or voice files, etc. have the appropriate clearances and have signed confidentiality agreements.
We have provided privacy, security, and confidentiality awareness training to our entire workforce.

Our compliance decisions are based on sound business practices and meet and exceed HIPAA.
In developing HIPAA compliance we have established the following:
Assessment of information available, who has access to that information and what protections are in place to prevent misuse of patient information, we may receive from our clients.

We have established a security policy with integrated whole business enterprise security.
Our computer systems have active security, monitored 24 hours a day, 7 days a week with automated and real time network intrusion detection.

We use approved, time-tested, leading security products. (Virus protection and encryption)

All employees are subject to patient privacy rules and regulations, and can be subject to immediate dismissal and will be prosecuted by the Laws of the United States if found in violation.