EPOCH - Your preferred partner for Healthcare Solutions
WHAT IS HIPAA ?
HIPAA is the abbreviation for the Health Insurance Portability and Accountability Act formulated in 1996. HIPAA regularizes the accessibility and comprehensiveness of group health plans and some specific health insurance policies. It is a revised version of the Employee Retirement Income Security Act, the Public Health Service Act, and the Internal Revenue Code. These directives, include the much talked about patient privacy and Safety regulations that depicts the US Governments involvement in regularizing these rules in the health care industry. The main aim of the act is to assure that healthcare authorities maintain the privacy of the patients regarding the health information and the rights they are bestowed as privacy rights.
WE ARE HIPAA COMPLIANT!
Abiding by the privacy rules of HIPAA, EPOCHHCS ensures conclude confidentiality of the patients confidential information. business associate (BA) with HIPAA, where BA is an associate who carries out the functions being monitored by covered entities (CE) to protect the information.
We are extremely authoritarian regarding compliance. We got taken several steps and composed our process totally compliant with HIPAA directives. You can be guaranteed of the highest security policies followed here.
All client and/or patient details is safely encrypted to be had permission to by only assigned personnel in an authorized way. Your privacy and safety are our main priorities at EPOCHHCS. All our policies are committed to following HIPAA guidelines and confidentiality.
THE SERVICES AT EPOCHHCS ARE CONSTRUCTED TO DISPUTE HIPAA COMPLIANCE IN THE FOLLOWING WAY:
-
Each employee from EPOCHHCS is bound by a confidentiality agreement that announce that they're not have the right to use or disclose, or supply anyone else the private details that they add up to know in.
-
Infringement of the terms in the agreement can outcome in legal action and ahead be the responsible of to termination.
-
HIPAA Compliant encrypted email systems and Secured, encrypted servers, with redundant backups.
-
Access card and biometric systems are employed for ensuring authorized entry only. The security scheme is monitored manually around the clock which leaves no chance of unwanted intrusion.
-
No one has the Get into use to the confined zones as an example server room and has itsy-bitsy entry and only the administrator and authorized personnel are allowed.
-
The entire system is computer-generated and can access email and internet from designated employees. Access is protected by a unique password for each staff member.