Platform Live
Security & Compliance

HIPAA isn't a badge.
It's our architecture.

Every system we build is designed around PHI protection from the ground up — from the RCM engine to the client platform.

HIPAA Compliance

Full HIPAA Security Rule compliance
Annual Security Risk Assessments (SRA) on file
Business Associate Agreement (BAA) at contract execution
Privacy Rule controls on all PHI access
Workforce training and access documentation

Azure Infrastructure

Microsoft Azure HIPAA-eligible cloud services
99.9% uptime Service Level Agreement
Geo-redundant data storage and backup
Automated failover and disaster recovery
No PHI stored on local or unsecured systems

Access Control

Role-based access control (RBAC)
Admin / Biller / Front Desk / Auditor / Owner roles
Multi-factor authentication (MFA) required
Session timeout and inactivity locks
Provisioning and de-provisioning protocols

Audit & Monitoring

Complete audit log on every user action
Real-time anomaly detection and alerting
Monthly access review and reporting
Incident response with OCR notification protocol
Annual third-party penetration testing

Data Encryption

TLS 1.3 encryption in transit
AES-256 encryption at rest
Encrypted backups with tested restore procedures
No PHI in logs, error messages, or URLs
Key management via Azure Key Vault

Legal & Contracts

BAA executed before any PHI access
Subcontractor BAA chain maintained
Breach notification within 72 hours of discovery
Data retention and destruction policy documented
OCR-ready documentation on request
Azure
HIPAA-Eligible Cloud
AES-256
Encryption at Rest
TLS 1.3
Encryption in Transit
99.9%
Uptime SLA

Questions about our security posture?

We'll walk your compliance team through our controls in detail.