The best transcription and back-office solutions. Period!

uk replica watches swiss replica watches replica watches uk uk replica watches fake watches
HOME | About Us | FAQs | Search  
Services
Promotions
HIPAA
Downloads
Contact Us
Useful Links
Login
   
 
  HIPAA  
     
 
PHI Security HIPAA FAQs HIPAA & PHI Basics Articles on HIPAA regulations/ guidance Articles on HIPAA compliance strategies
 
     
 

AmScribe asserts its leadership ability in transcription technology by being fully HIPAA compliant in line with requirements to assure our medical clients with express security. We take HIPAA policies seriously and handle PHI information on a need to know basis . Our compliance decisions are based on sound business practices and meet and exceed HIPAA standards.

We implement strict measures at our facility(ies) to ensure that we remain compliant with HIPAA policies, some of which are:

  •  The entire communication process is thoroughly encrypted.

  • Our computers are password protected.

  • Our systems are behind industrial strength hardware and software firewalls and documents are anti-virus certified before posting.

  • We have strict policies for recycling any paper with PHI. All such documents are securely shredded prior to discarding.

  • We currently require all our employees to sign a confidentiality and non-disclosure agreement and are subject to our corporate HIPAA policy.We maintain up-to-date contractual agreements with all business parties including our subcontractors.

  • All persons, administrators and transcriptionists, who have access to any sensitive information, patient records, or voice files, etc., have the appropriate clearances and have signed confidentiality agreements.

  • All client related information when using the Internet is handled in secure 128-bit SSL encryption.

  • All the chart delivery and management system is through secure 128-bit SSL encryption.

  • AmScribe has administrative procedures in place to guard data integrity, patient confidentiality, and document availability. (Information Access Control and Access Authorization).

  • To prevent unauthorized use, security devices are employed to prevent theft and/or vandalism of any information stored on our systems.

  • Technical evaluations are performed on a routine basis to make sure all systems meet or exceed specified security requirements.

  • Our entire workforce is empowered with privacy, security and confidentiality awareness training.

  • Additionally, we maintain a strict privacy policy that you can review here

 
     
á TERMS OF USE STAFF MAIL DISCLAIMER PRIVACY POLICY SITEMAP Copyrightę2007 AmScribe LLC. All rights reserved