HIPAA (backend)
π’ Smarter AI π’
π’ 100%. Compliant. Backend.
Server Management
We run our own self-hosted servers
We run everything in a fully compliant 100% Private Network
we are responsible for ALL security configurations (firewalls, updates, application security).
We have done all of those and more
Security Software
We have installed and configured our own security software (antivirus, intrusion detection).
Firewalls and antivirus alone are not enough for HIPAA
We know this. We have taken steps to close all gaps.
It's a comprehensive framework requiring policies, procedures, and specific technical safeguards.
We have these in place.
π’ Specific. Services. Implemented.
Compliance is a shared responsibility requiring technical setup and robust policies for ePHI.
Key Steps Taken:
Dedicated Servers/Colocation
We have implemented dedicated servers for greater control and isolation, rather than shared hosting, as PHI needs secure, isolated environments.
Private Networking
We use private network feature to keep our server traffic secure and separate from the public internet.
Encryption
We encrypt all Protected Health Information (PHI) both "at rest" (on the server) and "in transit" (using SSL/TLS for web traffic).
Access Controls
We have set up strong user authentication (2FA), unique logins, and role-based access to limit who can see ePHI.
Audit Logs & Monitoring: We have enable detailed logging of all access and activity on the server and monitor for suspicious events in real-time.
Secure File Transfer
We use SFTP (Secure File Transfer Protocol) for all data transfers.
We also use SSH (Secure Shell), a network protocol that establishes encrypted connections between all our computers for secure remote access. It operates on TCP port 22 and provides authentication, encryption, and integrity to protect data transmitted over unsecured networks.
Risk Assessments
Conduct regular, documented risk assessments of your server environment.
Data Backup & Recovery
We implement secure, regular backups with tested disaster recovery plans for your ePHI.
Breach Notification Plan
We have clear procedures for detecting, responding to, and reporting data breaches
π’ HIPAA-Compliant. Frontend.
HIPAA (frontend)π’ PCI DSS. SOC2. Compliance.
SOC-2 Type IIPCI DSSπ’ Compliant. Subprocessors.
Compliant SubprocessorsLast updated
Was this helpful?