The stored PHI data is segmented both logically and physically by separating back-end database/storage server from the front-end HTTPs servers. This separates publicly accessible sites/api from the data storage.
All network requests are logged, along with all system logs. PHI HTTP/HTTPS requests (GET, POST, PUT, DELETE). Additionally, alerts are proactively sent based on suspicious activity. In addition the key protocols and services are monitored by our NOC for faults and errors.
business associate agreement
We are fully committed to providing your organization with a signed BAA as required in the HITECH Act and recent Omnibus Rule changes. Our goal is to ensure your organizations hosted applications services are fully complaint.