In view of the sensitivity associated with the Healthcare Information, all our teams work on fully locked down dumb terminal PC’s which don’t have a floppy drive, CD drive or a USB port. We take all compliance related concerns of our customers very seriously and we address them proactively. Our delivery center houses the most technologically advanced infrastructure to handle data security issues . Here is how we go beyond the basics counter measures :
Physical Security
In our delivery center no one is allowed in without screening and no one is allowed to bring in or take any information capture devices including mobile phones and cameras. The facility is truly locked down with access only to authorized individuals in client specific areas protected by card readers and a secure access systems. A 24×7 security force physically guards the facility from any unauthorized access.
100% HIPAA Compliant
We are committed to achieving and maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA) of 1996. As your trustworthy partner in the chain of carrying patient health information, we have in place specific technical and physical security features for our data system, including identification of authorized users, control of system access, data integrity, and backup/recovery to ensure availability and reliability. In compliance with HIPAA, security is maintained using a combination of authorized mechanisms and secure socket layer protocol.
Authentication
Authentication is ensured through efficient use of passwords to establish user identity. Access to our proprietary workflow and distribution system is granted only after authentication.
Integrity
Data, program, system, and network integrity play a role in ensuring that information is exchanged only in an authorized manner.
Audit Trial
Complete logging of all modifications made to each and every document including editor, editor’s role, and time of edit.
System Security Monitoring
Monitoring of activities occurring in our system to prevent and/or detect any breach.
Data Storage and Transmission Features
Secure physical storage of all data and secure transmission. This includes constant surveillance by network experts, premises protected by security guards, and securely encrypted transmission between NWRCM and its clients.
Confidentiality Agreements
We restrict access to all confidential information. Only select employees may access the system for administrative and support purposes. These employees are very limited in number and are committed to the NWRCM privacy and security policies. NWRCM signs a Confidentiality Agreement with each of our employees and our customers. This clause outlives the life of the contract itself.