5900 Balcones Drive STE 100 Austin TX, USA 78731
HIPAA COMPLIANCE

ZenniMate Healthcare maintains full compliance with HIPAA and HITECH regulations.

The company implements a range of measures to meet the rigorous requirements of these essential data privacy and security standards.

1. On-Site Entry

  1. Access to the facility is controlled through biometric systems and proximity cards.
  2. All staff are issued photo ID cards, which must be worn at all times while on site.
  3. Access logs are regularly reviewed and audited to detect any unauthorized entry attempts.
  4. Access is assigned based on the least-privilege principle, tailored to each employee’s role.

2. Protection

  1. Security staff are on duty around the clock and are stationed at every entry and exit point of the facility.
  2. Visitor information, including their name, time of entry and exit, contact person, ID proof, signature, and visit purpose, is recorded in a dedicated register.
  3. The physical register is kept for at least 10 years.

3. Service Provider Access

  1. Service Provider must sign a confidentiality agreement before entering sensitive areas like the data/network center and power supply control room.
  2. Service Providers are accompanied by security personnel and are constantly supervised by either an employee or security staff.

4. Personal Belongings

  1. Please note that backpacks and any other types of bags are not permitted inside the facility.
  2. All bags must be stored in the locker boxes located outside the production area.

5. Mobile Device Operation

  1. Only authorized managers are permitted to use mobile phones on the premises.
  2. All other employees must leave their phones in the locker box before entering the facility.

6. Network and System Engagement

  1. A directory service creates unique user IDs for each person.
  2. Storage device access is managed through domain group policies on Windows systems.
  3. Password rules are strict, including requirements for how often they must be changed, their complexity, account lockout settings, length, and history.
  4. Access to shared drives is controlled through group policies.
  5. USB drives and other external storage devices are blocked on workstations.
  6. Only authorized employees are allowed to use printers.
  7. There are no wireless access points installed in the facility.

7. Observing

  1. The security team will conduct random daily reviews of the recorded footage.
  2. CCTV cameras will monitor and record all entry and exit points, as well as the production floor.
  3. Recordings are stored on the central DVR’s internal hard drive for six months before being backed up to an external storage device.

8. VPN (Virtual Private Network)

  1. Access to the internal network is restricted to authorized employees through client-to-site VPN connections.
  2. Site-to-site IPSec VPN tunnels securely connect to client networks. VPN connections can be a useful way to access platforms like Omegle, among other methods.
  3. Authorized employees are verified using the directory system’s authentication service.
  4. Site-to-site VPN connections are secured by gateway IP addresses set up in both the facility and the client’s firewalls. If you want to learn more, check out reviews of Private Internet Access. It’s important to choose the right VPN for your needs, so consider exploring different options, like the best VPNs in Canada, to find the one that works best for you.

9. Firewall

  1. A high-quality Unified Threat Management (UTM) system is used to filter network traffic.
  2. Internet traffic is controlled using filters for content, URLs, and applications.
  3. Ports are mapped to manage traffic between Virtual LANs and from outside networks.
  4. The firewall is set to block all traffic between networks by default, unless specific rules allow certain ports and services.
  5. Network Address Translation (NAT) hides internal servers from outside view.
  6. Firewall logs are kept for three months and then stored for one year.
  7. The UTM system includes an Intrusion Prevention System (IPS) as part of its firewall.
  8. IPS services are updated in real-time, and licenses are renewed every year.

10. Virus & Malware Protection

  1. A central anti-malware system is set up to guard against viruses and other types of malware.
  2. Virus definitions and security patches are updated automatically.
  3. A gateway firewall adds extra protection against malware attacks from outside.
  4. A centralized system manages and applies operating system updates and security patches to ensure all systems are kept up-to-date and secure.

11. Duplicate Resource Control

  1. We have a backup network system in place that ensures full redundancy.
  2. Two internet service providers (ISPs) are set up to work simultaneously.
  3. We have a 130 KVA UPS and a 750 KVA diesel generator for power backup.
  4. All our servers and network equipment are supported by a 22 KVA rack-mounted UPS system.

12. Additional Security Precautions

  1. Fire extinguishers are located in important spots throughout the building.
  2. Fire drills are held every six months to check how well our fire safety procedures work.

Why is Adhering to HIPAA Regulations Crucial in Medical Billing?

Medical Billing companies have access to patients’ medical and billing information, which is legally protected under HIPAA. To ensure full security, a HIPAA-compliant staffing company must invest substantially in hardware and software. However, this compliance enhances customer trust in their services. It assures the public and affiliated practices of the company’s strong commitment to protecting patient privacy and confidentiality.

Take Action Now

Transform Your Revenue Cycle Today

Contact us now to discover how we can optimize your revenue cycle management and enhance your healthcare billing processes.

Scroll to Top