How Does PIMSY Help Keep You HIPAA Compliant?
by Leigh-Ann Renz, 10.29.15
HIPAA Audits Set to Increase in 2016
While HIPAA compliance is always important, the US Department of Health and Human Services (HHS) announced that it will launch HIPAA audits in early 2016 in order to be more proactive in enforcement. Word on the street is that HIPAA will be the hot topic next year, and practices should ensure that they are complying with HIPAA now more than ever.
While most behavioral health practice management software help increase data protection, here’s how PIMSY specifically enhances HIPAA compliance:
All Data is Secure in the Cloud
PIMSY eliminates vulnerabilities from filing cabinets, misplaced flash drives or (gulp) client charts stolen from your car while paying for gas (actual example of a recent HIPAA breach). Mental health agencies are beginning to fully realize just how vulnerable paper charts make their patients – and therefore their practice. PIMSY stores - and encrypts - your data safely in the Cloud: click here for details.
Safe from Browser-based Attacks & Vulnerabilities
PIMSY’s unique architecture protects your data even further: unlike many other behavioral health practice management systems, PIMSY isn’t vulnerable to Browser-based attacks (remember Heartbleed?) - or the whims of Browser updates, plug-ins, add-ons and extensions. Click here for more information.
Tracking On Every Action in the System
PIMSY requires a unique log-in and password for every user, meaning that it puts an identification stamp on everyone who logs into the system. PIMSY can tell Management who did what, when, and where. This extra level of tracking safeguards against HIPAA breaches. Good luck doing that with paper charts!
No Data At Rest
With PIMSY, there is no data at rest on anyone’s personal device: everything is encrypted in the Cloud on Microsoft Azure, which adheres to HIPAA protocols– see more here.
No Data Disposal Needed
While other systems might require an extensive protocol to purge old records, PIMSY eliminates the need for data disposal and safeguards data remnants because there is no data at rest and nothing is stored locally.