What does HIPAA Compliant mean?
HIPAA requires organizations engaged in handling electronic Protected Health Information (ePHI) to implement the necessary policies to secure such information. In addition the HITECH Act includes provisions that require organizations that store ePHI to implement procedures to report any breach of unprotected ePHI.
A long history of secure healthcare services
Logicalis understands healthcare security requirements and we have a long history of supplying secure services to healthcare organizations. As an early adopter in providing healthcare IT services, Logicalis agreed to HIPAA Business Associate Agreements more than a decade ago. In addition to HIPAA, we maintain the highest standards of security compliance including PCI and SASE16 SOC Type 2.
Delivering secure cloud services to healthcare solution providers
Logicalis HIPAA Compliant Enterprise Cloud is a long-term IT infrastructure service to run mission-critical workloads for healthcare solution providers like API Healthcare and Health Care DataWorks. Our “managed” IaaS must provide the highest levels of security, ITIL regulated processes, 24 x7 monitoring and management, OS patching and daily backups – a service that our customers depend on.
"Logicalis understands healthcare security requirements and we have a long history of supplying secure services to healthcare organizations. This assessment by an independent security firm validates that Logicalis is compliant with important HIPAA security rules and HITECH breach reporting requirements,” says Mike Martin, Senior Vice President for Solutions and Services at Logicalis US.
Logicalis has completed an independent audit confirming that Logicalis is compliant with Health Insurance Portability and Accountability Act (HIPAA) security rules and Health Information Technology for Economic and Clinical Health (HITECH) breach reporting requirements. The stringent security assessment reviewed Logicalis’ compliance in its cloud, managed, and service desk services in the following critical customer areas:
- Administrative safeguards
- Physical safeguards
- Technical safeguards
- Organization policies, procedures, and documentation requirements
- Breach notifications