The teams have restricted remote access to the client’s software applications and tools enabling them to do the work required to accomplish the required services only in a secure manner. Specific client networks are physically isolated and have dedicated firewalls in the client’s network for
additional security.
In view of the sensitivity associated with the Healthcare Information, our teams work on fully locked down dumb terminal PC's which don't have a floppy drive, CD drive or a USB port.
We take all compliance related concerns of our customers very seriously and address them proactively. Our delivery center are the most advanced infrastructure to handle data security issues. Here is how we go beyond the basics measures:
In-house security team dedicated to monitor hacker sites, assessing possible threats. This team ensures Physical security, network security, applications, desktop, voice and data security, Centralized control over enterprise resources, change control, access control and configuration management to minimum disruption in customer service delivery. Rigorous audits are conducted to evaluate threats to develop and implement the relevant counter.
In our delivery center, no one is allowed in without screening and no one is allowed to bring in or take any information capture devices including mobile phones and cameras.Authorized individuals in client specific areas protected by card readers and secure access systems.
We are committed to achieving and maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA) of 1996. As your trustworthy partner in the chain of carrying patient health information, we have specific technical and physical security features for our data system, including identification of authorized users, control of system access, data integrity, and backup/recovery to ensure availability and reliability.
In compliance with HIPAA, security is maintained using a combination of authorized mechanisms and secure socket layer protocol.
Authentication is ensured through the efficient use of passwords to establish user identity. Access is granted only after authentication.
Data, program, system, and network integrity play a role in ensuring that information is exchanged only in an authorized manner.
Monitoring of activities occurring in our system to prevent and/or detect any breach.
Secure physical storage of all data and secure transmission. This includes constant surveillance by network experts, premises protected by security guards, and securely encrypted transmission between OBSRCM and its clients.
We restrict access to all confidential information. Only authorized employees may access the system for administrative and support purposes. These employees are very limited in number and are committed to the OBSRCM privacy and security policies. OBS signs a Confidentiality Agreement with each of our employees and our customers.