HIPAA Compliance

The Health Insurance Portability & Accountability Act of 1996:
To meet HIPAA compliancy, all healthcare organizations and related entities require rigorous security and privacy practices to insure patient confidentiality for all ┬áhealth care related information. With these stringent requirements in mind, the development staff has created ZipChart® EMR to adhere to all HIPAA policies.

How ZipChart offers HIPAA compliance

Practice Retains Complete Control of Records - The web server that houses the ZipChart EMR Software and all patient data is physically installed in the individual medical office (doesn't apply to ASP model). If the
practice has more than one location, only one server is needed with the remote offices having a standard broadband Internet connection. There is no need for a VPN (virtual private network) or other special network connection. The practice has complete control of the patient records.

Firewall Technology - Firewall technology is used to insure the safety of the client webserver from any unathorized outside traffic. Incoming traffic is intercepted and only authorized users are allowed access to the server.

Data Encryption - From the beginning, security was a primary concern with the design of ZipChart. Each ZipChart server installed is protected. All data on the server is encrypted at the file system level. All data displayed from the server is encrypted with 128 bit Secure Socket Layer (SSL) encryption, the same type of security that banks use to protect financial info, making ZipChart EMR patient files SAFER then your current paper charts.

Authentication Security -The only screen accessible without a username and password is the log in screen. Access to patient records requires staff to be logged into the system. No one can access patient information without a proper password.

Audit Trail - ZipChart provides full document tracking. Every document in a patient's medical record is tracked from the moment it is created. The document status shows when the document was created and by whom, as well as tracking every person accessing the document, including the time/date stamp for each access. When
a document is changed, the original document is kept on file and remains easily accessible with one click.