REALTIME WORKFLOW
Our SaaS portal allows you to upload, access, create, process and archive your transcription project files.
Upload audio, video, pictures of personal notes and more. Download completed transcriptions, search content and keep track of current/live ongoing projects at any time.
Our on-demand dial-up Cloud Dictation is available 24/7 for self-recording services.
HIPAA TTSP and it's affiliated services provide users with an array of components, including:
PHYSICAL SAFEGUARDS: Facility Access Controls are among the highest caliber in the nation include biometric security for staff access at one of the most trusted dedicated hosting platform providers in the nation with our single-tenant, managed dedicated servers, which have intensive scrutiny for physical security, daily backups as well as cybersecurity as part of our emergency contingency plan. The facility security plans contain policies and procedures to safeguard the facility and the equipment therein from unauthorized physical access, tampering, and/or theft. Our hosting program includes access controls and validation procedures to control and validate a person’s access to our hosting facilities based on their role or function and include visitor control, and controlled access to software programs for testing and revision. Maintenance Records are consistently documented and repairs and modifications to physical hardware components at the facilities (e.g. hardware, walls, doors and locks). Workstations used to access hardware/software/OS include the same level of security and are designed such that access to ePHI if necessary is monitored and audited. While the disposition of ePHI, and/or the hardware or electronic media on which it is stored is secured is secured, a record of the movements of hardware and electronic media and any person responsible are kept. Data Backup and Storage is created daily and are retrievable with an exact copy of ePHI contained therein, before movement of equipment.
TECHNICAL SAFEGUARDS: Access and Authentication Control for every user Automatic Logoff due to inactivity Access Control (current encryption and decryption technology for each session) Audit Control/Trail of every TID created on the system Integrity – Encryption for e to certify that ePHI has not been altered or destroyed
ADMINISTRATIVE AND INFORMATION ACCESS MANAGEMENT Security Management Processes include: - Risk Analysis - Risk Management - Sanction Policy for any employee/user who fails to comply - Information Systems Activity Reviews
|
 |