Date Range
Date Range
Date Range
Datica Managed Integration accelerates the integration process to warp speed while reducing costs. Compliance is in our DNA. We are HITRUST CSF Certified. We take compliance seriously without fail. We are the compliance and data foundation for industry and thought leaders, health systems and vendors. Industry leading learning materials brought to you by the Datica team.
Tackle HL7 With Our Mock API and Extensive Documentation. The Mock API provides developers with a prototyping tool that acts and functions as a JSON API for all things HL7. This is a living document and will continue to evolve as we add more details for each of the multitude of HL7 messages.
In an effort to be transparent, we go into a good amount detail on this page. As a lead in, below is a high level summary our major architecture, our guiding principles, and how it maximizes our security posture. All data is encrypted in transit, end to end, and at rest. Log data is also encrypted to mitigate risk of ePHI stored in log files. Access controls are always defaulted to no access unless overrided manually. Secure, encrypted access is the only form of public acces.
Tackle HL7 With Our Mock API and Extensive Documentation. The Mock API provides developers with a prototyping tool that acts and functions as a JSON API for all things HL7. This is a living document and will continue to evolve as we add more details for each of the multitude of HL7 messages.
Or Datica Customer means a current contractually bound customer of Datica.
Datica provides secure and compliant cloud-based software. These Categories are cited throughout polices as Customers in each category inherit different policies, procedures, and obligations from Datica. Mappings of HIPAA Rules to Datica controls and a mapping of what Rules are inherited by Customers, both Platform Customers and Add-on Customers, are covered in 2.
Upon employee onboarding and annually. Types of entities HIPAA defines;. How is PHI anonymized;. Understanding of the various sections of safegaurds in the Technical Rule;. What is a business associate agreement;. How is risk inherited with different levels of technology;. What is a breach and how is a breach handled;. How did the HITECH Act change HIPAA;. What are the sanctions for knowingly violating HIPAA;.