HIPAA Compliance
Last Updated: February 25, 2026
Our HIPAA Compliance Commitments
HIPAA Security Rule
Administrative, physical, and technical safeguards to protect ePHI
Encryption Standards
AES-256 encryption at rest and TLS 1.3 in transit
Business Associate Agreements
BAAs provided to all customers handling PHI
Audit Logging
Comprehensive logging of all PHI access and modifications
Breach Notification
Rapid response and notification protocols in place
Secure Infrastructure
HIPAA-compliant data centers and cloud services
HIPAA Compliant Platform for Healthcare Professionals
Practice ROI is designed from the ground up to meet HIPAA requirements for protecting Protected Health Information (PHI). We implement comprehensive administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and availability of your patient data.
As your Business Associate, we take our HIPAA obligations seriously and are committed to transparency about our compliance measures.
1. Our Commitment to HIPAA Compliance
This page outlines our HIPAA compliance measures, your responsibilities as a covered entity, and how we work together to protect patient information.
2. Business Associate Agreement (BAA)
2.1 BAA Requirement
- Store patient referral information containing PHI
- Send marketing communications containing patient identifiers
- Track patient interactions through our communication tools
- Use our platform to process any information covered under HIPAA
2.2 What Our BAA Covers
- Our obligations to safeguard PHI
- Permitted and required uses of PHI
- Data breach notification procedures
- Subcontractor requirements
- Audit rights and documentation
- Term and termination conditions
2.3 How to Request a BAA
3. Technical Safeguards
3.1 Encryption
- Data at Rest: AES-256 encryption for all stored data
- Data in Transit: TLS 1.3 for all data transmission
- Backup Encryption: All backups are encrypted with the same standards
- Key Management: Secure key rotation and management procedures
3.2 Access Controls
- Unique user identification for all system users
- Automatic logoff after period of inactivity
- Role-based access control (RBAC) limiting data access
- Multi-factor authentication (MFA) available for all accounts
- Emergency access procedures for critical situations
3.3 Audit Controls
- Comprehensive logging of all system activity
- PHI access tracking and monitoring
- Audit logs retained for minimum 6 years
- Regular review of audit logs for suspicious activity
- Tamper-proof audit trail mechanisms
3.4 Integrity Controls
- Mechanisms to ensure data is not improperly altered or destroyed
- Digital signatures and checksums for data verification
- Version control and change tracking
- Validation of data transmission accuracy
3.5 Transmission Security
- End-to-end encryption for all PHI transmission
- Secure messaging protocols
- Network segmentation and firewalls
- Intrusion detection and prevention systems
4. Physical Safeguards
4.1 Facility Access Controls
- Data hosted in SOC 2 Type II certified data centers
- 24/7 physical security with surveillance
- Biometric and badge-based access controls
- Visitor logging and escort requirements
- Regular physical security audits
4.2 Workstation and Device Security
- Secure workstation configurations
- Screen privacy filters and automatic lock screens
- Encrypted laptops and mobile devices
- Device management and tracking
- Secure disposal of physical media
5. Administrative Safeguards
5.1 Security Management Process
- Risk analysis and risk management procedures
- Sanction policy for security violations
- Regular security reviews and updates
- Information system activity review
5.2 Workforce Security
- Background checks for all employees with PHI access
- Signed confidentiality agreements
- HIPAA training for all relevant personnel
- Annual security awareness training
- Immediate access termination upon employee departure
5.3 Security Incident Procedures
- Incident response plan and team
- Breach detection and analysis procedures
- Containment and mitigation strategies
- Documentation and reporting requirements
- Post-incident review and improvements
5.4 Contingency Planning
- Data backup and disaster recovery plans
- Emergency mode operation procedures
- Regular testing of backup and recovery systems
- Business continuity planning
6. Breach Notification Procedures
- Notify affected customers within 24 hours of discovery
- Provide details about the breach, including what PHI was involved
- Describe steps we are taking to investigate and mitigate
- Assist with required notifications to individuals and authorities
- Document the breach and our response in accordance with HIPAA
Customer Responsibilities
- Notifying affected individuals within 60 days
- Reporting breaches affecting 500+ individuals to HHS
- Notifying media if breach affects 500+ individuals in a jurisdiction
- Maintaining documentation of breach notifications
7. Customer Responsibilities
- Execute a Business Associate Agreement with Practice ROI
- Configure the platform appropriately for your use case
- Train your staff on HIPAA requirements and platform use
- Implement appropriate access controls for your users
- Obtain necessary patient authorizations for marketing
- Conduct your own risk assessments
- Report suspected breaches to Practice ROI immediately
- Maintain your own policies and procedures
8. Subcontractors and Third-Party Services
- Sign Business Associate Agreements with Practice ROI
- Meet or exceed our HIPAA compliance standards
- Are subject to the same safeguards and requirements
- Are regularly audited for compliance
- Cloud infrastructure providers (AWS, Google Cloud)
- Email service providers
- SMS/communication providers (Twilio)
- Payment processors (Stripe)
- Analytics and monitoring services
9. Data Retention and Destruction
9.1 Retention
- PHI is retained as long as your account is active
- After account termination, data is retained for 90 days
- Backup data may be retained for up to 1 year
- Audit logs retained for 6 years per HIPAA requirements
9.2 Secure Destruction
- Cryptographic erasure of encryption keys
- Multiple-pass overwriting of storage media
- Physical destruction of decommissioned hardware
-
Certificate of destruction provided upon request
10. Ongoing Compliance
- Regular security risk assessments (at least annually)
- Penetration testing and vulnerability scans
- Third-party security audits
- Continuous monitoring of security controls
- Regular policy and procedure reviews
- Staying current with HIPAA regulations and guidance
- Participation in industry security initiatives
11. Training and Awareness
- HIPAA training during onboarding
- Annual security awareness training
- Role-specific training for those with PHI access
- Regular updates on security threats and best practices
- Incident response training and drills
12. Audit Rights
- Request information about our security practices
- Review our policies and procedures (subject to confidentiality)
- Request audit reports from third-party auditors
- Conduct your own audit (with reasonable notice and scope)
- Review logs of your PHI access (where technically feasible)
Need a Business Associate Agreement?
Request a BAA from our compliance team to begin using Practice ROI for PHI processing.
HIPAA Compliance Contact Information
HIPAA Compliance Officer
Email: hipaa@practiceroi.com
Report a Security Incident
Email: security@practiceroi.com
Phone: (719) 985-3535 (24/7 Security Hotline)
BAA and Compliance Questions
Email: compliance@practiceroi.com
