HIPAA Compliance

Iradah Medical Platform is fully compliant with HIPAA regulations to ensure the highest standards of patient data protection and privacy.

Last Updated: December 2024

1. HIPAA Overview

The Health Insurance Portability and Accountability Act (HIPAA) establishes national standards for protecting the privacy and security of health information. Iradah Medical Platform is fully compliant with all HIPAA requirements.

What is HIPAA?

HIPAA is a federal law that requires healthcare organizations to protect the privacy and security of patients' health information. It applies to:

  • Healthcare providers
  • Health plans
  • Healthcare clearinghouses
  • Business associates

Protected Health Information (PHI)

PHI includes any information that can identify a patient and relates to their health condition, treatment, or payment. Our platform handles PHI with the highest level of security and privacy protection.

2. Administrative Safeguards

Administrative safeguards are policies and procedures designed to manage the conduct of workforce members in relation to PHI protection.

Security Officer

We have designated a Security Officer responsible for developing and implementing security policies and procedures.

Workforce Training

  • All staff receive comprehensive HIPAA training
  • Regular refresher training sessions
  • Role-specific privacy and security training
  • Incident response training

Access Management

  • Role-based access controls
  • Regular access reviews
  • Immediate access revocation upon termination
  • Multi-factor authentication

Policies and Procedures

  • Comprehensive privacy policies
  • Security incident response procedures
  • Data breach notification protocols
  • Regular policy updates and reviews

3. Physical Safeguards

Physical safeguards protect electronic information systems and related buildings and equipment from natural and environmental hazards and unauthorized intrusion.

Facility Access Controls

  • Secure data centers with restricted access
  • 24/7 security monitoring
  • Biometric access controls
  • Visitor access logs

Workstation Security

  • Automatic screen locks
  • Secure workstation configurations
  • Encrypted storage devices
  • Regular security updates

Device and Media Controls

  • Encrypted mobile devices
  • Secure disposal of electronic media
  • Remote wipe capabilities
  • Asset tracking and management

4. Technical Safeguards

Technical safeguards are the technology and policies that protect electronic PHI and control access to it.

Access Control

  • Unique User Identification: Each user has a unique identifier
  • Emergency Access: Procedures for emergency access to PHI
  • Automatic Logoff: Automatic session termination after inactivity
  • Encryption and Decryption: PHI encrypted in transit and at rest

Audit Controls

  • Comprehensive logging of all system access
  • Regular audit log reviews
  • Automated anomaly detection
  • Tamper-proof log storage

Integrity

  • Data integrity checks
  • Secure data transmission
  • Backup and recovery procedures
  • Version control and change management

Transmission Security

  • End-to-end encryption
  • Secure communication protocols
  • VPN access for remote users
  • Secure email transmission

5. Business Associate Agreements

We have signed Business Associate Agreements (BAAs) with all third-party vendors who have access to PHI.

Business Associate Requirements

  • Written agreements with all business associates
  • Regular compliance audits
  • Security assessment requirements
  • Breach notification obligations

Vendor Management

  • Due diligence on all vendors
  • Regular security assessments
  • Contractual security requirements
  • Ongoing monitoring and compliance

6. Patient Rights

HIPAA grants patients specific rights regarding their health information.

Right to Access

  • Patients can request copies of their health information
  • Electronic access to health records
  • Timely response to access requests
  • Reasonable fees for copies

Right to Amend

  • Patients can request corrections to their records
  • Written response to amendment requests
  • Appeal process for denied amendments
  • Documentation of all amendment requests

Right to Restrict

  • Patients can request restrictions on PHI use
  • Accommodation of reasonable requests
  • Notification of restriction limitations
  • Emergency override procedures

Right to Accounting

  • Patients can request an accounting of disclosures
  • Detailed log of PHI sharing
  • Free accounting once per year
  • Timely response to accounting requests

7. Breach Notification

We have comprehensive procedures for identifying, investigating, and responding to potential security breaches.

Breach Assessment

  • Immediate investigation of potential breaches
  • Risk assessment of compromised information
  • Documentation of all findings
  • Legal and regulatory consultation

Notification Requirements

  • Individual Notification: Within 60 days of breach discovery
  • Media Notification: For breaches affecting 500+ individuals
  • HHS Notification: Annual reporting of smaller breaches
  • Business Associate Notification: Immediate notification of breaches

Response Procedures

  • Immediate containment of security incidents
  • Forensic investigation of breaches
  • Corrective action implementation
  • Prevention of future similar incidents

8. Staff Training

All staff members receive comprehensive training on HIPAA requirements and our privacy and security policies.

Training Requirements

  • Initial HIPAA training for all new employees
  • Annual refresher training
  • Role-specific privacy training
  • Incident response training

Training Topics

  • HIPAA Privacy Rule requirements
  • Security Rule safeguards
  • Patient rights and responsibilities
  • Breach prevention and response
  • Workforce sanctions for violations

Training Documentation

  • Training completion records
  • Competency assessments
  • Training effectiveness evaluations
  • Ongoing education requirements

9. Auditing and Monitoring

We conduct regular audits and monitoring to ensure ongoing HIPAA compliance.

Internal Audits

  • Quarterly compliance assessments
  • Annual comprehensive audits
  • Random access reviews
  • Policy compliance checks

External Audits

  • Third-party security assessments
  • Penetration testing
  • Vulnerability assessments
  • Compliance certifications

Continuous Monitoring

  • Real-time security monitoring
  • Automated threat detection
  • Access pattern analysis
  • Anomaly detection systems

10. Contact Information

For HIPAA-related questions, concerns, or to exercise your rights, please contact us:

Privacy Officer

Email: privacy@iradah.ae

Phone: +971 2 501 5555

Address: Abu Dhabi University, College of Engineering, Abu Dhabi, UAE

Security Officer

Email: security@iradah.ae

Phone: +971 2 501 5555

Emergency: +971 2 501 5556

HIPAA Resources