Healthcare Compliance

HIPAA Compliance

Last updated: January 28, 2026

HIPAA Compliant Platform

MedCrypt is fully compliant with the Health Insurance Portability and Accountability Act (HIPAA) of 1996 and its subsequent amendments. We implement comprehensive administrative, physical, and technical safeguards to protect Protected Health Information (PHI).

1. Understanding HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) is a federal law enacted in 1996 that establishes national standards for protecting sensitive patient health information. HIPAA consists of several key rules:

  • Privacy Rule: Establishes standards for the protection of individually identifiable health information
  • Security Rule: Sets standards for securing electronic Protected Health Information (ePHI)
  • Breach Notification Rule: Requires notification following a breach of unsecured PHI
  • Enforcement Rule: Contains provisions relating to compliance and penalties
  • Omnibus Rule: Implements HITECH Act provisions and strengthens privacy and security protections

2. MedCrypt's Role as a Business Associate

Under HIPAA, MedCrypt operates as a Business Associate to healthcare providers (Covered Entities) who use our platform. This means we:

  • Create, receive, maintain, or transmit PHI on behalf of healthcare providers
  • Are directly liable for compliance with applicable HIPAA requirements
  • Must enter into Business Associate Agreements (BAAs) with all covered entities
  • Implement appropriate safeguards to prevent unauthorized use or disclosure of PHI
  • Report any security incidents or breaches to covered entities

Business Associate Agreement (BAA)

We provide and execute Business Associate Agreements with all healthcare providers using MedCrypt. To request a BAA or if you have questions about our agreement, please contact us at medcryptsoftware@gmail.com.

3. Administrative Safeguards

We implement comprehensive administrative policies and procedures to manage the selection, development, implementation, and maintenance of security measures:

Workforce Training

All team members complete HIPAA training and sign confidentiality agreements

Access Management

Role-based access controls with principle of least privilege

Risk Assessment

Regular security risk assessments and vulnerability scanning

Policies & Procedures

Documented security policies reviewed and updated annually

Key Administrative Controls:

  • Security Officer: Designated security official responsible for HIPAA compliance
  • Workforce Clearance: Background checks and access authorization procedures
  • Termination Procedures: Immediate access revocation upon employee termination
  • Security Awareness: Ongoing security awareness and training programs
  • Incident Response: Documented procedures for responding to security incidents
  • Contingency Planning: Data backup, disaster recovery, and emergency operations plans

4. Physical Safeguards

Our infrastructure is hosted on enterprise-grade cloud platforms with comprehensive physical security measures:

Data Center Security

SOC 2 Type II certified facilities with 24/7 security personnel

Infrastructure

Redundant systems across multiple availability zones

Media Controls

Secure disposal and sanitization of hardware and storage media

Facility Access

Biometric access controls and comprehensive video surveillance

Infrastructure Partners:

  • Supabase: SOC 2 Type II compliant PostgreSQL database hosting with encryption at rest
  • Vercel: SOC 2 Type II certified edge network with global data centers
  • OpenAI: Enterprise-grade API with data processing agreements for AI features
  • Google Cloud: HIPAA-eligible services for calendar and video conferencing integration

5. Technical Safeguards

We implement robust technical controls to protect ePHI from unauthorized access:

Encryption

AES-256 encryption at rest, TLS 1.3 encryption in transit

Authentication

Multi-factor authentication (2FA) with TOTP and email verification

Audit Controls

Comprehensive logging of all access and modifications to PHI

Integrity Controls

Data validation, checksums, and tamper detection mechanisms

Security Features:

  • Access Control: Unique user identification with automatic session timeout
  • Automatic Logoff: Configurable inactivity timeout (default: 15 minutes)
  • Transmission Security: All data transmitted over HTTPS with TLS 1.3
  • Audit Logging: Immutable logs of all PHI access, modifications, and deletions
  • Rate Limiting: Protection against brute force and denial of service attacks
  • Password Security: Secure hashing (bcrypt), complexity requirements, and breach detection
  • Data Backup: Automated daily backups with point-in-time recovery capabilities

6. Breach Notification Procedures

In the event of a breach of unsecured PHI, MedCrypt follows strict notification procedures in compliance with the HIPAA Breach Notification Rule:

Breach Response Timeline

  • Immediate: Contain the breach and begin investigation
  • Within 24 hours: Notify affected covered entities
  • Within 60 days: Covered entities notify affected individuals
  • Annual Report: Breaches affecting fewer than 500 individuals reported to HHS

Our Breach Response Includes:

  • Immediate containment and remediation of the security incident
  • Thorough investigation to determine the scope and cause
  • Risk assessment to evaluate potential harm to affected individuals
  • Notification to covered entities with details of the breach
  • Cooperation with covered entities on individual notifications
  • Documentation and reporting to HHS as required
  • Post-incident analysis and implementation of preventive measures

7. Patient Rights Under HIPAA

HIPAA grants patients specific rights regarding their health information. MedCrypt's platform enables healthcare providers to fulfill these obligations:

  • Right to Access: Patients can request copies of their medical records. Our platform supports data export in multiple formats (PDF, CSV, JSON).
  • Right to Amendment: Patients can request corrections to their records. The platform maintains an audit trail of all amendments.
  • Right to Accounting of Disclosures: Patients can request a list of disclosures. Our audit logs track all access to PHI.
  • Right to Request Restrictions: Patients can request restrictions on certain uses or disclosures of their information.
  • Right to Confidential Communications: Patients can request alternative means or locations for receiving communications.
  • Right to Notice: Patients have the right to receive a notice of privacy practices from their healthcare provider.

8. PHI Data Handling

8.1 Minimum Necessary Standard

We adhere to the HIPAA minimum necessary standard, ensuring that access to and disclosure of PHI is limited to the minimum amount necessary to accomplish the intended purpose.

8.2 Data Retention

PHI is retained in accordance with applicable laws and professional requirements:

  • Active accounts: Data retained as long as the account is active
  • Account deletion: Data securely deleted within 30 days of account closure
  • Legal requirements: Some data may be retained longer if required by law

8.3 Data Disposal

When PHI is no longer needed, it is securely disposed of using methods that render the information unreadable and unrecoverable. This includes cryptographic erasure for electronic data and secure deletion from all backup systems.

9. AI Features and PHI

MedCrypt uses AI-powered features for prescription OCR, medical insights, and clinical decision support. We handle PHI in AI processing with strict safeguards:

  • Data Processing Agreements: We have appropriate agreements with AI service providers
  • No Training on Your Data: Your PHI is never used to train AI models
  • Encrypted Transmission: All data sent to AI services is encrypted in transit
  • Minimal Data Exposure: Only necessary data is processed; results are immediately returned
  • No Data Retention by AI: AI providers do not retain PHI after processing
  • Audit Logging: All AI interactions involving PHI are logged

10. Compliance Verification

We regularly verify and maintain our HIPAA compliance through:

  • Annual Risk Assessments: Comprehensive evaluation of potential risks to PHI
  • Penetration Testing: Regular security testing by qualified professionals
  • Vulnerability Scanning: Automated scans for security vulnerabilities
  • Policy Reviews: Annual review and update of security policies
  • Training Updates: Regular refresher training for all team members
  • Third-Party Audits: Independent assessments of our security controls

11. Contact Our Privacy Officer

For questions about HIPAA compliance, to request a Business Associate Agreement, or to report a privacy concern:

MedCrypt Privacy & Compliance Team

Email: medcryptsoftware@gmail.com

Subject line: "HIPAA Inquiry" for fastest response

12. Related Documents