Avoid Breaking your
HIPAA Compliance
We Help You Protect Patients’ Health Information

Encryption
By encrypting files in transit and at rest, Thru keeps your patients’ personal health information (PHI) protected. In addition, the risk that unauthorized employees will access this data is reduced.

Authentication
Thru offers application, endpoint and user authentication to help you ensure that only the right people can access files with PHI. Multi-factor authentication and single sign-on options are available.

Tracking
Be prepared for an audit with detailed dashboards that record user actions and file deliveries. Get alerts over email or text if files are not delivered.
FAQs
What is HIPAA?
Healthcare Insurance Portability and Accountability Act (HIPAA) is a U.S. federal law that regulates how companies can access and use personal health information (PHI). PHI includes a person’s medical history, test and laboratory results and other data.
Who needs to comply with HIPAA?
Any company that has access to PHI must achieve and maintain HIPAA compliance.
What are the three rules of HIPAA?
Before defining the three rules of HIPAA, it is important to understand the difference between a covered entity and a business associate:
- A covered entity is any entity that is a healthcare provider, provides a health plan or is a healthcare clearinghouse.
- A business associate is “a person or entity that performs certain functions or activities that involve the use or disclosure of protected health information on behalf of, or provides services to, a covered entity.”
Privacy Rule
This rule regulates when a covered entity may disclose PHI without a patient’s express written authorization, and when they cannot. If a covered entity discloses any PHI, it should take care to disclose the minimum amount necessary to achieve its purpose.
Security Rule
This rule requires covered entities and business associates to put technical, physical and administrative safeguards in place to keep PHI safe.
Breach Notification Rule
This rule requires business associates to notify covered entities if they know a breach occurred, and covered entities to notify patients affected by a breach of PHI.
Secure File Transfer Overview
Thru helps you achieve end-to-end file security with measures to protect data in the cloud, application and network.