Avoid Breaking your
HIPAA Compliance

We Help You Protect Patients’ Health Information

hipaa compliant secure file transfer encryption
Encryption

By encrypting files in transit and at rest, Thru keeps your patients’ personal health information (PHI) protected. In addition, the risk that unauthorized employees will access this data is reduced.

hipaa complaint secure file transfer authentication
Authentication

Thru offers application, endpoint and user authentication to help you ensure that only the right people can access files with PHI. Multi-factor authentication and single sign-on options are available.

hipaa compliant secure file transfer tracking
Tracking

Be prepared for an audit with detailed dashboards that record user actions and file deliveries. Get alerts over email or text if files are not delivered.

FAQs

What is HIPAA?

Healthcare Insurance Portability and Accountability Act (HIPAA) is a U.S. federal law that regulates how companies can access and use personal health information (PHI). PHI includes a person’s medical history, test and laboratory results and other data.

Who needs to comply with HIPAA?

Any company that has access to PHI must achieve and maintain HIPAA compliance.

What are the three rules of HIPAA?

Before defining the three rules of HIPAA, it is important to understand the difference between a covered entity and a business associate:

  • A covered entity is any entity that is a healthcare provider, provides a health plan or is a healthcare clearinghouse.
  • A business associate is “a person or entity that performs certain functions or activities that involve the use or disclosure of protected health information on behalf of, or provides services to, a covered entity.”

submit your security and compliance questions Privacy Rule

This rule regulates when a covered entity may disclose PHI without a patient’s express written authorization, and when they cannot. If a covered entity discloses any PHI, it should take care to disclose the minimum amount necessary to achieve its purpose.

Security Rule

This rule requires covered entities and business associates to put technical, physical and administrative safeguards in place to keep PHI safe.

Breach Notification Rule

This rule requires business associates to notify covered entities if they know a breach occurred, and covered entities to notify patients affected by a breach of PHI.

Secure File Transfer Overview

Thru helps you achieve end-to-end file security with measures to protect data in the cloud, application and network.

 

Have questions about security and compliance for file transfers?

Get answers, not a sales pitch. Since 2002, we have addressed and solved secure file transfer challenges.

 

Scroll to Top