100% HIPAA Compliant

HIPAA (Health Insurance Portability and Accountability Act of 1996) requires any organization that handles Protected Health Information to satisfy strict administrative, physical, and technical compliance standards. Contrary to common misunderstanding, to be truly HIPAA Compliant an organization is required by law to satisfy all HIPAA regulatory requirements.

Over 2 million Business Associates that do business with Covered Entities are not HIPAA Compliant. As a Covered Entity, you need to make sure your web hosting partner and Business Associate is aware of HIPAA and is fully compliant. Failing to do so exposes you to massive liability and legal risk.

Many Web Hosting and Managed Service Providers offer HIPAA Compliant solutions, but few can actually deliver.

DotBlock has been rigorously audited by an independent 3rd party to guarantee our 100% HIPAA Compliance. Our partnership with Compliancy Group ensures our clients that DotBlock is compliant in all HIPAA, HITECH, and OMNIBUS rules. You may verify our current status by clicking here.

HIPAA Compliance Verification

Recommended HIPAA Compliant Solutions

Single Server

  • Hardware Firewall
  • Dedicated Server
  • Off-site Encrypted Backup

Multiple Server

  • Redundant Hardware Firewall
  • 1 x Dedicated Server (application)
  • 1 x Dedicated Server (database)
  • Off-site Encrypted Backup
NEED A HIPAA COMPLIANT SOLUTION?

Speak with a DotBlock sales engineer today to help plan and deploy your 100% compliant solutions. Contact us using the links below or call our Support Team at 866.923.4550.

Chat with us! Open a Ticket

HIPAA Features

for your benefit

  • Offsite Backups (separate facilities)
  • PHI Encryption
  • 2 Factor Authentication
  • Business Associate Agreement
  • Client VPN
  • Managed Service Options
  • High Availability Infrastructure Options
  • Managed Hardware Firewall with IPSEC VPN
  • Locked Server Cabinets

Managed Services Features

for your benefit

  • Managed Backups
  • Vulnerability Assessment Scans
  • Intrusion Detection System
  • SSL Certificate Management
  • DDoS Mitigation
  • Web Application Firewall (WAF)
  • Server Hardening