Compliance, Privacy, and Security Overview
SOC 2
As it relates to our overall organization security posture, the following sections detail our approach to ensuring the highest levels of security, privacy, and compliance, which exist to help keep Protected Health Information (PHI) and other sensitive data safe. Additionally, we have dedicated Privacy and Security Officers to support our processes and technology.
Hosting
HST offers a variety of solutions which exist in a hosted environment (Data Center) and in the cloud. Depending on the solution you use, your data may reside within AWS (Amazon Web Services), Azure, or GCP (Google Cloud Platform). We only host data within the United States.
While HST maintains its own certifications, each cloud provider also maintains a set of certifications and attestations. See below for more information:
HITRUST r2 Certification
HST Pathways is proud to share that it has achieved HITRUST r2 Certification for nine solutions. This significant accomplishment underscores the company’s unwavering commitment to maintaining the highest standards of data security and privacy in healthcare.
The nine solutions are:
- Billing & Inventory (residing at C Spire)
- Electronic Charting (residing at C Spire)
- Anesthesia Billing (residing at C Spire)
- Scheduling & Care Communication (residing at Amazon Web Services [AWS])
- Patient Texting & Pre-Assessments (residing at AWS)
- Case Cost Forecasting (residing at AWS)
- Data & Custom Reporting (residing at AWS)
- Home (residing at AWS)
- Patient Estimates (residing at Google Cloud Platforms [GCP])
What does HST do to protect against hackers?
Encryption
Firewall
Security Monitoring Solutions
Password Security
Software and Web Application Patches
Penetration Testing
Application Weakness
How does HST defend against ransomware?
HST maintains nightly backups of customer data. These backups are stored on HST’s backup system and duplicated to offsite environments. If ransomware were to encrypt customer data, HST could restore the data from its multiple backup locations.
How does HST secure its servers?
The physical security of HST’s servers is the responsibility of HST’s hosting providers C Spire, AWS, GCP and Azure. All HST’s hosting providers following strict guidelines with regards to the physical security of their environments and have attestation reports from independent auditors that can be reviewed upon request.
Access Control
Awareness and Training
Application Security
- All databases are encrypted at rest adding an additional layer of protection using Advanced Encryption Standard.
- All data in transit is encrypted with the most secure protocols when using HTTPS, VPNs, or SFTP.
- User logon activities are recorded in audit logs and stored securely. Data Exchange leverages secured APIs or Secure FTP Services
System Integrity and Availability
High availability and load balances are offered for critical solutions to maintain access to PHI when you need it most.
Security Testing
Third Party Vendor Management
Report a Compliance, Privacy or Security Concern
Compliance concerns can also be reported through the Lighthouse Reporting Hotline:
The Lighthouse Services toll-free number and other reporting methods are available 24 hours a day, 7 days a week, for use by all team members.
- Website: www.lighthouse-services.com/hstpathways
- Anonymous Reporting App: Keyword: hstpathways
Toll-Free Telephone:
- English speaking: 877-222-2541
- Spanish speaking: 800-216-1288
- E-mail: [email protected] (must include company name with report)