Robust EHR for Behavioral Health Professionals: 866-847-3590


ICANotes meets HIPAA security standards for electronic medical records.

Establishing HIPAA Compliance

ICANotes maintains ongoing compliance with all HIPAA regulations.

These include the latest technology to prevent unauthorized access to company servers, full encryption of transmitted data, password and username protection, access logs, alerts, and protection of access points.

For a document describing our HIPAA Security Compliance: Policies and Procedures please contact us.

Rest Assured. We Have You Covered.

We comply with all HIPAA requirements with customized features and security precautions.

Individual Authentication of Users

ICANotes includes username/password protection. Biometric authentication via the use of fingerprint recognition technology can be provided on request.

Protection of Remote Access Points

In addition to fingerprint and/or username/password authentication at each workstation, ICANotes automatically drops the workstation computer from the network and/or logs off the program after a period of idle time.

Privacy of Psychotherapy Notes

ICANotes permits the recording of separate notes that can be password protected. These notes do not become part of the official record.

Access Controls

ICANotes is easily set to allow different privileges to different types of users. For example, a medical records staff person could easily be assigned privileges to browse and print records, but not to create or alter records. Privileges for other groups are similarly easy to set or change.

Access Establishment and Modifications

Users with appropriate privileges are able to create and remove users, edit user information, and set or reset passwords.

Prevention of Alteration or Destruction of the Electronic Record

ICANotes provides digital electronic signature and locking of the electronic record.

Audit Trails

ICANotes keeps a log of the date, time, and identity of every person who logs onto the program. A separate log is kept of which patient notes were accessed, when, and by whom.

Alarm and Event Reporting

If the wrong password is entered three times in a row, ICANotes prevents further attempts for 5 minutes and reports the event to the system administrator.


ICANotes transmits and receives data that is encrypted with a 128-bit key.

Intuitive, Accessible, Time-Saving

ICANotes - the only EHR software that actually thinks like a clinician.