Establishing HIPAA Compliance
ICANotes maintains ongoing compliance with all HIPAA regulations.
These include the latest technology to prevent unauthorized access to company servers, full encryption of transmitted data, password and username protection, access logs, alerts, and protection of access points.
For a document describing our HIPAA Security Compliance: Policies and Procedures please contact us.
Rest Assured. We Have You Covered.
We comply with all HIPAA requirements with customized features and security precautions.
ICANotes includes username/password protection. Biometric authentication via the use of fingerprint recognition technology can be provided on request.
In addition to fingerprint and/or username/password authentication at each workstation, ICANotes automatically drops the workstation computer from the network and/or logs off the program after a period of idle time.
ICANotes permits the recording of separate notes that can be password protected. These notes do not become part of the official record.
ICANotes is easily set to allow different privileges to different types of users. For example, a medical records staff person could easily be assigned privileges to browse and print records, but not to create or alter records. Privileges for other groups are similarly easy to set or change.
Users with appropriate privileges are able to create and remove users, edit user information, and set or reset passwords.
ICANotes provides digital electronic signature and locking of the electronic record.
ICANotes keeps a log of the date, time, and identity of every person who logs onto the program. A separate log is kept of which patient notes were accessed, when, and by whom.
If the wrong password is entered three times in a row, ICANotes prevents further attempts for 5 minutes and reports the event to the system administrator.
ICANotes transmits and receives data that is encrypted with a 128-bit key.
Intuitive, Accessible, Time-Saving
ICANotes - the only EHR software that actually thinks like a clinician.