HIPAA Compliance
BehaviorDocs is committed to protecting the privacy and security of your clients' Protected Health Information (PHI).
Our Commitment
As a platform serving healthcare professionals, we understand the critical importance of HIPAA compliance. BehaviorDocs implements comprehensive administrative, physical, and technical safeguards to protect all PHI processed through our platform.
We regularly review and update our security practices to ensure continued compliance with the HIPAA Privacy Rule, Security Rule, and Breach Notification Rule.
Business Associate Agreements
BehaviorDocs provides BAAs to all covered entities that require them. Our BAA outlines our responsibilities for protecting PHI and our compliance obligations under HIPAA.
BAA Coverage Includes:
- Permitted uses and disclosures of PHI
- Safeguards we implement to protect PHI
- Breach notification procedures
- Subcontractor requirements
- Return or destruction of PHI upon termination
To request a BAA, contact us at compliance@behaviordocs.com
HIPAA Verified
Compliance status
Security Measures
Multiple layers of protection to keep your data safe and compliant
Encryption at Rest
All data encrypted using AES-256 in our databases and file systems.
Encryption in Transit
All data transmitted is protected using TLS 1.3 encryption.
Access Controls
Role-based access ensures only authorized personnel can access PHI.
Audit Logging
Comprehensive audit logs track all access to PHI — who, what, and when.
Incident Response
Detailed incident response procedures to address potential security events.
Regular Assessments
Security assessments and penetration testing to identify vulnerabilities.
Shared Responsibilities
Maintaining HIPAA compliance is a shared responsibility between BehaviorDocs and our users.
What We Do
- Security Officer
Designated Security Officer responsible for developing and implementing security policies.
- Workforce Training
All employees undergo HIPAA training upon hiring and receive regular refresher training.
- Security Policies
Comprehensive security policies and procedures govern how we handle PHI.
- Contingency Planning
We maintain data backup, disaster recovery, and emergency mode operation plans.
- Evaluation
Regular evaluations ensure our security measures remain effective and compliant.
What You Should Do
- Use strong, unique passwords and enable two-factor authentication
- Never share your login credentials with others
- Only access PHI on secure, private networks
- Log out of your account when not in use
- Report any suspected security incidents immediately
- Ensure your organization has appropriate policies in place
- Only enter the minimum necessary PHI required for documentation
Questions About HIPAA Compliance?
Our compliance team is here to help with any questions about our security practices.