PRIVACY AND CONFIDENTIALITY STATEMENT
Privacy Statement
​
We use the information our clients provide to us for delivering our managed services and communications. To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we rely upon to conduct business.
​
Confidentiality Agreement
​
Core Signum agrees that confidential information received from its clients shall be treated as private, and safeguarded with all reasonable means. Core Signum will not make public or intentionally disclose its clients’ confidential information to any third party or any of its vendors. In the event that confidential information is lost or stolen, Core Signum agrees to promptly notify affected clients as well comply with all laws as mandated by U.S. Department of Health & Human Services and all other applicable laws.
​
Business Associate Agreement (BAA) Statement
​
Core Signum as part of its HIPAA security process and procedure always maintains Business Associate Agreements with all of its clients and vendors.​ Core Signum includes Service Level Agreements with vendors as well as Cloud Service Providers (CSPs). For more details, please visit the Cloud Computing | HHS.gov section.
​
Email Communications
​
Core Signum communicates with clients and vendors through an encrypted email technology that secures the content(s) of the email which makes it nearly impossible for the email to be intercepted for malicious reasons.
​
Cloud-Based Technologies and Secure Storage Statement
​
Core Signum subjects vendors through rigorous questions to validate and confirm that any cloud-based system whether it'd be hosted in a data center or on-premises, that they comply with all HIPAA and PCI laws. All ePHI data is encrypted at the source on the server, before being uploaded and stored in our secure cloud storage environment. Core Signum has no mechanism to read/view/print/disseminate any ePHI or data resource that has been encrypted and has already been stored in our secure cloud storage environment.
​
Dual-Factor/Two-Factor Authentication and IP Security Filtering
​
Core Signum emphasizes and implements highest standards of security that is available to support our clients. To minimize data breaches and unauthorized access to our systems and technologies, we always enable dual-factor/two-factor authentication methods that are available. In some cases, vendors may also include a settings that allows Core Signum to only access that specific system or resource from a designated IP (Internet Protocol) Address that is manually entered by Core Signum staff.
​
​