Commitment to Security

  • HIPAA Compliant
WoundVision’s secure, protected, and compliant software products have all been built using HIPAA/HITECH best practices for designing and developing scalable, enterprise-wide applications across the continuum of care.

A Partner You Can Trust

Designed with security as priority, WoundVision’s secure, protected, and compliant software products have all been built using HIPAA/HITECH best practices for designing and developing scalable, enterprise-wide applications across the continuum of care. WoundVision’s solutions are specifically designed to include features that help our customers comply with HIPAA. We maintain administrative, physical, and technical safeguards for protection of the security, confidentiality, and integrity of customer data. All storage and transmission of Patient Health Information (PHI) is handled in a secure manner that protects the integrity, confidentiality, and availability of the data.

Our solutions also also support the industry interoperability standards such as HL7 and FHIR so that the exchange and interpretation of data and images can integrate seamlessly into the provider’s existing EHR infrastructure.

Secure, Compliant Hosting

All of our products are hosted within a secure, private data center where all data is stored and replicated to redundant storage.

Highlights of the data center include:

  • Ranked in the top 3% of all US datacenters
  • All data stored in the continental United States
  • Tier III+ modeled facility
  • 3rd party SSAE SOC II audit and review
  • State of the art facilities
  • Services & support follow ITIL-aligned best practices
  • Redundant networks, power, & environmental controls
  • 24-hour access control and physical security

HIPAA Statement

We work to ensure that our products and services meet or exceed industry standards with respect to the HIPAA. Our products and services are specifically designed to include features that help our customers comply with HIPAA. All storage and transmission of PHI is handled securely to protect the integrity, confidentiality, and availability of the information.

Disaster Recovery

All customer data is stored in a secure data center and is replicated to redundant storage. Backups and snapshots of server data are captured on a regular basis and stored securely offsite on encrypted media. Disaster recovery tests verify the integrity of our customers’ data. This design provides the ability to rapidly restore in the case of catastrophic loss.