Restricted access to electronic docs

When you restrict use of very sensitive or confidential electronic files, you happen to be limiting the power of an unauthorized user to print, share, backup or modify that file. These equipment remain on the document no matter where it is kept (e. g. within a cloud service) and apply at any duplicate of the doc created upon or off-line.

Controls on where a report can be used

You are able to control the number of devices for each user that your shielded documents could be suited for and prevent these kinds of from getting used outside approved locations, age. g. school. This is a sensible way to stop staff members using confidential or hypersensitive documents on their personal products that may be found in places where you are not competent to monitor and control access, for example at home or when traveling.

Dynamic watermarks on seen and printed out pages

Additionally to managing how your protected records are used, you can even add strong watermarks towards the viewed and printed pages that include user-identifiable information to discourage users from sharing printouts with others. The information changes dynamic variables automatically when the document is viewed and imprinted, making it extremely hard for an unauthorized user to remove the watermark or distribute a version of the file without removing the protection.

Limits on costs for obtaining access to PHI

A covered entity must act on a request for access to an individual’s PHI inside 30 work schedule days of invoice of the ask for, or sixty calendar times of receipt of a request that was submitted directly to an enterprise associate since the covered business instructed individuals through the notice of privacy methods (or otherwise) to submit gain access to requests directly to the business associate’s for handling. If the 30-day or 60-day timeline is reached, a covered entity must provide usage of an individual in pieces, based upon her personal preferences to get how your lady wants to obtain it.