Trust & Verification

Security & Compliance

Built from day one for the strictest healthcare regulations. Every layer of E-AmAre is designed to protect patient data and earn your compliance team's confidence.

HIPAA Compliant 42 CFR Part 2 FHIR R4 / HL7 AES-256 MFA / 2FA
HIPAA

HIPAA Safeguards

Administrative, physical, and technical safeguards implemented across the entire platform.

📋

Administrative Safeguards

  • Designated security officer and privacy officer roles
  • Workforce training requirements and tracking
  • Risk assessment and management program
  • Business Associate Agreements (BAAs) with all customers
  • Incident response and breach notification procedures
🏢

Physical Safeguards

  • Cloud infrastructure with SOC 2 certified data centers
  • Geographic redundancy and disaster recovery
  • Workstation and device access controls
  • Media disposal and re-use procedures
  • Facility access logging and monitoring
🖥️

Technical Safeguards

  • AES-256 encryption at rest, TLS 1.2+ in transit
  • Role-based access control with 30+ configurable roles
  • Multi-factor authentication (MFA) for all users
  • 135+ audit control points with tamper-proof logging
  • Automatic session timeout and emergency access procedures
Substance Use Disorder Protections

42 CFR Part 2 Compliance

Federal protections for SUD patient records are built into every data flow, not bolted on as an afterthought.

Consent & Disclosure Management

📜

Purpose-Specific Consent Forms

Patients consent to specific recipients, purposes, and types of information disclosed. Consent can be revoked at any time with full audit trail.

📤

Disclosure Tracking

Every disclosure is logged with recipient, date, purpose, and the specific information shared. Complete accounting of disclosures available on demand.

📧

Re-Disclosure Notices

Automated re-disclosure prohibition notices accompany all disclosures per federal requirements, ensuring downstream recipients understand their obligations.

Data Protection & Segmentation

✂️

Record Redaction

SUD-specific information can be redacted from records shared with external parties who lack appropriate consent authorization.

🧩

Data Segmentation

SUD records are segmented so that access can be restricted at a granular level — ensuring only authorized personnel with proper consent see protected information.

🔍

Complete Audit Trail

Every access, modification, and disclosure of Part 2 records is logged with user identity, timestamp, and action taken. Ready for surveyor review at any time.

Identity & Access

Access Control

Granular permissions ensure every user sees only what they need and nothing more.

30+

RBAC Roles

Pre-configured roles for clinicians, nurses, billing staff, administrators, and more. Custom roles supported.

🔐

MFA Required

Multi-factor authentication enforced for all users. TOTP, SMS, and push notification options available.

💊

EPCS 2FA

Additional two-factor authentication layer for controlled substance prescribing, meeting DEA EPCS requirements.

🗝️

JWT & Sessions

Stateless JWT authentication with configurable session timeouts, automatic logout, and concurrent session limits.

Infrastructure

Encryption & Infrastructure

Enterprise-grade encryption and cloud infrastructure built for healthcare workloads.

🔒 Encryption

At Rest: AES-256 encryption for all stored data including backups and database snapshots
In Transit: TLS 1.2+ enforced for all client-server and inter-service communication
Key Management: Secure key management with automatic rotation and separation of duties
Field-Level: Additional encryption for highly sensitive fields (SSN, financial data)

☁️ Infrastructure

Availability: 99.9% uptime SLA with multi-zone redundancy
Backups: Automated daily backups with point-in-time recovery and geo-redundant storage
Monitoring: 24/7 infrastructure monitoring with automated alerting and incident response
Disaster Recovery: Documented DR plan with defined RPO and RTO targets
Accountability

Audit Logging

135+ auditable control points. Every action on patient data is tracked, attributed, and exportable.

135+

Audit Points

Covering record views, edits, deletions, exports, consent changes, login events, permission modifications, and more.

👁️

PHI Access Tracking

Every access to Protected Health Information is logged with user identity, timestamp, patient record accessed, and specific data viewed.

📤

Exportable Reports

Generate audit reports by user, patient, date range, or event type. Ready for surveyor review, accreditation audits, and compliance investigations.

Data Exchange

Interoperability

Standards-based data exchange so E-AmAre works with your existing systems, labs, pharmacies, and payers.

🔥

FHIR R4

Full FHIR R4 API for standardized resource exchange. Patient, Encounter, Observation, MedicationRequest, and more.

📡

HL7 v2

ADT (admit/discharge/transfer), CCD (continuity of care), OBR/OBX (lab orders/results) message support.

📄

C-CDA

Consolidated Clinical Document Architecture for structured document exchange with other EHR systems.

💊

NCPDP / e-Prescribing

NCPDP SCRIPT standard for electronic prescribing including EPCS controlled substance prescriptions.

📝

Business Associate Agreement

E-AmAre provides a Business Associate Agreement (BAA) to every customer. Our BAA covers:

  • Permitted uses and disclosures of PHI
  • Breach notification procedures and timelines
  • Safeguard obligations and security commitments
  • Data return and destruction upon termination
  • Available for review during the sales process
Architecture

Multi-Tenant Architecture

Complete data isolation between facilities with the efficiency of shared infrastructure.

🛡️

Data Isolation

Each facility's data is logically and cryptographically isolated. No cross-facility data leakage is possible — by design, not by policy.

🎨

White-Label Branding

Each facility can have its own logo, color scheme, and patient-facing branding while sharing the same powerful platform underneath.

⚙️

Facility-Level Config

Independent configuration per facility: roles, workflows, form templates, billing rules, and reporting — with portfolio-level oversight.

Ready to review our security posture?

We welcome questions from compliance officers, IT teams, and security reviewers. Let's connect and share our detailed security documentation.