Enterprise-Grade HIPAA Compliance

Vera RCM maintains the highest standards of data security and regulatory compliance. Your patient data is protected by industry-leading encryption, independently audited infrastructure with strict access controls, and rigorous security practices.

Last updated: January 1, 2026

HIPAA Compliant
Protected health data
SOC 2 Type II Data Centers
Infrastructure hosted in certified facilities
Equinix Hosting
Secure data centers

Our Commitment to HIPAA

At Vera RCM, protecting patient privacy and the security of sensitive healthcare data is not just a compliance requirement—it is fundamental to our mission. We understand the critical importance of maintaining the confidentiality, integrity, and availability of protected health information (PHI). Every system, process, and policy we implement is designed with security and privacy at its core.

Our HIPAA compliance program encompasses administrative, physical, and technical safeguards designed to meet and strengthen upon regulatory requirements. We conduct regular audits, maintain detailed documentation, and continuously improve our security posture to protect your patients and your practice.

Administrative Safeguards

We maintain administrative controls that establish the framework for security and privacy compliance across the organization. Our security management process includes:

  • Security ManagementSystematic identification, analysis, and mitigation of security risks to PHI
  • Designated Security OfficerExecutive-level oversight of all security and compliance initiatives
  • Information Access ManagementRole-based access controls ensuring employees only access data needed for their job duties
  • Security Awareness TrainingMandatory annual training for all staff members on HIPAA privacy and security obligations
  • Sanction PolicyDocumented procedures for addressing violations of security policies

Physical Safeguards

We implement rigorous physical controls to protect our computing infrastructure and the servers that store and process patient data. Our physical security measures include:

  • Facility Access Controls24/7 biometric access, visitor logs, and surveillance systems at all data centers
  • Workstation SecurityEncrypted laptops, automatic screen locks, and endpoint protection for all company devices
  • Environmental ControlsClimate control, fire suppression, and emergency power systems to maintain infrastructure integrity
  • Secure DisposalCertified destruction procedures for all media containing PHI

Technical Safeguards

We deploy advanced technical security measures to ensure the confidentiality, integrity, and availability of all electronic protected health information (ePHI). Our technical safeguards include:

  • Data EncryptionAll data in transit uses TLS 1.2+ and all data at rest uses AES-256 encryption
  • Access ControlsMulti-factor authentication, role-based access control (RBAC), and password policies enforced across all systems
  • Activity MonitoringFull access tracking for all PHI interactions with immutable records retained for compliance review
  • Intrusion DetectionAdvanced monitoring systems detect and alert on suspicious activity in real-time
  • Regular UpdatesAll systems receive timely security patches and vulnerability remediation

Business Associate Agreements

We understand that healthcare providers have a legal obligation to ensure that their business associates maintain appropriate safeguards for PHI. Vera RCM maintains executed Business Associate Agreements (BAAs) with all clients. Our BAA clearly defines our responsibilities and obligations under HIPAA, including:

  • Permitted uses and disclosures of PHI
  • Requirements for safeguarding PHI
  • Obligations regarding breach notification and mitigation
  • Limitations on subcontractor use and management
  • Termination provisions and return or destruction of PHI

Breach Notification

In the unlikely event of a breach of unsecured PHI, Vera RCM is committed to responding quickly and transparently. Our breach response procedures include:

  • Immediate DetectionSecurity monitoring systems are continuously scanning for anomalous activity
  • Rapid ResponseDedicated incident response team engages to contain and investigate any potential breach
  • Risk AssessmentThorough analysis to determine if notification is required under HIPAA rules
  • Timely NotificationWithin 60 days, notification to affected individuals, regulatory agencies, and media as required by law

Employee Training

Our team members understand that they are the first line of defense in protecting patient data. All Vera RCM employees receive thorough training on HIPAA compliance, including:

  • HIPAA privacy and security rules and their application
  • Vera RCM security policies and procedures
  • Phishing awareness and social engineering defense
  • Proper handling, storage, and disposal of PHI
  • Breach reporting procedures

Training is provided annually and upon hire, with supplemental training offered throughout the year for new threats and updates to policies.

Data Encryption

Encryption is a cornerstone of our technical security strategy. We implement industry-standard encryption protocols to protect data both in transit and at rest:

  • In Transit: All data transmitted between clients and our systems uses TLS 1.2 or higher, ensuring full encryption and protection from interception
  • At Rest: All PHI stored in our systems uses AES-256 encryption, the federal standard for protecting classified information
  • Key Management: Encryption keys are generated, stored, and managed securely with restricted access and regular rotation

Access Controls

We maintain strict access controls to ensure that only authorized personnel can access PHI. Our access control strategy includes:

  • Multi-Factor AuthenticationAll users must authenticate with something they know (password) and something they have (authenticator app or security key)
  • Role-Based Access ControlUsers are granted access only to the minimum data necessary to perform their job functions
  • Regular Access ReviewsQuarterly reviews of user access permissions to identify and remediate inappropriate access
  • Immediate DeprovisioningAccess is immediately revoked upon employee termination or role change

Audit Logging

Detailed event logging enables us to monitor all access to PHI and investigate any suspicious activity. Our logging capabilities include:

  • Complete CoverageAll access to PHI is logged, including reads, modifications, deletions, and exports
  • Immutable RecordsLogs are protected from tampering and deletion, ensuring audit trail integrity
  • Long-Term RetentionAll records are retained for a minimum of six years per HIPAA requirements
  • Real-Time MonitoringAutomated systems monitor logs in real-time to detect suspicious patterns and anomalies

Hosting & Infrastructure

Our infrastructure is built on a foundation of security, reliability, and compliance. Vera RCM leverages enterprise-grade hosting services to ensure the highest level of data protection:

  • Equinix Data CentersWe host our infrastructure on Equinix IBX platforms, which provide world-class security, redundancy, and compliance certifications
  • High AvailabilityOur systems are designed for 99.9% uptime with automatic failover and disaster recovery capabilities
  • SOC 2 Type II ComplianceIndependent verification of physical and environmental security controls across all hosting facilities
  • Geographic RedundancyData is replicated across multiple secure data center locations to ensure availability and disaster recovery
  • Backup and RecoveryDaily backups with regular testing ensure rapid recovery from any potential data loss incident
  • Exclusive Database IsolationEach client receives their own dedicated Vera RCM database instance, ensuring complete data separation with no commingling between practices

Contact Our Compliance Team

If you have questions about our HIPAA compliance practices or need to report a security concern, please reach out to our dedicated compliance team. We take all inquiries seriously and are committed to addressing your concerns promptly.

General Inquiries

Email:
info@verarcm.com

Phone:
(847) 430-4475

Location

2500 West Higgins Road
Suite 1230
Hoffman Estates, IL 60169