HIPAA Invoicing Protection
Now that we’ve discussed how the invoices can work, it’s important to come back to the HIPAA Security Rule and the HIPAA Privacy Rule. In general, we recommend collecting, and revealing, less information rather than more. Data should always be encrypted when it’s at rest with HIPAA-compliant database software and when it’s in transit.
It’s also incredibly important that you set permissions within the platform so that only authorized users have access to patient information that contains ePHI. Multifactor authentication is a must, and studious developers will suggest a “zero trust” philosophy. Of course, HIPAA also has logging requirements that say a record must be created every time the information is accessed or altered.