Patient data handled with the care it deserves.
MEDVOXA handles Protected Health Information (PHI) as part of normal billing operations. We treat data security not as a compliance checkbox but as a core operational responsibility.
Built for regulated healthcare environments
As a Business Associate under HIPAA, MEDVOXA maintains the administrative, physical, and technical safeguards required to handle PHI in the course of providing billing services.
Business Associate Agreements (BAAs) are executed with every practice before any patient data is accessed or transmitted.
BAA executed with every client before any PHI access. Standard agreement or client-provided BAA accepted.
Access to patient information is limited to what is necessary for billing purposes — no broader data collection.
Defined incident response and breach notification procedures aligned with HIPAA Breach Notification Rule requirements.
All staff with PHI access receive HIPAA training. Role-based access controls limit data exposure to billing team members.
System access and data handling activities are logged to support compliance review and investigation if needed.
How we handle patient information
Transmission Security
All data transmitted between MEDVOXA systems, payer clearinghouses, and client systems uses encrypted connections. PHI is never transmitted in plain text.
Data Storage
Patient data is stored in access-controlled environments with encryption at rest. Retention policies align with applicable state and federal requirements.
Third-Party Vendors
Any subcontractors or technology vendors that may access PHI in the course of providing services to MEDVOXA are required to execute their own BAAs.
MEDVOXA is currently in active development. Third-party security audits and certifications (SOC 2, etc.) will be pursued prior to full production deployment. Our compliance architecture is being designed to meet these standards from the ground up. Contact us to discuss our current compliance posture for your evaluation.
Have compliance or security questions?
We're happy to discuss our security posture, provide our BAA template, or answer specific compliance questions from your legal or IT team.