ProNetSecure

Mail Solutions:

Quick-Mail
Maximum-Security Email

Maximum-Security Email:
Features Provided Through the Most-Trusted Third Party Vendors.
Email messaging sent through 100% HIPAA-compliant email communications system.  Sensitive information is password-protected and completely secure, every time, using PKI-based S/MIME and PGP encryption hosted by Rackspace Security Systems.
Maximum-security for complete peace of mind.  Controlled data center with biometric scanning access.  ISO17799-based policies and procedures as part of SAS70 Type II audit process.
STANDARD164.312(a)(1) Access Control. 
STANDARD164.312(a)(1) Access Control. 
A covered entity is required to; "Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been grant ed access rights as specified in 164.308(a)(4) [Information Access Management]". 

A covered entity is required to; "Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been grant ed access rights as specified in 164.308(a)(4) [Information Access Management]". 
STANDARD164.312(a)(1) Access Control. 
A covered entity is required to; "Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been grant ed access rights as specified in 164.308(a)(4) [Information Access Management]". 
STANDARD164.312(a)(1) Access Control. 
A covered entity is required to; "Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been grant ed access rights as specified in 164.308(a)(4) [Information Access Management]". 
Standard 164.312(a)(1) Access Control.  
Access only to authorized users.
Emergency Access Procedure 164.312(a)(2)(ii)
Procedures for obtaining necessary data during an emergency.
Automatic Logoff 164.312(a)(2)(iii).
Electronic procedures that terminate an electronic session after a predetermined period of inactivity.
Encryption and Decryption 164.312(a)(2)(iv) and 164-312(e)(2)(ii).
Advanced data encryption and decryption, PKI-based S/MIME and PGP encryption hosted by Rackspace Security Systems.
Audit Controls 164.312(b).
Hardware / software / procedural mechanisms that record and examine activity in information systems. 
Integrity 164.312(c)(1) and 164.312(e)(2)(i).
Policies & procedures to protect data from improper alteration or destruction.
Authentication 164.312(c)(2).
Electronic mechanisms to authenticate data and corroborate that data has not been altered or destroyed in an unauthorized manner.
Access Authentication 164.312(d).
Strict verification of identify of personnel seeking access to data.
Transmission Security 164.312(e)(1).
Security measures to guard against unauthorized access to data that is being transmitted over an electronic communications network.