Important Notices & Announcements

Scheduled Third Party LNP Black Out Dates #20171007002

Monday, October 16, 2017 through Sunday, October 22, 2017

Scheduled Third Party Maintenance #20171007001

Sunday, October 8, 2017 between 1:00 am - 6:00 AM EDT

Planned Maintenance Notice #20161113001

Sunday, November 13th, 2016 between 3:00 AM - 6:00 AM EDT

HIPAA Compliance

HIPAA compliance is vital to the healthcare industry to ensure patient privacy. While there is no federal agency that can "certify" a solution as such, JJCOM.COM adheres to the following published HIPAA guidelines:

Technical Safeguards 

• Controlling access to computer systems and enabling covered entities to protect communications containing PHI(Patient Health Information) transmitted electronically over open networks from being intercepted by anyone other than the intended recipient.

• Information systems housing PHI must be protected from intrusion. When information flows over open networks, some form of encryption must be utilized. If closed systems/networks are utilized, existing access controls are considered sufficient and encryption is optional.

• Each covered entity is responsible for ensuring that the data within its systems has not been changed or erased in an unauthorized manner.

• Covered entities must also authenticate entities with which they communicate. Authentication consists of corroborating that an entity is who it claims to be. Examples of corroboration include: password systems, two or three-way handshakes, telephone call back, and token systems.

• Covered entities must make documentation of their HIPAA practices available to the government to determine compliance.

• In addition to policies and procedures and access records, information technology documentation should also include a written record of all configuration settings on the components of the network because these components are complex, configurable, and always changing.

Administrative Safeguards 

Security Management Process. JJCOM.COM has identified and analyzed potential risks to information and has implemented security measures to reduce risks and vulnerabilities. We continue to analyze new threats and take appropriate measures over time.

Security Personnel. JJCOM.COM has designated a security official responsible for developing and implementing its security policies and procedures.

Information Access Management. Access to any information on the JJCOM.COM system requires privileges which are maintained appropriate to our personnel's roles.

Workforce Training and Management. Our staff consists of dedicated on-site personnel who are appropriately trained and managed.

Evaluation. We perform quarterly network security scans and annual assessments of our policies and procedures.

Read 1393 times

Related items

Media

More in this category: « Privacy Policy

Highly Qualified And Friendly Support

We provide 24/7 service and support through a combination of online help, live operators, and our On-Call Technicians that come to your site when you need us.

Look at what we do for you!

  • Manage and maintain everything
  • Unlimited local and long distance
  • Easily add remote offices and mobile workers
  • Make moves and changes online
  • Free moves, adds, changes

Tons Of Useful Built-In Features

  • Toll Free Numbers
  • Call Forwarding
  • Call Screening
  • Caller ID
  • Voicemail to Email
  • Voicemail
  • Music-on-hold
  • Conference Calls
  • Cloud based
  • Many more features...