Blog

Sameer Sule, Chief Information Security Officer

Trust is always the foundation

Trust is the foundation of any healthcare business, and this extends to the technology these businesses use. Patients trust that their personal data (Personally Identifiable Data or PII) and medical data (Protected Health Information or PHI) are kept secure by their doctors’ offices and other clinics, pharmacies, medical device companies whose products they use, and their insurers. As a leader in global health enablement with over 1,700 customers, including all types of providers, public health agencies, and health technology companies, Rhapsody understands the importance of keeping data secure. Rhapsody customers around the globe trust that the integration, identity management, and clinical terminology management solutions we provide are secure, stable, reliable, and high-quality. We take this trust very seriously.

Rhapsody is committed to protecting any PHI, PII, and confidential information we handle, and we maintain compliance with applicable data privacy and security laws such as HIPAA in the US and GDPR in Europe. We have implemented an Information Security and Privacy Program that identifies and mitigates data security and privacy risks through an effective combination of policies, technology, and employee training. This program is aligned with the ISO 27001 standards and the NIST cybersecurity framework.

Our commitment to security and quality of our products and services is validated by the fact that Rhapsody:

The data security controls that Rhapsody has implemented to protect customer data include: 

  1. Information Security and Privacy Policies and Procedures: We have a comprehensive suite of security and privacy policies including Information Security Policy, Global Privacy Policy, Acceptable Use Policy, Mobile Computing Policy, Password Policy, Security Incident Management Policy, Breach Reporting and Notification Policy, and Third-Party Management Policy. These robust sets of policies and procedures form the foundation of our Information Security Management System (ISMS) and are assessed during the ISO 27001 and SOC2 audits.

  2. Secure Software Development Lifecycle (SDLC) Process: Our software products are developed using a robust SDLC process that includes comprehensive code review and testing prior to release. Our software developer security platform monitors open source software security and license vulnerabilities. An independent third-party conducts penetration testing of our solutions.

  3. Physical and Environmental Security: We host our cloud solutions in Amazon Web Services (AWS) and Microsoft data centers with comprehensive physical and environmental security. These data centers are certified to several industry standards and are fully compliant with applicable global data protection regulations.

  4. Cryptography: Data is encrypted at rest (stored) and in transit.

  5. Human Resource Security: All employees undergo a background check prior to beginning their employment with Rhapsody. Rhapsody has mandatory compliance, privacy, and cybersecurity training that all employees must complete when they join the company and annually thereafter. Employees must acknowledge that they have reviewed our data security and privacy policies and understand their obligations to protect confidential and sensitive information. Failure to adhere to the policies will result in disciplinary action.

  6. Access Control: Rhapsody has implemented policies and procedures for granting, monitoring, and revoking access to Rhapsody’s information systems. Role-based access control is in place for access to Rhapsody’s confidential data and customer data. This access is granted to the “minimum necessary” required for the job. We have implemented single sign-on (SSO) for critical business applications and require multi-factor authentication for access to other applications.

  7. Endpoint Protection: All mobile devices must be enrolled in Rhapsody’s Mobile Device Management System to access company resources. Rhapsody laptops are encrypted with full disk encryption. They also have endpoint detection, response, and remote wipe capability.

  8. Information Security Incident Management: Rhapsody internal infrastructure and customer facing cloud solutions are monitored 24/7. Our Security Information and Event Management (SIEM) systems continuously monitor the environment and alert the Security Operations team of any suspicious activity. Rhapsody’s information security incident management procedure addresses the response to potential security incidents in a timely manner. We have also engaged the services of a third-party managed security services provider to assist in handling cybersecurity incidents.  In addition, we perform incident response tabletop exercises to make sure the teams are prepared if an incident does occur.

  9. Supplier Relationships: Our third-party vendor management process is designed to identify and mitigate risks to data and systems from third-party software and services. Rhapsody conducts a comprehensive security evaluation of its vendors to ensure that vendors handling Rhapsody or customer data have implemented appropriate security controls to protect the data We conduct the security evaluation initially when onboarding the vendor for the first time and annually thereafter.

  10. Organization of Information Security and Privacy: Rhapsody has appointed a Chief Information Security Officer (CISO) and a Data Protection Officer (DPO) with overall responsibility for data security, privacy, and compliance.

  11. Compliance: Rhapsody has implemented reasonable and appropriate administrative, physical, and technical controls to safeguard customer PII and PHI and maintain compliance with the US HIPAA, EU GDPR, and other applicable regulations in regions in which Rhapsody does business.

For further reading, check out these resources:

You also might like:

icon rocket

The cost of scalability

Open-source software can appear to save organizations money but when it comes to interoperability the true cost is rarely free.

Data privacy at risk: What the Delete Act means for healthcare information

As data privacy regulations continue to expand worldwide, ensuring your EMPI solution uses transparent and traceable data to comply with privacy regulations is crucial.

Flexible deployment options: Why it matters

Learn the limitations of cloud only solutions and why you need a solution that meets you where you are for total interoperability in healthcare.

Related Blogs

Rhapsody Health Solutions Team

From Complexity to Simplicity: One Clinic’s Journey to Corepoint

Discover how Hattiesburg Clinic enhanced data integration, streamlined maintenance, and strengthened cybersecurity for Corepoint integration.

Read more

Rhapsody Health Solutions Team

How SOPHiA GENETICS Leverages Rhapsody to Revolutionize Genomic Data Interpretation

By leveraging Rhapsody, SOPHiA GENETICS can focus on what they do best: developing advanced genomic analytics that empower clinicians with actionable insights.

Read more

Rhapsody Health Solutions Team

Scale Your AI, Effortlessly: Simplify Data Integration

Discover essential strategies for integrating healthcare data effectively, ensuring your AI solutions are scalable and reliable.

Read more