Data Security and Compliance

Data security is something which each and every organization wants today. To safeguard as well as to offer safe and secure environment of your data, we are giving the best network application & administrative technologies and procedures. We are committed towards your information security and privacy. At Oriental Solutions, we use industry-leading technologies and policies to protect the confidentiality of your data and the patient’s information.

Check it out, what we have in offering to secure your data.

SSL 256-bit Encryption: SSL is a security protocol used for securing communications on the Web.

SGC (Microsoft Server Gated Cryptograph): Server Gated Crypto is an extension to the Secure Sockets Layer (SSL) security protocol.

HTTPS: PS provides secure communication mechanisms between an HTTP client-server pair in order to enable spontaneous commercial transactions for a wide range of applications.

NT/2000 Security: Internet Information Service (IIS) provides support for the Windows 2000 Challenge /Response authentication, which uses a cryptographic technique to authenticate password.

Locked-down physical access to data servers and storage media that is guarded and audited twenty-four hours a day, seven days a week

Fully fault-tolerant and disaster-resilient data centers

Data communication security that ensures the privacy and integrity of data passing over public networks

Secure, audited, & monitored electronic access for all internal information processing networks

Secure, logical application-level access for data that is processed within the system by server and client applications

The Most Advanced Process for a Secure System

Rigorous authentication and auditing procedures for all users (Transcribers, QA, Administration staff)

Personnel security with standardized background check

Firewall security for client's side

Limited access to patient information to transcribers, including voice, templates, ADT and text

To access platform, one need to know the password protected login

Data can only be decrypted once it has been downloaded to an authorized local machine

Data is automatically removed from the local desktop, once it has been transcribed and approved

Data cannot be accessed or viewed by another third party application

An audit trail is automatically captured every step of the process

Physical Security

At Oriental Solutions, the data is secured in a data center with limited access. Many security measures are in place to safeguard the data.

  • Access procedures include ID cards, authentication, password access and verification
  • Continuous video surveillance
  • Fire and gas suppression systems
  • Uninterrupted power supply and backup generators
  • Round the clock server operations monitored
  • Authorized personnel have access to data, documentation, specifications, software and any correspondence that is classified as client specific
  • Data center monitored 24*7 by on-site security personnel

Mandatory Requirement

All employees and management personnel (regardless of position & responsibility) have to sign confidentiality and non-disclosure agreement (NDA) at the time of joining.

All physical security measures are enforced at all times.

Disaster & Redundancy:

We have an equipped data center which has a detailed disaster recovery procedures. It helps us to manage and minimize disruptions. Apart from that it ensures stability in the time of disaster such as flood, fire, power outages, etc.

The backup process is performed in a dynamic mode to keep the systems operational 24 hours a day and to ensure that no data is lost even though, if there is a system failure.