HIPAA — Health Insurance Portability and Accountability Act
Every Via Lucra engagement that touches Protected Health Information follows HIPAA's Administrative, Physical, and Technical Safeguard requirements. We do not treat HIPAA as a checklist exercise—we design systems where the compliant path is the default path.
Technical Safeguards
- AES-256 encryption at rest for all PHI storage using AWS KMS with customer-managed keys. The provider controls key rotation schedules and access policies—not Via Lucra, not AWS.
- TLS 1.2+ enforced for all data in transit, including internal service-to-service communication within VPCs. Certificate pinning is applied for API integrations with external partners such as MCOs and clearinghouses.
- Role-based access control (RBAC) implemented through AWS IAM Identity Center with MFA enforcement. Access to PHI systems requires both organizational identity verification and per-session MFA tokens.
- Automated session timeouts and audit logging for all PHI access events. Every read, write, and delete operation is captured in immutable CloudTrail logs with tamper-detection enabled via log file validation.
Administrative Safeguards
- Business Associate Agreements executed before any engagement involving PHI. Via Lucra maintains a BAA template aligned with 45 CFR §164.502(e) and §164.504(e) that clearly delineates responsibilities.
- Workforce training documentation delivered as part of every engagement. We provide role-specific security awareness materials covering PHI handling, incident reporting, and acceptable use policies.
- Risk assessments conducted at engagement start using the NIST Cybersecurity Framework as the evaluation baseline. Findings are documented in a risk register with severity ratings, remediation timelines, and responsible parties.
Physical Safeguards
- All Via Lucra infrastructure runs in AWS regions with SOC 2 Type II and HIPAA-eligible designations. We do not use on-premise equipment for PHI processing.
- Workstation security policies require full-disk encryption, automatic screen lock, and endpoint detection and response (EDR) software on any device used to access client environments.