06 / Phase 04 · Security & HIPAA Infrastructure

Building trust into the system.

HIPAA-conscious infrastructure is not a feature added at the end of a build. It is the operational discipline that runs underneath every patient interaction — from a diabetic ulcer image uploaded on a phone, to a physician's consult note, to a multi-location scheduling sync.

Security Posture

Three layers of operational safeguard, designed together.

The platform's safeguards are organized into three coordinated layers — technical controls inside the application, administrative discipline around the people who operate it, and infrastructure-level protection across hosting, network, and storage. No single layer carries the full weight; they reinforce one another.

For a family-owned practice expanding into telemedicine, this structure is intentional. It allows the President to see, on a single page, where every dollar of security investment is going and which operational risk it answers.

Layer 01 · Technical Safeguards

Controls inside the application itself.

The first layer protects data and access at the code level — what the platform does every time a provider logs in, opens a chart, or reviews a wound image.

01.1

Encryption at rest & in transit

All PHI — patient demographics, wound images, consult notes, eRx records — is encrypted on disk using AES-256 and protected in transit using TLS 1.2 or higher. Encryption keys are managed by the cloud provider's KMS, not stored inside the application.

01.2

Multi-factor authentication

Every provider, admin, and staff account requires MFA. The President and the Medical Director get explicit visibility into who has access and whether their second factor has been enrolled.

01.3

Role-based access control

Front-desk staff see scheduling and intake. Medical assistants see clinical workflows. Providers see full charts. Owners see operational reporting. RBAC is enforced server-side — never relying on the front-end to hide things.

01.4

Audit logging

Every PHI access event — view, modify, export, share — is logged with user, timestamp, IP, and action. Logs are immutable, retained per HIPAA expectations, and surfaceable in operational reports.

01.5

Session management

Idle timeout, forced re-authentication for sensitive actions (eRx prescribing, refill approval, image export), device fingerprinting for telemedicine consults. A staff member can't walk away from a workstation and leave a chart open.

01.6

Secure image handling

Wound photos from the mobile app upload over an encrypted channel, are stored in a HIPAA-eligible object store, and are never exposed by predictable URL. Diabetic ulcer progression images carry the same protection as a chart note.

Layer 02 · Administrative Safeguards

Discipline around the people who run the system.

Technical controls fail when the operational habits around them are loose. This layer is the documented discipline that keeps the technical layer honest.

02.1

BAA registry & coverage map

Every vendor that touches PHI — hosting, email, SMS, eRx clearinghouse, telemedicine signaling, analytics — has an executed Business Associate Agreement, mapped in a single registry the President can review on demand.

02.2

Access provisioning & revocation

Documented procedure for adding a new provider, onboarding a new front-desk hire, or revoking access when someone leaves. Includes mandatory checklist items: account disabled, MFA tokens revoked, BAA-relevant access closed.

02.3

Training & acknowledgment

Onboarding training material for staff who will use the platform — what counts as PHI, how to handle a misdirected message, what to do if a device is lost. Documented acknowledgment, refreshed annually.

02.4

Incident response runbook

A written procedure for the moments that matter — suspected unauthorized access, lost device, accidental disclosure. Defines who is notified, who decides, and what the timeline looks like for breach assessment and notification, if required.

Layer 03 · Infrastructure Safeguards

The platform underneath the platform.

Hosting, network, and storage controls — the foundation the application sits on.

03.1

HIPAA-eligible hosting

Application and storage are provisioned on a HIPAA-eligible cloud provider with an executed BAA covering the specific services in use. No PHI lives in a service that isn't covered.

03.2

Network isolation

Private subnets, restricted security groups, and a defined ingress posture. Databases are not internet-addressable. Administrative access is gated behind authenticated, logged channels.

03.3

Backup & recovery

Encrypted, automated backups with documented retention and recovery procedures. Recovery point and recovery time objectives are agreed during discovery and tested before launch — not assumed.

03.4

Patch & vulnerability discipline

Operating systems, runtime, application dependencies, and container images are tracked and patched on a documented cadence. Critical CVEs in PHI-touching paths are treated as operational incidents, not housekeeping.

03.5

Monitoring & alerting

Authentication anomalies, unusual export patterns, infrastructure errors, and uptime degradation all generate alerts. The operations team sees them before the practice does — which is the only acceptable order.

03.6

Documented architecture

Every component, every data flow, every BAA-covered service is documented and version-controlled. If a future auditor, partner, or licensee asks how the system is built, the answer is on paper.

In Practice — Podiatry Workflows

Where these safeguards meet a real foot, a real chart, a real refill request.

Diabetic wound progression imaging

A patient uploads a weekly photo of a healing ulcer from the mobile app. The image is encrypted client-side, transmitted over TLS, stored in a HIPAA-eligible object store, indexed against the patient's chart, and surfaced to the Medical Director's dashboard. The patient's neighbor — who shares the Wi-Fi network — never sees a thing.

Multi-location refill workflow

A patient seen at one clinic location requests a refill while the original prescribing provider is at a second location. RBAC permits the covering provider to view the chart and approve via eRx; the audit log records both providers, both locations, and the prescription pathway end-to-end.

Telemedicine consult, post-op recovery

A post-surgical patient connects to a video consult through the patient portal. The signaling path runs through a BAA-covered service; the recording (if enabled) is encrypted and stored under the same controls as in-person chart documentation. Session timeout protects the encounter if either party walks away.

Orthotic intake from a referring office

A referring physician's office submits orthotic intake forms and imaging via a secure, BAA-covered channel. The platform routes the package to the correct provider queue, logs the source, and never exposes PHI through an unprotected upload URL.

Phase 04 Investment · Security & HIPAA Infrastructure Scoped against hosting choice, integration surface, and operational controls · revealed indicatively on request
$45,000 indicative midpoint · finalized post-discovery

Security investment scales with hosting architecture, audit depth, BAA coverage breadth, and the operational runbooks the practice chooses to formalize during this phase.

Next Phase

Safeguards installed. Time to transition into live operation.

Continue to launch and deployment — where the platform becomes operational reality for providers, staff, and patients.