American Transcription Services, LLC (ATS) is committed to safeguarding its clients’ data and privacy rights. This includes patient confidentiality and document security requirements for GDPR compliance. In this context, we have developed a GDPR-compliant data security policy to provide our clients with a comprehensive overview of how we store, transfer, and handle any information they provide to us.
As a leading healthcare service provider, ATS is dedicated to upholding the highest standards of data security and patient privacy. We recognize that the protection of sensitive patient information is paramount to our operations, and we are fully committed to complying with the General Data Protection Regulation (GDPR) and other relevant data protection laws and regulations.
At ATS, we understand that patient data is among the most sensitive and personal information. We are unwavering in our commitment to the following:
Data Types Covered
This GDPR policy encompasses the protection and management of various types of sensitive patient data, including but not limited to:
ATS usually collects PHRs from clients who want to avail of our healthcare services. We use secure digital communication channels to gather this information from customers.
Systems and Processes
This GDPR policy applies to all systems, processes, and activities involved in the handling, processing, and storage of patient data. It covers the following:
We’ve defined clear roles to ensure accountability for data security, privacy, and compliance. The most prominent roles include:
Data Security Officer (DSO)
The Data Security Officer (DSO) oversees and ensures the proper implementation of data security policies and practices across the organization. The DSO’s primary responsibilities include:
Data Custodians
Data custodians are individuals within the organization responsible for the custody and protection of patient data. Their responsibilities include:
Data Processors
Data processors, including employees, contractors, and third-party vendors, play a crucial role in handling patient data. Their responsibilities include:
Third-Party Vendors and Contractors
Third-party vendors and contractors who have access to patient data must also adhere to data security and privacy standards. Their responsibilities include:
We ensure that all stakeholders are aware of their obligations in maintaining data security and patient privacy.
At American Transcription Services, we classify patient data into the following categories based on sensitivity:
Confidential Data
This category includes patient health records (PHR) and billing information. Access to confidential data is strictly limited to authorized personnel with a legitimate need-to-know. Data handling procedures include encryption during transmission and storage.
Sensitive Data
Data such as medical histories and diagnostic information are classified as sensitive. Access controls ensure that only relevant individuals, as per the principles of least privilege (section 5), have access. These data types are also subject to encryption during transmission and storage.
Public Data
Limited non-sensitive patient information, such as basic demographic details, may be considered public. However, access controls are still enforced to prevent unauthorized disclosure.
Access to patient data is granted and revoked through the following procedures:
Our team members who work remotely exclusively use company-provided laptops and desktops and have to comply with company protocols and policies about the security of data. Their machines are loaded with desk time applications to monitor every fraction of their work.
They aren’t allowed to store PHIs and other client files on their personal devices. Furthermore, these nodes are updated with robust encryption software and malware protection software to protect the data on their computers.
We also prioritize cleaning up of temp files created after the completion of our services. The deletion of all documents from computers after service delivery follows an established protocol.
At ATS, we use secure cloud storage solutions to store all patient information we receive from clients. Each type of client-sourced file passes through robust 256-bit encryption at rest and during transit. Our host uses Secure Sockets Layer (SSL)/Transportation Layer Security (TLS) to protect data in transit between dictation applications and our servers. SSL/TSL creates a secure tunnel protected with 128-bit or greater Advanced Encryption Standard (AES) encryption.
We ensure secure data transmission and storage through the following measures:
Authentication
ATS uses a combination of secure methods to verify the identity of users accessing patient data. These methods may include:
Authorization
The authorization process involves specifying access rights based on user roles and responsibilities. ATS employs the principle of least privilege, ensuring that employees, contractors, and third-party vendors have access only to the data necessary for their specific roles. Authorization is controlled through role-based access control (RBAC) mechanisms, which are regularly reviewed and updated as job responsibilities change.
ATS maintains a well-defined incident response protocol to address data breaches, unauthorized access, and other security incidents. Our incident response plan covers the following:
Containment: In the event of a security incident or data breach, immediate containment actions are initiated to prevent further unauthorized access, data leakage, or damage. Containment may involve isolating affected systems or networks.
Investigation: A comprehensive investigation is launched to determine the nature, scope, and impact of the incident. This involves collecting evidence, conducting forensic analysis, and identifying the root cause.
Notification: If required by data protection regulations, affected parties, regulatory authorities, and relevant stakeholders will be promptly notified of the incident. The notification process will be carried out as per legal requirements and within the specified timeframes.
Recovery: Recovery measures are initiated to restore normal operations while minimizing any potential damage. This includes actions to remediate vulnerabilities, repair affected systems, and strengthen security controls to prevent similar incidents in the future.
We follow established guidelines for retaining patient data in compliance with legal requirements and ensure secure data disposal when data is no longer needed.
Retention Guidelines
Patient health data, billing information, and other details are retained only for the duration necessary to fulfil its intended purpose or as required by applicable laws and regulations. A data retention schedule is maintained to define specific retention periods for different types of patient data.
Secure Data Disposal
Procedures for secure data disposal are in place, including:
We predominantly recruit new employees through referrals from our current. We even run extensive background checks before hiring some. Moreover, our employees sign NDAs as and when required by a client to uphold privacy at all moments. We also conduct regular training programs to educate employees about data security policies, procedures, and best practices.
These include:
ATS specifies rigorous requirements for third-party vendors and partners who have access to patient data through the following:
We employ various methods for monitoring and auditing of data access and usage:
The GDPR policy is regularly reviewed and updated to adapt to new security threats, technologies, and regulations. It ensures data protection measures remain robust and up-to-date.
We reserve the right to update or modify the above GDPR Privacy Policy, as deemed necessary, to adapt to the changing business and market needs. We are not liable to inform you about the change in the policy before it has been made. Following the change, we will inform the same through the appropriate communication channels.
We take proactive measures to enforce the regulations and protocols outlined in this policy. The consequences of violating the data security policy are clearly defined and communicated to all stakeholders. Disciplinary actions, including warnings, suspension, termination, and potential legal repercussions, may be taken in response to policy violations.
At American Transcription Services, we believe in maintaining complete transparency with our clients. So, we give you the authority to request us to delete our copy of your files from our systems after the successful completion of your project.
If you want to request the deletion of any data, you can reach out to your account manager directly.
If you have any questions about our GDPR Data Security Policy, the data we hold, or your data protection rights, please feel free to contact us.