Banner Image

All Services

Programming & Development

Contract Indexing & Abstracting Services

Healthcare data entry services Healthcare claims Processing Drug rebate processing services Claims error resolution services Medical Record Scanning Survey data entry and collection services,Access control systems include 24 hour uniformed security and proximity readers Background checks conducted before hiring Signed confidentiality agreements upon hiring Limited access to the Internet, email, printers and media drives Dedicated work area to maintain confidentiality and restricted physical access Client material is printed on 'securitized' paper for projects where printing is required Client names and confidential project data are not disclosed internally,Networks split into multiple VLAN’s for each project or team VLAN access controlled by using Access Control List (ACL) in the Layer 3 switch Folder access is controlled by folder permissions in the Server Complex passwords are used for domain credentials. User Passwords expire every 30 days, and wrong password locking in place External storage devices are restricted, user credentials work only in their department Data is Wiped every 30 days,LAN restricted to only authorized sites using a hardware firewall Unauthorized access to network restricted through switch and firewall Network monitoring by Packet Captured in firewall Sonicwall Viewpoint Software is used to monitor all Web logs,We use SSL (Secure Socket Layer) & SSH (Secure Shell) file transfer for FTP Data is encrypted by AES prior to transfer

About

$8/hr Ongoing

Download Resume

Healthcare data entry services Healthcare claims Processing Drug rebate processing services Claims error resolution services Medical Record Scanning Survey data entry and collection services,Access control systems include 24 hour uniformed security and proximity readers Background checks conducted before hiring Signed confidentiality agreements upon hiring Limited access to the Internet, email, printers and media drives Dedicated work area to maintain confidentiality and restricted physical access Client material is printed on 'securitized' paper for projects where printing is required Client names and confidential project data are not disclosed internally,Networks split into multiple VLAN’s for each project or team VLAN access controlled by using Access Control List (ACL) in the Layer 3 switch Folder access is controlled by folder permissions in the Server Complex passwords are used for domain credentials. User Passwords expire every 30 days, and wrong password locking in place External storage devices are restricted, user credentials work only in their department Data is Wiped every 30 days,LAN restricted to only authorized sites using a hardware firewall Unauthorized access to network restricted through switch and firewall Network monitoring by Packet Captured in firewall Sonicwall Viewpoint Software is used to monitor all Web logs,We use SSL (Secure Socket Layer) & SSH (Secure Shell) file transfer for FTP Data is encrypted by AES prior to transfer

Skills & Expertise

AccessData EntryEmail ServicesFTPIndexingLanMedicalProcessingSecuritySoftware DesignSonicWallSshSSL

0 Reviews

This Freelancer has not received any feedback.