Celebrating Cedar Gate's 10th Anniversary: Looking back at a decade of looking forward. EXPLORE
X

Information Security

 

Commitment to Information Security and Privacy

As the leading provider of technology and analytics supporting Value-Based Care, Cedar Gate understands the importance of information security and data privacy. We are dedicated to ensuring data security and privacy by leveraging the most advanced tools and services to ensure our client’s data is protected at the highest level.

Our robust safeguards are designed to meet the most stringent privacy certification standards, ensuring that our clients’ nonpublic information remains confidential, with its integrity and availability intact. You can trust Cedar Gate to keep your data secure and safeguard healthcare data privacy.

 

Secure Data is Our Highest Priority

Cedar Gate prides itself on adhering to the most stringent industry guidelines and has achieved advanced industry certification recognizing our commitment to protecting our most valuable asset, our clients, and your data.

 


 

hipaa-logo

HIPAA

We comply with the regulatory requirements of the Health Insurance Portability and Accountability Act (HIPAA). We take great care in implementing adequate measures to securely store, access, and share individual medical and personal information while maintaining strict HIPAA standards.

NIST-logo-technology-copy

NIST

We establish a strong cybersecurity approach based on the National Institute of Standards (NIST) Cybersecurity Framework CSF. Our cybersecurity infrastructure is designed to prevent, detect, and manage security threats and risks effectively. We prioritize the protection of our client’s sensitive data and ensure the highest level of security for their healthcare systems.

 


 

Current 3rd Party Audits and Certifications

 

soc2  The SOC 2 Type II report is an independent assessment of our control environment performed by a third party. Established by the American Institute of Certified Public Accountants (AICPA), the SOC 2 examination is designed for organizations of any size, regardless of industry and scope, to ensure the personal assets of their potential and existing customers are protected. SOC 2 reports are recognized globally and affirm that a company’s infrastructure, software, people, data, policies, procedures, and operations have been formally reviewed.
HITRUST-Certified-r2-Logo HITRUST Risk-based, 2-year (r2) Certified status demonstrates that the organization’s value-based care solutions have met key regulations and industry-defined requirements and are appropriately managing risk. This achievement places Cedar Gate in an elite group of organizations worldwide that have earned this certification. By including federal and state regulations, standards, and frameworks, and incorporating a risk-based approach, the HITRUST Assurance Program helps organizations address security and data protection challenges through a comprehensive and flexible framework of prescriptive and scalable security controls. Cedar Gate’s Analytics, Bundles Adjudication, Care Management, Revenue Cycle Management, and User Management platforms have earned Certified status for information security by HITRUST.
Your browser is out-of-date!

Update your browser to view this website correctly. Outdated Browser

×