πŸ” HIPAA Compliance at BenOsphere

At BenOsphere, protecting employee health information is a top priority. As a platform trusted to handle sensitive benefits and wellness data, we are fully committed to maintaining HIPAA-compliant systems, policies, and processes. Our HIPAA compliance program has been reviewed and attested by the team at Compliancy, an industry-recognized third-party compliance partner.

We understand the responsibility that comes with managing protected health information (PHI), and we take that responsibility seriously. From secure infrastructure to strict access controls, every layer of BenOsphere is designed with privacy and compliance in mind.

Have questions about our HIPAA practices? πŸ“© hello@benosphere.com

ControlCategoryDescription
βœ“Customer Data Deletion Upon TerminationProductCustomer data is securely deleted when no longer needed or upon contract termination in accordance with data retention policies.
βœ“Data ClassificationProductData is classified by sensitivity and handled accordingly to ensure appropriate levels of protection.
βœ“Designated Security OfficialsOrganizationalBenOsphere has implemented and verified control for: Designated Security Officials.
βœ“Contractor RequirementsOrganizationalBenOsphere has implemented and verified control for: Contractor Requirements.
βœ“Credential Keys ManagedInfrastructureBenOsphere has implemented and verified control for: Credential Keys Managed.
βœ“Cryptography PoliciesInfrastructureBenOsphere has implemented and verified control for: Cryptography Policies.
βœ“System Access GrantedInfrastructureSystem access is managed using a role-based model and is revoked immediately upon employee or contractor termination.
βœ“Terminated Employee Access Revoked Within One Business DayInfrastructureSystem access is managed using a role-based model and is revoked immediately upon employee or contractor termination.
βœ“Unique Accounts UsedInfrastructureBenOsphere has implemented and verified control for: Unique Accounts Used.
βœ“Unique SSHInfrastructurePublic SSH access is disabled. Only authenticated and authorized users with unique credentials can access systems via secure protocols.
βœ“Users Can Access All Their InformationProductEach user is provisioned with a unique account. Access is monitored and governed by least privilege principles.
βœ“Users Can Update their InformationProductUsers can view and update their information through a secure, authenticated interface in compliance with data accuracy standards.
βœ“VPN Required for Production AccessInfrastructureProduction systems are only accessible through a secure VPN to protect internal assets from unauthorized external access.
βœ“Vulnerability ManagementInfrastructureBenOsphere has implemented and verified control for: Vulnerability Management.
βœ“Inactivity and Browser Exit LogoutProductSystem activity and security events are logged centrally and monitored for suspicious behavior with real-time alerts.
βœ“Least-Privileged Policy for Customer Data AccessProductA formal Least-Privileged Policy for Customer Data Access is in place to govern consistent and secure operations across the organization.
βœ“Log Management SystemInfrastructureSystem activity and security events are logged centrally and monitored for suspicious behavior with real-time alerts.
βœ“Logging/MonitoringInfrastructureSystem activity and security events are logged centrally and monitored for suspicious behavior with real-time alerts.
βœ“Logs Centrally StoredInfrastructureSystem activity and security events are logged centrally and monitored for suspicious behavior with real-time alerts.
βœ“Malware Detection Software InstalledInfrastructureBenOsphere has implemented and verified control for: Malware Detection Software Installed.
βœ“Multiple Availability ZonesInfrastructureBenOsphere has implemented and verified control for: Multiple Availability Zones.
βœ“Network segmentation in placeInfrastructureBenOsphere has implemented and verified control for: Network segmentation in place.
βœ“Operational AuditOrganizationalSecurity controls and data access are reviewed regularly to maintain regulatory compliance and identify improvement opportunities.
βœ“Oversight of Security ControlsOrganizationalBenOsphere has implemented and verified control for: Oversight of Security Controls.
βœ“Password ManagerInfrastructureBenOsphere has implemented and verified control for: Password Manager.
βœ“Password PolicyOrganizationalA formal Password Policy is in place to govern consistent and secure operations across the organization.
βœ“Password StorageInfrastructureBenOsphere has implemented and verified control for: Password Storage.
βœ“Removable Media Device EncryptionInfrastructureData is encrypted both at rest and in transit using industry-standard protocols. Encryption keys are tightly controlled and accessible only to authorized personnel.
βœ“Require Authentication for AccessProductSystem access is managed using a role-based model and is revoked immediately upon employee or contractor termination.
βœ“Require Encryption of Web-Based Admin AccessInfrastructureData is encrypted both at rest and in transit using industry-standard protocols. Encryption keys are tightly controlled and accessible only to authorized personnel.
βœ“Role-Based Security ImplementationProductBenOsphere has implemented and verified control for: Role-Based Security Implementation.
βœ“Servers Monitored and AlarmedInfrastructureCritical infrastructure components are continuously monitored with alerts configured for anomalous behavior or system failures.
βœ“Session LockInfrastructureBenOsphere has implemented and verified control for: Session Lock.
βœ“SSL/TLS EnforcedInfrastructureBenOsphere has implemented and verified control for: SSL/TLS Enforced.
βœ“Activity ReviewOrganizationalSecurity controls and data access are reviewed regularly to maintain regulatory compliance and identify improvement opportunities.
βœ“Annual Access Control ReviewOrganizationalSecurity controls and data access are reviewed regularly to maintain regulatory compliance and identify improvement opportunities.
βœ“Annual Incident Response TestOrganizationalA comprehensive incident response plan exists and is tested annually to ensure swift action during security events.
βœ“Annual Penetration TestsOrganizationalBenOsphere has implemented and verified control for: Annual Penetration Tests.
βœ“Architectural DiagramInfrastructureBenOsphere has implemented and verified control for: Architectural Diagram.
βœ“Authentication ProtocolInfrastructureBenOsphere has implemented and verified control for: Authentication Protocol.
βœ“Backup Integrity and CompletenessInfrastructureRegular, automated backups are performed with integrity checks and monitored for successful completion to ensure recoverability in case of data loss.
βœ“Backup PolicyOrganizationalRegular, automated backups are performed with integrity checks and monitored for successful completion to ensure recoverability in case of data loss.
βœ“Customer Data is Encrypted at RestProductBenOsphere has implemented and verified control for: Customer Data is Encrypted at Rest.
βœ“Customer Data PoliciesOrganizationalBenOsphere has implemented and verified control for: Customer Data Policies.
βœ“Daily Backup Statuses MonitoredInfrastructureRegular, automated backups are performed with integrity checks and monitored for successful completion to ensure recoverability in case of data loss.
βœ“Data Destruction PolicyOrganizationalA formal Data Destruction Policy is in place to govern consistent and secure operations across the organization.
βœ“Data Retention PolicyOrganizationalA formal Data Retention Policy is in place to govern consistent and secure operations across the organization.
βœ“Database Monitored and AlarmedInfrastructureCritical infrastructure components are continuously monitored with alerts configured for anomalous behavior or system failures.
βœ“Denial of Public SSHInfrastructurePublic SSH access is disabled. Only authenticated and authorized users with unique credentials can access systems via secure protocols.
βœ“Disaster Recovery PlanOrganizationalBusiness continuity and disaster recovery plans are in place to minimize disruption during unforeseen incidents.
βœ“Disposal of Sensitive Data on HardwareInfrastructureBenOsphere has implemented and verified control for: Disposal of Sensitive Data on Hardware.
βœ“Disposal of Sensitive Data on PaperInfrastructureBenOsphere has implemented and verified control for: Disposal of Sensitive Data on Paper.
βœ“Encryption PolicyOrganizationalData is encrypted both at rest and in transit using industry-standard protocols. Encryption keys are tightly controlled and accessible only to authorized personnel.
βœ“Event LoggingInfrastructureSystem activity and security events are logged centrally and monitored for suspicious behavior with real-time alerts.
βœ“Failed Backup Alert and ActionInfrastructureRegular, automated backups are performed with integrity checks and monitored for successful completion to ensure recoverability in case of data loss.
βœ“FIM (File Integrity Monitoring) Software in PlaceInfrastructureCritical infrastructure components are continuously monitored with alerts configured for anomalous behavior or system failures.
βœ“Hard-Disk EncryptionInfrastructureData is encrypted both at rest and in transit using industry-standard protocols. Encryption keys are tightly controlled and accessible only to authorized personnel.
βœ“Hardening Standards in PlaceInfrastructureBenOsphere has implemented and verified control for: Hardening Standards in Place.
βœ“Document Retention PeriodOrganizationalData retention is governed by clearly defined policies ensuring legal and operational requirements are met.
βœ“Employee Disclosure ProcessOrganizationalBenOsphere has implemented and verified control for: Employee Disclosure Process.
βœ“Follow-Ups TrackedOrganizationalBenOsphere has implemented and verified control for: Follow-Ups Tracked.
βœ“HIPAA Awareness TrainingOrganizationalAll employees and contractors complete regular HIPAA and cybersecurity training to ensure awareness of responsibilities and threats.
βœ“Incident Response TeamOrganizationalA comprehensive incident response plan exists and is tested annually to ensure swift action during security events.
βœ“Incident Response PlanOrganizationalA comprehensive incident response plan exists and is tested annually to ensure swift action during security events.
βœ“Termination/Offboarding ChecklistOrganizationalBenOsphere has implemented and verified control for: Termination/Offboarding Checklist.
βœ“3rd Parties and Vendors Given Instructions on Breach ReportingOrganizationalVendors are assessed for compliance, and agreements are maintained to ensure they meet BenOsphere’s security and privacy standards.
βœ“Acceptable Use Policy Employees AcknowledgeOrganizationalA formal Acceptable Use Policy Employees Acknowledge is in place to govern consistent and secure operations across the organization.
βœ“Allowable Use and DisclosureOrganizationalBenOsphere has implemented and verified control for: Allowable Use and Disclosure.
βœ“Annual Review of PurposesOrganizationalSecurity controls and data access are reviewed regularly to maintain regulatory compliance and identify improvement opportunities.
βœ“Asset Management PolicyOrganizationalA formal Asset Management Policy is in place to govern consistent and secure operations across the organization.
βœ“Background ChecksOrganizationalBenOsphere has implemented and verified control for: Background Checks.
βœ“Business Associate AgreementsOrganizationalBenOsphere has implemented and verified control for: Business Associate Agreements.
βœ“Business Continuity PlanOrganizationalBusiness continuity and disaster recovery plans are in place to minimize disruption during unforeseen incidents.
βœ“Business Impact AnalysisOrganizationalBenOsphere has implemented and verified control for: Business Impact Analysis.
βœ“Breach NotificationOrganizationalBenOsphere has implemented and verified control for: Breach Notification.
βœ“Board Oversight Briefings ConductedOrganizationalBenOsphere has implemented and verified control for: Board Oversight Briefings Conducted.
βœ“Code of ConductOrganizationalBenOsphere has implemented and verified control for: Code of Conduct.
βœ“Commitments Explained to CustomersProductBenOsphere has implemented and verified control for: Commitments Explained to Customers.
βœ“Communication to 3rd PartiesOrganizationalBenOsphere has implemented and verified control for: Communication to 3rd Parties.
βœ“Conduct Control Self-AssessmentsOrganizationalBenOsphere has implemented and verified control for: Conduct Control Self-Assessments.
βœ“Continuous Control MonitoringOrganizationalCritical infrastructure components are continuously monitored with alerts configured for anomalous behavior or system failures.
βœ“Defined Management Roles & ResponsibilitiesOrganizationalBenOsphere has implemented and verified control for: Defined Management Roles & Responsibilities.
βœ“Data Protection PolicyOrganizationalA formal Data Protection Policy is in place to govern consistent and secure operations across the organization.
βœ“DLP (Data Loss Prevention) Software is UsedInfrastructureBenOsphere has implemented and verified control for: DLP (Data Loss Prevention) Software is Used.
βœ“Disclosure with 3rd PartiesOrganizationalBenOsphere has implemented and verified control for: Disclosure with 3rd Parties.
βœ“Disclosure Process for CustomersOrganizationalBenOsphere has implemented and verified control for: Disclosure Process for Customers.
βœ“Information Security PolicyOrganizationalA formal Information Security Policy is in place to govern consistent and secure operations across the organization.
βœ“Information Security Skills MatrixOrganizationalBenOsphere has implemented and verified control for: Information Security Skills Matrix.
βœ“Maintains a Privacy PolicyOrganizationalA formal Maintains a Privacy Policy is in place to govern consistent and secure operations across the organization.
βœ“Maintains Asset InventoryOrganizationalBenOsphere has implemented and verified control for: Maintains Asset Inventory.
βœ“Messaging Queues Monitored and AlarmedInfrastructureCritical infrastructure components are continuously monitored with alerts configured for anomalous behavior or system failures.
βœ“Notice of Breach to Affected UsersOrganizationalEach user is provisioned with a unique account. Access is monitored and governed by least privilege principles.
βœ“PII with 3rd Parties and VendorsOrganizationalVendors are assessed for compliance, and agreements are maintained to ensure they meet BenOsphere’s security and privacy standards.
βœ“Privacy Policy Includes 3rd Party VendorsOrganizationalA formal Privacy Policy Includes 3rd Party Vendors is in place to govern consistent and secure operations across the organization.
βœ“Privacy Policy Publicly AvailableOrganizationalA formal Privacy Policy Publicly Available is in place to govern consistent and secure operations across the organization.
βœ“Privacy, Use, and DisclosureOrganizationalBenOsphere has implemented and verified control for: Privacy, Use, and Disclosure.
βœ“Provide Notice of Privacy PracticesOrganizationalBenOsphere has implemented and verified control for: Provide Notice of Privacy Practices.
βœ“Quarterly Review of Privacy ComplianceOrganizationalSecurity controls and data access are reviewed regularly to maintain regulatory compliance and identify improvement opportunities.
βœ“Remediation PlanOrganizationalBenOsphere has implemented and verified control for: Remediation Plan.
βœ“Review Privacy Notice AnnuallyOrganizationalSecurity controls and data access are reviewed regularly to maintain regulatory compliance and identify improvement opportunities.
βœ“Risk Assessment PolicyOrganizationalA formal Risk Assessment Policy is in place to govern consistent and secure operations across the organization.
βœ“Security Team Communicates in a Timely MannerOrganizationalA dedicated security team oversees compliance efforts and ensures accountability at the organizational level.
βœ“Security Team/Steering CommitteeOrganizationalA dedicated security team oversees compliance efforts and ensures accountability at the organizational level.
βœ“Security TrainingOrganizationalAll employees and contractors complete regular HIPAA and cybersecurity training to ensure awareness of responsibilities and threats.
βœ“Security UpdatesInfrastructureBenOsphere has implemented and verified control for: Security Updates.
βœ“Software Development Life Cycle PolicyOrganizationalA formal Software Development Life Cycle Policy is in place to govern consistent and secure operations across the organization.
βœ“Storage of Sensitive Data on PaperOrganizationalBenOsphere has implemented and verified control for: Storage of Sensitive Data on Paper.
βœ“System Access Control PolicyOrganizationalA formal System Access Control Policy is in place to govern consistent and secure operations across the organization.
βœ“Unauthorized Disclosures by 3rd PartiesOrganizationalBenOsphere has implemented and verified control for: Unauthorized Disclosures by 3rd Parties.
βœ“Vendor Agreements MaintainedOrganizationalVendors are assessed for compliance, and agreements are maintained to ensure they meet BenOsphere’s security and privacy standards.
βœ“Vendor Compliance ReportsOrganizationalVendors are assessed for compliance, and agreements are maintained to ensure they meet BenOsphere’s security and privacy standards.
βœ“Vendor Management PolicyOrganizationalA formal Vendor Management Policy is in place to govern consistent and secure operations across the organization.
βœ“Vendors and PHIOrganizationalVendors are assessed for compliance, and agreements are maintained to ensure they meet BenOsphere’s security and privacy standards.
βœ“Annual Risk AssessmentOrganizationalBenOsphere has implemented and verified control for: Annual Risk Assessment.
βœ“Intrusion Detection System in PlaceInfrastructureBenOsphere has implemented and verified control for: Intrusion Detection System in Place.