Features
By accessing our website, you are agreeing to be bound by these terms of service, all applicable laws and regulations.
HipaaChecker Features
UNIQUE USER ID TRACKING
PHI EMERGENCY ACCESS
SESSION MANAGEMENT
ENCRYPTION AND DECRYPTION
PREVENT UNAUTHORIZED PHI ALTERATION AND DESTRUCTION
INTEGRITY CONTROLS OVER TRANSMISSION
PHI ENCRYPTION
ACCESS CONTROL
Person or Entity Authentication
Person or entity authentication requires implementing procedures to verify that the person or entity seeking access to electronic protected health information is the one claimed.
HIPAAChecker scan authentication methods that can be employed in your software:
Common Authentication Methods: HIPAAChecker validates appropriate authentication methods for your software application. We identify vulnerabilities in Password-based Auth, FireBaseAuth, oAuth 2.0, Token-based Auth, etc.
Biometric Authentication: Reduce the risk of shared or compromised credentials with biometric identifiers such as fingerprints, iris scans, or facial recognition for user authentication.
SMS or Email-based Authentication: Validate one-time passcode (OTP) or verification code to the user’s registered mobile phone number or email address.
Social Media or Federated Identity Authentication: Check whether third-party identity providers (e.g., Google, Facebook, or Twitter) or federated identity providers have appropriate methods for PHI access authentication.
Multi-factor Authentication (MFA): Check whether multiple factors (e.g., password plus one-time code) are required to verify identity before granting PHI access.