In addition to maintaining third-party compliance certifications, we have implemented multiple defense-in-depth strategies into our patented etherFAX technology, including two-factor authentication and end-to-end encryption, to guarantee that patient data and business-critical information remain protected. Contact us today for more information about our HIPAA-compliant online fax and data exchange solutions.
An Easy Transition to IP-Based Infrastructure
- Two-Factor Authentication
- End-to-End Encryption
- Endpoint Authentication
- Multi-Level Encryption
- Black and White Lists
- Elliptic Curve Integrated Encryption Scheme
Third-Party Attestation of Compliance
Self-attestations or self-audits should be a red flag for any organization that processes confidential information. Independent software vendors (ISVs) that offer products utilizing cloud services must do their due diligence to ensure that all their cloud services providers have third-party certifications to protect their customers’ data, as well as their reputation as trusted vendors.
etherFAX services operate in a HIPAA and SOC 2® compliant environment that is both HITRUST CSF® and PCI DSS certified. Many ISVs integrate with etherFAX services due to our attestations of compliance and commitment to meeting these cybersecurity standards.
Compliance Certifications and Regulations
HITRUST CSF Certified
The Payment Card Industry Data Security Standard Service Provider Level 1 Version 4.0 Certification
Health Insurance Portability and Accountability Act
Trust Services Principles
etherFAX’s encrypted data exchange solutions operate in a SOC 2® compliant environment
The Equinix facilities that currently house etherFAX’s data centers maintain compliance with the following certifications:
- SOC 1 Type II
- SOC 2 Type II
- ISO 27001
- PCI DSS
- ISO 22301
For more information please visit https://www.equinix.com/data-centers/design/standards-compliance
etherFAX is currently working to achieve FedRAMP certifications.
As federal government agencies utilize etherFAX to securely exchange confidential data and business-critical information via the cloud, they can effectively eliminate fax frustrations, reduce costs, and mitigate privacy risks.
Cyberattackers use healthcare records to commit a multitude of crimes. In order to prevent a data breach, your organization should only utilize cloud services that meet stringent data protection requirements and regulatory compliance standards.