Skip to main content
Secure Texting

All Secure Messaging Solutions Are Not Created Equal - Part 2 of 3

In the first part of this series, Secure Texting can be more than just securing messages, we discussed the key features (quick messaging, conversation threads, and required acknowledgment) of a secure messaging application that makes it a valuable texting tool for healthcare professionals. The first question healthcare organizations want a provider of a secure messaging application to answer,” Is the application HIPAA compliant?”.

8 min read
Secure messaging solutions for healthcare | reduce data breach incidents | data and service portability

In the first part of this series, Secure Texting can be more than just securing messages, we discussed the key features (quick messaging, conversation threads, and required acknowledgment) of a secure messaging application that makes it a valuable texting tool for healthcare professionals. The first question healthcare organizations want a provider of a secure messaging application to answer,” Is the application HIPAA compliant?”. The first consideration should be the strength of an application’s data encryption and security. It is important to realize that being HIPAA and HITECH compliant does not guarantee that an application has a high level of security or that the PHI is not vulnerable to unauthorized access.Secure Texting Work with BYOD - Bring Your Own Device?A robust, secure texting application will have security features that work on both organizations-issued devices or in a “bring your own device” (BYOD) environment. These functions include strength of data encryption, storage of Protected Health Information (PHI) on user-owned devices/servers, central administration of users/devices, a consistent level of protection regardless of the device used (Apple, Android, PC), and portability of the application. It is also important to consider the total cost to the organization. This includes not only the cost of the application and services, but also the cost of certifying third party vendors for HIPAA compliance. It may be quite challenging to gather the security information, so it is important to see how easy or difficult the vendor makes it for you to compare their security features versus the cost of implementation.

end to end encryption

 Because a majority of data breaches are due to lost or stolen devices with unencrypted data, the security of a secure messaging system must consist of end-to-end data encryption while in transit and at rest. It should be encoded by the sender, and only the receiver should be able to decode the message. As a way to prevent unauthorized access to the data, the application on the device must only be accessible through the use of a password or pin code, a distributed model (data storage across multiple devices) should be employed, and a central administrator should be able to lock or remotely wipe the device. Also, the central administrator should be able to automatically sync all devices when a member is added or removed, set group policies for password strength, idle lockout time, failure attempts, and message retention time. It is also important that PHI is not presented in the message alerts.

reduce data breach incidents

Rist of Healthcare Data Breaches

With increasing threat of data breaches that are estimated to cost healthcare organizations over $7 Billion, it is critical that all data is 100% under your control by being stored on your servers or in your cloud and on the end user’s device. In this way, you decide who will have access to your PHI and other sensitive data, when they will have access to it, and can ensure that a third party provider will not be able to access your data. Many vendors of secure messaging solutions use third party servers, such as Amazon, to store data which increases the vulnerability of your PHI to unauthorized access. They will tell you that a business associate agreement is not needed because the Federal Register, Vol. 75, No. 134, p. 40873 states that “…entities that act as mere conduits for the transportation of protected health information, but do not access the information other than on a random or infrequent basis are not business associates”. Are you comfortable with the fact that an Amazon employee or your vendor can access your PHI and other sensitive data at any time? At qliqSOFT, we believe that only the members of your organization should have access to your data. This is why we do not store PHI on our servers and only buffer the encrypted data. By doing this, we decrease the likelihood of unauthorized access or breaches. It is important to keep in mind that most data breaches occur after you stop using a service or by a rogue employee within your vendor’s organization. So, if your vendor does not have control or access to the data, a significant threat to your PHI is eliminated.

data and service portability

 Data portability is an important feature for a secure messaging application. To have true data portability, the healthcare organization must have 100% control over the data. In this way, there are no issues with potential breaches after a switch is made to another vendor. Unfortunately with most vendors, your desire to change creates a potential security problem for you and them. Along with this, it is also important to consider the portability of the application. The application must be able to work with software ranging from Apple to Android to Windows to Mac and on any device (tablets, smartphones, laptops, and desktops) that a healthcare organization chooses to use. This flexibility allows the organization to grow organically and not get locked into particular products or pricing.

HIPAA and HITECH Compliance

At QliqSOFT, we took care of message security, so you don’t have to. We use strong end-to-end data encryption that works across multiple platforms; we ensure that all PHI and other sensitive data is stored on your resources in a distributed model that is 100% under your control ensuring portability. Since only your organization can access the data, you do not have to worry about unauthorized access from a third-party vendor. In other words, we lower the risk of a potential breach while minimizing its impact. Each day we leverage our 18 plus years of experience in secure communications to develop further and improve the infrastructure we spent over 18 months in R&D developing. The best thing is that our secure messaging product, qliqConnect, is free and that we exceed the HIPAA and HITECH compliance standards saving you time and money on lengthy third-party validation procedures.

Frequently Asked Questions

Find answers to common questions about this topic.

Essential BYOD security features include end-to-end data encryption, password/PIN protection, remote device wipe capabilities, and central administration for user management. The application should maintain consistent protection across all device types (Apple, Android, PC) and prevent PHI from appearing in message alerts.

Third-party server storage increases PHI vulnerability because vendor employees or cloud providers like Amazon can potentially access your sensitive data. Healthcare organizations should maintain 100% control over their data by using vendors that only buffer encrypted data without storing PHI on external servers.

Healthcare data breaches are estimated to cost organizations over $7 billion annually. This significant financial impact makes investing in robust secure messaging solutions with strong encryption and data control features a critical priority for healthcare organizations.

With true data portability, you maintain 100% control over your data, allowing seamless vendor transitions without security risks. However, many vendors create potential security problems during switches, making it crucial to choose solutions that don't store your PHI on their servers.

No, HIPAA and HITECH compliance alone do not guarantee high-level security or protection from unauthorized PHI access. Healthcare organizations must evaluate the actual strength of data encryption, storage methods, and security features beyond basic compliance requirements.

Krishna Kurapati

Written by

Krishna Kurapati

Founder & CEO

Founder & CEO of QliqSOFT with 20+ years of healthcare technology experience.

View all posts

Related Articles

medical practice secure texting solution. secure messaging platform for health record sharing
Secure Texting

Secure Messaging Solutions to Facilitate Realtime Health Record Sharing

Secure Messaging Solutions are of Interest to: Healthcare professionals who visit patients in at home or a private medical facility, Front Office Staff, Billing Departments/Services. Problem: It is estimated that doctors in the U.S. leave approximately $125 billion on the table each year due to poor billing practices. Sixty-five percent of all hospital bills have an error somewhere in the bill.

Krishna KurapatiKrishna Kurapati
3 min read
secure messaging solutions for healthcare|the secure texting process and features
Secure Texting

Secure Texting Apps can be More Than Just Securing Messages - Part 1 of 3

In today's changing healthcare environment, secure and easy communication is critical. Instead of worrying about the risks of HIPAA compliance with SMS texting, secure texting apps are being adopted by more and more providers. These applications allow secure voice, text, and image transmission of PHI to ensure providers have the information they need to make accurate medical decisions. Right now, several companies are developing HIPAA-compliant, secure texting applications.

Krishna KurapatiKrishna Kurapati
3 min read
requirements healthcare secure texting app|doctor using secure texting on mobile device
Secure Texting

What are the Essential Requirements of a Healthcare Secure Texting App?

At qliqSOFT we are always engaging in an open dialogue with industry experts and customers to discover new ways in which qliqCONNECT can help providers send secure communications in an increasingly unsecured world. To better get an idea of some current trends, we recently polled members in a HIMSS group LinkedIn discussion to discuss the essential “wish list” of health IT experts.

Krishna KurapatiKrishna Kurapati
3 min read
8m left