Velocity MSC secures HITRUST risk-based certification to mitigate risk in privacy, security, compliance
Velocity MSCÂ (managed solutions company), a technology solution and service provider of voice and data networking and connectivity for multi-location enterprises across multiple industries, has announced its V-Select Health Portal. Velocity’s proprietary custom-developed enterprise operations management system, has earned certified status by HITRUST (Health Information Trust Alliance) for information security.
HITRUST Risk-based, 2-year (r2) certified status demonstrates that V-Select Health Portal has met demanding regulatory compliance and industry-defined requirements and is appropriately managing risk. This achievement places Velocity in an elite group of organisations worldwide that have earned this certification.
By including federal and state regulations, standards, and frameworks, and incorporating a risk-based approach, the HITRUST Assurance Programme helps organisations address security and data protection challenges through flexible framework of prescriptive and scalable security controls.
By obtaining this certification, Velocity has unlocked new revenue growth opportunities in the healthcare sector. V-Select now supports enterprise clients who require secure networks with connectivity and (Health Insurance Portability and Accountability Act) HIPPA-compliant data protection safeguards.
When healthcare providers utilise V-Select, they gain deep insights into their IT environment across all locations and can rely on Velocity’s 24/7/365 Network Operations Centre to detect, diagnose, and resolve performance issues before problems arise.
“Our dedication to our clients is evident through the continuous rollout of innovative products and upgraded solutions,” says Mark Walker, president and chief operating officer of Velocity. “The HITRUST certification underscores our readiness to bring Velocity’s IT, data, video, and communications solutions to enterprise healthcare providers. Building upon our expertise in other hospitality sectors, we are well positioned to emerge as a provider in healthcare-managed services and now equipped to meet the demands of this industry.”
To achieve HITRUST’s high level of certification (r2), Velocity has taken proactive steps to enhance its cybersecurity capabilities and diligently developed new policies and procedures to align with HITRUST’s practices. All policies and procedures have undergone a meticulous mapping process, ensuring they meet HITRUST controls and are prepared to support future audits and evidence collection.
By establishing a data protection and compliance framework, Velocity is well-positioned to support healthcare organisations in their digital transformation journey and provide them with the secure technology solutions they need to deliver exceptional patient care.
“In the increasingly digitised healthcare landscape, Velocity is delivering network monitoring solutions that ensure providers can seamlessly access electronic health records, engage in telemedicine, and collaborate with colleagues with the HITRUST guarantee that all patient data is securely protected,” says Jim Rothschild, EVP, general counsel, and data protection officer, of Velocity.
“Obtaining the HITRUST Certification for the V-Select Health Portal represents a milestone for Velocity, as it marks a significant maturation of our compliance standards,” says Anthony Nguyen, chief information officer and chief information security officer of Velocity. “While many requirements for HITRUST are catered to the healthcare sector, the policies and procedures benefit all Velocity customers as we’ve bolstered our enterprise solutions’ consistency, transparency, and reliability.”
“The HITRUST Assurance Programme is rigorous and reliable because of the comprehensiveness of control requirements, depth of review, and consistency of oversight,” says Bimal Sheth, executive vice president, standards development and assurance operations, HITRUST. “HITRUST Risk-based, 2-year (r2) Certification demonstrates Velocity is taking the most proactive approach to cybersecurity, data protection, and risk management.”
Comment on this article below or via Twitter @IoTGN