Home Services About Us Join Us Contact Us

Health Insurance Portability and Accountability Act


InQuest’s HIPAA Solutions provide our clients with a comprehensive evaluation of their readiness to meet the privacy and security requirements of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. This is the initial service in a planned approach to the design, implementation and maintenance of a HIPAA-compliant privacy and security infrastructure, including the required policies and procedures.

What is information security?

Information is an asset, and like other important business assets, it needs to be protected from a wide range of threats in order to ensure business continuity, to minimize business damage, and to maximize return on investments and business opportunities. Information security is characterized by the maintenance of:

  • Confidentiality: ensuring only authorized access to information;
  • Integrity: safeguarding the accuracy and completeness of information;
  • Availability: ensuring availability of information when required.

Compliance with HIPAA privacy and security requirements are achieved by implementing a suitable set of controls including policies, procedures, best practices, organizational structures, and software. These controls ensure that the specific security objectives of the organization are met. The HIPAA regulations require that an information security program be in place in order to maintain appropriate controls for your information assets.


We help our healthcare clients implement proven policies, procedures, and technologies to become HIPAA compliant. Our solutions have been well tested at a number of healthcare provider organizations. We have extensive tools, assessment guides, methodologies, and training materials for rapid deployment and implementation of HIPAA solutions.

We educate our customers in the use of policies and procedures, and facilitate and help set direction for the development of a secure technology infrastructure .


InQuest recognizes that different organizations may be at different stages of HIPAA compliance. To maximize the value of our HIPAA solutions, our customers can customize a program to meet the unique requirements of their organization. For example we can assist our clients with:

  1. Development of privacy and security policies and procedures.
  2. Implementation of policies and procedures.
  3. Staff training.
  4. HIPAA privacy and security compliance assessment.
  5. Security assessment of network and IT infrastructure.
  6. Technology selection.
  7. Security architecture.