While we offer encryption and other security measures, we do not claim to be HIPAA compliant. So, it is important that as a user you do not use a patient’s PHI (ex: name or image) when building a program or exercise or using the system.
While we offer encryption and other security measures, we do not claim to be HIPAA compliant. So, it is important that as a user you do not use a patient’s PHI (ex: name or image) when building a program or exercise or using the system.