Security is our top most priority. We take our Information Management and Network Security very seriously and this is what separates us from our competitors.
MediTech Solutions has researched extensively into the latest cutting-edge technologies to design a fully integrated and secure working environment. We have adopted and implemented the highest industry standards to ensure secure transfer of all medical data and sensitive patient information. We have implemented a highly secure network infrastructure by using the latest cutting edge technologies to implement the next generation solutions that offer extremely safe and secure data transactions and storage.
We have taken extreme painstaking measures to secure all the PID (Patient Identifiable Data), both physically and electronically. All communications and data transfer occurs via secure designated IP Tunnels and IPSec VPN (Virtual Private Networks) to:-
- Keep data confidential (256 Bit Encryption)
- Ensure the identities of two parties communicating (Authentication)
- Safeguard the identities of communicating parties (Tunneling)
- Ensure data is accurate and in its original form (Non-Repudiation)
- Guard against packets being sent over and over (Replay Prevention)
MediTech Solutions has met or exceeded all the prerequisites of NHS CfH SyOP 9.7 for creating a NHS compliant data transfer environment. That's why we have obtained the approval from NHS Connecting for Health and NHSIA (NHS Infrastructure Administrators) for conducting our operations on any NHS premises, reiterating MediTech Solutions reputation of being a secured, trustworthy and reliable service provider. We have also been successfully audited against BSI:ISO27001 standards that confirm that DPA/EU Security Standards, or better, are being implemented and achieved by us.
BSI:ISO27001 are the most widely recognised security standard in the world. The assessment process required a detailed review of MediTech Solutions ISMS (Information Security Management System), compromising of company's security policies, computer infrastructures, remote access for mobile users, authentication controls, information encryption and storage, back-ups and physical security for handling sensitive data. Our network structure is conformant with BSI:ISO27001 standards for information security for:
- Security policies
- Network connections and network security
- Authentication and Intrusion Detection
- Information categorisation.