1. |
You need to evolve and innovate to be successful. But the cloud is as complex as it is powerful. Our staff and partnership with Rackspace leverages the right experts and environments who are certified in all the leading public cloud platforms and technologies — so you don’t have to be. Oxcyon, through it's partnership with Rackspace offers managed security services to help you leverage the public, private, hybrid and multi-cloud offerings while meeting even the most stringent security and compliance requ...
- Security Policies
- Security
- Everyone: All Users
- 10/25/2020
- Relevance: 477
-
-
12/31/9999 11:59:59 PM
-
Centralpiont Hosting & Security Policies, Cloud, Host, Hosting, Compliance, Certificate, Centralpoint, Oxcyon, Gartner, Digital Experience, Knowledge Management, Data Mining, Document Retention, Data Aggregation, Inference Engine, Technical, Specifications, Stack, Content Management, Sharepoint Alternative, Big Data, Metadata, Automate metadata, Taxonomy, Enterprise, Magic Quadrant, Centralpoint Compliance, Centralpoint Technical
-
-
-
-
-
-
-
-
3/27/2023 4:03:48 PM
-
-
|
2. |
HIPAA BUSINESS ASSOCIATE PRIVACY POLICY Oxcyon, Inc. takes privacy very seriously. We share a commitment with Covered Entities to protect the privacy and confidentiality of Protected Health Information (PHI) that we obtain subject to the terms of a Business Associate Agreement. This Policy is provided to help you better understand how we at OXCYON, INC., use, disclose, and protect PHI in accordance with the terms of Business Associate Agreements. Definitions Business Associate Agreement (BA Agreement). ...
- Site Map
- Everyone: All Users
- 8/26/2016
- Relevance: 429
-
-
12/31/9999 11:59:59 PM
-
HIPAA Compliant Portal, Content Management, Patient Portal, Extranet, Healthcare, Intranet
-
-
-
-
-
-
-
-
8/26/2016 8:34:03 AM
-
-
|
3. |
- Security Policies
- Security
- Everyone: All Users
- 7/14/2022
- Relevance: 38
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
3/27/2023 4:03:52 PM
-
-
|
4. |
You need to evolve and innovate to be successful. But the cloud is as complex as it is powerful. Our staff and partnership with Rackspace leverages the right experts and environments who are certified in all the leading public cloud platforms and technologies — so you don’t have to be. Oxcyon, through it's partnership with Rackspace offers managed security services to help you leverage the public, private, hybrid and multi-cloud offerings while meeting even the most stringent security and compliance requ...
- Security Policies
- General
- Everyone: All Users
- 10/25/2022
- Relevance: 34
-
-
12/31/9999 11:59:59 PM
-
Centralpiont Hosting & Security Policies, Cloud, Host, Hosting, Compliance, Certificate, Centralpoint, Oxcyon, Gartner, Digital Experience, Knowledge Management, Data Mining, Document Retention, Data Aggregation, Inference Engine, Technical, Specifications, Stack, Content Management, Sharepoint Alternative, Big Data, Metadata, Automate metadata, Taxonomy, Enterprise, Magic Quadrant, Centralpoint Compliance, Centralpoint Technical
-
-
-
-
-
-
-
-
3/27/2023 4:02:27 PM
-
-
|
5. |
This document outlines procedures and protocols for notification of and response to a security incident or breach involving unencrypted electronic personal information processed and/or maintained by Oxcyon and its extended providers, servers, clients and organizations. SECURITY INCIDENT NOTIFICATION REPORTING & INVESTIGATION PROTOCOL A. Security Incident Reporting In the event that a data owner, technology staff member, or Information Technology Services representative identifies a potential s...
- Site Map
- Everyone: All Users
- 5/12/2011
- Relevance: 32
-
-
12/31/9999 11:59:59 PM
-
Big Data, Centralpoint, Digital Experience, Security Policy, Oxcyon, Security, Incident, Cloud, Hosting, Managed service, monitoring
-
-
-
-
-
-
-
-
2/1/2018 2:24:49 PM
-
-
|
6. |
The Federal Information Security Management Act (FISMA) requires federal agencies to implement and support standardized IT security controls. These controls, defined by the National Institute of Standards and Technology (NIST), allow agencies to safely and confidently outsource critical applications to FISMA-compliant clouds, managed hosting environments and SaaS providers. Designed to Address Strict FISMA Standards More than half of all federal cabinet-level agencies — including Veterans Affairs, the De...
- Site Map
- Everyone: All Users
- 9/13/2017
- Relevance: 27
-
-
12/31/9999 11:59:59 PM
-
Fedramp, FISMA, Federal Government Hosting, 21st Century Digital Experience, Managed Services, FedRAMP Compliance, FISMA compliant, US Government
-
-
-
-
-
-
-
-
12/20/2023 3:53:17 PM
-
-
|
7. |
- Security Policies
- Security
- Everyone: All Users
- 9/27/2023
- Relevance: 27
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/27/2023 4:23:01 PM
-
-
|
8. |
Wearable technology, once considered a tech-savvy trend, has become an integral part of modern healthcare. With the aging population, increasing prevalence of chronic diseases, and the demand for personalized care services, wearable technologies are no longer a fad but a permanent fixture in healthcare. These devices offer the convenience of tracking one's health journey in real-time, making it far more convenient than rushing to a hospital for check-ups. Digital technologies and combined data are...
- Site Map
- Everyone: All Users
- 1/12/2024
- Relevance: 21
-
-
12/31/9999 11:59:59 PM
-
Wellness, healthcare portal, wearable, fitbit, eheatlh, gamification, tracking, remote health, telemedicine, Gartner, Digital Experience, Data Transformation
-
-
-
-
-
-
-
-
1/12/2024 5:48:49 PM
-
-
|
9. |
In the healthcare sector, security concerns have escalated alongside the pre-existing patient privacy and safety considerations. Unlike industries such as retail, where breaches involve credit data, healthcare deals with far more sensitive information. Your responsibility, therefore, requires careful handling to prevent harm to patients and their families. So, how can you safeguard your healthcare consumer data effectively? Comprehensive Encryption: Prioritize encryption across all possible areas. Howeve...
- Blogs
- Privacy
- Everyone: All Users
- 6/6/2015
- Relevance: 17
-
-
12/31/9999 11:59:59 PM
-
PHI, HIPAA, Security, Oxcyon, Centralpoint, Gartner, SSL, Encryption, Firewall, Privacy, GDPR,
-
-
-
-
-
-
-
-
8/10/2023 7:20:29 PM
-
-
|
10. |
You need to evolve and innovate to be successful. But the cloud is as complex as it is powerful. Our staff and partnership with Rackspace leverages the right experts and environments who are certified in all the leading public cloud platforms and technologies — so you don’t have to be. Oxcyon, through it's partnership with Rackspace offers managed security services to help you leverage the public, private, hybrid and multi-cloud offerings while meeting even the most stringent security and compliance requ...
- Security Policies
- General
- Everyone: All Users
- 10/25/2022
- Relevance: 17
-
-
12/31/9999 11:59:59 PM
-
Centralpiont Hosting & Security Policies, Cloud, Host, Hosting, Compliance, Certificate, Centralpoint, Oxcyon, Gartner, Digital Experience, Knowledge Management, Data Mining, Document Retention, Data Aggregation, Inference Engine, Technical, Specifications, Stack, Content Management, Sharepoint Alternative, Big Data, Metadata, Automate metadata, Taxonomy, Enterprise, Magic Quadrant, Centralpoint Compliance, Centralpoint Technical
-
-
-
-
-
-
-
-
3/27/2023 4:02:27 PM
-
-
|
11. |
Oxcyon's unique bi-weekly, (pull) updates mean an equally unique approach to quality control and testing. Oxcyon employs a hybrid process which is primarily Agile, but with some waterfall checkpoints regarding quality assurance. . First, on the Agile process, and our preferred approach. Traditional software development methodologies work on the premise that software requirements remain constant throughout the project. But with increase in complexity , the requirements undergo numerous c...
- Site Map
- Everyone: All Users
- 11/9/2012
- Relevance: 13
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
11/21/2017 4:35:27 PM
-
-
|