One Chance to Earn Trust

The information MPOWR customers collect and manage include Personally Identifiable Information (PII) and often Protected Health Information (PHI). In some cases sensitive information related to addictions and abuse are recorded.  Therefore we take every step to ensure that individual’s privacy is guarded through powerful release of information security.

Privacy is the number one reason individuals and providers cite for not wanting to share crucial care information within a team of care givers. It only takes one privacy violation to destroy trust with a client, and open legal liability for organizations. Therefore trust must be established among all care providers in a collaborative.

MPOWR’s compliance to privacy laws and release of information regulations is without compare in the industry. From HIPAA / HITECH to FERPA and 42 CFR Part 2, internal policies and embedded product features enable MPOWR to be a trusted Business Associate.

Privacy and Security is the Rule

To ensure private information is kept that way, we have layers of safeguards in place that foster stringent system security.

MPOWR maintains policies and procedures that adhere to HIPAA Privacy Rule and HIPPA Security Rule. Our objectives are to protect individuals’ records and other personal information, enable ‘ownership’ of information by individuals, and ensure that use and disclosure of information is not made without individual’s authorization.

We view security as an ever evolving endeavor.  Our team is always creating ways to keep information private and control sharing with only those given permission.

Release of Information Security

Worldclass Partners

MPOWR is housed under the security umbrella of Microsoft’s robust Azure Cloud. Microsoft has decades-long experience building enterprise software and running some of the largest online services in the world. We has leveraged this partnership to implement and continuously improve security-aware software development, operational management, and threat mitigation practices that are essential to the strong protection of data in the cloud.

Security is built into Azure from the ground up, starting with the Secure Development Lifecycle, a mandatory development process that embeds security requirements into every phase of the development process. We help ensure that the Azure infrastructure is resilient to attack by mandating that our operational activities follow the rigorous security guidelines laid out in the Operational Security Assurance (OSA) process.

Read more at Microsoft

Design and Operational Security

Identity and Access

Encryption and Key Management

Network Security

Threat Management

Monitoring, Logging, and Reporting

Security Partners

Penetration Testing