Skip to main content
BAA Available · Technical Controls In Place

HIPAA
Compliance

G8KEPR implements the technical and administrative safeguards required by the HIPAA Security Rule. We will sign a Business Associate Agreement before your deployment processes any ePHI.

75%
Readiness score
BAA
Available to sign
7yr
Audit log retention
TLS 1.3
ePHI in transit

What "HIPAA-ready" means here. G8KEPR implements the technical controls required by the HIPAA Security Rule and will sign a BAA before your deployment processes ePHI. We are not formally audited by a third-party HIPAA compliance assessor. Physical safeguards (device tracking, visitor logs) are partially implemented. Our 75% readiness score reflects the current state of our safeguard tracking — not a certification claim.

HIPAA Security Rule — 45 CFR Part 164

Safeguard Coverage

The Security Rule organizes safeguards into three categories. Here is where G8KEPR stands in each.

Technical

4 / 5 done
§164.312(a)(1)
Access ControlImplemented

RBAC with least-privilege + MFA enforced on all ePHI access paths

§164.312(b)
Audit ControlsImplemented

Centralized tamper-proof audit logging with 7-year retention

§164.312(d)
Person/Entity AuthenticationImplemented

SSO + hardware token MFA deployed organization-wide

§164.312(e)(1)
Transmission SecurityImplemented

TLS 1.3 enforced on all ePHI transit paths; no fallback to TLS 1.2

§164.312(c)(1)
Integrity ControlsPartial

Checksums in place; real-time tamper detection in progress

Administrative

1 / 2 done
§164.308(a)(1)
Security Management ProcessImplemented

Annual risk assessment completed Q1 2026; documented in security policy

§164.308(a)(3)
Workforce TrainingPartial

Role-based security training; annual completion tracking in progress

Physical

In progress
§164.310(a)(1)
Facility Access ControlsPartial

Badge access active; visitor log digitization in progress

§164.310(d)(1)
Device and Media ControlsPending

Policy drafted; automated device inventory tooling not yet deployed

ePHI Protection

How G8KEPR Protects Protected Health Information

These are the specific technical measures in place — not marketing copy. Each maps to a Security Rule requirement.

Encryption at Rest

AES-256 for all ePHI stored in PostgreSQL. Field-level encryption for the most sensitive identifiers (SSN, diagnosis codes).

Encryption in Transit

TLS 1.3 enforced end-to-end. All API endpoints reject plaintext connections. Certificate pinning on internal service-to-service calls.

Tenant Isolation

Row-Level Security (RLS) in PostgreSQL ensures each organization can only query its own ePHI — even if application code had a bug.

Tamper-Proof Audit Logs

Hash-chained audit log entries. Every read, write, and export of ePHI is recorded with user, timestamp, and a cryptographic link to the previous record.

7-Year Retention

HIPAA requires 6 years. G8KEPR retains audit logs for 7 years by default. Configurable up to 10 years for organizations that need it.

Access Anomaly Detection

Unusual ePHI access patterns (bulk exports, off-hours queries, role mismatches) are flagged in real time and generate alerts.

HIPAA §164.308(b)(1)

Getting a BAA Signed

A Business Associate Agreement is required before G8KEPR processes any ePHI on your behalf. The process is straightforward — typical turnaround is 1–2 business days.

1
Request

Contact us via the form below. Tell us which PHI types your deployment will process and your organization name.

2
Review scope

We confirm the covered services, PHI types, and your obligations as a covered entity. Typically a 1–2 day turnaround.

3
Execute

Sign electronically via DocuSign. Executed BAA stored in the compliance dashboard under Business Associate Agreements.

Audit Log Retention

§164.312(b) requirement: 6 years

6yr
HIPAA minimum
7yr
G8KEPR default
10yr
Max configurable

Logs are hash-chained — each record links to the previous, making retroactive tampering detectable. Exportable in standard formats for auditors.

Breach Notification SLAs

§164.400–414 Breach Notification Rule

Detection → Covered entity notice
We notify you within 60 days of discovering a breach that affects ePHI we process
≤ 60 days
HHS notification (>500 individuals)
Your obligation to HHS; we provide the evidence package
≤ 60 days
Internal containment target
Isolation and access revocation for confirmed breaches
< 2 hours

Access Control Summary

MFARequired for all users with ePHI access
RBACRole-based permissions; least-privilege by default
Session timeoutConfigurable idle timeout (default 15 min)
Audit on every accessAll ePHI reads and writes are logged
Automatic logoutMulti-tab logout — all sessions terminated on sign-out

Self-Hosted: ePHI Never Leaves Your Infrastructure

G8KEPR can run entirely on your own servers. No data ever transits a third-party cloud — your BAA obligations are significantly simpler.

Your infrastructure, your control

Deploy on-premises or in your own cloud account. ePHI stays within your security boundary — you are the only covered entity in the picture.

Docker + Kubernetes

Helm chart for production deployments. Runs in existing hospital or health system Kubernetes clusters with RBAC and namespace isolation.

Reduced BAA scope

When self-hosted, G8KEPR is not a business associate — it is your software. BAA still covers any support or monitoring access we have to your environment.

HIPAA Ready

Processing ePHI? Let us talk before you deploy.

We will walk through the technical controls, sign the BAA, and help you map your compliance requirements to the G8KEPR configuration.