Breakpoint HIPAA Compliance and Security Policy

Last Updated: 29 January 2025

This document describes the measures Breakpoint (operated by Cromulent Consulting, Inc.) undertakes to protect the confidentiality, integrity, and availability of user data, including any information that may be considered Protected Health Information (PHI). While Breakpoint does not function as a Covered Entity or Business Associate under the Health Insurance Portability and Accountability Act (HIPAA), we have adopted certain practices to safeguard data in a manner consistent with HIPAA's core principles.


1. Scope of Services and PHI Handling

2. Business Associate Agreements (BAA)

3. Data Storage and Infrastructure

4. Access Control and Authentication

5. Encryption and Transmission

6. Physical Security

7. Policies and Procedures

The following policies and procedures address privacy, security, and breach handling:

8. Employee Training and Management

9. Audit Trails and Monitoring

10. Breach Notification Protocol

Breakpoint is committed to timely disclosure of any incident that jeopardizes user-submitted data, including any PHI:

  1. Investigation: Upon detection of a breach, a security team promptly evaluates the nature and scope of the suspected breach.
  2. Containment: Steps are taken to isolate affected systems, remove unauthorized access, and prevent additional data exposure.
  3. Notification: Users potentially impacted by a confirmed breach are notified. If legally required, regulatory bodies are also informed.
  4. Remediation: Following containment, we review policies, update protocols, and implement additional safeguards as needed to prevent future incidents.

11. Data Retention and Disposal

12. Ongoing Compliance Assessments

13. User Rights and Requests

14. Disclaimer and Limitations

15. Contact Information

If you have questions regarding HIPAA-related issues, data security, or any portion of this policy, please reach out to our designated Security Officer:


References and Further Reading

By using Breakpoint, you acknowledge your understanding of how data, including user-submitted PHI, is handled under these guidelines. Cromulent Consulting, Inc. reserves the right to update or modify this policy as needed to enhance security measures or comply with evolving requirements.