EPISCS views security and privacy as top priorities. EPISCS has methods in place to ensure the protection of user data. The intent of this article is to guide you through the steps to enable the Protected Information feature.
How to use the Protected Information feature
The Protected Information feature is available to customers. However, this feature must be enabled through contacting EPISCS Customer Service.
Infrastructure security
All EPISCS services are managed within Amazon Web Services (AWS).
Who benefits from the feature
The Protected Information feature is for anyone dealing with privileged information or protected health information. This can include:
- Accountants
- Attorneys
- Biomedical labs
- Medical device manufacturers
- Pharmaceutical companies
Identity and access controls
User identities and related access permissions are managed within defined
user roles. Invocation and revocation of access permissions is automated and specific to the role granted to each user. User identities are validated using an access policy related to the defined role of a user. The Identify Access Management Service provided by AWS is used to manage identity and access controls.
Additional resources
- Learn about EPISCS detailed security and privacy processes.
- Check your resources folder within your account for the Security Cutsheet.