• SERVICES
  • SECURITY
  • TEAM
  • CAREERS
  • INSIGHTS
  • CONTACT

Security and compliance

Your data is our business so we take every step to safeguard it. Automated controls ensure your data remains protected.

OUR APPROACH

Security in our DNA

setings
Systems

We build and maintain automated security solutions through a mix of proprietary and best in breed solutions.

people
Peoples

We select for and cultivate a culture of security awareness, placing the utmost emphasis on data security and privacy.

lite
Lteration

We challenge assumptions about security and compliance best practices, pushing for optimal over sufficient.

leftimg
COMPLIANCE

Audited and certified

Fathom retained a leading Certified Public Accounting firm based on their world-class team of auditors and information security experts to conduct a thorough audit to verify Fathom's HIPAA and SOC 2 Type 2 compliance.

comp-img-1

HIPAA

HIPAA Compliance audits are designed to assess an organization’s risk management and regulatory compliance effectiveness. This includes the evaluation of the administrative, physical, and technical safeguards as they relate to the electronic protected health information (ePHI) an organization creates, receives, processes, maintains, and/or transmits; as well as the evaluation of the organization’s policies, procedures, and overall readiness to manage a breach of protected health information (PHI) in accordance with the notification requirements.

comp-img-2

SOC 2 Type 2

Developed by the AICPA, SOC 2 is specifically designed for service providers storing customer data in the cloud. SOC 2 requires companies to establish and follow strict information security policies and procedures, encompassing the security, availability, processing, integrity, and confidentiality of customer data. SOC 2 ensures that a company’s information security measures are in line with the unique parameters of today’s cloud requirements.

POLICY AND PROCEDURES

A holistic approach to ensuring security of your data

Fathom's systems drive excellence in security and compliance across all aspects of the organization.

img1

Application security

img-2

Infrastructure security

img-3

Business continuity

img4

Incident management

img5

Data privacy and management

img6

Threat and vulnerability management

img7

Disaster recovery

img8

Access management

img9

Incident management

img10

Workforce training

How to report security vulnerabilities to Fathom

We welcome reports from security researchers and experts about possible security vulnerabilities within our system. We are particularly interested in hearing about vulnerabilities that impact the confidentiality or integrity of protected health information, and have the potential to impact a large number of people.



If you believe you have discovered a possible security vulnerability, please file a report with our security team including information and detailed instructions about how to reproduce the issue. You can file your report by sending an email to security@fathomhealth.com.

Ready to get started?

SCHEDULE A CALL
REQUEST A QUOTE
footer_img

Medical coding automation

Technology
  • Solutions
  • Security
Company
  • Team
  • Contact
  • Careers
Legal
  • Privacy policy
  • Cookies
Resources
  • Articles
  • RFP guide for medical coding
  • Medical coding automation checklist

© Fathom, Inc. 2022