Privacy Policy
Your privacy is important to us. This policy explains how Elanix Enterprise collects, uses, and protects your personal information.
Last Updated: January 15, 2025
Information We Collect
- Personal identification information (Name, email address, phone number)
- Medical practice information and credentials
- Billing and payment information
- Website usage data and analytics
- Communication records and preferences
How We Use Your Information
- Provide healthcare billing and credentialing services
- Process payments and manage accounts
- Communicate about services and updates
- Improve our services and website functionality
- Comply with legal and regulatory requirements
Information Protection
- Industry-standard encryption for data transmission
- Secure servers with regular security updates
- Limited access to authorized personnel only
- Regular security audits and assessments
- HIPAA-compliant data handling procedures
Information Sharing
- We do not sell personal information to third parties
- Information shared only with service providers under strict agreements
- Data may be disclosed when required by law
- Business transfers may include customer information
- Anonymous data may be used for research and analytics
Data Retention
- Personal data retained as long as account is active
- Medical billing records kept per regulatory requirements
- Marketing data retained until opt-out request
- Website analytics data aggregated and anonymized
- Backup data securely deleted according to schedule
Your Rights
- Access and review your personal information
- Request corrections to inaccurate data
- Delete your account and associated data
- Opt-out of marketing communications
- Receive a copy of your data in portable format
HIPAA Compliance
As a healthcare service provider, Elanix Enterprise is fully committed to HIPAA compliance. We implement comprehensive safeguards to protect your protected health information (PHI) and ensure all data handling meets or exceeds federal requirements.
Secure Encryption
End-to-end encryption for all data transmission
Access Controls
Strict user authentication and authorization
Audit Trails
Comprehensive logging and monitoring