Compliance Audits and External Communications
Hellotracks may be requested occasionally to share additional details regarding its compliance, privacy and security program by an external entity such as a customer, media, legal or law enforcement. Such external communication, beyond what is already publicly published, needs to comply with the following policies and procedures.
Hellotracks policy requires that:
(a) Hellotracks operations must comply with all applicable laws, regulations, security standards and frameworks. External audits shall be conducted accordingly to each applicable compliance requirement.
- HIPAA/HITECH. Hellotracks must comply with all requirements listed in the HIPAA (Health Insurance Portability and Accountability Act of 1996) and the Health Information Technology for Economic and Clinical Health (HITECH) Act.
(b) All external communications related to compliance and customer/employee privacy must follow pre-established procedures and handled by approved personnel. This includes but is not limited to distribution of audit reports, assessment results, incidents and breach notification.
(c) Audit and compliance reports may be shared with an external party only when under signed NDA and approved by Hellotracks Security and/or Privacy Officer.
Controls and Procedures
Compliance Program Management
Hellotracks management and security/compliance team has identified and regularly reviews all relevant statutory, regulatory, and contractual requirements.
Hellotracks’s compliance policy includes requirements to meet any and all applicable compliance requirements.
Additionally, the Vendor Risk Management policies and procedures specify the details related to contractual agreements with clients, partners and vendors, as well as requirements and process related to intellectual property rights and the use of proprietary software products.
Requesting Audit and Compliance Reports
Hellotracks, at its sole discretion, shares audit reports, including any Corrective Action Plans (CAPs) and exceptions, with customers on a case by case basis. All audit reports are shared under explicit NDA in Hellotracks format between Hellotracks and party to receive materials. Audit reports can be requested by Hellotracks workforce members for Customers or directly by Hellotracks Customers.
The following process is used to request audit reports:
- A request may be sent by email to firstname.lastname@example.org or by submitting a request via Hellotracks Internal Support Portal or Email. In the request, please specify the type of report being requested and any required timelines for the report.
- An Issue with the details of the request into the Hellotracks Security Project on JIRA, which is used to track requests status and outcomes.
- Hellotracks security team will confirm if a current NDA is in place with the party requesting the audit report. If there is no NDA in place, Hellotracks will send one for execution.
- Once it has been confirmed that an NDA is executed, Hellotracks staff will move the JIRA Issue to “Under Review”.
- The Hellotracks Security Officer or Privacy Officer must Approve or Reject the Issue. If the Issue is rejected, Hellotracks will notify the requesting party that we cannot share the requested report.
- If the Issue has been Approved, Hellotracks will send the customer the requested audit report and complete the JIRA Issue for the request.
See detailed policy and procedures in Breach Notification
External Audits of Information Access and Activity
Prior to contracting with an external audit firm, Hellotracks shall:
- Outline the audit responsibility, authority, and accountability
- Choose an audit firm that is independent of other organizational operations
- Ensure technical competence of the audit firm staff
- Require the audit firm’s adherence to applicable codes of professional ethics
- Assign organizational responsibility for supervision of the external audit firm
- Obtain a signed HIPAA business associate agreement, if any ePHI will be shared/accessed during the audit
Whenever possible, a third party auditing vendor should not be providing the organization IT oversight services (e.g., vendors providing IT services should not be auditing their own services to ensure separation of duties).
Contacts for External Communications Requests
Direct all other communication requests to one of the following:
- For incident reporting, vulnerability disclosure and other security related inquiries:
- For privacy concerns, including report of violation:
- For all compliance related issues, including request of audit reports:
Continuous Compliance Monitoring
The status of compliance is tracked via JupiterOne. Compliance dashboards are configured with applicable internal and external standards and frameworks. Any potential gaps detected are reported on the compliance dashboards.