- Dr. Lauren TessierAsked on February 10, 2014 at 11:10 PM
I am looking to convert my intake forms from paper to PDF. I am looking for a web-based fillable form that produces a HIPPA complaint PDF document, that can then be uploaded into an EHR program. Can JotForm help?
- CesarAnswered on February 11, 2014 at 12:07 AM
Definitely JotForm can help out in the Form o PDF aspect:
In regards to if JotForm is HIPPA Compliant, kindly review this response:
Jotform doesn't have HIPAA Compliance Certificate, but you can use Jotform in HIPAA Compliant way. Please check the below details:
Our servers already match all criteria since we already care a lot about the security. However, some features of our application are not HIPAA compliant so if you refrain from using those features, I think you should be fine.
1. Always use SSL (https) version of JotForm site on your browser. Use "https://www.jotform.com" to login to your account, create your forms, look at your submissions and link to your forms.
2. Edit emails on all forms to make sure no specific information is used on them. We send emails in plain text. So, they are not secure. Only use emails to get alerts to know there is a new submission. Once you receive an email alert, log into the secure JotForm site and then look at the user
3. If you use the Reports feature only do it with password protection. That will both ask for a password, and it will transfer all data over SSL.
4. Same for uploads. They are not password protected.
5. Logout immediate after you are done with the site.
6. Regularly download submissions and then delete them.
Data stored on our servers are not encrypted, but access to our servers is safeguarded. Data transmission from the person who submits their health information to our servers can be done in an encrypted manner, by using the forms securely.
JotForm certainly complies with the technical safeguard section of the HIPAA security rule:
Information systems housing PHI must be protected from intrusion. When information flows over open networks, some form of encryption must be utilized. If closed systems/networks are utilized, existing access controls are considered sufficient and encryption is optional.
Basically, this is a excerpt from thread: http://www.jotform.com/answers/4728