Security & Compliance

Committed to Upholding Program Requirements

Compliance is at Our Core

Convey’s IT security, compliance, and operations teams are aligned to safeguard the security of your membership, data, and organization. We operate as a First Tier, Downstream, and Related (FDR) entity, adhering to applicable state and federal laws and regulations, including client contractual requirements.

Compliance & Privacy Program

  • Monitors, interprets, and applies state and federal regulations

  • Adheres to Seven Fundamental Elements of an Effective Compliance Program (OIG)

  • Trains team members in Compliance, HIPAA, and FWA

  • Collaborates with clients’ teams

  • Completes regular audits, including desk audits and internal risk assessments

  • Restricts print and email access and enacts role-based securities

  • Updates and enforces internal compliance policies and procedures

  • Upholds our code of conduct and ethics guidelines

Robust Security Framework

Our comprehensive physical, administrative, and technical controls provide your organization with the most compliant solutions on the market.

  • HITRUST Certified

  • ISO Foundation

    • Security Controls & Risk Management

  • HIPAA Compliant

  • CMS Compliant

  • PCI DSS Compliant

Compliance & Security Matters

Managed by our dedicated information security team and led by our chief information security officer, Convey’s security program ensures business continuity and integrity through a defense-in-depth strategy to mitigate known and potential risks.

The compliance and privacy program, led by our chief compliance officer and managed by our dedicated compliance team, reaffirms our commitment to promoting full compliance with applicable laws and regulations. This includes identifying and reducing risks, improving internal controls, and establishing ethical standards within the organization.

These work together, alongside operations, in order to provide you with peace of mind–ensuring the safety and security of your membership, your data, and your organization.

Questions?

 

Get in touch with our information security experts.