Compliance · HIPAA
Private Beta · BuildingDocuments are SHA-256 fingerprinted in your browser before anything reaches our systems. The original PHI never crosses the network. That isn't just a privacy convenience — it materially shrinks the surface area HIPAA's Security Rule applies to. What's left is metadata anchored to a public ledger so an OCR investigator can verify your audit log without trusting Arkova or any other vendor.
What it is
HIPAA is the Health Insurance Portability and Accountability Act of 1996. The original act was about insurance portability when changing jobs; the compliance burden everyone refers to as "HIPAA" actually comes from regulations issued by HHS afterward — most notably the Privacy Rule (2003), the Security Rule (2005), the Breach Notification Rule (2009 under HITECH), and the Enforcement Rule.
HIPAA applies to covered entities (health plans, providers, clearinghouses) and to business associates (anyone handling PHI on their behalf — direct HIPAA liability since HITECH 2009). Civil monetary penalties reach up to The Office for Civil Rights (OCR) within HHS investigates complaints, performs periodic audits, and resolves cases either through corrective-action plans (most common) or through formal Resolution Agreements (with the highest penalties published). Most multi-million-dollar HIPAA settlements turn on whether the entity could prove the safeguards it claimed were operating actually were operating at the time.
The four rules · how Arkova maps to each
Requirement
Standards for the use and disclosure of Protected Health Information (PHI). Minimum-necessary rule, individual rights to access/amend records, accounting of disclosures, business associate agreements (BAAs).
Arkova
Anchored disclosure log per patient: who requested PHI, why, on what date, what was disclosed. The §164.528 accounting-of-disclosures requirement becomes a single API query against an immutable ledger instead of a manual reconstruction.
Requirement
Administrative, physical, and technical safeguards for electronic PHI (ePHI). Encryption-in-transit + at-rest, access controls, audit controls, integrity controls, transmission security.
Arkova
Client-side SHA-256 fingerprinting before any data leaves the device satisfies the §164.312(a)(2)(iv) encryption addressable specification by design. Append-only audit log on a public ledger satisfies the §164.312(b) audit-controls requirement with independent verifiability.
Requirement
Required notifications when a breach of unsecured PHI occurs. Individual notice within 60 days, HHS notice (timing depends on breach size), media notice for breaches affecting 500+ residents of a state.
Arkova
Anchored timeline per incident: when discovered, when assessed, when notifications sent. Disputes about whether notification met the 60-day window become objectively verifiable.
Requirement
OCR investigation procedures, civil monetary penalties (up to
Arkova
OCR investigations frequently turn on whether claimed safeguards were operating at the time of the alleged violation. Anchored evidence + immutable timeline removes the "your logs say so but how do we know" question.
Security Rule safeguards
Arkova specifically targets the technical safeguards that produce the most evidence demand: audit controls (§164.312(b)), integrity (§164.312(c)(1)), and encryption (§164.312(a)(2)(iv) + §164.312(e)(2)(ii)). Anchored receipts replace screenshot-and-spreadsheet evidence with cryptographic proof.
Who's in scope
Health insurance issuers, HMOs, Medicare/Medicaid programs, employer-sponsored group health plans, ACA marketplace plans.
Hospitals, physicians, dentists, clinics, nursing homes, pharmacies — provided they transmit PHI in electronic form for HIPAA-defined transactions.
Billing services, repricing companies, community health information systems that translate non-standard health data.
Cloud SaaS, EHR vendors, transcription services, accounting firms, IT contractors — anyone creating, receiving, maintaining, or transmitting PHI on behalf of a covered entity. Subject to direct HIPAA liability since HITECH (2009).
What an OCR investigation asks for
Why Arkova fits HIPAA particularly well
Most compliance-evidence platforms are themselves business associates because they ingest PHI to function. Every BAA you sign is one more breach surface, one more vendor to vet, one more audit exposure.
Arkova's architecture is different. Documents are SHA-256 fingerprinted in your browser using the Web Crypto API before anything touches our systems. Only the 64-character hash + structured metadata flow outward. The original PHI stays on your device. Even if our infrastructure were entirely compromised, the attacker would not have any of your PHI — because we never had it.
This isn't a privacy nicety. It's an architectural property that:
If you're a covered entity or business associate looking for PHI evidence that doesn't require Arkova to ever see your documents, we'd like to discuss an early-access pilot.
Arkova is in private beta. Features described on this page are being built and refined with pilot customers right now. Some controls and integrations are live today; others are in active development. Talk to us about the parts most relevant to your workload.
Request Early Access