HOME CARE SCHEDULER
  • Home
  • Features
    • Search Closest Practitioner
    • Daily Practitioner Email
    • ATO Compliant Log Book
    • Route Optimisation
    • Practitioner Travel Tracking
    • Home Visit Appointment Scheduling
    • Home Care Reporting and Analytics
  • Integrations
    • Cliniko
    • Nookal
    • Splose
  • Pricing
  • Login
  • Get Started
  • Home
  • Features
    • Search Closest Practitioner
    • Daily Practitioner Email
    • ATO Compliant Log Book
    • Route Optimisation
    • Practitioner Travel Tracking
    • Home Visit Appointment Scheduling
    • Home Care Reporting and Analytics
  • Integrations
    • Cliniko
    • Nookal
    • Splose
  • Pricing
  • Login
  • Get Started

Security

Security Policy

We prioritise the security of user data and have implemented robust measures to safeguard it from unauthorised access, disclosure, alteration, or destruction. Our security protocols include but are not limited to:
Encryption: All data transmitted between our route optimisation tool and your practice management software is encrypted using industry-standard encryption protocols to prevent interception and unauthorised access.
Access Control: Access to user data within our system is strictly controlled and limited to authorised personnel who require access for the provision of our services. User authentication mechanisms, such as passwords and multi-factor authentication, are enforced to ensure that only authorised individuals can access sensitive data.
Encrypted API Key: ​Home Care Scheduler integrates with various practice management software primarily through API keys. To ensure the utmost security, these keys are encrypted using best-practice techniques within the database. This approach guarantees that the API keys are never visible, either in the application interface or to any system administrators, providing an extra layer of security against unauthorised access. This method helps safeguard sensitive data and maintain the integrity of both the application and the connected systems.
Data Integrity: We employ measures to maintain the integrity of user data, including regular backups, data validation checks, and error detection mechanisms to prevent data corruption or tampering.
Security Audits: We conduct regular security audits and assessments of our systems to identify and address potential vulnerabilities or weaknesses. This proactive approach allows us to continually enhance our security measures and protect against emerging threats.
Employee Training: Our team undergoes regular training on data security best practices to ensure that they understand their responsibilities in safeguarding user data and mitigating security risks.
Compliance with Standards: We adhere to industry standards and regulations related to data security and privacy, ensuring compliance with applicable laws and regulations governing the protection of user data.
These security measures are continuously reviewed and updated to adapt to evolving security threats and technology advancements. Our commitment to maintaining the confidentiality, integrity, and availability of user data underscores our dedication to protecting your privacy and ensuring a secure user experience. If you have any concerns or questions regarding our security practices, please feel free to contact us using the details provided at the end of this document.

Home-Care Scheduler

​Our route optimization software seamlessly integrates with existing healthcare systems, offering efficient scheduling and dynamic route planning to maximize patient visits while minimizing costs and ensuring compliance.
Login
Sign Up 
Features 
Pricing 
​​FAQ
Contact Us

enquires & support

[email protected]
+61 400 683 466
​​YouTube
Developed in ​Brisbane, Australia ​
Security | Privacy Policy | Terms of Use
 © Home Care Scheduler 2024

Disclaimer: Home Care Scheduler does not collect health information, and therefore, HIPAA compliance is not required for our operations. We are not the primary source of data collection; instead, information is transferred into our application from your practice management software. It is the responsibility of our users to ensure that all data transfers comply with GDPR guidelines, including informing and obtaining consent from data subjects about the data transfer process