eOrdersPlus™ Privacy Policy

PRIVACY AND SECURITY POLICY

This Privacy and Security Policy (the “Policy”) governs the practices of all Software Solutions (each a “Solution” and collectively, the “Solutions”) that are owned, operated and maintained by eOrdersPlus, LLC and its affiliated companies. We refer to eOrdersPlus™ and its’ service providers and other subcontractors in this Policy as “we,” “us” or “our.” We refer to all applications available through the Solution as “Our Applications.” Our Applications include, but are not limited to eOrdersPlus™.

Personal Information We Collect or Maintain

When we refer in this Policy to “Personal Information,” we mean any information that can be used to identify you. If you register to use Our Applications, we will ask you to provide us with your Personal Information when you register and as our relationship grows. Examples of Personal Information include your name, address, email address and telephone number. The information will vary depending on which of Our Applications you use. Your Personal Information will be available for you to access through Our Applications. Our Applications and your Personal Information will be stored on computer servers operated by us or by our service providers.

Retention

We retain Personal Information for as long as the information is relevant to our business purposes or until you request that we remove the data by contacting us at Info@Stratice.com.

Cookies

From time to time, the eOrdersPlus™ system may collect anonymous, non-personal information about your use of this site through the use of “cookies.” Cookies are small bits of information that we transfer to your computer’s hard drive that allow us to know how often you visit our Application and the activities you conduct while on our Application. We automatically assign a different cookie to each user. The information collected by cookies helps us create a better experience for our users. It also allows us to monitor how many people use the application and for what purpose. We may use cookie information to target certain information to your browser or to determine the use of certain features. Your browser software can be set to reject all cookies. Most browsers offer instructions on how to reset the browser to reject cookies in the “Help” section of the toolbar. If you reject our cookie, certain functions and conveniences of the Application may not work properly. We never collect Personal Information through the use of cookies.

Our Internal Privacy and Confidentiality Policy

We value and respect the privacy and confidentiality of the individuals and organizations that use Our Applications and we have placed strict limits on access and disclosure of all Personal Information that is collected and stored in Our Applications. Subject to applicable law, Personal Information is accessed only to maintain and service Our Applications and to otherwise deliver our services. Furthermore, our internal security measures protect your information against both unauthorized access and misuse by authorized users. (See “Technical Security Measures” below.)

Access to Your Personal Information

We will not disclose or provide access to your Personal Information to anyone, unless: (a) we receive your prior consent directly from you or your authorized representative, (b) we believe the recipient to be you or your authorized representative, (c) we are required by law to release the information to the recipient. To deliver superior service and to quickly identify and resolve technical and other problems, it may be necessary for our employees or authorized agents to access data stored in Our Applications. Further, we may work with our business partners or service providers who may perform certain functions on our behalf, such as managing data, hosting Our Applications, sending e-mail messages, data analysis, and mailings. These business partners and service providers have access to your Personal Information only to the extent necessary to perform these specific functions and may not use it for any other purpose.

Confidentiality

Our employees who are permitted access to your Personal Information have an ethical responsibility not to disclose your Personal Information for any reason. Furthermore, all of our employees, as a condition of employment, are required to sign a confidentiality agreement legally binding them from disclosing any Personal Information with which we are entrusted.

Technical Security Measures

Access to Our Applications

Authorized users rely on unique user identifications and passwords to access Our Applications. Account Administrators assign access privileges to Our Applications on a “need-to-know basis” and access by each user is documented. Please note that you are responsible for taking all reasonable steps to ensure that no unauthorized person has access to your password. We cannot and do not assume any responsibility or liability for the use or misuse by you of the information you transmit or receive while using Our Applications or for the use or misuse of information by third parties to whom you allow access.

Encryption

We use Secure Socket Layer (“SSL”) encryption technology when transmitting your Personal Information to our servers. SSL helps to ensure the integrity and privacy of your Personal Information during transmission. Encryption involves systematically scrambling numbers and letters, so that even if someone managed to intercept the information, they would not be able to make sense of it. In order to take advantage of this encryption technology, you need to have an Internet browser that will support 128-bit encryption.

Firewall Technology

Firewalls prevent unauthorized system access and are implemented between the Internet and the servers on which Our Applications reside. Access to Our Applications is not permitted without going through firewalls. We currently use industry standard firewall technology.

Our Applications’ Cloud-Based Hosting & Security

Our Applications are hosted on Amazon Web Services (AWS) and our Solutions’ infrastructure operates with no single point of failure within multiple AWS availability zones. All AWS data centers comply with industry-leading security and privacy practices, and frameworks, including SOC 2, HITRUST CSF, ISO 27001, ISO 27701, ISO 27701, ISO 27018, and FedRAMP.  Additional information regarding AWS security and compliance programs can be found here:  aws.amazon.com/compliance/programs/

Software Discipline

Software discipline measures are in place to ensure the proper functioning and integrity of the software used to support Our Applications. Antivirus technology is used for virus prevention, detection and removal. Unauthorized software is prohibited from being installed on any system supporting Our Applications.

Auditing Activities

Our systems create audit trail logs to monitor activities on our systems. All user information, privileges, and date and time of access, can be audited routinely to ensure adequacy of training and compliance with policy. We can analyze usage patterns and identify all breaches of information security, leading to corrective action to prevent future occurrences.

Current Standards and Technologies

We are committed to meeting or exceeding current information security industry standards and any federal legislation requirements. We constantly review the latest standards, technologies, and legislation and modify our practices and software accordingly.

Links to Other Websites, Content Contractors and Their Cookies

Certain content and services offered to you through Our Application are stored on Applications not hosted or operated by us. We refer to such web sites as “Third Party Applications.” We do not disclose your Personal Information to Third Party Applications, but you should be aware that any information you disclose once you access these other applications is not subject to this Policy. In addition, Third Party Applications may use their own cookies when you click on their advertisements or link to their website or service. We have no access to, or control over, these cookies. We do not endorse and are not responsible for the privacy practices of any Third Party Application. You should review the privacy policy posted on each Third Party Application to understand how that application collects and uses Personal Information. Please remember that if you enter an application that does not display the name “Patient-Connect” you are on a Third Party Application.

Use of De-Identified Information

Unless provided otherwise in a binding legal agreement to which we are a party, we may at times aggregate de-identified personal information and may compile and distribute statistical analyses and reports utilizing aggregated data derived from this information. We may also share such information with our partners. Any information that can be traced back to an individual, including, for example, name, address, telephone numbers and e-mail addresses, will not be included in the aggregate data.

Changes to Policy; Contact Information

Changes to these policies will occur as warranted and will be posted on this page. Please refer to it occasionally to keep up-to-date on our current policies. If you have any question regarding this Policy, if you want to correct any Personal Information that we have collected, or if you feel that we are not abiding by this Policy, you should contact us at Info@stratice.com.  Last updated January 1, 2024.