We know the privacy of your personal information is important to you. We commit to safeguarding your information and want you to know the protective measures we take.
Non-Public Information We Collect
If you use our website, we collect the following types of information:
Cookies. Cookies are a text file put on a user’s computer, if accepted by the computer, which provide to us such information as whether you are a new or returning visitor and which web pages you visit.
Transparent gifs. Transparent gifs are an invisible image which gathers such information as where you came from to visit a particular web page or which of multiple links to the same page you used to access that page.
Log files. Log files are text files on the server which gather such information as your internet protocol address, internet service provider and type of browser. We use this information to determine such things as the number of visitors and day and time of visit to our website.
If you choose to submit your contact information to indicate an interest in a consultation, we receive the information you submit through the form.
Your Protected Health Information is always encrypted at rest and in transit. All of our employees have been trained on best practices for protecting your information. Cameras and security systems have been installed in our offices. Biometrics are used for employee clock-in and clock out. Computers and electronic devices in our office have security implementation to prevent your information from being breached and used in a malicious way.
The company and it’s employees are always cognizant about not disclosing protected information within earshot of anyone but the patient and any authorized individual or their representatives.
We maintain physical, electronic and procedural security measures that comply with or exceed applicable legal and regulatory standards to safeguard your non-public personal information. This includes the HIPPA HITECH Act. Access to such information is restricted to those employees who are trained in the proper handling of client information and have a legitimate business need to access that information.
We maintain Business Associate Agreements with any 3rd parties involved in our Information Technology infrastructure.
If you entered your contact information into our website to express an interest in being contacted, we use your information so that a Representative of ours may contact you to communicate about this opportunity.
If you have any questions, please don’t hesitate to Contact Us