IDS Policy

In order to preserve the integrity of data that Next Health Choice stores, processes, or transmits for Customers, Next Health Choice implements strong intrusion detection tools and policies to proactively track and retroactively investigate unauthorized access.

Applicable Standards from the HITRUST Common Security Framework

  • 09.ab - Monitoring System Use
  • 06.e - Prevention of Misuse of Information
  • 10.h - Control of Operational Software

Applicable Standards from the HIPAA Security Rule

  • 164.312(b) - Audit Controls

Intrusion Detection Policy

  • Automatic monitoring is done to identify patterns that might signify the lack of availability of certain services and systems (DOS attacks).
  • Next Health Choice firewalls monitor all incoming traffic to detect potential denial of service attacks. Suspected attack sources are blocked automatically. Additionally, our hosting provider actively monitors its network to detect denial of services attacks.
  • All new firewall rules and configuration changes are tested before being pushed into production. All firewall and router rules are reviewed every quarter.
  • Next Health Choice utilizes redundant firewall on network perimeters.

More patient time, less office work

Get in touch with Next Health Choice today to learn more.


Next Health Choice is HIPAA and HITECH compliant. Our policies are available online for you to review.