hipaa compliance statement
TRANSCRIPT
![Page 1: HIPAA compliance statement](https://reader037.vdocuments.us/reader037/viewer/2022100311/55abc0781a28ab477f8b4787/html5/thumbnails/1.jpg)
DATA FLOW OF MESSAGES THROUGH THE QLIQ NETWORK:
Sender submits message.1If sender has a WiFi connection, the phone will preferentially transmit the message to the wireless access point (WAP), which will then forward the message to the network router. [The WAP and router may or may not be integrated into a single piece of hardware.]
2a
If sender has a 3G/4G data connection with no active WiFi connection, the message is transmitted to the cell tower and processed by the base station (BS), and then sent to the cellular data network (CDN).
2b
Network router forwards message to qliqServer.3a
Packet Router GGSN/PDSN forwards the message to qliqServer.
3b
qliqServer determines availability of recipient, including current IP address. If the recipient is available, the qliqServer will forward the message. If the recipient is not available, qliqServer will send a notice to the recipient’s device via push notification, letting the recipient know that they have received a new qliqCon-nect message. Once the recipient opens the application and becomes available, qliqServer will send the message to the recipient’s IP address.
4
If the recipient’s IP address is associated with a network address, the network router will receive the message and forward it to the WAP.
5a
If the recipient’s IP address is associated with an CDN, the CDN will receive the message and forward it to the correct base station (BS).
5b
The WAP processes the message and transmits it to the recipient’s device over WiFi.
6a
The BS processes the message and transmits it via the cell tower to the recipient’s device over 3G or 4G.
6b
Recipient receives message.7
BASESTATION
WIRELESSACCESSPOINT
INTERNET
CELLULAR DATANETWORK
ROUTER
BASESTATION
WIRELESSACCESSPOINT
CELLULAR DATANETWORK
ROUTER
SERVER
HOW qliq TECHNOLOGY WORKS
![Page 2: HIPAA compliance statement](https://reader037.vdocuments.us/reader037/viewer/2022100311/55abc0781a28ab477f8b4787/html5/thumbnails/2.jpg)
STOR
BASESTATION
WIRELESSACCESSPOINT
CELLULAR DATANETWORK
ROUTER
BASESTATION
WIRELESSACCESSPOINT
CELLULAR DATANETWORK
ROUTER
1024-BIT PRIVATE KEY2048-BIT PUBLIC KEY
PHYSICAL SECURITY
in using authorized credentials.
access is available.
strength requirements.
TRANSMISSION SECURITY
across port 443).
(image, audio, and various document formats).
decrypted by the receiving device, using a combination of public and private keys. Only the intended recipient can decrypt the message.
then stored on end-user devices in an encrypted file. No unencrypted messages are stored in the cloud.
qliqSTORWith the optional qliqStor feature, organizations can store all message traffic exchanged between users of a qliq group on group-controlled virtual server that can be queried by the group administrator, or authorized designees, for auditing purposes.
A
B D
qliqSERVER
through the qliq network. Rather, storage is distributed and information is controlled by end-users and their organizations.
the cloud only long enough to complete message delivery. When delivery occurs, user information is deleted from the qliq servers.
ACCOUNT MANAGEMENTThrough the qliqWeb console, the group administrator can:
timeout, and other security settings
stolen device (group and individual management to provide BYOD support)
C
SECURITY FEATURES
INTERNET
SERVER
PUBLIC KEYREPOSITORY
STOR
HOW qliq TECHNOLOGY WORKS