The security of your data is important to Melissa. We have a 30+ year history of establishing and refining our controls to secure client data in an ever-changing, and increasingly connected world.

SOC 2 - Security, Availability, & Confidentiality Report

Melissa has successfully completed the Service Organization Control (SOC 2 Type II) audit for its data center and data processing organization. SOC 2 Type II is the corporate industry’s standard for an overall control structure, and validates the comprehensive reliability, security, and availability of Melissa’s handling processes. By completing the SOC 2, Type II examination, we affirm our long-standing commitment to strong controls and safeguards for handling and processing your data.

Because Melissa processes, procedures, and controls have been formally evaluated and tested by an independent accounting and auditing firm, SSAE 16 Professionals, LLP, you can be assured that a high level of internet controls and security are established and maintained. The examination was conducted in accordance with the AT Section 101, Attest Engagements of SSAEs (AICPA, Professional Standards, Trust Service Principles, Criteria and illustrations for Security, Availability, Processing Integrity, Confidentiality, and Privacy. Reporting standards include an audit of Melissa’s controls relevant to security and availability and the suitability of the design and operating effectiveness of our controls.

Service Organization Control (SOC 2 Type II) logo

HIPAA and HITECH – Protected Health Information

Melissa is in compliance with all data security standards outlined in the Health Insurance Portability and Accountability Act (HIPAA). The legislation regulates the use and disclosure of an individual’s health information in any format, also known as Protected Health Information (PHI). PHI includes a wide set of personally identifiable health- and health-related data, from insurance and billing information, to diagnosis data, clinical care data, and lab results such as images and test results. The rules apply to “Covered Entities”, which include hospitals, medical services providers, employer sponsored health plans, research facilities and insurance companies that deal directly with patients and patient data. The law and regulations also extend the requirement to protect PHI to “Business Associates”.

HIPAA was expanded by the Health Information Technology for Economic and Clinical Health Act in 2009. HIPAA and HITECH establish a set of federal standards intended to protect the security and privacy of PHI. For additional information on how HIPAA and HITECH protect health information, visit: here

HIPAA logo

Medicare/Medicaid Fraud, Waste & Abuse Certification

Melissa data quality services such as address and data verification are used by many Healthcare companies that provide health, prescription or administrative services to Medicare. As such Melissa meets the Centers for Medicare & Medicaid Services (CMS) requirement to comply with all applicable federal laws, regulations and CMS instructions. As Melissa is fully compliant, staff undergo annual training, designed to prevent, detect, and correct fraud waste and abuse, and serve as an important tool in ensuring we are successful in adhering to those requirements.

Medicare/Medicaid Fraud, Waste & Abuse Certification