Flexibility
Highlight Health’s expert analyses rely upon data. We take pride in our flexible approach to data intake. Simply put, we do not let data formatting get in the way of cost reduction. Our innovative technology and proprietary software allows us to ingest our clients’ data and information as it exists, and we likewise deliver our work product in formats that our clients request.
We have built an HIPAA secure, AI-enabled technology platform that can ingest claims data in nearly every format, including:
- UB-04s and HIPAA-1500s, including those that have been faxed multiple times!
- 837 EDI transactions
- Flat files
We can even scan a TPA’s incoming EDI transactions and filter for claims appropriate for our review — before the claims even get to the TPA.
Use of AI
Highlight Health utilizes both proprietary claims processing technology, which includes artificial intelligence (AI). We recognize that AI is the present and the future of technology for modern companies.
Our AI, however, is carefully monitored and double-checked because the security and privacy of our clients’ data cannot be compromised. Highlight Health knows how to deploy AI and will always hold expert people, not machines, responsible for our decisions and work product.
Security and Privacy
Complying with HIPAA and deploying industry-leading security and privacy policies is an obsession at Highlight Health. We must continuously safeguard protected health information (PHI) and personally identifiable information (PII) that our clients share with us pursuant to business associate agreements. A breach of this information could impose personal harm to the individuals whose information is disclosed and could cause us to lose the confidence and business of our clients.
Highlight Health utilizes multi-tiered, progressive data security architecture, follows best practices security and privacy policies, deploys reputable tools, and complies with HIPAA and related healthcare and privacy laws. Our security is managed by an in-house team and guided by outside experts. We believe that this is the perfect combination of “the people who care the most” and the “people who know the most.”
In addition to our built-in, continuous security monitoring, our vendors run routine external scans and penetration tests and perform regular full security assessments.