Skip to main content

Everything, Everywhere Point of Care™

Complete Access to Your Data

Point of care never stops. You need interfaces that are perpetual, notifications when things go wrong, and a reliable middleware solution that is always available. Your team needs access to patient data to provide the best healthcare outcomes, but you’re also tasked with maintaining data security.

Data security is important to you – and TELCOR, too.

Contact Us

healthcare worker using laptop

Security within TELCOR QML®

TELCOR automatically enables security features in QML during software installation; therefore, each QML operator is required to have a login and password for access to functionality and data. Passwords are masked in QML with asterisks and encrypted in the QML database with AES 256. QML also supports active directory (AD) integration.

Access to Your Data by TELCOR

TELCOR QML is a customer-hosted solution on customer-sourced server(s) in designated local, commercial, or private data center(s). TELCOR has established remote access to your network and the server hardware where QML resides via either an attended (“we can only access QML when you let us in”) or unattended (“we can access QML without your intervention”) method. TELCOR will only connect to your QML servers in response to a request from you, whether for support, an upgrade, an installation, or a new project. Regardless of how we connect, TELCOR keeps a detailed accounting of all remote access to your QML server.

While we do securely transfer software from TELCOR to your server(s) during the software installation and implementation processes, we will never transfer or copy data from your server(s) to TELCOR without your explicit permission. Furthermore, TELCOR policy prohibits the transfer or storage of any patient health information (PHI) on our network regardless of whether it is a production or test environment. In the rare event you grant TELCOR permission to transfer data containing PHI from your server(s), we will temporarily store that data encrypted and permanently delete it as soon as the necessary troubleshooting or follow-up is complete.

Access to Your Data by You

QML allows you to grant needs-based access for your users. Depending on the diversity of your POC team, this could mean limiting access to specific areas within QML (Security Roles) or limiting the data displayed in QML to only applicable locations (My Locations). For example, you can grant complete access to all QML configurations and data to your POC team while restricting access to configurations for the people who manage POC after-hours. QML also includes an automatic logout feature to further safeguard your data from unauthorized use. The below features give you peace of mind that users can complete their tasks with the minimum necessary information.

My Locations
Security Roles
Working Locations
Operator Outliers

Learn more about TELCOR Point of Care Solutions

Discover More About TELCOR POC Data Security
lock on a white surface with numbers and text

Protecting Your Data with Encryption

healthcare worker looking at computer monitor

Maximizing Uptime