Skip to main content
Patient Protect circular logo mark in purple and white used for site navigationPatient Protect

Intelligence · Data Flow Mapper

See where your PHI actually goes.

Visual map of every place PHI flows in your practice. Vendors. Systems. Workforce. Find concentration risk before it concentrates into a breach.

Included in Core·Starting at $39/mo
Patient Protect — Data Flow Mapper
Patient Protect Data Flow Mapper showing visual map of PHI flowing between patient records, EHR, billing vendor, transcription service, lab, and other practice systems with concentration risk highlighted

HIPAA mapping

What this satisfies in the Security Rule.

4 citations, each with the specific Data Flow Mapper behavior that satisfies it. The mapping is the receipt — what you can show an auditor without assembling anything new.

§164.308(a)(1)(ii)(A)

Risk analysis

Identifies and documents threats to PHI. The map is the data-flow documentation that supports rigorous risk analysis.

§164.308(a)(1)(ii)(B)

Risk management

Identifies highest-risk paths and supports prioritization of controls.

§164.312(b)

Audit controls

Visualizes the systems generating audit data; useful for understanding audit scope and coverage.

§164.502(b)

Minimum necessary

Shows where minimum-necessary boundaries are working and where they aren't — PHI flowing to nodes that don't need it surfaces in the map.

What it does

The data architecture you keep saying you need to document.

When auditors ask “where does your PHI go?” most practices struggle to answer comprehensively. The EHR is obvious. The billing service is usually remembered. The transcription provider, the lab interface, the secure email service, the backup vendor, the IT contractor with access — each is remembered piecemeal. The complete map is rarely written down. The complete map is exactly what the §164.308(a)(1)(ii)(A) risk analysis requires.

Data Flow Mapper is the complete map. The platform reads from your Workforce, your Information Systems inventory, your BAA records, your messaging history, and your form workflows to produce a visual representation of where PHI actually flows. Concentration risks (single vendors carrying disproportionate data exposure) are highlighted. Path analyses show how PHI gets from intake to disposition.

The map updates as your platform state updates. Add a vendor; the Mapper reflects them. BAA goes Active; the protection status of edges to that vendor updates. Workforce member's role changes; their access pattern in the map shifts. The map is always current state.

How it works

6 mechanisms keep Data Flow Mapper working.

01

Comprehensive entity discovery.

The Mapper reads from across the platform: Workforce module (internal staff, business associates), Information Systems (devices, cloud services, software systems), BAA records (the contractual relationships), messaging history (actual exchange patterns), form submissions (data capture), audit log (actual access patterns).

02

Multi-dimensional edge analysis.

Edges between nodes carry multiple dimensions: direction (which way does data flow), encryption status (TLS, at-rest), BAA coverage (active, expired, none), frequency (high-volume, medium, occasional), data category. The visualization can filter by any dimension.

03

Concentration analysis.

Nodes are sized by data exposure. The vendor handling the full patient roster appears larger than the contractor with incidental access. Concentration warnings fire when a single vendor's exposure exceeds threshold; the warning is the beginning of “should we have a backup vendor for this function?”

04

Path traversal.

Click “patient intake” and watch PHI flow from the intake form through the patient record, into clinical documentation, out to billing, out to lab interfaces, out to transcription. The path traversal is the answer to “what happens to PHI from the moment a patient walks in.”

05

Compliance-flag overlay.

Toggle compliance overlays: BAA coverage status, encryption coverage, audit coverage, role-scope coverage. Each overlay highlights the gaps in that specific dimension. The map becomes a heat map for the specific compliance question.

06

Export for SRA documentation.

The map exports as PDF for SRA documentation, as CSV for analysis, and as a visual asset for board reports or auditor presentations. The exported version captures current state plus the specific filters applied.

Who this is for

Built for the practices that need it most.

Practices that have done an SRA but couldn't actually show flows.

Most SRAs include a “data flow” section. Most practices answer it with a paragraph of prose. The map is the visual that the prose was supposed to summarize.

Practices with vendor concentration concerns.

If you've ever wondered whether you're too dependent on a single vendor — for data, for risk, for operational continuity — the Mapper visualizes the dependency.

Practices preparing for SRA renewal.

The annual SRA refresh is far less work when the data flow documentation is auto-generated and current. Compare to last year's map; document what changed.

Practices recovering from a vendor incident.

Post-incident, the question is “what was the blast radius?” The Mapper shows what data the affected vendor had, who else they handed it off to, and what's downstream of the affected node.

What you get

6outcomes you'll feel in week one.

The complete map.

Every PHI flow, visualized.

Concentration risk visibility.

Single-vendor concentrations surface as visually prominent nodes.

Compliance-overlay analysis.

BAA, encryption, audit, scope — see gaps in any dimension.

Path traversal.

Watch PHI flow from intake through every downstream step.

SRA-ready export.

§164.308(a)(1)(ii)(A) data-flow documentation auto-generated.

Historical comparison.

What changed since last review.

FAQ

What people ask first.

6 questions cover most first-time evaluations. See all FAQs →

How does the Mapper know about my data flows?
It reads from the platform's existing data — your Workforce module, Information Systems inventory, BAA records, messaging history, audit log. The map represents what the platform already knows; you don't fill it in manually.
What about flows that aren't on the platform?
You can add nodes and edges manually for flows the platform can't auto-discover (a paper-based workflow, a legacy system not yet in Information Systems, an external transmission via fax). Manually-added nodes are flagged so the audit clearly distinguishes platform-observed from manually-asserted.
Can I share the map with consultants or auditors?
Yes. Read-only sharing is supported with time-limited access. Consultants typically use the shared map during SRA review; auditors typically receive the PDF export.
How accurate is the concentration analysis?
The concentration analysis uses platform-observed data flow patterns. For practices with significant off-platform flows (e.g., paper records, third-party systems not connected to the platform), the analysis may understate concentration; manual flow additions correct for this.
Does the map show specific PHI?
No. The map shows entities, flows, and characteristics — it doesn't display patient records or specific PHI. The visualization is at the architecture level.
What about HIPAA's “data inventory” requirements?
§164.308(a)(1)(ii)(A) requires identifying where PHI is “created, received, maintained, or transmitted.” The Mapper's node and edge model is the visual data inventory.

Next step

The complete map of where your PHI actually goes.

Most practices generate their first complete map inside the first hour after their SRA. The annual SRA refresh becomes a diff, not a project.

No contracts. No consultants. Starting at $39/mo.