Table of Contents
- The Decision That Sits Underneath the RFQ
- The Four Questions a Practice Should Be Ready to Answer
- Why a Cloud EMR Doesn't Eliminate the Hosting Question
- The Operational Reality of an Offshore Working Day
- What a Production Deployment Looks Like at Atlantic.Net
- Designing From the Compliance Boundary Inward
To continue our series of request-for-quote deep dives, today, we are going to look at how we address the complexities some health practices face in maintaining HIPAA Compliance when using support teams scattered across the globe.
Here, we will investigate an offshore back-office model that is now common in US specialty medicine. A small practice in New York, Florida, or Texas hires a billing team in Bangalore, Manila, or Cebu, and the team works the practice’s claims queue from twelve time zones away. This model can make HIPAA-Compliance complex, but this article is about how Atlantic.Net overcame these challenges.
Atlantic.Net’s pre-sales team has been answering these types of requests with growing regularity: how does an offshore team actually access the electronic medical record (EMR) in real time?
Do they need a contractor laptop with access and credentials configured, and hope nothing leaks? Or a secure, US-based HIPAA-compliant environment, one that can be audited, configured, and inspected on your own terms?
This was the situation for one pain management practice in Queens, New York, that recently contacted Atlantic.Net. The practice had moved its EMR to a cloud platform a year earlier and was setting up a three to five-person billing team in India to work the claims queue.
The Request for Quotations (RFQ) asked for a HIPAA-compliant Managed VPS or virtual desktop, a signed HIPAA Business Associate Agreement (BAA) (BAA), no-leak controls, multi-factor authentication, and a confirmed uptime SLA.
The Decision That Sits Underneath the RFQ
The customer was on the right track when requesting a cloud server or a virtualized desktop solution, and it doesn’t matter where your support teams are based, provided that the workspace the team uses is a controlled environment the practice can audit, not a trusted endpoint it cannot inspect.
The difference matters because electronic Protected Health Information (ePHI) does not have to be stored somewhere to create a HIPAA liability. , how ePHI is accessed is critical for compliance.
A billing clerk in India who opens a patient chart through a browser on their own laptop has touched ePHI on a device the practice has never seen, running software the practice cannot configure, connected to a network the practice cannot monitor. The BAA the practice signed with its EMR vendor does not extend to that laptop. Nothing does.
The answer Atlantic.Net built toward an access model workspace that belongs inside a HIPAA-covered hosted environment, and the offshore team works inside via virtual desktops rather than connecting from outside.
The Four Questions a Practice Should Be Ready to Answer
A practice owner does not need to understand Group Policy or Remote Desktop Services licensing. Still, it’s essential to have answers for these questions to determine whether a deployment lands cleanly. Getting clear on them before the quote stage saves time on both sides.
Who Signs the BAA, and What Does It Actually Cover?
The BAA is the legal instrument that makes HIPAA-compliant hosting meaningful. Without one, a provider is handling infrastructure that may contain ePHI without taking on the obligations of a business associate, creating a compliance gap regardless of how strong the security controls are.
Atlantic.Net includes the BAA at no extra charge with the Windows Business HIPAA hosting plan. It is part of the tier, not a separate negotiation, and it covers Atlantic.Net’s role as a business associate for the data, traffic, backups, and operational records that pass through the hosted environment.
What it does not cover is the chain upstream. The practice has its own BAA with the EMR vendor. The two are separate instruments that cover distinct legs of the ePHI journey. The practice owns the chain; the hosted environment is one covered link in it.
Where Does ePHI Physically Live During a Working Session?
When a billing clerk in India opens the EMR platform via the hosted Windows desktop, the ePHI resides in the cloud. The hosted server holds the operating system, a browser, and session logs. It does not hold patient charts or claims files in any persistent form. The browser session opens, the clerk works the queue, and the session closes. The EMR vendor’s cloud is where the data rests.
The server’s role is to serve as the authorized workspace where the billing clerk’s credentials and the EMR’s data meet. If that meeting were to happen on a contractor’s laptop instead, the practice would lose two things at once: the audit trail of what was accessed, and the policy layer that controls what can leave the system.
HIPAA-compliant cloud storage on Atlantic.Net’s platform means that what does sit on the server, session logs, temporary files, and encrypted backups, falls under the same compliance posture as the compute layer.
What Is Refused at the Desktop Layer?
The security question that matters most for an offshore billing team is not what the server enables. It is what the server refuses.
Atlantic.Net can deliver a no-leak policy bundle as part of the Windows Business HIPAA hosting configuration for this use case. At the operating system level, every path that would let a file leave the server or a clipboard string travel back to a contractor’s device can be closed: drive redirection, clipboard redirection, printer redirection, removable media, and port and plug-and-play device access can be blocked at the policy layer. The billing team has a working Windows session and a browser. What they may not have is any mechanism to move ePHI from the server to the device in front of them.
A browser-level control layer sits on top. The session browser can be locked to the EMR domain and a short list of supporting URLs. Downloads can be disabled independently of the OS-level block. Print to PDF can be turned off. The session functions as a window onto the EMR platform and nothing else.
Atlantic.Net applies hardening during provisioning for HIPAA customers with offshore back-office teams. The practice’s part is to confirm whether an exception is needed for a specific peripheral, and in most cases, including this one, none is.
Who Brings the Microsoft Licensing?
This is the question most practices do not think to ask before the quote stage, and it is the one most likely to affect the go-live timeline if left unanswered early.
A Windows Server included in a hosting plan ships with a built-in RDP license that supports two concurrent administrative sessions. That is a Microsoft licensing rule that applies to every cloud provider in this category. For three to five concurrent billing users, the practice needs Remote Desktop Services (RDS) User CALs, purchased separately from a Microsoft partner.
Atlantic.Net’s Services Provider License Agreement (SPLA) with Microsoft does not permit reselling or leasing RDS User CALs. That boundary applies to every Atlantic.Net Windows plan, and it is not unusual in managed hosting. What Atlantic.Net does provide, at no extra charge, is installation and activation of the License Server role on the cloud server, pointing the RD Session Host at it, and validating the per-user licensing mode. The practice brings the CALs; Atlantic.Net brings the infrastructure they run on.
Microsoft’s 120-day RDS licensing grace period is available, allowing the team to start working on day one while CAL procurement runs in parallel. For an offshore billing team that is often onboarded faster than a Microsoft partner’s procurement cycle, that window is the practical answer to whether licensing will delay the go-live.
Why a Cloud EMR Doesn’t Eliminate the Hosting Question
The most common objection Atlantic.Net encounters is straightforward: “Our EMR is already in the cloud. Why do we need a server at all?” It is a fair question. If the patient data lives in the cloud and the billing team just opens a browser to access it, the server can feel like an unnecessary layer between the contractor and the work.
The answer is that the EMR vendor’s cloud holds the data, but it does not provide the workspace. The workspace, wherever it is, is what gets audited. If the workspace is a contractor’s personal laptop, the practice has no visibility into what happens to ePHI during the session: whether the screen is photographed, whether the browser caches data that persists after the session, or whether files are downloaded before the tab is closed. The EMR vendor’s security posture covers its infrastructure. It does not extend to the device at the other end of the browser.
A HIPAA-covered hosted desktop brings both things back. The audit trail comes back because session activity is logged on a server that the practice controls. The policy layer comes back because the no-leak controls apply to the session, not to the device. The contractor’s personal laptop is irrelevant to the compliance model because it ends at the server, not at the contractor’s front door.
For customers who assumed the cloud EMR had already solved the access-control problem, the need for a hosted workspace can feel like unexpected overhead. It is not overhead. It is the piece that the EMR vendor’s cloud cannot provide on the practice’s behalf.
The Operational Reality of an Offshore Working Day
The productive window between an Indian working day and a New York business day is narrow. A billing team in India starting work at 9:30 in the morning is several hours into its shift before the Queens practice opens its phones. The overlap where questions can be answered and escalations handled runs to perhaps two hours in the afternoon, New York time.
In that context, uptime is not an abstract SLA metric. An hour of unplanned downtime during that window does not slow the billing team down. It stops them. The overlap is so short that an outage that would cost a colocated team a coffee break and a restart can cost an offshore team the productive portion of an entire day.
Atlantic.Net’s published 100% Cloud Service Level Agreement applies to the cloud platform on which the Windows VPS runs. The weight of that commitment is higher, not lower, when the users depending on the server are twelve time zones away. It is also why the 24/7 managed support included in the Windows Business HIPAA plan matters: support availability at 3 in the morning US Eastern time is the relevant metric when the team working the server is in India during business hours.
What a Production Deployment Looks Like at Atlantic.Net
The configuration Atlantic.Net provisions for a practice in this situation is built around a single Windows Business HIPAA hosting plan, sized for the team’s workload. For three to five concurrent billing users working in a cloud EMR via a browser, the baseline is a 4 vCPU, 16 GB RAM instance with 200 GB of encrypted SSD storage. That allocation runs the Windows Server, the browser sessions, and a year’s worth of audit logs comfortably, with headroom if the team grows.
Included in the plan: the Windows Server license, the BAA, mandatory MFA on initial server login, daily onsite and offsite encrypted backups, vulnerability scanning, anti-malware, host intrusion detection, and 24×7 managed support. The no-leak GPO bundle, covering drive, clipboard, printer, removable media, and port redirection at the policy layer, plus browser-level URL controls and download restrictions as a second layer, is applied at provisioning. The License Server role is installed and activated at no extra charge, configured for per-user licensing, and ready to accept the practice’s CAL pack, with the 120-day Microsoft grace period bridging provisioning and CAL delivery.
Monthly billing is a flat, recurring charge. This workload shape, RDP sessions inbound and HTTPS traffic outbound to the EMR cloud, does not generate the per-gigabyte egress charges that make cloud billing unpredictable for data-heavy workloads. The practice gets a predictable number every month against a server it does not have to manage.
Designing From the Compliance Boundary Inward
You may have seen the pattern throughout this article: a practice that designs offshore-team access from the compliance boundary inward, starting with the BAA and working out toward the desktop, ends up with a hosted Windows session, a no-leak policy layer, predictable licensing, and an SLA that holds. A practice that starts on the contractor’s laptop and extends outward ends up arguing with its auditor.
Atlantic.Net’s role is to provide the environment that makes the compliance boundary real: the BAA, the Windows Business HIPAA hosting tier, server installation, the 100% Uptime Service Level Agreement, and 24×7 managed support that covers the offshore team’s working hours. The practice’s role is to bring the CALs, identify any peripherals that need an exception, and onboard the team. The work splits cleanly along that line.
If you are evaluating Atlantic.Net for a HIPAA-compliant offshore billing deployment, the four questions above are the ones to raise during the first call. Walk us through your EMR, team size, and compliance posture, and the Atlantic.Net pre-sales team can scope a HIPAA-compliant hosting configuration that fits.
* This post is for informational purposes only and does not constitute professional, legal, financial, or technical advice. Each situation is unique and may require guidance from a qualified professional.
Readers should conduct their own due diligence before making any decisions.