Seavey Healthcare Consulting®
Privacy and Security
HomeAbout UsCore CompetenciesArticles/PublicationsNew AAMI BookPresentationsBiography/ExperienceProfessional MembershipsCommendationsHonors & AwardsConference AttendanceLinksPhotosPrivacy and SecuritySP Audit Check ListCommon AcronymsContact Us

                                           Privacy and Security

Our Commitment To Privacy 
Seavey Healthcare Consulting, LLC is committed to maintaining the privacy and confidentiality of customer information.  This document covers the
information we collect and how it is used.  We will not sell, share, or rent this information to other parties unless described in this document.
All information will be kept confidential between client and Seavey Healthcare Consulting, LLC.                                                                                                                                                                                                                             
The Information We Collect 
The information we collect is customer/vendor name, contact name, address, telephone numbers, and E-mail addresses, policies and procedures,
decontamination and sterilization records, and any other information for the consultation.  We do not collect any patient information or financial
How We Use This Information
We use customer/vendor name, contact name, E-mail addresses, and address when under contract to send or request information and for
billing purposes.                                                                                                                                                                                                                                            
The Information We Disclose 
The only information we may disclose is done as part of a specific, contracted project as it relates to the coordination of new or improved
vendor equipment, services, or procedures. 
Our Commitment To Data Security 
To prevent the unauthorized use of any customer information, we have put in place appropriate physical, technical/electronic, and managerial
procedures to safeguard the information we collect.