Improving experiences for your team.

Supporting your team is why we exist.

We understand the challenges you’re facing, from nursing shortages to increasing administrative overhead while trying to serve an aging population with increasing co-morbidities. Together, we can work smarter to optimize resources and achieve even better outcomes than you may have thought possible.

"I'm in awe. It's fantastic. It's not like anything I've ever seen before in all my years of case management."

— Lynn, Social Worker, Care Management

Three Simple Steps to Optimize Your Team

1

Onboard Administrators

Coordi onboards and provides training for administrators.

(1 to 2 hours)

2

Configure Workflows

Set the services and workflows for your business. No-code needed.

(15 min to 2 hours depending on size of business)

3

Onboard Field Team

Onboard and train field team

(1 hour)

FAQs

Does Coordinista’s platform integrate with our EHR?

Although Coordinista does not require integration with your EHR to be used, integrations can be established on a per client basis to send data back and forth between systems.

How fast can we be up and running with Coordinista?

As Coordinista is an intuitive and cloud-based platform, clients can be up and ready to deliver care in a day once contracts are signed.

What information is required to get started using Coordinista?

The following minimum information is required to get started:

  • Care team contact information, work location and their role (e.g. supervisor, care manager).

  • Patient / member demographics

Will we need to sign a Business Associate Agreement?

Yes. Coordinista takes great care to protect the privacy and security of Personal Health Information and this includes regulatory and contractual agreements about the use of such information.

HIPAA, Privacy and Security

We take the protection of customer data seriously and implement industry-standard controls to safeguard access to our systems, applications, and APIs.

Identity & Authentication: All users are assigned unique, non-shared accounts, passwords are required to meet defined strength standards and are stored using secure cryptographic hashing.

Two-Factor Authentication (2FA): Two-factor authentication is required for: Administrative and privileged accounts, remote and cloud-based access. Supported 2FA methods use secure, modern authentication mechanisms.

Access Control & Least Privilege: Access to systems and data is granted based on least privilege. Role-based access controls (RBAC) ensure users can access only what is necessary for their job function.

Session & Account Security: User sessions are encrypted and time-limited. Automatic session termination occurs after inactivity. Authentication is re-validated when elevated access is requested. Privileged access is restricted, reviewed, and removed when no longer required. Screen shots of PHI on mobile devices is disabled.

API & Application Security: API keys and secrets are: Encrypted in transit and at rest, scoped to minimum required permissions, monitored and rate-limited to prevent abuse.

Account Lifecycle Management: Formal processes govern account creation, modification, and removal. Access is promptly disabled upon role change or inactivation.

Monitoring & Audit Logging: Authentication and access events are logged. Logs are protected from unauthorized modification and reviewed for suspicious activity.

Compliance Alignment: Our security controls are designed to align with HIPAA Security Rule administrative, technical, and access control safeguards

Let us help you reimagine your care delivery model.