Safe Smart Money Logo

Privacy Policy

Site Policy – Your privacy is important to us. It is Safe Smart Money’s policy to respect your privacy regarding any information we may collect from you across our website,, and other sites we own and operate.

We only ask for personal information when we truly need it to provide a service to you. We collect it by fair and lawful means, with your knowledge and consent. We also let you know why we’re collecting it and how it will be used.

We only retain collected information for as long as necessary to provide you with your requested service. What data we store, we’ll protect within commercially acceptable means to prevent loss and theft, as well as unauthorized access, disclosure, copying, use or modification. We don’t share any personally identifying information publicly or with third-parties, except when required to by law.

Our website may link to external sites that are not operated by us. Please be aware that we have no control over the content and practices of these sites, and cannot accept responsibility or liability for their respective privacy policies.

You are free to refuse our request for your personal information, with the understanding that we may be unable to provide you with some of your desired services.

Your continued use of our website will be regarded as acceptance of our practices around privacy and personal information. If you have any questions about how we handle user data and personal information, feel free to contact us. This policy is effective as of September 1, 2022.

Our HIPAA Policy

These privacy policies and procedures represent our obligation as an insurance office to protect the “nonpublic personal information” that we create, receive or maintain on all clients.

1. Purpose for Policy

We place a high value on the privacy of its clients (“Clients”) and the expectation that information regarding Clients remains confidential and is made available only to persons who have a legitimate right to know. In addition, and the principals Martin Levy, Scott Zimmerman and affiliated agencies they are licensed and contracted with, are contractually obligated to comply with the privacy and security provisions of the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”). Collectively they recognize that all employees and temporary workers (“Employees”), as well as outside contractors, have an ethical and legal obligation to keep certain information about Clients confidential and to protect and safeguard this information against unauthorized use or disclosure.

2. Overview

This privacy policy concerns protected health information (“PHI”). PHI, as defined by federal law, means any individually identifiable health information of a Client, including, but not limited to: social security number, name, address, birth date, age, telephone number, subscriber number, policy number, e-mail address, fax number, medical records and genetic information. PHI is not confined to written materials, facsimiles or hard copy. It also includes information derived from any source, including, but not limited to: e-mail, computer data, data stored on electronic media, disks or handheld computing devices (such as PDAs and smartphones), verbal communications or recordings and visual observation.

3. Procedures

The following section outlines the basic procedures necessary to comply with this policy.

Disclosure of Information

  • An Employee may access, discuss, use and disclose PHI only as it relates to that employee’s specific job functions and/or responsibilities.
  • Employees may disclose PHI only to those who have a legitimate, directly related business need to know or who have prior written authorization. PHI about a Client may only be shared for purposes of claims payment or healthcare operations.
  • PHI must never be the subject of casual conversation either inside or outside of the workplace. PHI must not be discussed in lobbies, stairwells, elevators, restrooms, hallways, or any other public area where conversation could be easily overheard by visitors and Employees who do not have a need to know.
  • Only “Minimally Necessary” PHI may be disclosed. “Minimally Necessary” means only that amount of PHI necessary to accomplish the intended purpose of the use or disclosure.

Access to Information

  • PHI may only be accessed if related to specific job functions and responsibilities.
  • Casual reading of PHI is not permitted.
  • Employees with legitimate access to PHI will protect this information from casual or unauthorized access.

Security of PHI

  • Employees may remove PHI from the facility only as it relates to specific job functions and/or responsibilities. Approval from an employee’s direct manager is necessary to remove PHI from the facility. It is the responsibility of each Employee to protect and safeguard all such information.
  • Employees are encouraged to review PHI in a secure area and are responsible for records that are checked out to them. It is the responsibility of the Employee to protect and safeguard all records that are removed from the secure areas.
  • Technical security safeguards are used to store, process and transmit electronic PHI. Our IT staff has primary responsibility for the security oversight of electronic PHI. Employees are responsible for complying with these security safeguards. All workstations that store, process or otherwise access electronic PHI must be protected with a strong password. Open sessions will be disconnected after a period of inactivity.

 Breach of Confidentiality

  • Any Employee who believes he/she has observed a breach of security or confidentiality should promptly notify his or her direct manager or the Chief Privacy Officer.
  • Employees found to be in violation of this policy may be subject to disciplinary action, up to, and including termination and/or legal action. PHI is protected by federal and state laws and regulations that define civil and criminal penalties for violations of confidentiality.
  • We will periodically conduct unscheduled audits to ensure compliance with this policy.

Safeguarding PHI

  • In order to maintain confidentiality, any item containing PHI must be discarded according to the standards identified below:
ItemExamplesWhere/How Discarded
PaperMedical records, applications, census files, or any other paper-based document containing PHIPaper-based PHI should be placed in a sealed recycle bin for destruction or destroyed by shredding. Electronic copies stored in any document Management System will be password protected using encryption procedures.
ElectronicComputer hard drives, disks, e-mails and electronic filesThe IT staff will remove the hard drive from each computer or laptop that is scheduled for disposal. These hard drives will be physically secured until they are destroyed or recycled. Computers that will be reused must cleared or purged to remove PHI. Disks should be destroyed or re-formatted. E-mails and electronic files should be purged from the system after use. Employees needing assistance in disposing of electronic files should contact a member of our IT staff.
  • Employees must not leave any PHI on fax machines, printers or copiers.
  • Employees are to clean their workspace of PHI at the end of their work day and place the PHI in a secure location.
  • Employees must exercise caution and discretion when leaving voicemail messages containing PHI.
  • Employees are to escort visitors through work areas.
  • Employees must exercise caution and discretion when e-mailing PHI  inside organization
  • Employees must use appropriate encryption software when e-mailing PHI outside organization
  • Employees must not store PHI on handheld devices, such as PDAs or smartphones.
  • Employees must secure all hardcopy mail containing PHI.
  • Employee workstations will be programmed to auto-lock after 10 minutes of inactivity.
  • Employees should refrain from loading PHI on pooled laptops. Information stored on laptops will be routinely purged.