559.825.3200

The Cleaning Crew Has a Key to Every Room in Your Visalia Clinic. Including the Server Room.

A commercial cleaning worker (janitorial crew) in a healthcare hallway — mop, cleaning cart — passing by an office door or server room door that is open or ajar.
Facebook
Twitter
LinkedIn

Every healthcare administrator in the Central Valley knows the drill: before you hire a vendor, you get them to sign a Business Associate Agreement. The BAA says they will protect PHI. It says they will report breaches. It says they will maintain reasonable safeguards. It is a legally binding document that took your compliance officer three weeks to finalize.

And then you give the janitorial company a master key.

The master key that opens the front door also opens the medical records storage room, the IT closet with the EHR server, the medication room, and the billing office where patient financial records are stacked on desks overnight. The cleaning crew… wonderful people, many of whom have been with the company for years… enter your clinic at 9 PM, work until midnight, and leave. They access every room. There is no record of which rooms they entered, in what order, or for how long.

Your BAA is a piece of paper. Your master key is a piece of metal. Neither one knows what happens between 9 PM and midnight.

The HIPAA Security Rule requires healthcare organizations to implement physical safeguards that control access to areas containing PHI. This means you need to know… and be able to demonstrate… who accesses spaces where patient data is stored, displayed, or processed.

For most Central Valley clinics, the gaps between policy and practice are wide enough to park a cleaning cart in:

  • Janitorial staff access the entire facility nightly with a single key or code. They empty trash cans in offices where patient charts or printouts may be visible. They clean the IT closet where servers store electronic PHI. They enter exam rooms where patient information may be on screens or in unbinned documents. None of this access is logged, video-recorded, or restricted.
  • IT service vendors visit quarterly… or in response to a support call… and are given temporary access to server rooms, workstations, and network infrastructure. They may remote into systems while on-site. Their access is documented by a sign-in sheet at the front desk (when reception remembers to ask), but their movement within the facility is untracked.
  • Medical equipment technicians service imaging systems, lab analyzers, and diagnostic stations. These devices are often in clinical areas adjacent to patient records, and the technicians may need to access network connections or software systems that are integrated with your EHR. Their physical presence in PHI-adjacent spaces is not monitored.
  • HVAC, plumbing, and electrical contractors access mechanical rooms… which in many clinic layouts are adjacent to or co-located with server closets and telecommunications rooms. They are often in the building for hours, and nobody tracks where they go beyond the initial work order area.

The common response from clinic administrators is: “We trust our vendors.” And that is probably justified. But HIPAA does not ask whether you trust your vendors. It asks whether you can demonstrate that access to PHI was controlled, monitored, and documented. Trust is not a compliance posture.

When a Breach Traces Back to a Vendor, the Clinic Is Liable

HHS holds the covered entity responsible for vendor access failures. If a janitorial worker photographs patient records visible on a desk and posts them on social media… it has happened… the clinic faces the breach investigation, not the janitorial company. The BAA gives you a civil contract claim against the vendor. HHS imposes the penalty on you.

The more vendors, the more exposure. A mid-sized clinic group in Fresno with five locations might contract with separate janitorial services, IT providers, medical equipment companies, copier/printer vendors, shredding services, and building maintenance companies. Each of those third parties has individuals who physically enter your facilities and may encounter PHI. How many of them have logged, video-verified access records? If the answer is not “all of them,” you have exposure.

Breach investigations dig into physical access. When HHS OCR investigates a reported breach, one of the first document requests is for access logs and surveillance records. They want to know who had physical access to the area where PHI was compromised, and whether that access was authorized, logged, and monitored. For clinics that cannot produce this documentation, the investigation shifts from “what happened” to “you don’t know what happened… and that is a problem.”

Your cyber insurance may not cover a physical access breach. Many healthcare cyber liability policies focus on electronic intrusion… hacking, ransomware, phishing. A breach caused by a vendor’s physical access to a server room or a workstation containing PHI may fall into a coverage gap between your cyber policy and your general liability policy. The legal argument happens while you are paying for the breach response out of pocket.

Vendor Access That Is Controlled, Logged, and Verified

PC Solutions deploys Verkada’s access control and visitor management platform to give Central California healthcare facilities complete visibility and documentation of every third-party access event.

1. Vendor-Specific Credentials with Restricted Access Issue each vendor company… and each individual technician where appropriate… a credential that restricts access to only the areas they need. The janitorial crew accesses hallways, restrooms, and common areas. They do not access the server room, medication storage, or billing offices. The IT vendor accesses the server room. They do not access the pharmacy. Each credential is configured once and enforced automatically at every door.

2. Time-Limited Access Windows Vendor credentials can be configured with start and end times. The janitorial crew’s access activates at 9 PM and deactivates at midnight. If anyone attempts to use that credential outside the window, the system denies access and logs the attempt. No more “the cleaning crew came at 7 AM to pick something up” with unmonitored access to the entire facility.

3. Video-Paired Access Logs Every vendor access event is paired with the nearest camera footage. You know not just that a credential was used, but that the right person used it and that they went where they were authorized to go. When your compliance officer needs to demonstrate vendor access controls for a HIPAA audit, the documentation is complete… badge, time, video, duration, and exit.

4. Digital Visitor Management for One-Time Vendors For contractors who visit once… the HVAC tech, the copier repair person, the network cabling crew… Verkada’s visitor management system captures photo ID, issues a temporary credential, restricts access to the relevant area, and logs the entire visit. No more unescorted vendors wandering the hallway asking “where’s the server room?”

5. Automated Compliance Reporting Generate access reports by vendor, by area, by time period. Provide them to your compliance officer, your BAA management process, or your insurance carrier. When your next HIPAA audit asks “how do you control vendor access to areas containing PHI,” you do not pull out a policy binder. You pull up a dashboard.

Your BAA Is the Promise. Access Control Is the Proof.

PC Solutions helps Central Valley healthcare organizations close the gap between written vendor compliance and physical access reality. We handle credential setup, door hardware, camera positioning, and ongoing managed support… aligned to HIPAA’s physical safeguard requirements.

Schedule a vendor access security assessment →

Call 559.825.3200 or email sales@gopcsolutions.com

Facebook
Twitter
LinkedIn

A Worker Fell on Your Clovis Jobsite. Cal/OSHA Asked for Video. You Had a Toolbox Talk Sign-In Sheet.

Cal/OSHA investigations at Central Valley construction sites increasingly request video documentation of safety practices. Fresno and Visalia contractors without timestamped footage face higher fines, longer investigations, and rising insurance costs. Here’s how to close the documentation gap.

April 14, 2026

That $300K Excavator Sitting on Your Visalia Jobsite Uses a Universal Key. So Does Every Thief’s.

Here is a fact about construction equipment that should keep every general contractor up at night: the majority of heavy equipment in the field can be started with a universal

April 7, 2026

The Cleaning Crew Has a Key to Every Room in Your Visalia Clinic. Including the Server Room.

Third-party vendors at Central California clinics… janitorial, IT, equipment techs… access areas containing PHI with no audit trail. PC Solutions and Verkada help Fresno, Visalia, and Bakersfield healthcare facilities control, log, and verify every vendor visit.

April 6, 2026

Your Fresno Clinic Closes at 5 PM. Its $2 Million in Equipment and 10,000 Patient Records Don’t.

After-hours break-ins at Central California clinics are targeting medical equipment and patient data. Fresno, Bakersfield, and Visalia practice managers need cloud-managed alarm and camera systems that verify threats in real time — not an answering service that calls back in 20 minutes.

March 31, 2026

Your Fresno Jobsite Lost $40,000 in Materials Last Weekend. Your Temporary Fence Didn’t Stop Anything.

Construction site theft in the Central Valley costs contractors tens of thousands per project. PC Solutions and Verkada deploy camera systems designed for temporary jobsites… solar-powered, LTE-connected, and operational before the foundation is poured.

March 31, 2026
Verkada by PC Solutions

Try Verkada by PC Solutions

Start your 30-day free trial