Our Privacy Policy
Our Privacy Policy outlines how we collect, use, and protect your personal information. Your privacy and security are our priorities.
Last Updated on November 22, 2025
Introduction
Introduction
Tether Supervision, officially registered as Contrast Coverage Texas, PLLC (“Tether Supervision,” “we,” “us,” or “our”), is committed to protecting your privacy and securing the information you entrust to us. This Privacy Policy describes how we collect, use, disclose, and safeguard information when you access or use:
Our public website at tethersupervision.com (the “Website”); and
Our HIPAA-compliant contrast supervision platform, mobile contrast units (MCUs), software applications, audio-video systems, and associated services (collectively, the “Application” or “Services”).
We may update this Privacy Policy periodically to reflect changes in our practices, regulatory requirements, or service offerings. If material changes are made, we will notify you by email or by posting a notice on the Website or within the Application. Continued use of our Website or Services after such changes constitutes acceptance of the updated Privacy Policy.
Tether Supervision, officially registered as Contrast Coverage Texas, PLLC (“Tether Supervision,” “we,” “us,” or “our”), is committed to protecting your privacy and securing the information you entrust to us. This Privacy Policy describes how we collect, use, disclose, and safeguard information when you access or use:
Our public website at tethersupervision.com (the “Website”); and
Our HIPAA-compliant contrast supervision platform, mobile contrast units (MCUs), software applications, audio-video systems, and associated services (collectively, the “Application” or “Services”).
We may update this Privacy Policy periodically to reflect changes in our practices, regulatory requirements, or service offerings. If material changes are made, we will notify you by email or by posting a notice on the Website or within the Application. Continued use of our Website or Services after such changes constitutes acceptance of the updated Privacy Policy.
Information We Collect
Information We Collect
We collect only what we need to operate our Website and Services safely and effectively.
A. Website Visitors
When you interact with the Website, we may collect:
Contact information you provide (e.g., name, business email, phone number, company name, and any details submitted through forms).
Usage and device data (e.g., IP address, browser type, device identifiers, pages viewed, and approximate location inferred from IP) to secure and improve the Website.
B. Application Users (Customers / Authorized Staff)
When your organization uses the Application, we may collect:
Account and role information (e.g., name, role, professional identifiers, facility affiliation, phone number, and login credentials).
Operational and safety data (e.g., supervision session logs, timestamps, quality/safety flags, system messages, and incident report submissions).
Limited user-generated notes that are relevant to supervision workflows and safety.
C. Minimal PHI (Rare and Incident-Driven)
Our Services are designed to avoid PHI. In limited emergency or incident scenarios, authorized users may submit information that includes limited PHI. When PHI is present, we handle it as a HIPAA business associate for that data and protect it accordingly.
We collect only what we need to operate our Website and Services safely and effectively.
A. Website Visitors
When you interact with the Website, we may collect:
Contact information you provide (e.g., name, business email, phone number, company name, and any details submitted through forms).
Usage and device data (e.g., IP address, browser type, device identifiers, pages viewed, and approximate location inferred from IP) to secure and improve the Website.
B. Application Users (Customers / Authorized Staff)
When your organization uses the Application, we may collect:
Account and role information (e.g., name, role, professional identifiers, facility affiliation, phone number, and login credentials).
Operational and safety data (e.g., supervision session logs, timestamps, quality/safety flags, system messages, and incident report submissions).
Limited user-generated notes that are relevant to supervision workflows and safety.
C. Minimal PHI (Rare and Incident-Driven)
Our Services are designed to avoid PHI. In limited emergency or incident scenarios, authorized users may submit information that includes limited PHI. When PHI is present, we handle it as a HIPAA business associate for that data and protect it accordingly.
How We Use Your Information
We may use the information we collect from you for various purposes, including to:
Provide and Operate the Services: Facilitate virtual and on-site direct supervision, emergency escalation workflows, and safe contrast administration.
Maintain Safety and Compliance: Monitor system reliability, investigate incidents, and ensure service quality.
Improve User Experience: Analyze performance, troubleshoot issues, implement features, and optimize workflows for technologists and supervising physicians.
Communicate With You: Respond to inquiries, send onboarding materials, provide service and safety updates, and deliver promotional or informational communications.
Compliance and Audit: Support HIPAA, CMS, ACR, and state regulatory requirements; retain logs necessary for legal or contractual obligations.
Security and Fraud Prevention: Detect unauthorized access, enforce usage policies, and protect system integrity.
Data Security
Data Security
We use administrative, physical, and technical safeguards appropriate to the nature of the data we process, including access controls, encryption in transit, audit logging, and vendor risk management. No method of transmission or storage is entirely error-free. We continuously review and enhance our security practices.
We use administrative, physical, and technical safeguards appropriate to the nature of the data we process, including access controls, encryption in transit, audit logging, and vendor risk management. No method of transmission or storage is entirely error-free. We continuously review and enhance our security practices.
Third-Party Disclosure
Third-Party Disclosure
We do not sell, trade, or otherwise transfer your personal information to third parties without your consent, except as required by law or as necessary to provide our services. We may share your information with trusted third-party service providers who assist us in operating our website, conducting our business, or servicing you, provided that they agree to keep your information confidential.
We share information only in the ways described below:
Service providers / subcontractors. We use vetted vendors to host, support, and secure the Services. Where a vendor may handle PHI, we execute HIPAA-compliant Business Associate Agreements (BAAs).
Legal and safety requirements. We may disclose information if required to comply with law, regulation, subpoena, or lawful request, or to protect the safety, rights, or property of users, patients, or Tether.
Business transactions. If we are involved in a merger, acquisition, financing, or sale of assets, information may be transferred as part of that transaction, subject to confidentiality safeguards.
With your direction. We may share information when an authorized customer admin directs us to (e.g., adding a facility user, enabling integrations)
We do not sell, trade, or otherwise transfer your personal information to third parties without your consent, except as required by law or as necessary to provide our services. We may share your information with trusted third-party service providers who assist us in operating our website, conducting our business, or servicing you, provided that they agree to keep your information confidential.
We share information only in the ways described below:
Service providers / subcontractors. We use vetted vendors to host, support, and secure the Services. Where a vendor may handle PHI, we execute HIPAA-compliant Business Associate Agreements (BAAs).
Legal and safety requirements. We may disclose information if required to comply with law, regulation, subpoena, or lawful request, or to protect the safety, rights, or property of users, patients, or Tether.
Business transactions. If we are involved in a merger, acquisition, financing, or sale of assets, information may be transferred as part of that transaction, subject to confidentiality safeguards.
With your direction. We may share information when an authorized customer admin directs us to (e.g., adding a facility user, enabling integrations)
Cookies
Cookies
Our website may use cookies to enhance your browsing experience and collect information about how you interact with our site. You can adjust your browser settings to refuse cookies or alert you when cookies are being sent, but some features of the site may not function properly without cookies.
Our website may use cookies to enhance your browsing experience and collect information about how you interact with our site. You can adjust your browser settings to refuse cookies or alert you when cookies are being sent, but some features of the site may not function properly without cookies.
HIPAA and Incident Report Information
HIPAA and Incident Report Information
Tether Supervision operates in alignment with HIPAA when PHI is involved.
Incident reports. Incident reporting is used to protect patient safety, refine workflows, and ensure clinical readiness. Reports may include clinical context relevant to contrast reactions or other safety events. These data are accessed only by authorized personnel and safeguarded under HIPAA where PHI is present.
Business associate role. For any PHI processed within the Services, Tether acts as a business associate to the covered entity customer and applies HIPAA-level safeguards.
Customer responsibility. Customers are responsible for ensuring their internal use of the Services aligns with their own HIPAA and professional obligations. We provide secure tooling to support compliant use.
Tether Supervision operates in alignment with HIPAA when PHI is involved.
Incident reports. Incident reporting is used to protect patient safety, refine workflows, and ensure clinical readiness. Reports may include clinical context relevant to contrast reactions or other safety events. These data are accessed only by authorized personnel and safeguarded under HIPAA where PHI is present.
Business associate role. For any PHI processed within the Services, Tether acts as a business associate to the covered entity customer and applies HIPAA-level safeguards.
Customer responsibility. Customers are responsible for ensuring their internal use of the Services aligns with their own HIPAA and professional obligations. We provide secure tooling to support compliant use.
Changes to this Privacy Policy
Changes to this Privacy Policy
We reserve the right to update or change this Privacy Policy at any time. Any changes will be posted on this page, and the effective date will be updated accordingly. We encourage you to review this Privacy Policy periodically for any updates.
We reserve the right to update or change this Privacy Policy at any time. Any changes will be posted on this page, and the effective date will be updated accordingly. We encourage you to review this Privacy Policy periodically for any updates.
Contact Us
If you have any questions or concerns about this Privacy Policy or our data practices, please contact us at legal@tethersupervision.com or send us a letter at:
Contrast Coverage Texas, PLLC (DBA Tether Supervision)
2410 Polk St, Suite 200
Houston, TX 77019