Login
What security certifications and policies do you follow?

What security certifications and policies do you follow?

Victor Joseph

Last updated: 23 December 2024

We take security and compliance seriously, implementing industry-leading practices to protect your data. Hereโ€™s an overview of our security certifications and procedures:

  1. Incident Response Plan
    We maintain a robust incident response plan, including a HIPAA Addendum with breach notification procedures, certified by BSI.

  2. HIPAA Workstation Security Policy

    Our HIPAA workstation security policy ensures compliance with regulatory standards, verified by BSI.

  3. HIPAA Compliance Policy

    We adhere to a comprehensive HIPAA compliance policy, also certified by BSI.

  4. SOC II Certification

    We are SOC II certified, demonstrating our commitment to managing your data with the highest standards of security and confidentiality.

  5. Frequent Penetration Testing

    Regular penetration testing is conducted to identify and address vulnerabilities, ensuring the integrity of our systems.

  6. Data Processing Agreement (DPA)

    Our DPA outlines clear terms for how we process and protect personal data in compliance with applicable laws.

  7. GDPR Compliance Policy

    We strictly follow GDPR regulations to safeguard personal data and uphold your privacy rights.

These measures highlight our dedication to ensuring your data is secure and compliant with global standards. If you have any further questions about our security policies, feel free to reach out!

Did you find this article helpful?