Compliance
SOC 2HIPAA
COMPLIANT
Resources
Policies
Other resources
Controls
Updated April 11, 2026
Infrastructure security
- Encryption key access restricted
- Remote access encrypted enforced
- Network firewalls utilized
Organizational security
- Anti-malware technology utilized
- Code of Conduct acknowledged by employees and enforced
- Confidentiality Agreement acknowledged by employees
Product security
- Control self-assessments conducted
- Data transmission encrypted
- Vulnerability and system monitoring procedures established
Internal security procedures
- Continuity and Disaster Recovery plans established
- Configuration management system established
- Development lifecycle established
Data and privacy
- Data retention procedures established
- Data classification policy established
- Customer data deleted upon leaving