<aside> <img src="/icons/question-mark_orange.svg" alt="/icons/question-mark_orange.svg" width="40px" />

Recommendations

Our technology

1. Compliance Frameworks

Our product is designed to be HIPAA-compliant from the outset, with a strong emphasis on patient data privacy and de-identification practices. This ensures our handling of Protected Health Information (PHI) meets foundational healthcare privacy requirements.

While we have not yet adapted our infrastructure to SOC2 Type 2 compliance, we recognize the importance of implementing this standard for long-term security. We are actively exploring pathways to align our practices with SOC2 Type 2 standards, including access controls, data confidentiality, and availability monitoring. These efforts are part of a broader commitment to achieving robust compliance that aligns with the most rigorous healthcare standards in the U.S.

2. Current Security Practices in Place

Our infrastructure for [Product Name] functions as follows:

(Are there any additional access control details on the AWS side, such as IAM roles or AWS Shield, that could be mentioned here to add further clarity?)

3. Leveraging AWS for Compliance and Security

Our system is hosted entirely on AWS, which is certified for SOC2, SOC3, ISO27001, and HIPAA eligibility. This foundational infrastructure provides our baseline security, covering data encryption, access control, and incident response. These services are monitored and independently audited, ensuring that we meet industry standards for data security and compliance.