Security and Privacy

Full HIPAA Compliance

HIPAA Security Rule Entity

We maintain all four e-PHI requirements with state-of-the-art measures. Using robust security measures, including encryption, authentication, and data lifecycle management, we ensure compliance with all HIPAA regulations.

Authentication and Token Management

User authentication is managed through JSON Web Tokens (JWT), which are encrypted and signed with a secret key, making them secure and tamper-proof. The tokens are also hashed before being stored, adding another layer of security.

Data Encryption

All sensitive data, whether stored in the database or in transit between client and server, is encrypted. This ensures that even if the data is accessed by unauthorized users, it remains unreadable and secure.

Data Lifecycle Management

The system handles data securely by encrypting it on the client side and deleting it when no longer needed. Additionally, user data is automatically deleted after 30 days, reducing the risk of exposure.

Server Security

Sensitive information, such as database connection details and JWT secrets, is stored in environment variables, keeping them separate from the codebase. This reduces the risk of accidental data exposure

Database Security

The database is secured with access controls that only allow authorized services to connect, and schema validation is enforced to maintain data integrity, ensuring that the data is stored and accessed securely.