Usage Terms

Overview

Defines guidelines for using our services, ensuring compliance & protecting both parties.

DPA (Data Processing Agreement)

Outlines how data is processed, ensuring compliance with privacy regulations and safeguarding client data.

Privacy Policy

Details how we collect, use & protect your personal information for transparency & compliance.

Cookies Policy

Explains our use of cookies to enhance user experience, data collection and usage.

Our Controls

Here are one-liners for each implemented control, highlighting their objectives and benefits to clients or prospects:

People Controls

Identity Verification

Ensures verified and trusted personnel, enhancing security and reducing risk.

Background Checks

Provides confidence that all staff have been thoroughly vetted for trustworthiness.

Legal Contractual Bindings in the Country of Origin

Guarantees adherence to local legal standards, ensuring compliance and security.

Coordination Assistance / Dedicated Accounts Manager

Streamlines communication, ensuring smooth operations and personalized support.

Payment Protection (as per contract)

Safeguards financial transactions, providing peace of mind with secure payment terms.

HR Training for Enhancement of Cyber Hygiene

Enhances staff awareness, ensuring high standards of cybersecurity and data protection.

Physical Controls

Dedicated – Fully Equipped Workspace

Ensures a professional and secure environment for remote work, fostering productivity.

Power/Network Backups

Minimizes downtime, ensuring continuity in case of power or network failures.

24/7 Surveillance and On-site Security

Enhances physical security, safeguarding facilities and equipment around the clock.

Tiered Access Control

Restricts physical access to sensitive areas, ensuring protection from unauthorized access.

Environmental Hazards Protection

Mitigates risks from environmental threats, ensuring a safe and secure work environment.

Technological Controls

Cloud and Application Security

Secures cloud infrastructure and applications, protecting client data from threats.

Single Sign-On

Simplifies and secures user access, improving ease of use and reducing security risks.

Multi-Factor Authentication

Strengthens security by requiring multiple forms of verification for system access.

Role-Based Access Control

Limits access based on roles, ensuring sensitive data is only available to authorized users.

Secure Tenant Segregation

Ensures data isolation in multi-tenant environments, preventing unauthorized access.

Password Management Implementation

Secures credentials, reducing the risk of unauthorized access due to weak or reused passwords.

Secure Software Development Lifecycle

Change Management

Minimizes disruption and security risks by controlling and tracking system changes.

Security By Design Architecture

Incorporates security measures from the start, ensuring secure systems by default.

Code Reviews

Ensures software integrity and security by identifying and resolving potential vulnerabilities early.

Vulnerability and Patch Management

Keeps systems secure by proactively identifying and addressing vulnerabilities.

Vulnerability Assessment and Penetration Testing Programs

Identifies weaknesses in systems to prevent potential attacks and breaches.

Web Application Firewall

Protects web applications from malicious traffic, enhancing cybersecurity.

Intrusion Detection and Prevention System (IDS/IPS)

Monitors and blocks unauthorized access attempts, preventing potential threats.

Responsible Disclosure (Internal and External)

Promotes transparency and prompt resolution of security vulnerabilities through responsible reporting.

Security Audit and Risk Assessment

Provides comprehensive insights into security posture, ensuring vulnerabilities are identified and addressed.

 

Data Controls

Managed Backups with Recurring Verifications

Ensures data is securely backed up and can be quickly restored, minimizing potential data loss.

Encryption at Rest

Protects stored data, ensuring it is encrypted and secure from unauthorized access.

Encryption in Transit

Safeguards data during transmission, ensuring privacy and protection from interception.

Secure Data Sharing

Ensures safe and compliant sharing of sensitive data with authorized parties only.

Network Security

Secures networks from unauthorized access, ensuring safe communication and data transfers.

Web Filtering

Prevents access to malicious sites, enhancing security and reducing risks.

Host-Based and Tiered Network Firewall

Secures networks and endpoints from external threats, maintaining a strong defense perimeter.

Zero-Trust VPN

Ensures secure access to networks, requiring verification at every access point.

 

Endpoint Security

End Detection and Response (EDR)

Detects and responds to potential threats at the endpoint level, minimizing risk.

Anti-Virus/Anti-Malware Protection

Protects devices from malware and viruses, preventing data compromise and disruptions.

Full Disk Encryption

Ensures all stored data is encrypted, protecting it in case of device theft or loss.

Mobile Device Management

Secures mobile devices, ensuring compliance and safeguarding sensitive data on the go.

CIS Benchmark-Based Hardening

Implements industry standards to securely configure systems, reducing vulnerabilities.

Secure Disposal of Hardware and Media

Ensures proper destruction of sensitive data when hardware or media is no longer needed.

 

Cloud Infrastructure

Our Cloud Platform

We leverage Amazon Web Services’ secure and scalable cloud infrastructure to protect client data.

Business Continuity and Disaster Recovery Plans

Ensures rapid recovery and minimal disruption in case of unforeseen events or disasters.

Multi-Environment with Isolated Production Environment

Enhances security and performance by isolating production environments from other systems.

Security Operations Center

Security Information and Events Management (SIEM) Implementation

Provides real-time monitoring and threat detection, enabling proactive security management.

Enhanced Metrics Capture and Logging

Improves visibility into system activity, helping identify and respond to security incidents.

24/7 Monitoring

Ensures continuous oversight of systems, identifying and responding to threats at all times.

Information Security Incident Response Management and Plan

Establishes a clear protocol for managing and resolving security incidents efficiently.

Performance Monitoring

Tracks system performance to identify and address issues before they affect security.

 

HIPAA Controls

Business Associate Agreements

Ensures compliance with HIPAA by setting clear data handling expectations with partners.

ePHI Handling Policy for Users and Facilities

Protects electronic patient information by ensuring proper handling, storage, and access control.