Rest assured, your data is in good hands
Privacy, Security, & HIPPA Best Practices

We pay for top of the line database management, perform routine audits, and maintain HIPPA best practices

Database Security

  • Our database is hosted on the HIPPA Compliant Amazon Web Services (AWS) cloud servers
  • Your data is protected with preconfigured security features for authentication, authorization, & encryption.
  • Nightly snapshots create a database backup
  • Data is encrypted at rest at the disk level
  • End-to-End Encryption (TLS)
  • Client-side field-level encryption
  • Always-on authentication
  • Monitoring and alerting
  • Database backups are automatic, on a consistent schedule and retention cycle
Best Practises & Standards

  • We use the elliptic curve digital signature algorithm (ECDSA) (256 Bit) related to cryptography operations
  • Transmitted data is encrypted using strong TLS ciphers
  • Security patching is performed on a routine basis
  • Internal audits are performed on a schedule
  • HIPPA best practices guided the development of our application
  • A source of truth, granting and limiting access and permissions across your company's data is key to maintaining PHI security
  • Access to the application is granted to one super user, and access levels are granted via super user authority
  • Super user has access to remove and add users, set permissions and view who has logged into their company application in real time
  • Permissions and restrictions are granted on a per user basis
  • Timed automatic logout sessions
These are some of our security features, but not all-encompassing.

Terms-Of-Use

Terms-Of-Service

Privacy Policy

Security

Demo@ecoverysoftware.com


A LUCID LOOP Product © 2022 - Boutique software, BIG solutions