HIPAA-Ready Security

Security that's built in,
not bolted on.

Role-based access control, immutable audit logs, encrypted data at every layer, 2FA, HIPAA training modules, and entitlement-based feature gating — protecting patient data is foundational to everything we build.

AES-256 at RestTLS 1.2+ in TransitImmutable Audit LogsTwo-Factor Auth
Data Protection

Encryption at every layer

Patient data is protected with industry-standard encryption both at rest and in transit, with strict access controls ensuring only authorized users see what they need to see.

Encryption at Rest

All patient data, clinical records, and communications are encrypted with AES-256 in the database and file storage.


Encryption in Transit

All API calls, WebSocket connections, and file transfers use TLS 1.2+ with HSTS enforcement and certificate pinning.


Minimal PHI Exposure

Outbound SMS and email messages never include diagnosis codes, medication names, or other sensitive clinical data.


Access Control

4-tier role-based access control

Every API endpoint is protected by policy-based authorization. Users only see data appropriate to their role — patients see their own records, providers see their patients, admins manage their clinic.

Patient

Own records & appointments
Personal billing & payments
Secure messaging with care team
Shipment review & approval

Provider

Patient records across locations
E-prescribe & Rx queue
Appointment management
Clinical note authoring

Admin

Clinic-level user management
System settings & entitlements
Staff HIPAA training oversight
Billing & revenue reports

Super Admin

Multi-clinic management
Clinic provisioning & setup
Global entitlement control
Platform-wide audit logs

Authentication

Secure access, zero friction

Multiple authentication methods for different contexts — from traditional password + 2FA for staff to passwordless magic links for patient convenience.

Two-Factor Authentication

SMS-based 2FA with TOTP automatic fallback when SMS is unavailable — ensuring staff always have a secure second-factor option.


Magic Link Login

Passwordless authentication via signed, time-limited email links — ideal for patients who need quick portal access without password management.


Invitation-Based Onboarding

New patients and staff join via secure invitation links with role-adaptive registration, consent capture, and automatic clinic assignment.


Audit & Compliance

Immutable audit trail on every action

Every data access, modification, approval, and communication is time-stamped and stored in an immutable log — giving your practice complete regulatory traceability.

3-Layer Activity Logging

Automatic model-level logging for creates, updates, and deletes. Middleware-based logging for all PHI read access. Manual logging for custom clinical actions. No gaps.


HIPAA Training & Certification

7 built-in training modules for staff with progress tracking, pass/fail scoring, and completion certificates — ensuring compliance before accessing patient data.


What gets logged — automatically

  • Patient record views and edits
  • Prescription creation and approval
  • Appointment scheduling and changes
  • Billing record generation
  • Shipment status changes
  • Login attempts and session events
  • Role changes and permission updates
  • Message sent/delivered/read events
  • File uploads and document access
  • System setting modifications
Feature Gating

Only pay for what you use

Entitlement-based feature gating lets administrators enable or disable capabilities per clinic — telehealth, insurance, shipment tracking, and more — so your team only sees what's relevant.

Per-Clinic Toggles

Administrators control which features are active for each clinic. Disabled features are hidden from the UI entirely — no confusion, no accidental access.


Backend Enforcement

Feature gates are enforced at the API level — not just the UI. Disabled features return proper authorization errors even if accessed directly.


Scalable Configuration

Add new clinics with pre-configured entitlement profiles. As your practice grows, new locations inherit the right capabilities from day one.


Ready to see our security in action?

Schedule a security-focused demo and we'll walk you through access controls, audit logs, and compliance features.