Security

Your security is our number one priority. We use the latest technologies to ensure that your data is always safe.

Authentication

Our military-grade authentication system ensures only authorized access to information and records. We also include secure auditing, logging, and monitoring.

Encryption

Our industry leading 256-bit SSL data encryption creates a secure SSL tunnel through our proxy. All information is encrypted throughout transit and storage.

No Local Storage

Information in our application is never stored on the local device. It is transmitted to our secure encrypted redundant and HIPAA-compliant cloud data storage.

General Security Practices

Protected and Private Cloud

Each organization’s data is completely segmented from all other organizations using our services. Access is allowed only through properly authenticated channels. Our cloud environment provides you with:

Data Redundancy

Our secure environment includes regional redundancy across North America to protect your data. We store all data, including audit logs, securely for seven (7) years.

Complete Audit Trails

We maintain a complete audit trail of all activities in the system, including user information, timestamps, and all actions taken. The centralized logging solution is designed to monitor activity and actions that occur within the environment. In addition, we keep detailed logs of each organ donation, procurement, and transplant for internal recordkeeping and auditing.

Still have questions?

We want to make sure you feel comfortable with our security, and are happy to discuss in more detail.
Send us a note and we can arrange a time to dive into our infrastructure and security practices.

Menu