Org Logo

Compliances (1)

Compliance Logo

HIPAA

Compliant

Controls

Continuously monitored

Product security (2)

Situational Awareness For Incidents

Notification of changes

Data security (14)

Identity Validation

Termination of Employment

Production Databases Access Restriction

Network security (8)

Impact analysis

Limit Network Connections

External System Connections

App security (4)

Secure system modification

Approval of Changes

Unauthorized Activities

Endpoint security (5)

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Corporate security (33)

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Resources (37)

Access Control Policy

Acceptable Usage Policy

Asset Management Policy

Subprocessors (4)

Subprocessor Logo

Google Workspace

IAM providers

Subprocessor Logo

Slack

Collaboration & Productivity

Subprocessor Logo

GCP

IT infrastructure

Subprocessor Logo

Twilio

United States of America

Customer Service