Skip to main content
Compliance

HIPAA Compliance Guide

Security requirements and compliance guidelines for handling protected health information (PHI).

HIPAA Compliant Infrastructure

Our healthcare APIs are built on HIPAA-compliant infrastructure with Business Associate Agreements (BAA) available for all healthcare clients.

SOC 2 Type IIHITRUST CSFBAA Available

Security Controls

ControlDescriptionStatus
Encryption at RestAES-256 encryption for all stored PHIRequired
Encryption in TransitTLS 1.3 for all API communicationsRequired
Access LoggingComplete audit trail of PHI accessRequired
Multi-Factor AuthMFA for all user accountsRequired
Role-Based AccessGranular permission controlsRequired
Session TimeoutAutomatic logout after inactivityRequired

PHI Handling Requirements

Data Minimization

Only request and store PHI that is necessary for the intended purpose

Audit Logging

All PHI access is logged with user, timestamp, and action details

Data Residency

PHI is stored in US-based data centers with geographic controls

Breach Response

24-hour breach notification with incident response procedures

Next Steps