Security Policy
We are very security conscious and we take this very seriously. We employ a number of industry standard best practices to protect this service and your data.
- We use trusted, secure, well respected Linux distributions (RedHat Enterprise Linux in this case).
- We keep our systems patched and up to date.
- We use firewalls proactively and use a whitelist approach for limited access/services.
- We host the service in an internal, protected computing environment.
- We do not keep decryption keys or credentials for passphrase-protected secrets.
HIPAA/PHI
This service was not designed or deployed with HIPAA considerations and does not meet the standards necessary for use with Protected Health Information. This tool is not to be used for any patient health data or any data covered under HIPAA regulations.