The following policies are available upon request for enterprise customers, auditors, partners, and others who need them for compliance or security review.
Policies
Breach Notification Policy
How we identify, assess, and respond to breaches of unsecured PHI, including notification procedures.Vendor Management Policy
How we manage vendors that process PHI, including Business Associate Agreements (BAAs).Information Security Policy
Our administrative, physical, and technical safeguards for protecting PHI and other sensitive data.Data Protection Policy
Our approach to data retention, disposal, minimum necessary use, and protection of PHI.
How to Request
To request a copy of any of these policies, please contact us:
Email:
Subject line:
βPolicy request β [policy name]
We will respond with the requested policy (or policies) in a timely manner.
