Security you cantrust

We understand just how important cyber security is in healthcare. That’s why we’ve done things differently.
Illustration d’un homme les bras croisés et d’une femme à côté de lui
Cyber security can be complex. We keep it simple: we don't
store PHI. That means no loopholes, vulnerabilities, or risks that could expose patient data—because there’s nothing to be exposed.
/ 01
We know industry standards
HIPAA is constantly changing. That’s why we stay up-to-date on HIPAA and its security and privacy requirements for you. In fact, as part of our community, we help you understand and navigate these changes.
Illustration d’une infirmière et d’un médecin sous les logos RGPD, HIPAA et AICPA SOC 2
/ 02
Patient visits are incognito
Patients don’t create accounts, logins, or any other trackable information. The only way patients can be identified is through the call by you, their provider. Since the call doesn’t store PHI, patients remain anonymous.
Illustration d’une personne en appel vidéo tenant une pancarte avec un point d’interrogation, avec le texte « Pas besoin de compte, de connexion ou de téléchargement de logiciel. »
/ 03
A BAA is arranged for you
Having a business associate agreement (BAA) with your telehealth platform is a HIPAA requirement. Because we keep track of the details in telehealth security, we provide a BAA, ready for you to sign.
Illustration d’une main signant un document intitulé « BAA ».
/ 04
Cyber security is routine for us
Keeping our systems and software secure is a continuous process. That’s why we have processes in place that prevent intruders. And since we’re immediately alerted when there are issues, we can act quickly.
Illustration de deux personnes regardant des icônes d’avertissement liées à Internet et au cloud.
Illustration d’une infirmière et d’un médecin sous les logos RGPD, HIPAA et AICPA SOC 2
What to expect from our security
Icône d’une personne dans un cadre avec un point d’exclamation, suggérant une alerte ou une attention liée à l’identification de l’utilisateur.
24/7 monitoring
With 24/7 monitoring, we can respond immediately to any security breach or suspicious activity.
Icône de deux bulles de dialogue contenant des astérisques, représentant des messages cachés ou chiffrés
True end-to-end encryption
All chat messages and video calls sent through doxy.me remain private.
Icône d’un cadenas et d’une clé
Single sign-on
For added security, you can enable single sign-on to protect access to your account.
Icône d’une étoile avec un badge de sécurité
Dedicated security team
We have an information security team that is focused on staying ahead of cybersecurity threats.
Icône d’un bouclier avec une coche à l’intérieur d’un cercle, représentant la protection ou la sécurité vérifiée.
Vulnerability scans
We proactively look for vulnerabilities, which reduces the risk of attacks.
Leading security standards—worldwide
HIPAA
HIPAA
We meet US standards for protecting patient health information.
AICPA SOC (System and Organization Controls)
SOC 2 (Type 2)
This industry standard report was issued by an independent auditor.
AICPA SOC (System and Organization Controls)
SOC 3
See this third-party security assessment.
Icône d’un cadenas contenant la silhouette de la Californie
CPRA
We meet the requirements of the California Privacy Rights Act.
GDPR
GDPR
We meet the EU’s standards for protecting European citizens’ data.