Security you cantrust

We understand just how important cyber security is in healthcare. That’s why we’ve done things differently.
Ilustração de um homem com os braços cruzados e uma mulher ao lado dele
Cyber security can be complex. We keep it simple: we don't
store PHI. That means no loopholes, vulnerabilities, or risks that could expose patient data—because there’s nothing to be exposed.
/ 01
We know industry standards
HIPAA is constantly changing. That’s why we stay up-to-date on HIPAA and its security and privacy requirements for you. In fact, as part of our community, we help you understand and navigate these changes.
Ilustração de uma enfermeira e um médico abaixo dos logotipos GDPR, HIPAA e AICPA SOC 2
/ 02
Patient visits are incognito
Patients don’t create accounts, logins, or any other trackable information. The only way patients can be identified is through the call by you, their provider. Since the call doesn’t store PHI, patients remain anonymous.
Ilustração de uma pessoa em uma videochamada segurando um cartaz com um ponto de interrogação, com o texto “Não é necessário criar conta, fazer login ou baixar software.”
/ 03
A BAA is arranged for you
Having a business associate agreement (BAA) with your telehealth platform is a HIPAA requirement. Because we keep track of the details in telehealth security, we provide a BAA, ready for you to sign.
Ilustração de uma mão assinando um documento intitulado “BAA”.
/ 04
Cyber security is routine for us
Keeping our systems and software secure is a continuous process. That’s why we have processes in place that prevent intruders. And since we’re immediately alerted when there are issues, we can act quickly.
Ilustração de duas pessoas olhando para ícones de aviso relacionados à internet e à nuvem.
Ilustração de uma enfermeira e um médico abaixo dos logotipos GDPR, HIPAA e AICPA SOC 2
What to expect from our security
Ícone de uma pessoa dentro de uma moldura com um ponto de exclamação, indicando um alerta ou atenção relacionada à identificação do usuário.
24/7 monitoring
With 24/7 monitoring, we can respond immediately to any security breach or suspicious activity.
Ícone de dois balões de fala com asteriscos, representando mensagens ocultas ou criptografadas
True end-to-end encryption
All chat messages and video calls sent through doxy.me remain private.
Ícone de um cadeado e uma chave
Single sign-on
For added security, you can enable single sign-on to protect access to your account.
Ícone de um escudo com um sinal de verificação dentro de um círculo, representando proteção ou segurança verificada.
Dedicated security team
We have an information security team that is focused on staying ahead of cybersecurity threats.
Ícone de um escudo com um sinal de verificação dentro de um círculo, representando proteção ou segurança verificada.
Vulnerability scans
We proactively look for vulnerabilities, which reduces the risk of attacks.
Leading security standards—worldwide
HIPAA
HIPAA
We meet US standards for protecting patient health information.
AICPA SOC (System and Organization Controls)
SOC 2 (Type 2)
This industry standard report was issued by an independent auditor.
AICPA SOC (System and Organization Controls)
SOC 3
See this third-party security assessment.
Ícone de um cadeado contendo o contorno do estado da Califórnia
CPRA
We meet the requirements of the California Privacy Rights Act.
GDPR
GDPR
We meet the EU’s standards for protecting European citizens’ data.