GDPR • HIPAA • SOC 2 Compliant

Security & Privacy by Design

Your data security and client privacy aren't just features – they're the foundation of everything we build. Learn how we protect sensitive therapy information.

Enterprise-Grade Security

Built with healthcare data protection in mind

End-to-End Encryption

All data is encrypted in transit and at rest using AES-256 encryption. Messages, files, and personal information are protected with industry-standard cryptography.

  • • TLS 1.3 for data in transit
  • • AES-256 encryption at rest
  • • Regular key rotation
Access Controls

Role-based access control ensures only authorized users can access specific data. Multi-factor authentication adds an extra layer of security.

  • • Multi-factor authentication (MFA)
  • • Role-based permissions
  • • Session management
Privacy by Design

Data minimization principles ensure we only collect what's necessary. Users control their data sharing preferences and can export or delete their information.

  • • Minimal data collection
  • • User data control
  • • Right to be forgotten
Infrastructure Security

Our infrastructure is hosted on certified cloud providers with 99.9% uptime SLA. Regular security audits and penetration testing ensure system integrity.

  • • SOC 2 Type II certified hosting
  • • Regular security audits
  • • Automated backup systems
Compliance Standards

We maintain compliance with healthcare and data protection regulations across multiple jurisdictions to ensure your organization meets its obligations.

  • • GDPR compliant
  • • HIPAA ready
  • • ISO 27001 aligned
Content Moderation

AI-powered content screening combined with human oversight helps maintain safe spaces while respecting therapeutic confidentiality.

  • • Crisis detection alerts
  • • Inappropriate content filtering
  • • Therapist oversight tools

Regulatory Compliance

Meeting the highest standards for healthcare data protection

GDPR Compliance

Full compliance with the General Data Protection Regulation for our European users, including:

  • • Lawful basis for data processing
  • • Data subject rights (access, rectification, erasure)
  • • Data Protection Impact Assessments
  • • Breach notification procedures
  • • Data Protection Officer oversight
HIPAA Ready

Built to support HIPAA compliance for US healthcare organizations, featuring:

  • • Administrative safeguards
  • • Physical safeguards
  • • Technical safeguards
  • • Business Associate Agreements (BAA)
  • • Audit logging and monitoring

Our Security Practices

Continuous improvement in security and privacy protection

1

Regular Security Audits

Third-party security assessments and penetration testing performed quarterly to identify and address potential vulnerabilities.

2

Employee Training

All team members undergo comprehensive security and privacy training, with regular updates on best practices and emerging threats.

3

Incident Response

Comprehensive incident response plan with defined procedures for security breaches, including user notification and remediation steps.

4

Continuous Monitoring

24/7 monitoring of our systems with automated threat detection and response capabilities to ensure rapid identification of security issues.

Questions About Security?

Our security team is here to answer your questions and provide additional documentation for your compliance needs.