Security & Regulatory Compliance
This page summarizes how we protect data and meet healthcare and regulatory expectations. It is written for a general audience and highlights the key safeguards you can expect.
1. Compliance Frameworks
1.1 SOC 2 Type II (Certified)
We are SOC 2 Type II certified, which means an independent auditor has verified that our controls operate effectively over time.
- What it covers: Security, availability, confidentiality, processing integrity, and privacy.
- What it means for you: You can expect consistent, audited controls for how we protect data.
- How we maintain it:
- Documented security policies and control mapping.
- Continuous monitoring and alerting (SIEM).
- Defined incident response process with clear responsibilities.
- Annual independent audits; report available under NDA upon request.
1.2 HIPAA (U.S. Healthcare Privacy)
HIPAA sets the baseline for protecting Protected Health Information (PHI).
- What it covers: Privacy, security safeguards, and breach notification requirements.
- What it means for you: Your PHI is handled with strict access controls, encryption, and monitoring.
- Key safeguards we use:
- Encryption for PHI at rest (AES-256) and in transit (TLS 1.2+).
- Role-based access control (RBAC) and least-privilege access.
- Regular risk assessments and staff security training.
1.3 21 CFR Part 11 (Electronic Records & Signatures)
This FDA regulation governs electronic records and signatures for clinical and medical device use.
- What it covers: System validation, audit trails, and secure electronic signatures.
- What it means for you: Records are tamper-evident and traceable.
- Key safeguards we use:
- Immutable, time-stamped audit logs.
- Formal software validation and change control.
- Multi-factor authentication (MFA) for sensitive access.
2. Summary of Controls & Certifications
| Standard | Status | Review Cadence | Examples of Controls |
|---|---|---|---|
| SOC 2 Type II | Certified | Annual | Monitoring, incident response, policies |
| HIPAA | Compliant program | Annual | Encryption, access control, logging, training |
| 21 CFR Part 11 | Validated processes | Annual | Audit trails, electronic signatures, validation |
3. Continuous Improvement
- Regular Audits & Assessments: Third-party audits and internal reviews validate our controls.
- Security Roadmap: Continuous improvements to encryption, identity, and threat detection.
- Training & Awareness: Quarterly security and compliance training for all employees.
- Maintenance/Change Window (EST): 12:00 AM – 4:00 AM (Sunday)
4. Contact & Documentation
- Request Full Reports:
- SOC 2 Type II Audit Report (available under NDA)
- HIPAA Security Risk Assessment summary
- 21 CFR Part 11 Risk Assessment summary
For any questions or requests for additional documentation, please reach out to Kerrick Cavanaugh (kerrick@neuropacs.com)
Last updated: February 11, 2026