Live Status: Secure

Security & Trust Center

We are committed to protecting information with practical safeguards and transparent policies. Use the tabs below to review our overview, security controls, and privacy policy in our website’s theme.

Updated recently Contact Compliance

Overview

A quick snapshot of how we approach compliance, encryption, monitoring, and privacy in plain language.

HIPAA Aligned
TLS 1.2+ Encryption in transit
24/7 Monitoring
Need help understanding a policy? We’ll explain it in simple terms, just email us.
Email Compliance

Controls

Below is a structured list of key security controls. Expand each category to view the full set.

βœ“ Infrastructure security Open
Encryption key access restricted

Access to encryption keys is limited to authorized users with a business need.

βœ“
Unique account authentication enforced

Systems require unique usernames and authentication for access.

βœ“
Production application access restricted

Production access is restricted to authorized personnel only.

βœ“
Production database access restricted

Database access is limited based on role and reviewed periodically.

βœ“
Remote access encrypted enforced

Approved remote connections require encrypted transport.

βœ“
Log management utilized

Logging helps detect and investigate events that may impact security objectives.

βœ“
βœ“ Organizational security Open
Anti-malware technology utilized

Anti-malware protections are used on relevant systems where applicable.

βœ“
Code of Conduct acknowledged by employees

Employees acknowledge expected conduct and confidentiality standards.

βœ“
Password policy enforced

Password requirements are enforced to reduce account risk.

βœ“
Visitor procedures enforced

Visitor and access procedures are maintained where applicable.

βœ“
βœ“ Product security Open
Data encryption utilized

Appropriate safeguards are used to protect sensitive information.

βœ“
Control self-assessments conducted

Security controls are periodically reviewed and assessed.

βœ“
Data transmission encrypted

Transmission is encrypted using modern transport security (TLS 1.2+).

βœ“
βœ“ Internal security procedures Open
Continuity and Disaster Recovery plans established

Business continuity and recovery planning is maintained.

βœ“
Development lifecycle established

Development processes follow defined lifecycle practices.

βœ“
Management roles and responsibilities defined

Security ownership and responsibilities are clearly defined.

βœ“
Incident response policies established

Incident response procedures exist for handling security events.

βœ“
Security policies established and reviewed

Security policies are documented and reviewed periodically.

βœ“
βœ“ Data and privacy Open
Data retention procedures established

Retention and disposal practices are defined and followed.

βœ“
Data classification policy established

Data classification standards guide handling requirements.

βœ“
Have a controls question? Email compliance and we’ll respond quickly.
Email Compliance

Privacy Policy

This page is formatted for a long policy like your screenshot, clean typography, sticky table of contents, and section scrolling.

Privacy Statement: Your Privacy Rights

Replace the sample copy below with your exact policy text. The layout and typography will stay consistent.

1. Introduction

This Privacy Policy explains how Healthcare Solutions may collect, use, disclose, and safeguard information when you interact with our website and services.

2. Applicability

This policy applies to visitors, users, and others who access or use our website. It does not apply to third-party sites or services that may be linked from our pages.

3. Sources of personal information

  • Information you provide directly (forms, emails, phone calls).
  • Information collected automatically (device, browser, usage data).
  • Information from service providers assisting website operations.

4. Types of personal information we collect

  • Identifiers (name, email, phone number).
  • Contact and communication information.
  • Device and usage information (IP, browser type, pages visited).

5. How we use your information

  • Provide and improve website functionality and customer support.
  • Respond to inquiries and requests.
  • Maintain security and prevent fraud/abuse.

6. How we share information

We may share information with vendors and service providers who perform services on our behalf, subject to appropriate safeguards and only as needed to deliver those services.

7. Cookies & automatic collection

We may use cookies and similar technologies to understand usage, remember preferences, and improve performance. You can manage cookies through your browser settings.

8. Security & retention

We use reasonable administrative, technical, and physical safeguards designed to protect information. We retain information only as long as necessary for legitimate business or legal purposes.

9. Children’s privacy

Our website is not directed to children under 13 and we do not knowingly collect personal information from children.

10. Your rights

Depending on your location, you may have rights to access, correct, delete, or restrict certain processing of your personal information.

11. Contact

If you have privacy questions or requests, contact us at compliance@healthcaresolutions.net.

Tip: Paste your full policy text here section-by-section. This template keeps it clean, consistent, and easy to scroll.
Privacy question? Email our compliance team.
Email Compliance