Loading...

Security

Protecting your data with enterprise-grade security and compliance

HIPAA Compliant

Full BAA Available

AES-256 Encryption

Data at Rest & Transit

SOC 2 Type II

In Progress

Security Overview

At NoteIQ, security is not just a feature—it's the foundation of everything we build. We understand that healthcare organizations trust us with their most sensitive data, and we take that responsibility seriously.

Our security program is built on industry best practices, continuous monitoring, and a commitment to transparency. We maintain comprehensive security controls across infrastructure, application, and organizational levels.

Compliance & Certifications

HIPAA Compliance

NoteIQ is fully compliant with the Health Insurance Portability and Accountability Act (HIPAA). We implement all required administrative, physical, and technical safeguards to protect Protected Health Information (PHI).

Business Associate Agreements (BAA) available for all healthcare customers

SOC 2 Type II

We are actively working toward SOC 2 Type II certification, demonstrating our commitment to security, availability, processing integrity, confidentiality, and privacy.

GDPR Ready

Our platform includes features to help you comply with GDPR requirements, including data portability, right to erasure, and consent management.

Data Protection

Encryption

  • In Transit: TLS 1.3 encryption for all data transmission
  • At Rest: AES-256 encryption for all stored data
  • Backups: Encrypted backups with separate encryption keys
  • Database: Encrypted database volumes with key rotation

Access Controls

  • Multi-Factor Authentication (MFA): Required for all user accounts
  • Role-Based Access Control (RBAC): Granular permissions based on job function
  • Session Management: Automatic timeout and secure session handling
  • Password Policies: Strong password requirements and regular rotation

Data Isolation

  • Complete logical separation between customer data
  • Practice-level data segregation within the platform
  • No data sharing between organizations without explicit authorization

Infrastructure Security

Cloud Infrastructure

NoteIQ is hosted on enterprise-grade cloud infrastructure with:

  • 99.9% uptime SLA with redundant systems
  • Automated failover and disaster recovery
  • DDoS protection and traffic filtering
  • Regular security patches and updates
  • Network segmentation and firewall rules

Data Centers

  • SOC 2 Type II certified data centers
  • Physical security controls (biometric access, 24/7 surveillance)
  • Environmental controls (temperature, humidity, fire suppression)
  • Geographic redundancy for disaster recovery

Monitoring & Auditing

Security Monitoring

  • 24/7 Monitoring: Continuous monitoring for security threats and anomalies
  • Intrusion Detection: Real-time alerting for suspicious activity
  • Log Management: Centralized logging with retention and analysis
  • Threat Intelligence: Integration with global threat intelligence feeds

Audit Logs

Comprehensive audit logging includes:

  • User authentication and access events
  • Data access and modifications (who, what, when)
  • Administrative actions and configuration changes
  • System events and security incidents
  • 6-year retention for HIPAA compliance

Backup & Disaster Recovery

Automated Backups

  • Frequency: Automated backups every 6 hours
  • Retention: 30-day rolling backup retention
  • Encryption: All backups encrypted with separate keys
  • Testing: Regular backup restoration testing

Disaster Recovery

  • RTO (Recovery Time Objective): 4 hours
  • RPO (Recovery Point Objective): 1 hour
  • Geographic Redundancy: Data replicated across multiple regions
  • Failover: Automated failover to backup systems

Application Security

Secure Development

  • Secure coding practices and code reviews
  • Automated vulnerability scanning in CI/CD pipeline
  • Dependency management and updates
  • Regular penetration testing by third-party security firms

Web Application Security

  • Protection against OWASP Top 10 vulnerabilities
  • Input validation and sanitization
  • CSRF and XSS protection
  • SQL injection prevention
  • Rate limiting and DDoS protection

Incident Response

We maintain a comprehensive incident response plan that includes:

  • Detection: 24/7 monitoring and automated alerting
  • Response: Defined escalation procedures and response team
  • Communication: Timely notification to affected customers
  • Resolution: Rapid containment and remediation
  • Post-Incident: Root cause analysis and preventive measures

Report a Security Issue: If you discover a security vulnerability, please report it immediately to security@noteiq.pro. We take all reports seriously and will respond within 24 hours.

Employee Security

Access Management

  • Background checks for all employees with data access
  • Principle of least privilege (minimal necessary access)
  • Regular access reviews and revocation procedures
  • Immediate access termination upon employee departure

Training & Awareness

  • Mandatory security training for all employees
  • Annual HIPAA compliance training
  • Phishing awareness and testing
  • Secure handling of sensitive data

Third-Party Security

We carefully vet all third-party vendors and service providers:

  • Security assessments and due diligence reviews
  • Business Associate Agreements (BAA) where applicable
  • Regular security audits of vendors
  • Contractual security and privacy requirements
  • Vendor risk management program

Your Responsibilities

Security is a shared responsibility. To keep your account secure:

  • Use strong, unique passwords and enable MFA
  • Never share your login credentials
  • Keep your devices and software up to date
  • Be cautious of phishing attempts
  • Report suspicious activity immediately
  • Train your staff on security best practices
  • Follow your organization's security policies

Contact Security Team

For security inquiries or to report security issues:

NoteIQ Security Team

Security Issues: security@noteiq.pro

General Support: support@noteiq.pro

We respond to security reports within 24 hours and provide regular updates throughout the resolution process.