Coachier
Privacy Policy Terms of Service HIPAA Security

Security

Learn about our comprehensive security measures to protect your data and your clients' information.

Last Updated: January 15, 2024

1. Security Overview

Security is at the core of everything we do at Coachier. We implement multiple layers of security controls to protect your data and ensure the confidentiality, integrity, and availability of our platform.

Certifications: SOC 2 Type II, HIPAA Compliant, ISO 27001, GDPR Ready

2. Data Encryption

2.1 Encryption at Rest

  • Algorithm: AES-256 (Advanced Encryption Standard)
  • Scope: All databases, file storage, and backups
  • Key Management: AWS Key Management Service (KMS) with automated rotation
  • Field-Level Encryption: Additional encryption for sensitive PHI fields

2.2 Encryption in Transit

  • Protocol: TLS 1.3 (Transport Layer Security)
  • Certificates: Extended Validation (EV) SSL certificates
  • Perfect Forward Secrecy: Enabled for all connections
  • HSTS: HTTP Strict Transport Security enforced

2.3 End-to-End Encryption

  • Secure messaging with end-to-end encryption
  • Encrypted file uploads and downloads
  • Client data encrypted before leaving your device

3. Infrastructure Security

3.1 Cloud Infrastructure

Coachier is hosted on Amazon Web Services (AWS), leveraging enterprise-grade security:

  • Data Centers: SOC 1/2/3, ISO 27001 certified facilities
  • Geographic Distribution: Multi-region architecture for redundancy
  • Physical Security: 24/7 monitoring, biometric access, video surveillance
  • Environmental Controls: Fire suppression, climate control, power redundancy

3.2 Network Security

  • Firewalls: Multiple layers of firewall protection
  • DDoS Protection: AWS Shield and CloudFlare protection
  • Intrusion Detection: Real-time monitoring and alerting
  • Network Segmentation: Isolated networks for different components
  • VPC: Private cloud network with strict access controls

3.3 Server Security

  • Hardened operating systems with minimal attack surface
  • Automated security patching within 48 hours of release
  • No direct SSH access to production servers
  • Bastion hosts for administrative access
  • All changes tracked and audited

4. Application Security

4.1 Secure Development

  • SDLC: Security integrated into Software Development Lifecycle
  • Code Reviews: Mandatory security-focused code reviews
  • Static Analysis: Automated code scanning for vulnerabilities
  • Dependency Scanning: Regular checks for vulnerable libraries
  • Security Training: Developers trained in secure coding practices

4.2 Vulnerability Management

  • Scanning: Weekly automated vulnerability scans
  • Penetration Testing: Quarterly third-party pen tests
  • Bug Bounty: Responsible disclosure program
  • Patching: Critical vulnerabilities patched within 24 hours
  • Remediation: Risk-based prioritization and tracking

4.3 Secure APIs

  • OAuth 2.0 and JWT authentication
  • Rate limiting and throttling
  • Input validation and sanitization
  • CORS (Cross-Origin Resource Sharing) policies
  • API versioning and deprecation procedures

5. Access Controls

5.1 Authentication

  • Password Requirements:
    • Minimum 12 characters
    • Mix of uppercase, lowercase, numbers, symbols
    • No common or breached passwords
    • 90-day expiration for administrative accounts
  • Multi-Factor Authentication (MFA):
    • Available for all accounts
    • Required for administrative access
    • TOTP (Time-based One-Time Password) support
    • Biometric authentication (fingerprint, Face ID)
  • Single Sign-On (SSO):
    • SAML 2.0 support for enterprise customers
    • Integration with major identity providers

5.2 Authorization

  • Role-Based Access Control (RBAC):
    • Predefined roles: Admin, Practitioner, Staff, Client
    • Granular permissions for each role
    • Custom roles for enterprise accounts
  • Principle of Least Privilege:
    • Users granted minimum necessary access
    • Regular access reviews and audits
    • Automatic revocation of inactive accounts

5.3 Session Management

  • Secure session token generation
  • 15-minute inactivity timeout
  • Session invalidation on logout
  • Single active session per user (optional)
  • Device fingerprinting for anomaly detection

6. Data Protection

6.1 Data Classification

Classification Examples Protection Level
Critical (PHI) Client health records, session notes Highest - Encrypted, audited, restricted access
Confidential Account credentials, payment info High - Encrypted, access controlled
Internal Business data, usage analytics Medium - Access controlled
Public Marketing materials, documentation Standard - Integrity checks

6.2 Data Backup

  • Frequency: Automated daily backups
  • Retention: 90-day retention period
  • Encryption: All backups encrypted at rest
  • Geographic Redundancy: Multiple backup locations
  • Testing: Monthly backup restoration tests
  • Offsite Storage: Air-gapped offline backups

6.3 Data Residency

  • All PHI stored exclusively in US data centers
  • Compliance with US data protection laws
  • No international data transfers for PHI
  • Customer choice for data center region (enterprise)

7. Monitoring and Logging

7.1 Security Monitoring

  • 24/7 Monitoring: Round-the-clock security operations center
  • SIEM: Security Information and Event Management system
  • Threat Intelligence: Real-time threat feeds and analysis
  • Anomaly Detection: AI-powered behavior analysis
  • Alert Response: Automated and manual incident response

7.2 Audit Logging

  • What We Log:
    • User authentication events (login, logout, failed attempts)
    • Data access and modifications
    • Permission changes
    • Administrative actions
    • API requests
    • System configuration changes
  • Log Protection:
    • Tamper-proof logging
    • Encrypted log storage
    • Centralized log management
    • 6-year retention for HIPAA compliance

7.3 User Audit Trails

Account administrators can view detailed audit reports showing:

  • Who accessed what data
  • When access occurred
  • From which location/device
  • What actions were performed
  • Any changes made to records

8. Incident Response

8.1 Incident Response Plan

Our comprehensive incident response plan includes:

  • Detection: Automated alerts and 24/7 monitoring
  • Triage: Rapid assessment and classification
  • Containment: Immediate actions to limit impact
  • Eradication: Removal of threat and vulnerabilities
  • Recovery: Restoration of normal operations
  • Lessons Learned: Post-incident review and improvements

8.2 Security Incident Team

  • Dedicated incident response team
  • 24/7 on-call security personnel
  • Defined escalation procedures
  • Regular incident response drills

8.3 Breach Notification

  • Affected customers notified within 24 hours
  • Detailed incident reports provided
  • Assistance with regulatory notification requirements
  • Remediation actions clearly communicated

9. Business Continuity

9.1 High Availability

  • Uptime SLA: 99.9% availability guarantee
  • Redundancy: No single point of failure
  • Load Balancing: Automatic traffic distribution
  • Auto-Scaling: Dynamic resource allocation
  • Health Checks: Continuous system monitoring

9.2 Disaster Recovery

  • RTO (Recovery Time Objective): 4 hours
  • RPO (Recovery Point Objective): 1 hour
  • Failover: Automatic failover to backup systems
  • Geographic Distribution: Multi-region architecture
  • Testing: Quarterly disaster recovery drills

9.3 Maintenance Windows

  • Scheduled maintenance during low-usage periods
  • Advance notification (minimum 7 days)
  • Rolling deployments to minimize downtime
  • Emergency maintenance procedures for critical issues

10. Third-Party Security

10.1 Vendor Management

  • Due Diligence: Security assessment before onboarding
  • Contracts: Security requirements in all vendor agreements
  • BAAs: Business Associate Agreements for PHI access
  • Regular Reviews: Annual security reassessments
  • Limited Access: Minimum necessary principle enforced

10.2 Trusted Partners

  • AWS (Cloud Hosting): SOC 1/2/3, ISO 27001, HIPAA
  • Stripe (Payments): PCI DSS Level 1 certified
  • SendGrid (Email): SOC 2 Type II certified
  • Cloudflare (CDN/Security): ISO 27001 certified

11. Security Training and Awareness

11.1 Employee Training

  • Mandatory security training for all new hires
  • Annual refresher training for all employees
  • Role-specific security training
  • HIPAA compliance training
  • Phishing awareness training
  • Incident response training

11.2 Security Culture

  • Security-first mindset across organization
  • Regular security updates and communications
  • Rewards for identifying security issues
  • Clear reporting channels for concerns

12. Compliance and Certifications

12.1 Current Certifications

  • SOC 2 Type II: Security, availability, confidentiality
  • HIPAA: Full compliance with Privacy and Security Rules
  • ISO 27001: Information security management
  • GDPR: EU data protection compliance
  • CCPA: California privacy law compliance

12.2 Regular Audits

  • Annual SOC 2 audits by independent auditors
  • Quarterly security assessments
  • Monthly vulnerability scans
  • Penetration testing every 3 months
  • Continuous compliance monitoring

13. User Security Best Practices

We recommend the following security practices for all users:

13.1 Account Security

  • Use a strong, unique password (12+ characters)
  • Enable two-factor authentication (2FA)
  • Never share your password
  • Use a password manager
  • Log out when finished
  • Review account activity regularly

13.2 Device Security

  • Keep devices and software updated
  • Use antivirus software
  • Lock your screen when away
  • Use encrypted Wi-Fi connections
  • Avoid public computers for sensitive data
  • Enable device encryption

13.3 Data Handling

  • Only access client data when necessary
  • Don't download sensitive data unnecessarily
  • Securely delete downloaded files
  • Use secure file sharing methods
  • Follow your organization's policies

14. Reporting Security Issues

14.1 Responsible Disclosure

We welcome reports of security vulnerabilities. If you discover a security issue:

  • Email: security@coachier.com
  • PGP Key: Available on request for encrypted communication
  • Response Time: We respond within 24 hours
  • Recognition: Credit in our security hall of fame

14.2 Bug Bounty Program

We operate a private bug bounty program for qualified security researchers. Contact security@coachier.com for details.

14.3 What to Include

  • Detailed description of the vulnerability
  • Steps to reproduce the issue
  • Potential impact assessment
  • Any proof-of-concept code
  • Your contact information

15. Security Contact Information

For security-related questions or to report incidents:

  • Security Team: security@coachier.com (24/7 monitored)
  • HIPAA Inquiries: hipaa@coachier.com
  • Privacy Questions: privacy@coachier.com
  • General Support: support@coachier.com
  • Phone: +1 (888) 555-CARE
Security is Our Priority: We invest heavily in security to protect your data. Our dedicated security team works 24/7 to keep your information safe.

© 2024 Coachier Platform. All rights reserved.

Privacy Terms Security