Trust & Compliance

Security You Can Trust

EHealthVoice AI from EHealthMed is built from the ground up for healthcare compliance. Review our security practices, download our policies, and execute your Business Associate Agreement.

HIPAA Compliant

Full Security Rule compliance

SOC 2 Ready

Controls aligned with SOC 2 criteria

AES-256 Encryption

Data at rest & in transit

99.9% Uptime SLA

High availability infrastructure

HIPAA Policy Library

Comprehensive policies governing the protection of electronic Protected Health Information (ePHI)

7 Documents

HIPAA Security Policy

Comprehensive security policy governing the protection of electronic Protected Health Information (ePHI) within the EHealthVoice AI platform, in accordance with the HIPAA Security Rule (45 CFR Part 164, Subpart C).

v2.0Updated 2026-03-01

Breach Notification Policy

Policy governing the identification, investigation, and notification procedures for breaches of unsecured Protected Health Information, in compliance with the HIPAA Breach Notification Rule (45 CFR §§164.400-414).

v2.0Updated 2026-03-01

Risk Assessment Summary

Summary of the annual risk assessment conducted to identify threats and vulnerabilities to electronic Protected Health Information (ePHI) and evaluate the effectiveness of current security measures.

v2.0Updated 2026-03-01

Workforce Training Policy

Policy establishing the requirements for HIPAA security and privacy awareness training for all EHealthVoice AI workforce members.

v2.0Updated 2026-03-01

Data Flow Diagram

Documentation of all data flows involving Protected Health Information (PHI) within the EHealthVoice AI platform, including data collection, processing, storage, transmission, and disposal.

v2.0Updated 2026-03-01

Minimum Necessary Policy

Policy implementing the HIPAA Minimum Necessary Standard, ensuring that access to and disclosure of Protected Health Information is limited to the minimum amount necessary to accomplish the intended purpose.

v2.0Updated 2026-03-01

Audit Log Policy

Policy governing the creation, maintenance, review, and retention of audit logs for all system activities involving Protected Health Information.

v2.0Updated 2026-03-01

Sub-processors

Third-party services that may process Protected Health Information on behalf of EHealthVoice AI. All sub-processors have executed Business Associate Agreements.

Cloud Infrastructure Provider

Application hosting, database, and storage

BAASOC 2

Twilio

Voice calls, phone numbers, and SMS messaging

BAASOC 2

Stripe

Payment processing (no PHI transmitted)

SOC 2

EHR Vendors (via FHIR)

Clinical data exchange per patient authorization

BAASOC 2

SOC 2 Certification Status

EHealthVoice AI has implemented security controls aligned with all five SOC 2 Trust Service Criteria (Security, Availability, Processing Integrity, Confidentiality, and Privacy). Our controls matrix documents 28 specific controls with their technical implementations.

We are currently in the process of engaging an independent CPA firm to conduct a formal SOC 2 Type I audit, which will verify our control design at a point in time. Following successful Type I attestation, we plan to pursue SOC 2 Type II certification, which evaluates control effectiveness over a sustained observation period (6-12 months).

28 Controls ImplementedType I Audit — In ProgressType II Audit — Planned

Questions About Our Security?

Our compliance team is available to answer questions, provide additional documentation, or schedule a security review call.