Security & Compliance at TransDyne
At TransDyne, safeguarding clinical and patient data is our highest priority. We implement industry-leading security measures and follow rigorous processes to ensure the confidentiality, integrity, and availability of all sensitive information.
Key Security Controls
Infrastructure & Network Security
- Our services are hosted in a resilient, multi-region cloud environment to ensure high availability and fault tolerance.
- All operations run within private, segmented networks with strict access controls limiting connectivity to authorized endpoints only.
- All inbound and outbound communications are encrypted with TLS 1.2 or higher.
Data Protection & Retention
- Data is encrypted at rest and in transit using robust encryption standards.
- Automated data retention policies ensure that data—including protected health information (PHI) and recordings—is securely deleted when no longer needed.
- Backup and storage systems follow the same stringent encryption and access controls.
Identity & Access Management
- Centralized authentication with optional single sign-on (SSO) minimizes credential sprawl.
- Role-based access and least-privilege principles govern all user and service permissions.
- Regular reviews and automated checks detect and remove unnecessary access rights.
Monitoring, Logging & Auditing
- Real-time alerts detect errors and anomalies, enabling prompt response.
- Comprehensive logging records system and user activities to support forensic analysis.
- Immutable audit trails maintain a tamper-proof history of critical events.
Device & Endpoint Security
- Devices and client-side applications encrypt sensitive recordings at rest.
- Hardened operating environments and minimized software reduce attack surfaces.
- Offline modes maintain security even when disconnected from the network.
Governance, Assurance & Compliance
- Annual third-party security audits validate our policies, architecture, and controls.
- Regular penetration tests help proactively identify and remediate vulnerabilities.
- We maintain compliance with HIPAA and applicable data protection regulations relevant to our clients.
Customer Data Rights & Lifecycle
- Customers retain control over their data, with options for export or deletion upon request.
- Data is purged automatically according to retention schedules, minimizing risk.
- Secure handling of backups and archived data ensures ongoing protection.