Hipafy is built by a compliance company. We hold ourselves to the same standards we help our customers meet. This page explains exactly what we do to protect your data.
Hipafy is designed with a deliberate architectural choice: we do not store patient PHI. Our platform collects operational information about your practice — your EHR vendor, staff count, communication methods — not patient names, records, diagnoses, or clinical notes. This is a security design decision, not a limitation.
If we never hold patient data, we can never lose it, leak it, or be compelled to disclose it. This is the most reliable security guarantee we can offer healthcare practices: the attack surface simply does not exist. The compliance documentation we generate is based on your practice profile, not your patient database.
For the operational practice data we do store — assessment answers, account information, training records — we apply the technical controls described on this page.
Hipafy uses Stripe for all payment processing. Stripe is a PCI DSS Level 1 certified payment processor — the highest level of certification available. When you enter payment details on Hipafy, they go directly to Stripe’s systems over an encrypted connection. Hipafy’s servers never see, receive, or store your full card number, CVV, or bank account details.
What Hipafy receives from Stripe: a tokenized reference to your payment method, the last four digits of your card, the card type, and your billing name and address for invoicing. This is sufficient for subscription management and completely isolated from your sensitive payment credentials.
Hipafy uses a limited number of third-party service providers. Before engaging any provider that processes customer data, we evaluate their:
All sub-processors are listed in our Privacy Policy and are contractually bound to maintain the same level of data protection as Hipafy. We review sub-processor security posture at least annually.
In the event of a security incident that involves your data, Hipafy follows a documented incident response procedure:
For incidents involving PHI under our Business Associate Agreements, we also follow the breach notification requirements of 45 CFR Part 164, Subpart D, including notifying Covered Entities within the timeframes specified in the applicable BAA.
Hipafy secures the platform. You secure your access to it. Here is what we recommend:
If you believe you have discovered a security vulnerability in Hipafy’s platform or website, we ask that you disclose it to us responsibly before making it public. We are committed to working with security researchers in good faith.
To report a vulnerability: Email security@hipafy.com with a description of the vulnerability, steps to reproduce it, and your assessment of potential impact. Please include “Responsible Disclosure” in the subject line.
Our commitments to researchers: We will acknowledge your report within 2 business days, keep you informed of our progress, work to remediate confirmed vulnerabilities promptly, and not take legal action against researchers who act in good faith.
Out of scope: Social engineering attacks on Hipafy staff, physical access attacks, denial-of-service attacks, spam, and issues in third-party services not under Hipafy’s control.
Contact our security team directly. We take all reports seriously and respond within 2 business days.