Inquira Health Logo

Trust Center

At Inquira Health, we are committed to maintaining the highest standards of security, privacy, and compliance. Our Trust Center provides transparent access to our security practices, compliance certifications, and data protection policies.

EU AI Act

Security Controls Overview

Last update: June 2025

Data Region

Explore our comprehensive security controls and compliance measures. Click on each section to learn more about specific controls and their implementation.

Risk Profile

Data Classification
Data Access Level
Hosting

View more

Security Controls

Audit Logging & Monitoring
Data Security
Access Control

View more

Infrastructure

US-Based Hosting
Resilient & Isolated Environments
Zero Trust Implementation

View more

Data Privacy & HIPAA

HIPAA Compliance
Data Subject Rights
Data Retention & Erasure Policy

View more

AI Governance

AI Risk Management
Human Oversight Built In
LLM Governance

View more

Legal & Compliance

Business Associate Agreement (BAA)
Subprocessor List
Acceptable Use Policy

Disaster Recovery & Testing

Disaster Recovery Plan
Redundancy & Backups
Recovery Objectives

View more

Incident Response

24/7 Monitoring & Alerting
Breach Notification Process
Security Contact

View more

Reports & Assessments

Vulnerability Scan Reports

Risk Profile

Data Classification

All customer data is classified as Internal or Confidential. Sensitive data is handled according to strict internal security policies on a need-to-know basis.

Data Access Level

Role-based access with Multi-Factor Authentication (MFA) and audit logging is enforced across all relevant systems.

Hosting

We utilize US-based major cloud providers. For details, see our sub-processors list.

AI Risk Level

Our AI is designed with appropriate safeguards for healthcare administrative use with human oversight.

Security Controls

Audit Logging & Monitoring

Detailed audit logs are maintained for all system activity and retained according to our data retention policy. Call logs are also accessible to customers in the dashboard.

Data Security

  • Encryption: AES-256 encryption at rest, TLS 1.3 + TLS-SRTP for media streams in transit.
  • Password Requirements (per NIST):
    • Minimum 20 characters
    • Three of four character types (uppercase, lowercase, numbers, special characters)
    • Multi-Factor Authentication (MFA) enforced

Access Control

Role-based access control (RBAC) plus MFA is enforced across all environments containing confidential or internal data.

Secure Development Lifecycle

Our CI/CD pipeline includes code scanning, security testing, and automated checks to identify vulnerabilities before deployment.

Monitoring Approach

24/7 real-time monitoring of all systems with on-call support. We maintain a public status page for transparency.

Infrastructure

US-Based Hosting

We host our services in US data centers provided by major cloud vendors. See our sub-processors list for details.

Resilient & Isolated Environments

Production and non-production environments are strictly isolated. Servers are replicated for fault tolerance and high availability.

Zero Trust Implementation

We leverage a Zero Trust architecture using WireGuard for secure networking and strict identity-based access controls.

Continuous Monitoring

All infrastructure components are monitored 24/7 for performance, availability, and security indicators.

Data Privacy & HIPAA

HIPAA Compliance

We maintain HIPAA compliance standards for handling Protected Health Information (PHI) with appropriate safeguards and controls.

Data Subject Rights

We support individual privacy rights with streamlined processes for data access, correction, and deletion requests.

Data Retention & Erasure Policy

We maintain clear guidelines on data lifecycle management, including secure deletion.

Privacy Documentation

Our Privacy Policy and Business Associate Agreement (BAA) are available for healthcare customers.

AI Governance

AI Risk Management

Our platform is designed with appropriate risk management controls for healthcare administrative tasks with human oversight. Clinical or diagnostic use may require additional safeguards.

Human Oversight Built In

We design workflows to ensure human validation and accountability throughout the AI interaction lifecycle.

LLM Governance

We apply strict prompt control, link extractions to source transcripts, and leverage Azure OpenAI's content filtering to maintain safe and compliant outputs.

Traceability of Extracted Data

All call transcripts are viewable in the product. When the AI extracts structured data (e.g. date of birth), we clearly show which part of the transcript it was derived from—ensuring auditability and contextual traceability.

Legal & Compliance

Business Associate Agreement (BAA)

We offer a standardized Business Associate Agreement (BAA) for healthcare customers requiring HIPAA compliance.

Subprocessor List

We perform security assessments of our third-party processors and update the list of sub-processors regularly.

Acceptable Use Policy

Our platform usage guidelines and restrictions to prevent misuse and maintain compliance.

Disaster Recovery & Testing

Disaster Recovery Plan

We maintain and review our Disaster Recovery (DR) plan on a quarterly basis. The plan outlines key recovery procedures, contact protocols, and infrastructure dependencies across our US-based cloud providers.

Redundancy & Backups

Our core database is managed by US-based cloud providers and has daily encrypted backups.

Recovery Objectives

Our current disaster recovery targets include:

  • RPO (Recovery Point Objective): ≤ 24 hours
  • RTO (Recovery Time Objective): ≤ 4 hours

Uptime SLA

We target a 99.9% availability SLA across our services, with infrastructure-level monitoring in place to minimize downtime.

DR Testing & Documentation

We conduct scheduled disaster recovery drills and document outcomes.

Incident Response

24/7 Monitoring & Alerting

We maintain continuous security monitoring and alerting for quick incident detection.

Breach Notification Process

A clearly defined communication workflow ensures timely breach notifications to all stakeholders.

Security Contact

For security incidents or queries view responsible disclosure policy.

Root Cause Analysis

We provide RCAs for all security incidents. These are available to affected customers upon request.

Reports & Assessments

Vulnerability Scan Reports

Regular automated vulnerability scanning of our infrastructure and applications.

Contact Information

Inquira Technologies B.V.

Dutch Chamber of Commerce Number (KvK): 95495460

Rotterdam, The Netherlands

For responsible disclosure of security vulnerabilities, please visit our responsible disclosure page.