Trust Center
At Inquira Health, we are committed to maintaining the highest standards of security, privacy, and compliance. Our Trust Center provides transparent access to our security practices, compliance certifications, and data protection policies.
Security Controls Overview
Last update: June 2025
Data Region
Explore our comprehensive security controls and compliance measures. Click on each section to learn more about specific controls and their implementation.
Risk Profile
View more
Security Controls
View more
Infrastructure
View more
Data Privacy & HIPAA
View more
AI Governance
View more
Legal & Compliance
Disaster Recovery & Testing
View more
Incident Response
View more
Reports & Assessments
Risk Profile
Data Classification
All customer data is classified as Internal or Confidential. Sensitive data is handled according to strict internal security policies on a need-to-know basis.
Data Access Level
Role-based access with Multi-Factor Authentication (MFA) and audit logging is enforced across all relevant systems.
Hosting
We utilize US-based major cloud providers. For details, see our sub-processors list.
AI Risk Level
Our AI is designed with appropriate safeguards for healthcare administrative use with human oversight.
Security Controls
Audit Logging & Monitoring
Detailed audit logs are maintained for all system activity and retained according to our data retention policy. Call logs are also accessible to customers in the dashboard.
Data Security
- Encryption: AES-256 encryption at rest, TLS 1.3 + TLS-SRTP for media streams in transit.
- Password Requirements (per NIST):
- Minimum 20 characters
- Three of four character types (uppercase, lowercase, numbers, special characters)
- Multi-Factor Authentication (MFA) enforced
Access Control
Role-based access control (RBAC) plus MFA is enforced across all environments containing confidential or internal data.
Secure Development Lifecycle
Our CI/CD pipeline includes code scanning, security testing, and automated checks to identify vulnerabilities before deployment.
Monitoring Approach
24/7 real-time monitoring of all systems with on-call support. We maintain a public status page for transparency.
Infrastructure
US-Based Hosting
We host our services in US data centers provided by major cloud vendors. See our sub-processors list for details.
Resilient & Isolated Environments
Production and non-production environments are strictly isolated. Servers are replicated for fault tolerance and high availability.
Zero Trust Implementation
We leverage a Zero Trust architecture using WireGuard for secure networking and strict identity-based access controls.
Continuous Monitoring
All infrastructure components are monitored 24/7 for performance, availability, and security indicators.
Data Privacy & HIPAA
HIPAA Compliance
We maintain HIPAA compliance standards for handling Protected Health Information (PHI) with appropriate safeguards and controls.
Data Subject Rights
We support individual privacy rights with streamlined processes for data access, correction, and deletion requests.
Data Retention & Erasure Policy
We maintain clear guidelines on data lifecycle management, including secure deletion.
Privacy Documentation
Our Privacy Policy and Business Associate Agreement (BAA) are available for healthcare customers.
AI Governance
AI Risk Management
Our platform is designed with appropriate risk management controls for healthcare administrative tasks with human oversight. Clinical or diagnostic use may require additional safeguards.
Human Oversight Built In
We design workflows to ensure human validation and accountability throughout the AI interaction lifecycle.
LLM Governance
We apply strict prompt control, link extractions to source transcripts, and leverage Azure OpenAI's content filtering to maintain safe and compliant outputs.
Traceability of Extracted Data
All call transcripts are viewable in the product. When the AI extracts structured data (e.g. date of birth), we clearly show which part of the transcript it was derived from—ensuring auditability and contextual traceability.
Legal & Compliance
Business Associate Agreement (BAA)
We offer a standardized Business Associate Agreement (BAA) for healthcare customers requiring HIPAA compliance.
Subprocessor List
We perform security assessments of our third-party processors and update the list of sub-processors regularly.
Acceptable Use Policy
Our platform usage guidelines and restrictions to prevent misuse and maintain compliance.
Disaster Recovery & Testing
Disaster Recovery Plan
We maintain and review our Disaster Recovery (DR) plan on a quarterly basis. The plan outlines key recovery procedures, contact protocols, and infrastructure dependencies across our US-based cloud providers.
Redundancy & Backups
Our core database is managed by US-based cloud providers and has daily encrypted backups.
Recovery Objectives
Our current disaster recovery targets include:
- RPO (Recovery Point Objective): ≤ 24 hours
- RTO (Recovery Time Objective): ≤ 4 hours
Uptime SLA
We target a 99.9% availability SLA across our services, with infrastructure-level monitoring in place to minimize downtime.
DR Testing & Documentation
We conduct scheduled disaster recovery drills and document outcomes.
Incident Response
24/7 Monitoring & Alerting
We maintain continuous security monitoring and alerting for quick incident detection.
Breach Notification Process
A clearly defined communication workflow ensures timely breach notifications to all stakeholders.
Security Contact
For security incidents or queries view responsible disclosure policy.
Root Cause Analysis
We provide RCAs for all security incidents. These are available to affected customers upon request.
Reports & Assessments
Vulnerability Scan Reports
Regular automated vulnerability scanning of our infrastructure and applications.
Contact Information
Inquira Technologies B.V.
Dutch Chamber of Commerce Number (KvK): 95495460
Rotterdam, The Netherlands
For responsible disclosure of security vulnerabilities, please visit our responsible disclosure page.