Security posture

Security, not by accident.

How we protect your organization’s data and your clients’ information. Encryption, audit logging, breach notification, and every control that sits behind the workspace.

Built for HIPAA

Engineered against the HIPAA Privacy, Security, and Breach Notification Rules. BAA signed with every customer, and with every cloud sub-processor that touches PHI.

Encrypted at Rest

All Protected Health Information is encrypted with AES-256, the industry standard for healthcare data at rest. Managed keys rotate automatically.

Encrypted in Transit

Every byte between your browser and our servers moves over TLS 1.2 or higher. HSTS enforced. Legacy protocols disabled.

Automatic Session Timeout

Sessions expire after 15 minutes of inactivity, matching HIPAA’s automatic-logoff requirement. Re-authentication is one click.

Audit Logging

Every PHI access is logged: who viewed, created, modified, signed, or exported patient data, with timestamps and source IP.

Facility Isolation

Each agency sees only its own data. Row Level Security enforces the boundary at the database layer, not just in the app code.

Under the hood

Controls that earn the trust, not just claim it.

The administrative, technical, and physical safeguards behind IntakeFlow. plain-language, no buzzword padding.

Signed BAA, plain contract

Every customer onboards with a signed BAAand a clear agreement of what we do and don’t do with your data.