Our Commitment to Security
At Enable Medicine, we understand the critical importance of information security, compliance, privacy, and a robust infrastructure to not only our operations but also to the trust our clients place in us. We are dedicated to maintaining the highest standards of data protection and ensuring that our systems and processes meet rigorous security requirements.
[fs-toc-h2]Comprehensive Security Infrastructure
Our comprehensive security program is designed to ensure the confidentiality, integrity, and availability of our client's data. Our infrastructure, hosted on AWS (Amazon Web Services), employs a multi-layered security model, including physical and environmental controls, network security, and data encryption both at rest and in transit.
[fs-toc-h2]Data Protection
We employ advanced data protection strategies, including:
- Data Encryption: Utilizing state-of-the-art encryption protocols to protect data at rest and in transit.
- Access Controls:
- Internally we implement strict access controls and identity management through Single Sign-On (SSO) to ensure that only authorized individuals can access sensitive information.
- For the Enable Medicine portal we require users to maintain passwords adhering to industry best practices and offer app-based multifactor authentication (MFA).
- Data Backup and Recovery: Maintaining robust data backup and disaster recovery plans to ensure business continuity.
If you would like more information about how we handle data at Enable Medicine please consult our Data License Agreement.
[fs-toc-h2]Compliance and Governance
Enable Medicine is proactive in adhering to the industry’s best practices for compliance and governance. Our GRC (Governance, Risk, and Compliance) strategies are continuously monitored of our compliance posture.
[fs-toc-h2]Regular Training and Awareness
We conduct regular training sessions to ensure that our employees are aware of the latest security threats and best practices for preventing breaches. Our culture of security awareness is fundamental to our preventative strategies.
[fs-toc-h2]Continuous Improvement
Our information security practices are not static. We believe in continuous improvement and regularly update our security measures in response to evolving threats and industry standards.
[fs-toc-h2]Transparency
We strive to be transparent about our security and compliance practices. Detailed information about our policies is available to our clients and partners upon request.
[fs-toc-h2]Contact Us
For more information about our security practices please contact us at [email protected].