In order to comply with the highest security standards of our users, government agencies, hospitals, and private individuals, our policies, network architecture, and software are designed with the aim of implementing the following security recommendations:
• General system architecture and company policies aim to implement all pertinent recommendations outlined in NIST Special Publication 800-53: Security and Privacy Controls for Federal Information Systems and Organizations. This is a matter of policy persistent audit, review, and development process.
• Encryption of data at rest is achieved in accordance with the guidelines specified by NIST Guide to Storage Encryption Technologies for End User Devices.
• All data channels are secured by compliant with NIST Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. Accordingly, at the time of this writing, end-user browsers must be compatible with TLS 1.2.
• General system architecture and company policies aim to implement all pertinent recommendations outlined in NIST Special Publication 800-53: Security and Privacy Controls for Federal Information Systems and Organizations. This is a matter of policy persistent audit, review, and development process.
• Encryption of data at rest is achieved in accordance with the guidelines specified by NIST Guide to Storage Encryption Technologies for End User Devices.
• All data channels are secured by compliant with NIST Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. Accordingly, at the time of this writing, end-user browsers must be compatible with TLS 1.2.