Flashpoint.AI Trust Center
Flashpoint.AI is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.
Compliance
Links
Resources
SOC 2 Type II Report
Network Security Policy
Change Management Policy
Baseline Hardening Policy
Vendor Management Policy
Controls
Remote access tool
ePHI policy accessibility evidence
VPN access
Access restricted to modify infrastructure
Access review of infrastructure
ePHI data sanitization
Encryption of data
Privacy and confidentiality governance charter
Data loss prevention tool
ePHI privacy and security awareness training
Web application firewall
Outsourced Development Management
Code repositories
Tracking of code changes
Sample code changes
SSL/TLS certificates for infrastructure
Intrusion detection tool
Infrastructure firewall
Monitoring tool
Network diagram
Alerts and remediation
Breach notification communication
Security incident list
Incident response and breach notification policy
Whistleblower policy
Log management tool
Vendor management program
Vendor list
ePHI risk assessment report
Vendor onboarding
Vendor termination
List of newly hired employees & contractors
Media disposal training
Employee handbook
New employee and contractor agreements
List of active employees & contractors as on date
Asset register maintaining
Multi-availability zones
Risk and Governance Executive Committee meeting minutes
Risk management program
Customer termination
Customers list
Patient status and admission records
Information security policies and procedures
Mobile device management tool configurations