Zellify logoZellify

Zellify Trust Center

Zellify is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.

Compliance

Resources

HIPAA Internal Privacy Policy
Chief Information Security Officer (CISO) Policy
Baseline Hardening Policy
Business Continuity and Disaster Recovery
Information Security Policy

Controls

ePHI policy accessibility evidence
Remote access tool
Access restricted to modify infrastructure
Access review of infrastructure
User list with assigned roles and privileges
Encryption of data
Privacy and confidentiality governance charter
ePHI data sanitization
Data loss prevention tool
ePHI privacy and security awareness training
Vulnerability scanning
Business continuity and disaster recovery testing
Web application firewall
Sample code changes
Penetration testing
SSL/TLS certificates for infrastructure
Intrusion detection tool
Monitoring tool
Security incident list
Alerts and remediation
Breach notification communication
Incident response and breach notification policy
Log management tool
ePHI risk assessment report
Vendor termination
Vendor list
Vendor onboarding
Vendor management program
Media disposal training
New employee and contractor agreements
List of newly hired employees & contractors
Background checks
List of terminated employees & contractors
Asset register maintaining
Risk and Governance Executive Committee meeting minutes
Risk management program
Key management services used
Mobile device management tool configurations
Ticketing tool
Security-related roles
Termination checklist

Subprocessors

Vercel
VercelCloud Infrastructure & Platform Services
Axiom
AxiomUnknown Category
Upstash Console
Upstash ConsoleUnknown Category
AWS
AWSCloud Infrastructure & Platform Services