Trust Center

Security, privacy, and compliance are foundational to how we build and operate IntakePro. We protect sensitive claims data with enterprise-grade controls at every layer.

SOC 2 Type I Aligned|ISO 27001 Aligned|PIPEDA Compliant

Compliance Frameworks

SOC 2 Type I

Aligned

Security practices aligned with SOC 2 Trust Services Criteria for security, availability, and confidentiality.

ISO 27001

Aligned

Information security management system aligned with ISO 27001:2022 requirements.

PIPEDA

Compliant

Full compliance with Canada's Personal Information Protection and Electronic Documents Act.

Security Posture

Our security controls are designed to meet the requirements of enterprise customers handling sensitive data.

Encryption

  • TLS 1.2+ for all data in transit
  • Provider-managed encryption at rest
  • Application-layer encryption for stored credentials (AES-256-GCM)
  • Versioned HMAC key management for audit integrity

Identity & Access

  • SSO / SAML 2.0 integration
  • Multi-factor authentication (MFA)
  • Role-based access control (RBAC)
  • Session management with automatic timeout

Data Protection

  • Provider-managed database backups
  • Tenant-level data isolation with row-level security
  • Configurable data retention with audit log archival
  • Sensitive field redaction in audit logging

Monitoring & Logging

  • Tamper-evident, append-only audit logs
  • HMAC-SHA256 hash chain integrity
  • Automated anomaly detection with alerting
  • SIEM integration support

Infrastructure

  • Managed cloud hosting (Vercel, Supabase, Upstash)
  • Edge-level security controls and CAPTCHA protection
  • Rate limiting on authentication and API endpoints
  • Security headers including HSTS and Content Security Policy

Privacy

  • PIPEDA-aligned privacy practices
  • Data processing agreements (DPA) available
  • Subprocessor transparency and documentation
  • Security documentation available upon request

Operational Commitments

Reliability, resilience, and transparency are central to our operational practices.

Platform Availability

Built on managed cloud infrastructure designed for high availability, with health monitoring and automated alerting for service disruptions.

Incident Response

Defined incident response procedures with automated anomaly detection, alerting to on-call personnel, and structured investigation and remediation processes.

Infrastructure Resilience

Managed cloud infrastructure with provider-level redundancy and backup capabilities. Audit logs archived to cloud storage for long-term retention.

Security Monitoring

Continuous application monitoring, daily automated audit log review, and configurable anomaly detection thresholds with multi-channel alerting.

Data Residency

Data processed through managed cloud providers that may operate across multiple regions. Audit archives may be stored in Canadian cloud regions where configured.

Vendor Risk Management

Subprocessors subject to appropriate contractual obligations. Subprocessor list maintained and available to customers upon request.

Security Documentation

Detailed security and compliance materials are available to verified organizations. Access includes our security whitepaper, subprocessor list, DPA, and additional security documentation.

Requests are verified and reviewed by our security team. Typically processed within 1-2 business days.

Request Access

Security Contact

To report a security vulnerability, request compliance documentation, or ask security-related questions, contact our security team directly.

security@intakepro.ca