Policy

Policy

Policy

Security Statement

Updated:

Apr 1, 2025

Empathiq is committed to protecting customer data with secure, modern infrastructure and best-in-class security practices. This document outlines how we safeguard your information across all components of the Empathiq platform.


Infrastructure & Hosting

Empathiq’s core services—including our Platform and Knowledge Base—are hosted using trusted infrastructure providers who meet rigorous security and reliability standards.

  • Cloud Infrastructure: Hosted via audited environments including AWS and Fly.io

  • Network Security: Private networking, firewalled systems, no exposure of databases to the public web

  • Data Encryption:

    • In-transit: All data is encrypted using HTTPS (TLS 1.2+)

    • At-rest: Application and backup data is encrypted using industry-standard AES-256


Certifications & Audits

Our infrastructure partners undergo regular independent audits and maintain industry-recognized certifications, including:

  • SOC 2 Type II

  • GDPR compliance

  • ISO 27001 (AWS)

We regularly review partner audit reports and apply required controls across our own systems.


Application Security

Empathiq takes a layered security approach:

  • Tenant Isolation: Logical data separation ensures that your information is never accessible by other clients.

  • Access Controls: Role-based access and scoped permissions are enforced across user types.

  • Admin Monitoring: Administrative access is tightly controlled and logged.

  • Session Management: Timeouts, IP logging, and browser session rules are enforced to limit unauthorized access.


Payment & Billing

Empathiq uses PCI-DSS compliant vendors (e.g., Stripe) for all billing operations. We never store full card details on our own servers.


Backups & Business Continuity

  • Daily backups of all critical systems

  • Encrypted backups stored in geographically redundant locations

  • Business continuity and disaster recovery plans are tested and maintained


Incident Response & Reporting

Security events are logged, triaged, and addressed according to a documented incident response plan.

  • If an incident affects your data, we will notify you promptly with impact and resolution details.

  • Vulnerabilities or suspicious activity can be reported to security@getempathiq.com


For details about Empathiq’s HIPAA compliance, SOC 2 attestations, and Business Associate Agreements (BAAs), please visit our Compliance page.

Related Articles

Check articles from the same category

Ready to Empower Your Medicare Brokerage?

Explore an entirely fresh approach to serving beneficiaries and empowering your agents with Empathiq.

Ready to Empower Your Medicare Brokerage?

Explore an entirely fresh approach to serving beneficiaries and empowering your agents with Empathiq.

Ready to Empower Your Medicare Brokerage?

Explore an entirely fresh approach to serving beneficiaries and empowering your agents with Empathiq.