ProofOps Medical ← Back to ProofOps
Trust & Security

Built to handle medical records the way medical records should be handled.

ProofOps Medical processes documents, schedules, and PHI on behalf of clinical operators. This page describes the controls we use, the agreements we sign, and the sub-processors we work with. Customers who want a deeper review can request a security packet or schedule a call with our security team.

Last updated: May 4, 2026 · Version 1.0

Quick read: HIPAA-ready onboarding — BAA signed before any PHI is processed. AES-256 at rest, TLS 1.3 in transit. Least-privilege staff access with MFA. Audit-logged. No customer data is used to train AI foundation models. SOC 2 Type II in progress.

1. HIPAA & the Business Associate Agreement

To the extent ProofOps processes Protected Health Information ("PHI") as defined under 45 CFR § 160.103, ProofOps acts as a Business Associate. We sign a Business Associate Agreement ("BAA") with every customer before any PHI is loaded into the system. The BAA covers permitted uses, breach notification within 24 hours of confirmed breach, sub-processor flow-downs, and return or destruction of PHI on termination.

Customers can request the standard ProofOps BAA at support@proofopsmedical.com. Material modifications are reviewed case-by-case.

2. Data classification & what we collect

We collect the minimum necessary for the service. We do not collect, store, or process Social Security numbers, full payment-card numbers (PCI handled by our processor), or government-classified information.

3. Encryption

4. Access control

5. AI & agent safety

6. Audit logging & monitoring

7. Vulnerability management & pen testing

8. Incident response

We maintain a documented incident-response plan with on-call rotation, severity tiers, customer-notification SLAs, and post-incident reviews. Confirmed breaches involving PHI are notified to affected customers within 24 hours per the BAA.

9. Backups, business continuity, disaster recovery

10. Compliance posture

11. Sub-processors

ProofOps relies on a small set of vetted sub-processors to deliver the service. The current list is reviewed quarterly. Notable sub-processors:

We provide at least 30 days' advance notice of any new sub-processor that processes PHI; customers can object and terminate without penalty if a substitute cannot be agreed.

12. Customer responsibilities

13. How to request a security packet

Customers and prospective customers under NDA can request our security questionnaire responses, BAA template, DPA, and SOC 2 status. Email support@proofopsmedical.com.


This page describes ProofOps' security practices in plain English. Customer agreements, the BAA, and the DPA contain the binding obligations.