Join us at the 2025 Advanced Wound Care Summit

Data Security

Your trusted partner

Utilizing the most advanced AI and information security technologies,

our principles align with the CIA Triad, SOC 2 Type II Audit and HIPAA.

SOC 2 Type II Audited
CIA Triad logo
HIPAA logo

Confidentiality

TRUE-See ensures information isn’t disclosed to unauthorized parties, including individuals, programs, and processes.

\

Photo Verification – TRUE-See can verify that a TRUE-See-certified photo has not been tampered with or altered, providing verification of authenticity.

\

Secure Data Exchange – Integration into any existing platform or product using established secure protocols.

\

HIPAA compliant data hosting – TRUE-See ensures information isn’t disclosed to unauthorized parties, including individuals, programs, and processes.

\

Predictive and prescriptive analytical capabilities – Domain experts regularly engage in review, testing, and certification of all aspects of TRUE-See, including policies, technical safeguards, and workflows.

\

Multi-Platform Data Capture – Patient data transfers and storage, including calibrated wound photos, are subject to encryption, hosting logic, access control, secure transmission, and protocols.

\

Protection and Mitigation Measures – We continuously audit our computing and data storage centers with certifications from trusted accreditation bodies, including SOC2, Type II.

Integrity

Integrity

\

Unique Photo Certification – TRUE-See utilizes a patented, unique slate and unique certificate number for every photo in the medical record.

\

Ensured Business Continuity – TRUE-See constantly logs, manages, and monitors all transactions across the platform.

\

Rigorous Risk Assessment Protocols – We have instituted policies and procedures that include rigorous risk assessment protocols, audit trails and change controls.

\

Quality Assurance – All minor and major update receives rigorous testing by our Quality Assurance team to validate data integrity protection and attributes, including accuracy, relevance, timeliness, and privacy.

\

Encryption – Our multi-factor encryption is always active, at rest, in motion, and across backups.

\

Strong Authentication – We configure communication and information exchanges to trusted, explicitly identified, and approved networks.

\

Service Oriented Architecture – Support and management solutions built to the industry’s highest security and authentication standards.

\

Discreet Profiles – The TRUE-See systems support discreet profiles for role-based access control of shared resources.

Availability

\

High Level of Availability – TRUE-See provides prompt information, systems, and resources to our users, so our software never affects patient care productivity.

\

Fault Tolerant Environment – We put in place proven capabilities to guarantee systems’ fault tolerance and recovery mechanisms to ensure the seamless continuity of customers’ resource availability.

\

Secure Architecture and Access – The TRUE-See technical architecture was designed to tolerate system and hardware failures with minimal impact.

\

Universal Integration – Seamless integration with platforms using established protocols such as FHIR/HL7, Allscripts Unity/Veradigm, etc.

\

Global Redundancy – TRUE-See developed its infrastructure with no single failure point and total redundancy on a secure distributed architecture for a high level of availability. We deploy and manage the TRUE-See systems with Global Redundancy with Cloud Storage backups in more than one global location.