Data Security

Your trusted partner

Utilizing the most advanced AI and information security technologies,

our principles align with the CIA Triad, SOC 2 Type II Audit and HIPAA.

SOC 2 Type II Audited
CIA Triad logo
HIPAA logo

Confidentiality

TRUE-See ensures information isn’t disclosed to unauthorized parties, including individuals, programs, and processes.

\

Photo Verification – TRUE-See can verify that a TRUE-See-certified photo has not been tampered with or altered, providing verification of authenticity.

\

Secure Data Exchange – Integration into any existing platform or product using established secure protocols.

\

HIPAA compliant data hosting – TRUE-See ensures information isn’t disclosed to unauthorized parties, including individuals, programs, and processes.

\

Predictive and prescriptive analytical capabilities – Domain experts regularly engage in review, testing, and certification of all aspects of TRUE-See, including policies, technical safeguards, and workflows.

\

Multi-Platform Data Capture – Patient data transfers and storage, including calibrated wound photos, are subject to encryption, hosting logic, access control, secure transmission, and protocols.

\

Protection and Mitigation Measures – We continuously audit our computing and data storage centers with certifications from trusted accreditation bodies, including SOC2, Type II.

Integrity

Integrity

\

Unique Photo Certification – TRUE-See utilizes a patented, unique slate and unique certificate number for every photo in the medical record.

\

Ensured Business Continuity – TRUE-See constantly logs, manages, and monitors all transactions across the platform.

\

Rigorous Risk Assessment Protocols – We have instituted policies and procedures that include rigorous risk assessment protocols, audit trails and change controls.

\

Quality Assurance – All minor and major update receives rigorous testing by our Quality Assurance team to validate data integrity protection and attributes, including accuracy, relevance, timeliness, and privacy.

\

Encryption – Our multi-factor encryption is always active, at rest, in motion, and across backups.

\

Strong Authentication – We configure communication and information exchanges to trusted, explicitly identified, and approved networks.

\

Service Oriented Architecture – Support and management solutions built to the industry’s highest security and authentication standards.

\

Discreet Profiles – The TRUE-See systems support discreet profiles for role-based access control of shared resources.

Availability

\

High Level of Availability – TRUE-See provides prompt information, systems, and resources to our users, so our software never affects patient care productivity.

\

Fault Tolerant Environment – We put in place proven capabilities to guarantee systems’ fault tolerance and recovery mechanisms to ensure the seamless continuity of customers’ resource availability.

\

Secure Architecture and Access – The TRUE-See technical architecture was designed to tolerate system and hardware failures with minimal impact.

\

Universal Integration – Seamless integration with platforms using established protocols such as FHIR/HL7, Allscripts Unity/Veradigm, etc.

\

Global Redundancy – TRUE-See developed its infrastructure with no single failure point and total redundancy on a secure distributed architecture for a high level of availability. We deploy and manage the TRUE-See systems with Global Redundancy with Cloud Storage backups in more than one global location.

Skip to content