Privacy.
Protected.
Privacy is a fundamental human right. It’s also one of our core values. Which is why we have designed our products & services to protect it. That’s the kind of innovation we believe in.
Anonymised Patient Data
If patient identifiers, such as names are detected, Note Dr detects and redacts this information, to ensure your patients, clients and colleagues identity is protected.
" It's lovely to
meet you,
Mrs Dobson " [Patient Name] "
Audio Recordings, Deleted
You have the ability to download the recording of your session. After ending the session, audio recordings are deleted from Note Dr and never accessible again.
Whether it's intimate confessions, difficult conversations or light-hearted humor, your appointment needs to be protected .
End-to-End Encryption
Note Dr is encrypted over 256-bit SSL, which cannot be viewed by unauthorised third parties.
Layers of Privacy
We add additional layers of protection to all of your appointments, to ensure they stay between you and your patient.
Enterprise Security
Built-in layers of security give you the peace of mind to focus on connecting with your world.
Data Centres
We ensure that the machines within the Note Dr network are protected at all times. Note Dr uses industry leading data centres managed by Equinix, which are also trusted and used by Google, Microsoft and Amazon. Investing in leading data centres provide a highly scalable cloud computing platform with advanced end-to-end security and privacy features as standard.
Access to these data centres is strictly controlled and monitored using a variety of physical controls, intrusion detection systems, environmental security measures, 24 x 7 on-site security staff, biometric scanning, multi-factor authentications, video surveillance and other electronic means. All physical and electronic access to data centres is authorised strictly on a least privileged basis and is logged and audited routinely.
These Data Centers are certified to meet rigorous security standards:
These Data Centers are certified to meet rigorous security standards (right):
Artificial intelligence has the potential to benefit nearly every aspect of our lives—so it must be developed and deployed responsibly .
Product Security
- Multi-Factor Authentication (MFA)
MFA can be enabled for user accounts via an SSO provider.
- Role-Based Access Control
Note Dr implements Role-Based Access Control (RBAC) to manage permissions.
- SSO Support
Customers can authenticate using SSO, including SAML.
- Separate Production Environment
Customer data is not used in non-production environments.
Access Control
- Data Access
Access to internal systems is granted based on the principle of least privilege and is reviewed on a regular basis.
- Logging
All important security events in our environment are monitored.
- Staff Password Security
We have a strong internal password policy that includes a requirement for MFA for accounts that do not support SSO. Passwords are stored in a company managed password manager.
Endpoint Security
- Disk Encryption
Full-disk encryption is used to protect employee endpoints.
- DNS Filtering
Employee endpoints are protected from malicious web traffic.
- Endpoint Detection & Response
All employee endpoints are protected with an advanced EDR solution.
- Mobile Device Management
All employee endpoints are centrally managed and secured using an MDM solution.
- Threat Detection
Note Dr's Security Defense and Intelligence proactively monitors for known attacker TTPs, known malicious binaries, and suspicious activity in the environment. Our team also review anomalous activity and hunt for unknown threats on a regular cadence.
Network Security
- Data Exfiltration Monitoring
We restrict removable media on endpoints and have tools to monitor for suspicious activity, including data exfiltration.
- DMARC
Our domain has DMARC enabled to reduce the risk of spoofing attacks.
- Firewall
We use Firewalls to monitor and control traffic in our infrastructure.
- IDS
Network activity is centrally logged and arbitrary detection logic has been defined to identify attackers and other anomalous behavior and generate alerts for further investigation.
- Security Information and Event Management
Important infrastructure logs are centrally stored and monitored.
Corporate Security
- Email Protection
We restrict removable media on endpoints and have tools to monitor for suspicious activity, including data exfiltration.
- Employee Training
Personnel perform security and privacy awareness training on an annual basis. Topics covered include: Passwords, Mobile devices, Social Engineering, Physical security, Phishing, GDPR and CCPA.
- Incident Response
We have a documented Incident Response Plan that is reviewed, tested and approved at least annually.
- Internal Assessments
We conduct an annual risk assessment to identify major gaps in our environment.
- Penetration Testing