Back to Home

Security Practices

Version 1.3 | Last Updated: January 11, 2026

Our Commitment to Security

At myCARI, protecting your health information is our top priority. We employ industry-leading security measures to ensure your data remains private and secure. As a healthcare application handling Protected Health Information (PHI), we implement security controls that meet or exceed HIPAA requirements.

Compliance Framework

StandardStatusDescription
HIPAAImplementedSecurity controls aligned with HIPAA requirements
SOC 2 Type IIVia InfrastructureGCP infrastructure is SOC 2 certified
GDPRImplementedData protection practices aligned with GDPR
CCPAImplementedCalifornia Consumer Privacy Act requirements addressed

Technical Security Measures

Encryption

LayerTechnologyDetails
In TransitTLS 1.3All network communications use the latest TLS encryption
At RestAES-256All stored health data encrypted with industry-standard encryption
Key ManagementGoogle Cloud KMSAutomatic key rotation, hardware security modules
End-to-EndCurve25519 + AES-256-GCMCare team messages encrypted on-device

End-to-End Messaging Encryption

ComponentImplementationDetails
Key ExchangeX25519 (Curve25519)Elliptic curve Diffie-Hellman for secure key agreement
Message EncryptionAES-256-GCMAuthenticated encryption with associated data
Private Key StorageDevice Secure EnclaveKeys never leave your device
Public Key StorageServer-sidePublic keys stored for key exchange only

Authentication

FeatureImplementationDetails
BiometricFace ID / Touch IDRecommended for secure, convenient access
PasswordMinimum 6 charactersFirebase Auth with secure password storage
Social Sign-InApple Sign-In, Google Sign-InOAuth 2.0 with secure token exchange
Session ManagementToken-based sessionsAutomatic expiration and refresh
Token SecurityJWT with short expirySecure storage in device keychain
Brute Force ProtectionRate limitingRequest rate limits per endpoint to prevent abuse

Infrastructure Security

ComponentImplementationDetails
Cloud ProviderGoogle Cloud PlatformHIPAA Business Associate Agreement (BAA) signed
Data CentersSOC 2 CertifiedUS-based GCP data centers with physical security
Load BalancingGlobal HTTPS Load BalancerSSL/TLS termination with automatic certificate management
Web Application FirewallCloud ArmorOWASP rule sets, DDoS protection
Network SecurityVPC isolationPrivate networking with strict network policies
DatabaseCloud SQLAES-256 encryption, private IP connectivity
Secrets ManagementSecret ManagerEncrypted storage for API keys and credentials
MonitoringCloud Logging & MonitoringAutomated alerting for security and performance

Application Security

MeasureImplementationDetails
Code SecurityStatic analysisAutomated security scanning in CI/CD pipeline
Dependency ManagementAutomated updatesRegular dependency updates and vulnerability scanning
Input ValidationServer-side validationAll inputs sanitized to prevent injection attacks
API SecurityRate limiting, authenticationAll endpoints require authentication
Secure DevelopmentOWASP guidelinesDevelopment follows secure coding practices

Data Isolation and Multi-Tenancy

Per-User Data Isolation

Each user's health data is logically isolated at the database level. Row-level security policies ensure that users can only access their own data. All database queries are scoped to the authenticated user's context.

Care Team Security

Care team access is explicitly granted by users. Each care team member can only view data for patients who have granted them access. Access can be revoked at any time by the user. All care team actions are logged and auditable.

Organizational Security

Access Control

ControlImplementationDetails
Principle of Least PrivilegeRole-based accessStaff only access systems required for their role
Multi-Factor AuthenticationRequired for all staffMFA required for all internal systems
Access ReviewsQuarterly reviewsRegular audits of staff access permissions
Background ChecksPre-employmentBackground checks for all employees with data access

Staff Training

TrainingFrequencyDetails
HIPAA TrainingAnnualComprehensive HIPAA privacy and security training
Security AwarenessQuarterlyPhishing simulations and security best practices
Incident ResponseAnnualProcedures for handling security incidents

Vendor Security

All third-party vendors with access to PHI are required to sign Business Associate Agreements (BAAs). Vendors undergo security assessments before onboarding. We maintain an inventory of all vendors with data access and conduct annual reviews.

Incident Response

Response Capabilities

CapabilityImplementationDetails
Detection24/7 monitoringAutomated alerting for security anomalies
Response TeamDedicated teamTrained incident response personnel
ContainmentAutomated and manualRapid isolation of affected systems
RecoveryDocumented proceduresTested backup and recovery processes
Post-IncidentRoot cause analysisLessons learned and preventive measures

Breach Notification

In the event of a data breach affecting your information, we will notify you within 72 hours of discovery, as required by HIPAA and applicable state laws. Notifications will include details about the breach, steps we are taking, and recommendations for protecting yourself.

Audit Logging

Event Types

Event CategoryExamplesDetails
Authentication EventsLogin, logout, failed attemptsAll authentication activities logged
Data AccessView, create, update, deleteAll PHI access recorded with timestamps
Administrative ActionsPermission changes, settingsConfiguration and access changes tracked
Care Team EventsAccess granted, revokedCare team membership changes logged
Export EventsData exports, reportsAll data export activities recorded

Retention Policy

Audit logs are retained for 6 years as required by HIPAA. Logs are stored in tamper-evident, append-only storage. Access to audit logs is restricted and itself logged.

Your Role in Security

Best Practices

PracticeWhy It Matters
Use a strong, unique passwordPrevents unauthorized account access
Enable Face ID/Touch IDAdds biometric layer of protection
Keep your iPhone updatedSecurity patches protect against vulnerabilities
Keep myCARI updatedApp updates include security improvements
Don't share your login credentialsYour credentials are for your use only
Review care team access regularlyVerify who has access to your data
Use secure Wi-Fi networksAvoid public networks for sensitive data
Enable device passcodeProtects data if device is lost or stolen

Reporting Security Issues

If you discover a security vulnerability or suspect unauthorized access to your account:

We do not pursue legal action against security researchers who act in good faith and follow responsible disclosure practices.

Healthcare Provider Security

Standards-Based Integration

StandardImplementationDetails
FHIRR4 SpecificationFast Healthcare Interoperability Resources for data exchange
SMART on FHIRApp authorizationSecure authorization for healthcare apps
OAuth 2.0Authorization frameworkIndustry-standard authorization protocol
PKCEProof Key for Code ExchangeEnhanced security for mobile OAuth flows
Epic MyChartPatient portal integrationSecure connection to Epic EHR systems

Physical Security

Data Center Security

All data is stored in Google Cloud Platform data centers that feature:

Device Recommendations

To maximize security when using myCARI:

Questions?

We are happy to answer any questions about our security practices.

Security Team: security@mlpipes.ai

Privacy Team: privacy@mlpipes.ai

General Support: support@mlpipes.ai

Mailing Address:
MLPipes LLC
5725 S Valley View Blvd Ste 5 PMB 471045
Las Vegas, Nevada 89118-3122 US