Security

Our Commitment to Security

At EMS SOAP, security is foundational to everything we build. Healthcare data demands the highest level of protection, and we implement comprehensive security controls to safeguard patient information and maintain the trust of our customers.

We are actively pursuing SOC 2 Type II certification and HIPAA compliance, with Business Associate Agreements (BAA) available upon request.

Data Protection

Encryption at Rest

All data stored in our database is encrypted using AES-256 encryption. This includes patient information, SOAP narratives, and all associated metadata.

Encryption in Transit

All data transmitted between your browser and our servers is protected using TLS 1.2 or higher. We enforce HTTPS on all connections and implement HTTP Strict Transport Security (HSTS).

Backup & Recovery

We maintain automated daily backups with Point-in-Time Recovery (PITR) capability, enabling restoration to any point within the retention window. Backups are encrypted and stored in geographically separate locations.

Infrastructure Security

Cloud Hosting

Our application is hosted on enterprise-grade cloud infrastructure with DDoS protection, edge network distribution, and automatic SSL certificate management. Our hosting provider maintains SOC 2 Type II certification.

Database Security

We use a managed PostgreSQL database with Row Level Security (RLS), network isolation, and comprehensive audit logging. Our database provider is SOC 2 Type II certified.

Authentication

User authentication includes support for multi-factor authentication (MFA), secure password policies, and protection against brute force attacks.

Access Controls

Role-Based Access Control (RBAC)

Our platform implements granular role-based access controls. Users are assigned roles (Admin, Manager, or Member) that determine their access level to organizational data and features.

Principle of Least Privilege

Access to systems and data is granted on a need-to-know basis. Employees only have access to the resources necessary for their role, and access is regularly reviewed and revoked when no longer needed.

Employee Access Management

We maintain formal procedures for provisioning and deprovisioning employee access. Access is granted based on job requirements and removed immediately upon role changes or departure.

Security Monitoring

Vulnerability Scanning

We use GitHub Dependabot for automated dependency scanning and receive alerts for known vulnerabilities in our software dependencies. Critical vulnerabilities are prioritized and addressed promptly.

Rate Limiting & Attack Protection

Our APIs are protected by rate limiting to prevent abuse. We implement bot detection, block suspicious traffic patterns, and utilize edge-level DDoS protection.

Incident Response

We maintain a documented incident response program with defined procedures for detection, containment, eradication, and recovery. Security incidents are investigated and documented with lessons learned incorporated into our processes.

Compliance & Certifications

SOC 2 Type II

We are actively pursuing SOC 2 Type II certification with Vanta to demonstrate our commitment to security, availability, and confidentiality. Our compliance program includes continuous monitoring of security controls.

HIPAA Compliance

EMS SOAP is designed with HIPAA compliance in mind for healthcare organizations. We are actively working toward full compliance and offer Business Associate Agreements (BAA) upon request. We implement appropriate administrative, physical, and technical safeguards.

Data Privacy

We comply with applicable data privacy regulations including GDPR and CCPA. Users have the right to access, correct, and delete their personal data. For privacy inquiries, contact us at brandon@emssoap.com.

Security Questions?

For security-related questions or to request our security documentation, please contact us at brandon@emssoap.com.


Vulnerability Disclosure Policy

At EMS SOAP, we take the security of our systems and user data seriously. We value the security research community and welcome responsible disclosure of any vulnerabilities you may find.

Reporting a Vulnerability

If you believe you have found a security vulnerability, please submit it through our HackerOne vulnerability disclosure program, or email us at brandon@emssoap.com.

Please include as much detail as possible to help us understand and reproduce the issue.

Submit a Vulnerability Report on HackerOne

Guidelines

  • Do not access or modify data belonging to other users
  • Do not perform actions that could harm service availability
  • Do not use automated scanning tools without prior written approval
  • Provide sufficient detail for us to reproduce and verify the issue
  • Allow reasonable time for us to address the issue before public disclosure

Out of Scope

  • Social engineering attacks (phishing, vishing, etc.)
  • Physical security issues
  • Denial of service attacks
  • Third-party services and applications
  • Issues requiring physical access to a device
  • Vulnerabilities in outdated browsers or platforms
  • Self-XSS or issues requiring unlikely user interaction

Our Commitment

  • We will acknowledge receipt of your report within 5 business days
  • We will keep you informed of our progress toward resolving the issue
  • We will not pursue legal action against researchers acting in good faith
  • We will credit researchers who report valid vulnerabilities (upon request)

Rewards

We offer monetary rewards for qualifying vulnerability reports based on severity and impact. Reward amounts are determined on a case-by-case basis, taking into account the potential risk to our users and systems. Critical and high-severity vulnerabilities are eligible for higher rewards.

Bug Bounty Program

This is an active public bug bounty program. We appreciate security researchers who help keep our platform secure and reward valid vulnerability reports.