Security Policy
Publication date: March 5, 2025.
The Security Policy regulates the procedure and methods for protecting the Data of the User.
The Security Policy describes protection systems, methods and techniques for ensuring the security of User Data.
The Security Policy describes special methods of data processing, such as encryption, pseudominimization, and ways to protect against DDos attacks.
A Security Policy was created to ensure that the Data Subject has the opportunity to familiarize itself with the storage of the Personal Data, granting access to Personal Data to Company employees, Company’s procedure in case of loss of Personal Data.
Please read the Privacy Policy for a more profound understanding of the security of Personal Data.
- DEFINITION
- User is any person who installs the App to receive Services for the purpose of monitoring their health.
- Personal Data is any information that is in the public domain, allowing you to directly or indirectly identify the User. For example, first name, last name, phone number, IP address.
- Data concerning health means personal data related to the physical or mental health of a natural person, including the provision of health care services, which reveal information about his or her health status.
- Data is a common name for Personal Data and Data concerning health
- Doctor is a qualified specialist in the field of medicine, who is chosen by the User to receive Services for diagnosing his health or monitoring his condition.
- DeHealth company (hereinafter referred to as the "Company" or "DeHealth") is a DEHEALTH TECHNOLOGIES, INC, registered at 1049 El Monte Avenue, Ste C #846, Mountain View, CA 94040, United States, EIN: 36-5099713, which provides Services to Users.
- DeHealth application (hereinafter referred to as the "App") is a service created so that the User can check the state of his health and monitor the change in his health.
- Services an algorithm of actions carried out by the Company to provide the User with the opportunity to install the App to check the state of his health and monitor its condition by contacting a Doctor.
- Controller means a natural or legal person, government agency, institution or other body that independently determines the purposes and means of processing Personal Data.
- Processor means a natural or legal person, public authority, agency or other body processing Personal Data on behalf of and on behalf of the Controller.
- Password means a secret word or a certain sequence of symbols intended to confirm identity or its rights. Passwords are used to protect information from unauthorized access.
- Pseudonymization is the processing of Data as a result of which the Data cannot be identified without the use of additional information, provided that such additional information is stored separately and protected by technical and organizational means to exclude the association of Data with an identified or identifiable individual.
- Encryption is an algorithmic and reversible transformation of Data that is performed by a symbolic sequence in order to ensure their security.
- Server is specialized equipment that is designed to store information and service users and databases.
- Third Party means a natural or legal person, government agency, institution or body, other than the User or Company.
- GENERAL PROVISION
- By ensuring the security of Data we mean a set of actions aimed at preventing the disclosure and/or loss of Data.
- The Company ensures the security of Data relying on Art. 32 of the General Data Protection Regulation.
- In the event of a situation during which there is a possibility of loss of Data, we make every effort to avoid it.
- The Company uses measures such as Pseudonymization and Data Encryption.
- We make every effort to restore access to Data in the event of its disclosure and/or loss.
- The Company acts as the Controller during the processing of Data concerning health:
- DEHEALTH TECHNOLOGIES, INC
- Address:1049 El Monte Avenue, Ste C #846, Mountain View, CA 94040, United States
- EIN: 36-5099713
- SCOPE OF APP
- The Security Policy applies exclusively to Data processed by the Company when providing access to the Services and paying for them.
- The Security Policy does not apply to Data that is not processed by the Company, including but not limited to accepting payment from the User for providing access to the Services.
- DATA SECURITY MEASURES
- The Company shall use the following Data security measures:
- information risk assessment;
- rules for working with Data;
- separation of employee/contractor access levels to Data;
- determination of a Data Processing Officer (DPO);
- regular testing of Data security;
- coordination between key Employees who have access to Data;
- rules for access to premises and equipment where Data is stored;
- performing periodic checks of Data security;
- use of antivirus software;
- use of security systems;
- control of physical access to Data;
- protection of Data using an authorization system;
- assigning a unique password to an employee to access Data;
- backup of Data;
- training and advanced training of employees who have the right to access Data;
- interaction with the Server.
- The Company identifies the following Data cybersecurity measures:
- system security - the security of our network and information systems, including those that process Data;
- data security - the security of the Data that we store on our Server;
- security systems - the security of Data, which is ensured with the help of special services, programs.
- The Company shall use the following Data security measures:
- PSEUDONIMISATION OF DATA
- Pseudonymisation does not allow identification of Data, but it allows it to be distinguished from other Data.
- Pseudonymisation allows identification of an employee or counterparty using online identifiers.
- Pseudonymisation of Data may reduce the risks of loss and/or disclosure of Data and help Controllers and Processors to fulfil their obligations to protect Data.
- ENCRYPTION OF DATA
- Company encrypts Data in accordance with Art. 32 of the General Data Protection Regulation.
- Company encrypts Data in the following way - Local storage of encrypted Data. In this case, Data is encrypted and already encrypted is stored on the Server.
- The Company uses the following software and methods for Encryption:
- SSL/TLS for Zipit encryption;
- Encryption disk on HealthLake;
- gRPC communication between the Company's services;
- Firebase for data storage;
- Firewall usage;
- using AES-256 to encrypt hard drives at rest:
- regular updating of SSL/TLS certificates for traffic encryption;
- use of services with authentication through OAuth 2.0;
- integration with deep logging via AWS CloudWatch to track changes and anomalous activity;
- multi-factor authentication (MFA).
- To ensure Data security, the Company uses segmented data storage in different AWS regions to increase stability and automatic backup to Amazon S3 with Data Encryption with regular software version updates.
- Data is stored in the cloud on digital media. Backups are encrypted and stored in AWS Glacier for long-term archival storage. Access to physical servers is restricted by AWS Glacier's physical security policy.
- Company encrypts Data both during their transmission and during their storage.
- DDoS PROTECTION
- The Company uses the maximum and most modern means of protection against DDoS attacks, minimizing the possibility of losing Data and lack of access to the Service.
- Uses the maximum and most modern methods of protection against DDoS attacks, minimizing the likelihood of losing Data.
- The Company uses the following types of protection against DDoS attacks:
- protection against all types of DDoS attacks (SYN Flood, UDP/ICMP Flood, HTTP/HTTPS attacks);
- secure IP address;
- Cloud Security with AWS Shield;
- filtering traffic through specialized equipment and software methods;
- use of Intrusion Prevention Systems (IPS) intrusion prevention systems;
- ensuring protection from the Company's Server;
- OpenSSL is used to encrypt data in transit.
- To provide additional protection against DDoS attacks, content delivery services, Internet security services, and distributed domain name server services.
- DATA SECURITY BREACH
- A Data security breach means a breach leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Data. This includes breaches that result from both accidental and intentional causes.
- Нарушение безопасности Данных может включать:
- access by an unauthorized Third Party;
- intentional or accidental action (or inaction) of the Controller or Processor;
- sending Data to the wrong recipient;
- computer devices containing Data are lost or stolen;
- modification of Data without proper authorization;
- loss of access to Data.
- In the event of a Data security breach, we will take immediate action to eliminate it.
- In the event that a Data security breach could result in significant losses for the User, we will take all necessary measures to inform them as soon as possible.
- The Company documents all Data security breaches, regardless of the risk to Data security.
- In the event of a Data security breach, we will take measures in accordance with the Data Protection Guidelines under Art. 25 of the General Data Protection Regulation, in accordance with Regulation 2016/679.
- PROCEDURE IN THE EVENT OF A SECURITY BREACH OF DATA
- In case of unlawful disclosure and/or loss of Data, the Company takes the following steps:
- Immediately notifies the User of such breach;
- Takes all necessary measures to stop further disclosure;
- Performs security audits to prevent further leakage of Data;
- Takes actions to minimize the damage from such leakage of Data;
- Notification to the supervisory authority;
- Takes action to compensate for damage to the User.
- The Company trains its employees to perform an algorithm of actions in case of violation of the security of Data.
- The Company assesses and monitors the mitigation of damage from a Personal Data breach and ensures cooperation between employees and Users, and regularly reviews the Data breach response plan.
- In case of unlawful disclosure and/or loss of Data, the Company takes the following steps:
- NOTIFICATION OF A DATA BREACH TO THE SUPERVISORY AUTHORITY
- In the event of a Data security breach, the Controller or the Processor on behalf of the Controller shall, without undue delay and if possible no later than 72 hours after becoming aware of the breach, notify the competent supervisory authority of the breach, unless it does not result in any risk to the rights and freedoms of natural persons. If the notification is not made within 72 hours, it shall be accompanied by an explanation of the reasons for the delay.
- The Controller or the Processor on behalf of the Controller shall notify the supervisory authority pursuant to Art. 33 of the General Data Protection Regulation.
- In the event of a Data security breach, the Controller or the Processor on behalf of the Controller shall notify the User of the breach without undue delay.
- Notification of a breach of User Data is not required in any of the following cases:
- The Controller or the Processor on behalf of the Controller has previously applied appropriate technical and organizational security measures to the Data that make it impossible for any person who is not authorized to access it to read it, such as encryption;
- The Controller or the Processor on behalf of the Controller has taken subsequent measures that do not represent a high risk to the rights and freedoms of the User;
- notification would require a disproportionate effort. In such a case, a public notification or similar action informing data subjects with equal effectiveness is taken instead.
- The Controller or the Processor on behalf of the Controller notifies the User in accordance with Art. 34 of the General Data Protection Regulation.
- Notification of a breach of User Data must:
- describe the nature of the breach of Data, including, where possible, the categories and approximate number of persons affected, as well as the categories and approximate amount of Data affected;
- contain the name and contact details of the data protection officer or other contact person from whom further information can be obtained;
- describe the possible consequences of a breach of Data security;
- describe the steps taken by the Controller or the Processor on behalf of the Controller to deal with the breach of personal data security, including, where appropriate, measures aimed at minimising its possible negative consequences.
- LIABILITY
- The Controller is liable for damage caused by a breach of Data security. The Processor is liable for damage caused by processing only if it has failed to comply with the requirements of the General Data Protection Regulation or if it has violated the lawful instructions of the Controller.
- The Controller and the Processor are liable in accordance with Art. 82 of the General Data Protection Regulation.
- The Company is liable in accordance with Art. 83 of the General Data Protection Regulation.
- The Company is liable for damage caused by a breach of Data security and undertakes to compensate for the damage caused.
- The Company shall not be liable in the following cases:
- If the breach of Data security occurred due to reasons beyond the Company's control and it could not prevent such a breach in any way.
- The breach of Data security occurred due to the User providing knowingly false Personal Data;
- The breach of Data security occurred due to the Doctor's actions that the Company could not control;
- If the Company disclosed the Data by order of any supervisory authority, court, law enforcement and/or government agency;
- If the disclosure and/or loss of the Data occurred as a result of force majeure, military action, emergency situations;
- If the disclosure and/or loss of the Data occurred as a result of the failure of the company that provided the data storage services (data center) to fulfill its obligations.
- CHANGING THE SECURITY POLICY
- The Company has the right to change the provisions of the Security Policy in case of changes in the methods and ways of ensuring the security of Data.
- If changes are made to the Security Policy, the Company trains its employees and adds new provisions to this Security Policy.
- The User is obliged to read the new terms of the Security Policy, and the Company is not responsible if the User has not read the new terms of the Security Policy.
- Digital or otherwise stored copies of the Security Policy are considered to be authentic, complete, valid and enforceable versions of this Security Policy in effect at the time the User visits the App. If the User uses the Services, after the date of updating the Security Policy, he agrees to the new rules for the storage of Data.
- CONTACTS
- The User has the right to contact the Company's support service at: [email protected] to ensure his rights, in accordance with the terms of this Security Policy, or in case of violation of his rights, or to leave feedback or ask a question.