Our Security Foundation

We build trust through rigorous engineering, continuous monitoring, and a privacy-first culture across every layer of our platform.

End-to-End Encryption

All therapy sessions, messages, and sensitive health data are encrypted in transit and at rest using AES-256 and TLS 1.3 protocols. Only you and your assigned therapist hold the keys to your conversations.

Strict Access Controls

Role-based access, multi-factor authentication, and zero-trust architecture ensure that only authorized personnel can interact with infrastructure. No employee can access your personal health information without explicit consent and audit logging.

Data Minimization

We only collect what is strictly necessary for your care. Anonymous analytics are aggregated, therapy notes are isolated in HIPAA-compliant vaults, and you retain full control over what is stored and shared.

Continuous Monitoring

24/7 threat detection, automated vulnerability scanning, and real-time anomaly alerts protect against unauthorized access. Our security team conducts quarterly penetration tests and incident drills.

Secure Backups & Recovery

Encrypted, geo-redundant backups ensure your data remains available and intact. Disaster recovery protocols are tested monthly, with RTO under 4 hours and RPO under 15 minutes.

Transparent Data Lifecycle

You dictate your data's lifespan. Automatic retention policies, one-click export, and permanent deletion tools give you complete sovereignty over your digital wellness footprint.

\n

Compliance & Certifications

We adhere to the highest global standards for health data privacy and security.

HIPAA Compliant

Fully compliant with the Health Insurance Portability and Accountability Act. All protected health information (PHI) is handled, stored, and transmitted according to strict federal guidelines.

GDPR Ready

Built for European data sovereignty. We provide data portability, right to be forgotten, and lawful processing bases for all EU/EEA users, with dedicated Data Protection Officers.

SOC 2 Type II Certified

Independently audited for security, availability, processing integrity, confidentiality, and privacy. Our controls are rigorously tested and validated annually.

CCPA & State Privacy Laws

Compliant with California Consumer Privacy Act and emerging state-level data protection regulations. You retain full rights to opt-out, access, and correct your information.

How We Protect Your Mental Health Data

Mental health information requires exceptional care. Our architecture is designed with privacy by default, ensuring that your therapy sessions, mood logs, and personal insights remain strictly confidential.

  • Therapy messages use perfect forward secrecy — past conversations remain secure even if keys are compromised.
  • Mood tracking and journal entries are anonymized at the source before aggregation for app improvements.
  • Video sessions are streamed via WebRTC with zero stored recordings unless explicitly saved by the user.
  • Third-party integrations (calendars, wearables) require explicit OAuth consent with limited, scoped permissions.
  • Employee access to systems is logged, time-bound, and subject to automated compliance reviews.

Privacy by Design

Your Data Rights

You are in control. We empower you with transparent tools to manage, access, and govern your personal information.

Right to Access

Request a complete export of all your personal data, including therapy transcripts, mood history, and account settings, in standard JSON/PDF formats.

Right to Erasure

Permanently delete your account and all associated data. Upon request, we will purge your information from primary systems and backups within 30 days.

Right to Rectification

Update or correct inaccurate personal information at any time through your dashboard. Changes propagate across our systems within 24 hours.

Right to Opt-Out

Disable non-essential data processing, marketing communications, and personalized insights with a single toggle. We respect DND preferences globally.

Incident Response & Transparency

We maintain a proactive security posture. In the unlikely event of a security incident, our structured response protocol ensures rapid containment, clear communication, and full accountability.

1. Detection & Triage

Automated monitoring systems flag anomalies within seconds. Our Security Operations Center validates alerts and classifies severity levels immediately.

2. Containment & Eradication

Threat vectors are isolated, compromised credentials are revoked, and system access is locked down. Root cause analysis begins concurrently.

3. Transparent Notification

Affected users are notified within 72 hours via email and in-app alerts. We provide clear details about what happened, what data was involved, and what we're doing to fix it.

4. Recovery & Post-Mortem

Systems are restored, patches deployed, and controls hardened. We publish a transparent incident report and implement preventive measures to avoid recurrence.

Report a Security Concern

We take every vulnerability report seriously. If you suspect a security issue or need assistance with your data privacy settings, our dedicated security team is ready to help.