Introduction
We use WoundReference to keep our team organized and connected. Ensuring our platform remains secure is vital to protecting our own data, and protecting your information is our highest priority.
Our security strategy covers all aspects of our business, including:
- WoundReference corporate security policies
- Physical and environmental security
- Operational security processes
- Scalability & reliability of our system architecture
- Data model access control in WoundReference
- Systems development and maintenance
- Service development and maintenance
- Regularly working with third party security experts
WoundReference Corporate Security Policies & Procedures
Every WoundReference employee is expected to respect the terms of our data confidentiality policies, available at WoundReference.com/terms and woundreference.com/privacy. Access rights are based on employee’s role.
Security in our Software Development Lifecycle
WoundReference uses Visual Studio Team Services revision control system. Changes to WoundReference’s code base go through a suite of automated tests and are then manually reviewed. When code changes pass the automated testing system, the changes are first pushed to a staging server wherein WoundReference employees are able to test changes before an eventual push to production servers. WoundReference engineers also have the ability to "cherry pick" critical updates and push them immediately to production servers.
We also work with third-party security professionals to test our web application security.
WoundReference Architecture & Scalability
Scalability/Reliability of Architecture
WoundReference uses Microsoft Azure Web Services (SQL) to manage user data. The database is replicated synchronously so that we can quickly recover from a database failure. As an extra precaution, we take regular snapshots of the database and securely move them to a separate data center so that we can restore them elsewhere as needed, even in the event of a regional Microsoft Azure failure.
We currently host data in secure SSAE 16 audited data centers via Microsoft Azure.
Encrypted Transactions and Data
Web connections to the WoundReference service are via TLS 1.2 and above. All data is encrypted at rest using performance optimized symmetric encryption.
Information Security
Security Consulting and Application Review
We work with external security advisors, and have a responsible disclosure policy that allows security researchers to report vulnerabilities in our application.
Data Center Security
Microsoft Azure
Azure employs a robust physical security program with multiple certifications, including an SSAE 16 certification. For more information on Azure’s physical security processes, please visit azure security.
HIPAA Compliance
WoundReference and its parent company Wound Reference Inc. have gone through a comprehensive review to achieve HIPAA compliance. WoundReference does not collect any information that can be tied back to a specific patient. We also do not transmit or store any images from the mobile device.
Product Features
Administrator Management Features
Authentication – If passwords are stored directly with WoundReference, we secure them using bcrypt.
User Management – Administrators can see last login, user status, and deprovision users from a central administration interface.
User Features
Privacy, Visibility, & Sharing Settings – Customers determine who can access and edit pathways. You can assign users to groups for department level management.
Privacy
Privacy Policy
WoundReference’s privacy policy, which describes how we handle data input into WoundReference, can be found at WoundReference.com/privacy.
Availability
We are committed to making WoundReference consistently available to you and your teams. Our systems have built-in redundancy to withstand failures and are constantly monitored to keep your work uninterrupted.
Want to report a security concern?
Email us at security@woundreference.com.