Trust & Safety

Security at Zenia

We take the protection of your health data seriously. Here's exactly how we keep it safe.

Last updated: March 2026 HIPAA & GDPR Aligned End-to-end encrypted
Security is foundational at Zenia. We handle sensitive medical data every day. This page describes the technical and organisational measures we apply to protect you, your patients, and your clinical records at every layer of our platform.

1. Our Security Commitment

Zenia Care is built on the principle that healthcare data deserves the highest level of protection available. We treat every piece of information on our platform — from appointment records to voice-generated clinical notes — as sensitive by default.

Our security programme covers people, processes, and technology. We continuously evaluate and improve our controls to stay ahead of emerging threats, and we hold ourselves accountable through independent audits and certifications.

  • Security is a product requirement, not an afterthought
  • All security decisions are reviewed at engineering leadership level
  • We operate a dedicated security function responsible for policy, monitoring, and response
  • We publish this page and update it whenever our practices materially change

2. Data Encryption

All data transmitted to and from Zenia is encrypted in transit using TLS 1.2 or higher. We enforce HTTPS across all endpoints and reject connections over older or insecure protocols.

All data stored on our servers is encrypted at rest using AES-256, including database volumes, backup snapshots, and object storage. Encryption keys are managed via a dedicated key management service (KMS) with strict access policies and automatic key rotation.

  • TLS 1.2+ enforced on all network connections
  • AES-256 encryption at rest on all storage layers
  • Separate encryption keys per data classification tier
  • Automatic key rotation on a defined schedule
  • Voice recordings and AI-generated transcripts encrypted separately from structured records

3. Access Controls

Zenia enforces a least-privilege access model across all systems. Users — both internal employees and external platform users — are granted only the permissions necessary for their specific role. Access is reviewed regularly and revoked immediately upon role change or offboarding.

All administrative access to production systems requires multi-factor authentication (MFA). We do not permit shared credentials or password reuse. Privileged access to patient data is logged in full and subject to automated anomaly detection.

  • Role-based access control (RBAC) across all services
  • MFA mandatory for all staff accessing production environments
  • Just-in-time (JIT) access provisioning for sensitive operations
  • Full audit trail of all data access and administrative actions
  • Quarterly access reviews for all user accounts

4. Infrastructure Security

Zenia's infrastructure is hosted on enterprise-grade cloud platforms that maintain their own comprehensive security certifications. Our architecture is designed for isolation, redundancy, and resilience.

We use network segmentation to separate environments (development, staging, production) and apply strict firewall rules to limit inter-service communication to the minimum required. All cloud resources are managed through infrastructure-as-code (IaC) to ensure consistency and auditability.

  • Production environment fully isolated from development and staging
  • Automated vulnerability scanning on all infrastructure components
  • Immutable infrastructure deployments — no direct production access
  • DDoS mitigation and rate limiting at the network edge
  • Continuous uptime monitoring with automated incident alerting

5. Application Security

Security is embedded throughout our software development lifecycle (SDLC). Every code change undergoes automated security testing before deployment. Our engineering team follows secure coding standards aligned with OWASP guidelines.

We conduct regular penetration tests by accredited third-party security firms. Critical findings are remediated within 48 hours; high-severity findings within 7 days. All findings are tracked to resolution.

  • Static application security testing (SAST) on every pull request
  • Dynamic application security testing (DAST) in staging environments
  • Third-party penetration testing at least annually
  • Dependency scanning and software composition analysis (SCA)
  • Secure code review for all features involving patient data
  • OWASP Top 10 mitigations applied across all endpoints

6. Data Residency & Storage

By default, all patient data and clinical records are stored within data centres located in India, in compliance with applicable data localisation requirements. We do not transfer personal health information outside of your designated region without explicit consent or legal basis.

Backups are performed daily and are encrypted and stored in geographically separate locations. Backup integrity is verified on a regular schedule. Data is retained for the period required by applicable law and our contractual obligations, and is securely deleted thereafter.

  • Primary data stored in India-based cloud regions
  • Encrypted daily backups with geo-redundant storage
  • Retention periods aligned with applicable medical record laws
  • Secure deletion (crypto-shredding) upon expiry of retention period
  • No cross-border transfers of PHI without a valid legal basis

7. Compliance & Audits

Zenia is designed to align with healthcare data protection standards including HIPAA (Health Insurance Portability and Accountability Act) and GDPR (General Data Protection Regulation) where applicable to our customers and data subjects.

We maintain detailed records of our data processing activities and undergo periodic independent audits to verify compliance. Our data processing agreements (DPAs) are available upon request for enterprise customers.

  • HIPAA-aligned technical safeguards for all PHI
  • GDPR-aligned data subject rights and processing records
  • Annual third-party compliance audits
  • Data Processing Agreements (DPAs) available for enterprise customers
  • Business Associate Agreements (BAAs) available upon request

8. Incident Response

Zenia maintains a formal incident response plan that is tested at least twice per year through tabletop exercises. Our security team monitors systems 24/7 using automated threat detection and alerting.

In the event of a confirmed data breach affecting your personal health information, we will notify you without undue delay and within the timeframe required by applicable law (typically 72 hours for GDPR; 60 days for HIPAA). Notifications will include the nature of the incident, the data affected, and the steps we are taking to mitigate harm.

  • 24/7 automated monitoring and anomaly detection
  • Defined escalation paths and on-call security response team
  • Incident response plan tested at least biannually
  • Breach notification within legally required timeframes
  • Post-incident reviews and root-cause analysis for all major events

9. Employee Security

Every Zenia employee and contractor who may access patient data undergoes a thorough background verification before being granted access. All staff complete mandatory security awareness training at onboarding and annually thereafter.

Access to production systems is provisioned on a need-to-know basis and is logged at all times. Employees are bound by confidentiality obligations and data handling policies. Access is revoked on the day of departure.

  • Background checks for all employees handling PHI
  • Mandatory annual security awareness training
  • Confidentiality agreements signed before system access is granted
  • Immediate access revocation upon offboarding
  • Regular phishing simulations and social engineering awareness

10. Vulnerability Disclosure

We welcome responsible disclosure of security vulnerabilities. If you have discovered a potential security issue in our platform, we ask that you report it to us privately so that we can investigate and remediate it before any public disclosure.

Please submit vulnerability reports to our security team via our Contact Us page, clearly marked "Security Vulnerability Report." We commit to acknowledging your report within 2 business days and providing a remediation timeline within 7 business days.

Responsible Disclosure Policy: We ask that you do not publicly disclose a vulnerability before we have had a reasonable opportunity to investigate and address it. We will not pursue legal action against researchers who act in good faith and follow this policy.
  • Report vulnerabilities to us via the Contact Us page
  • Acknowledgement within 2 business days
  • Remediation timeline provided within 7 business days
  • We do not pursue legal action against good-faith researchers

11. Your Responsibilities

While Zenia takes extensive measures to protect your data, security is a shared responsibility. The following practices will help you maintain the security of your Zenia account:

  • Use a strong, unique password for your Zenia account and do not share it with anyone
  • Enable two-factor authentication (2FA) if available on your account type
  • Log out of shared or public devices after each session
  • Report any suspicious activity or unauthorised access to your account immediately
  • Keep your registered email address up to date so we can reach you in case of a security event
  • Do not share your login credentials with colleagues — each user should have their own account

If you suspect your account has been compromised, please contact us immediately via our Contact Us page and we will take immediate steps to secure your account.

12. Contact Security Team

For security-related enquiries, vulnerability disclosures, or to request our security documentation (including DPAs or BAAs), please reach out to us through the following channel:

  • Security enquiries: Visit our Contact Us page and select "Security" as the subject
  • Response time: Within 2 business days for security matters
  • Critical vulnerabilities: Escalated and acknowledged within 24 hours
We are committed to transparency about our security practices. If you are an enterprise customer and require a more detailed security review, custom DPA, or compliance documentation, please reach out and our team will work with you directly.