Security Practices

At Pawanax, security is built into every aspect of our systems and operations. Learn about our comprehensive approach to protecting your data.

Infrastructure Security

Secure cloud infrastructure with multiple redundancies, regular security patches, and comprehensive network monitoring.

Application Security

Secure development practices, regular code reviews, and comprehensive security testing throughout the development lifecycle.

Data Security

End-to-end encryption for sensitive data, secure backup procedures, and strict data minimization and retention policies.

Operational Security

Security awareness training for all staff, background checks, and comprehensive incident response procedures.

Our Security Practices

Infrastructure Security

Our infrastructure security program is designed to protect our systems and data from unauthorized access, ensuring the availability, integrity, and confidentiality of our services.

  • Secure Cloud Infrastructure: We use industry-leading cloud providers with robust security controls and compliance certifications.
  • Network Security: We implement multiple layers of network security, including firewalls, intrusion detection systems, and network segmentation.
  • Regular Patching: We maintain a rigorous patching schedule to address security vulnerabilities in a timely manner.
  • DDoS Protection: Our systems are protected against distributed denial-of-service attacks to ensure availability.
  • Redundancy: We implement multiple redundancies to ensure high availability and disaster recovery capabilities.

Application Security

Security is integrated throughout our development lifecycle, from design to deployment, ensuring that our applications are built with security in mind.

  • Secure Development Lifecycle: We follow secure coding practices and conduct regular security training for our development team.
  • Code Reviews: All code changes undergo peer review with a focus on security implications.
  • Security Testing: We conduct regular security testing, including static code analysis, dynamic application security testing, and penetration testing.
  • Input Validation: We implement strict input validation and output encoding to prevent injection attacks.
  • Authentication & Authorization: We use strong authentication mechanisms and implement principle of least privilege for access control.

Data Security

Protecting sensitive healthcare data is our top priority. We implement multiple layers of protection to ensure the confidentiality, integrity, and availability of your data.

  • Encryption: We use industry-standard encryption for data in transit (TLS 1.2+) and at rest (AES-256).
  • Data Minimization: We collect and retain only the data necessary for providing our services.
  • Secure Backups: We maintain secure, encrypted backups with strict access controls.
  • Data Retention: We have clear data retention policies and secure data deletion procedures.
  • Federated Learning: Where possible, we use federated learning techniques that keep sensitive data on local devices.

Operational Security

Our operational security practices ensure that our team members follow secure procedures and that we can respond effectively to security incidents.

  • Security Awareness: All team members receive regular security awareness training.
  • Access Control: We implement strict access controls based on the principle of least privilege.
  • Background Checks: We conduct background checks for employees with access to sensitive systems.
  • Incident Response: We have a comprehensive incident response plan that is regularly tested.
  • Security Monitoring: We maintain continuous security monitoring and alerting systems.

Compliance & Certifications

We maintain compliance with relevant healthcare data protection regulations and industry standards, including:

ISO 27001

We are ISO 27001 certified, demonstrating our commitment to information security management.

HIPAA Compliance

Our systems and processes are designed to comply with the Health Insurance Portability and Accountability Act requirements.

GDPR Compliance

We adhere to the General Data Protection Regulation for processing personal data of EU residents.

SOC 2 Type II

We have completed SOC 2 Type II audits, verifying our controls related to security, availability, and confidentiality.

We also comply with local data protection regulations in the East African countries where we operate, including Kenya's Data Protection Act and similar regulations in Uganda and Tanzania.

Security Vulnerability Reporting

We take security vulnerabilities seriously and appreciate the efforts of security researchers and our user community in identifying and reporting potential issues.

Responsible Disclosure

If you discover a security vulnerability in our systems, we encourage you to report it to us through our responsible disclosure program. We commit to:

  • Acknowledging receipt of your vulnerability report within 24 hours
  • Providing regular updates on the progress of addressing the vulnerability
  • Notifying you when the vulnerability has been fixed
  • Recognizing your contribution (if desired) after the vulnerability has been addressed

How to Report

Please send your vulnerability reports to security@pawanax.com. Include the following information in your report:

  • Description of the vulnerability
  • Steps to reproduce the issue
  • Potential impact of the vulnerability
  • Any suggestions for mitigating the issue

Note: Please do not disclose the vulnerability publicly until we have had the opportunity to address it.

Have Questions About Our Security Practices?

Our security team is here to help. Contact us with any questions or concerns about our security practices.

Contact Our Security Team