Skip to main content
All CollectionsData Privacy & Security
How is the webhook connection secured?
How is the webhook connection secured?

In this article, we want to give you a glimpse into the robust security measures we take to protect your data during webhook transmission.

Paola Malo Molina avatar
Written by Paola Malo Molina
Updated over 6 months ago

In today's digital landscape, information security is an indisputable priority.

Encryption and protection:

We ensure that all data sent through webhooks is safeguarded in an encrypted database. This database acts as a strong guardian, protecting your health information from unauthorized access. Additionally, this database is completely isolated from remote connections, providing an additional layer of protection.

Only specific services responsible for handling health data have access to these webhook endpoints. This means that the information is only available to authorized personnel, adding an extra level of security.

Unified Logging System (ULS): Transparency and Control:

Our Unified Logging System (ULS) allows you to trace the path of your information. Every time we send data through webhooks, the ULS meticulously records the origin and destination of each piece of health information.

This level of monitoring is not only useful for us but also provides you with the reassurance of tracking your information. Each transmission becomes a registered event, highlighting our commitment to the security and transparency of data handling.

In summary, your security is not just a part of our job; it is the foundation upon which we build the trust you place in us.

Did this answer your question?