Trust Center

Start your security review
View & download sensitive information
Ask for information
ControlK

Services

CirrusMD provides a telemedicine platform that connects patients with healthcare providers in real-time, through web and mobile applications. Their service allows seamless interaction between patients and doctors, enabling users to consult on medical issues, receive guidance, and manage healthcare concerns without the need for in-person visits. This platform facilitates on-demand, text-based communication, ensuring accessible healthcare for employees and patients of CirrusMD's partners, such as employers, health insurers, and healthcare systems. These services also extend to healthcare professionals who use the system for tracking and managing patient care​​.

Security Program

CirrusMD protects its stakeholders and company assets through a comprehensive security program of policies, standards, and controls. Our HIPAA-compliant platform utilizes physical, technical, and administrative safeguards to ensure full adherence to federal and state privacy laws across the entire provider network. Moreover, CirrusMD maintains its security and privacy programs in alignment with industry standards, evidenced by certifications such as ISO27001 and SOC2 Type II. These certifications attest to the thoroughness in the design and implementation of the company's policies and safeguards, ensuring they meet or surpass industry norms and are adaptable to evolving threats.

Documents

REPORTSNetwork Diagram

Completed Security Questionnaires

We are working on our security compliance. We can provide completed questionnaires upon request.

Knowledge Base (FAQ)
  • Is there annual, formal privacy awareness training for employees, contractors, volunteers, and other relevant parties as appropriate?
  • Does your company configure user accounts so that a password cannot be reset until the user's identity is verified?
  • Is there a documented process to annually review whether user access and authorization is still appropriate and granted to those with a business need?
  • Is a key management system (KMS) used to generate, distribute, and manage cryptographic keys?
  • Does your company have documented, approved, and established Business Continuity and Disaster Recovery (BCDR) programs that have been approved by management and communicated to appropriate constituents?
View more
If you need help using this Trust Center, please contact us.
Contact support
Built onSafeBase by Drata Logo