Security & Compliance
Security Review: Quarterly (Next: January 2026)
EverFlow Veterinary Codes is committed to maintaining the highest standards of security and compliance to protect our users' data and maintain trust in our platform. This document outlines our security measures, compliance standards, and ongoing commitments.
🔒 Enterprise-Grade Security
SOC 2 Type II Compliant • ISO 27001 Certified • State Veterinary Privacy Law Compliant
1. Security Framework
1.1 Information Security Management
Our security program is built on industry-standard frameworks and best practices:
- ISO 27001:2013 - Information Security Management System
- NIST Cybersecurity Framework - Comprehensive security controls
- SOC 2 Type II - Security, availability, and confidentiality controls
- OWASP Top 10 - Application security best practices
1.2 Security Organization
Our security governance structure includes:
- Dedicated Chief Information Security Officer (CISO)
- Security Steering Committee with executive oversight
- Regular security training for all employees
- Third-party security assessments and penetration testing
- 24/7 security monitoring and incident response team
2. Technical Security Controls
2.1 Data Encryption
- In Transit: TLS 1.3 encryption for all data transmission
- At Rest: AES-256 encryption for all stored data
- Key Management: Hardware Security Modules (HSMs) for key protection
- Database: Transparent Data Encryption (TDE) enabled
2.2 Access Controls
- Multi-factor authentication (MFA) required for all accounts
- Role-based access control (RBAC) with principle of least privilege
- Single Sign-On (SSO) integration available
- Regular access reviews and deprovisioning procedures
- API key management with rotation and expiration policies
2.3 Network Security
- Next-generation firewalls with intrusion detection
- DDoS protection and traffic filtering
- Network segmentation and micro-segmentation
- VPN access for administrative functions
- Regular vulnerability scanning and penetration testing
2.4 Application Security
- Secure coding practices and code reviews
- Static Application Security Testing (SAST)
- Dynamic Application Security Testing (DAST)
- Software Composition Analysis (SCA) for third-party components
- Regular security updates and patch management
3. Infrastructure Security
3.1 Cloud Security
Our infrastructure is hosted on enterprise-grade cloud platforms with:
- SOC 2, ISO 27001, and FedRAMP certified cloud providers
- Dedicated virtual private clouds (VPCs) with network isolation
- Auto-scaling with security group controls
- Encrypted storage volumes and automated backups
- Geographic data residency controls
3.2 Backup and Disaster Recovery
- Automated daily backups with 30-day retention
- Geographically distributed backup storage
- Regular backup testing and restoration procedures
- Recovery Time Objective (RTO): 4 hours
- Recovery Point Objective (RPO): 1 hour
4. Compliance Standards
SOC 2 Type II
Annual audits covering security, availability, processing integrity, confidentiality, and privacy.
CompliantISO 27001:2013
International standard for information security management systems.
CertifiedState Veterinary Privacy Laws
Compliance with 35 state-level veterinary confidentiality statutes.
CompliantGDPR
European General Data Protection Regulation for international users.
CompliantCCPA/CPRA
California Consumer Privacy Act and amendments for California residents.
CompliantFedRAMP
Federal Risk and Authorization Management Program for government use.
Planned 20265. Veterinary-Specific Compliance
5.1 State Veterinary Privacy Laws
We comply with veterinary confidentiality requirements across all 35 states with specific statutes:
| Requirement | Our Implementation | Monitoring |
|---|---|---|
| Client consent for data sharing | Explicit consent workflows | Audit logs for all consents |
| 5-day response to authorized requests | Automated request processing | SLA monitoring and alerts |
| Secure record storage | Encrypted databases and backups | Regular security assessments |
| Professional confidentiality | Role-based access controls | Access logging and reviews |
5.2 Academic Partnership Compliance
Our partnership with Virginia Tech VTSL requires adherence to academic research standards:
- IRB approval for research data usage
- De-identification of practice data for research
- Publication review and approval processes
- Data retention policies aligned with research requirements
6. Data Protection and Privacy
6.1 Data Classification
We classify data based on sensitivity and apply appropriate controls:
- Public: Marketing materials, documentation
- Internal: Business processes, non-sensitive analytics
- Confidential: Customer data, financial information
- Restricted: Veterinary records, personally identifiable information
6.2 Data Minimization
- Collect only data necessary for service provision
- Regular data purging based on retention policies
- Anonymization and pseudonymization techniques
- Purpose limitation for all data processing activities
6.3 Data Subject Rights
We provide comprehensive data subject rights management:
- Right to access personal information
- Right to correct inaccurate information
- Right to delete personal information
- Right to data portability
- Right to opt-out of certain processing
7. Incident Response and Business Continuity
7.1 Security Incident Response
Our incident response process includes:
- Detection: 24/7 monitoring and alerting systems
- Analysis: Rapid triage and impact assessment
- Containment: Immediate threat isolation and mitigation
- Eradication: Root cause analysis and remediation
- Recovery: Service restoration and validation
- Lessons Learned: Post-incident review and improvements
7.2 Breach Notification
In the event of a data breach, we commit to:
- Customer notification within 72 hours of discovery
- Regulatory notification as required by applicable laws
- Detailed incident reports and remediation plans
- Credit monitoring services if personal data is compromised
7.3 Business Continuity
- Comprehensive business continuity and disaster recovery plans
- Regular testing of recovery procedures
- Geographic redundancy for critical systems
- Vendor risk management and third-party assessments
8. Third-Party Security
8.1 Vendor Risk Management
All third-party vendors undergo rigorous security assessment:
- Security questionnaires and on-site audits
- Contractual security requirements and SLAs
- Regular security reviews and reassessments
- Vendor performance monitoring and compliance tracking
8.2 Approved Vendors
We maintain a list of pre-approved vendors that meet our security standards for common services like cloud infrastructure, monitoring, and support tools.
9. Security Training and Awareness
9.1 Employee Training
- Mandatory security awareness training for all employees
- Role-specific security training (developers, administrators, etc.)
- Regular phishing simulation exercises
- Annual security policy reviews and updates
9.2 Customer Security Resources
- Security best practices documentation
- Integration security guidelines
- Regular security webinars and updates
- Dedicated security support channel
10. Audit and Monitoring
10.1 Continuous Monitoring
- Security Information and Event Management (SIEM)
- User Entity Behavior Analytics (UEBA)
- File Integrity Monitoring (FIM)
- Database Activity Monitoring (DAM)
- API usage monitoring and anomaly detection
10.2 Regular Assessments
- Annual penetration testing by certified third parties
- Quarterly vulnerability assessments
- Monthly security control reviews
- Continuous automated security scanning
11. Certifications and Attestations
Current Certifications
- SOC 2 Type II: Valid through December 2025
- ISO 27001:2013: Valid through September 2026
- Cloud Security Alliance (CSA): STAR Level 2
Audit Reports Available
Current SOC 2 Type II reports are available to customers under NDA. Contact our security team for access.
12. Security Contact and Reporting
12.1 Vulnerability Reporting
We encourage responsible disclosure of security vulnerabilities. Please report security issues to:
- Email: security@everflowvet.com
- PGP Key: Available on our security page
- Response Time: Initial response within 24 hours
- Bug Bounty: Rewards for qualifying vulnerabilities
12.2 Security Advisory
Subscribe to our security advisory mailing list for updates on:
- Security patches and updates
- New compliance certifications
- Security best practices
- Threat intelligence relevant to veterinary practices
Security Team Contact
EverFlow Veterinary Codes, LLC
Chief Information Security Officer
Email: security@everflowvet.com
Phone: +1 321-559-1671 (ext. 3)
Secure Portal: https://security.everflowvet.com
Status Page: https://status.everflowvet.com
Emergency Security Hotline: +1 602-531-SECURITY (24/7)