Akkio utilizes enterprise-grade best practices to protect our customers’ data.
We take our data privacy and security obligations seriously. Our platform, processes, and systems are designed to protect our users and their data. We have implemented information security controls in every part of our operations and we are consistently working to strengthen our stance.
Download our Data Privacy & Security PDF ->
Akkio builds on infrastructure from Amazon Web Services (AWS) and Google (GCP) which provide industry-leading security, privacy, operation monitoring, and compliance.
Akkio uses Drata’s automation platform to continuously monitor 100+ internal security controls across the organization against the highest possible standards. Automated alerts and evidence collection allows Akkio to confidently prove its security and compliance posture any day of the year, while fostering a security-first mindset and culture of compliance across the organization.
Akkio utilizes enterprise-grade best practices to protect our customers' sensitive health information, and uses Drata to verify its security, privacy, and HIPAA compliance controls.
Akkio is SOC 2 Type 2 compliant.
HIPAA is a federal law that requires the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge.
Drata’s HIPAA product provides an automated approach to ensuring that organizations can demonstrate compliance.
Security is a company-wide endeavor. All employees complete an annual security training program and employ best practices when handling customer data.
Our people can only access the data they need to do their job. We follow a need-to-know with least privileged access principle and won’t access user data without your permission. Employee workstations are configured with full-disk encryption, strong passwords, and automatic locking. Employees are prohibited from installing unauthorized software or using portable media. All employees and contractors are bound by NDA.
Akkio works with industry leading security firms to perform annual network and application layer penetration tests.
Akkio utilizes a variety of manual and automatic data security and vulnerability checks throughout the software development lifecycle.
Data is encrypted both in-transit using TLS and at rest.
If you believe you’ve discovered a bug in Akkio’s security, please get in touch at firstname.lastname@example.org. Our security team promptly investigates all reported issues.
For more information, to report an issue, or to ask any questions, contact email@example.com.