The core of information security is information assurance, the act of maintaining the confidentiality, integrity and availability of information, ensuring that information is not compromised in any way when critical issues arise.


Data Reliability

  • Data Centers are managed by Amazon over its cloud. Data Centers are located in multiple zones across the US.
  • Daily Backups are scheduled for critical resources/data and are archived as per HIPAA Standards
  • The Data Center backups provide up to 99.99% reliability

Information Security & Monitoring

  • Controls are designed as per NIST 800-66 (HIPAA Security Rule). SOC 1 & SOC 2 Type-2 audits and External Penetration tests are performed annually
  • Vulnerability Assessments are performed quarterly
  • Application Security scans happens with each product release
  • Firewall over Private ISP for limited access of Internet and other tools in the office premises
key performance indicator

Access Controls

  • Access to sensitive client resources are tightly bound with physical and logical security mechanisms
  • Separate area (Cleanroom) is allocated for accessing such resources

Data Ownership

  • Data provided by customers is kept safe with multiple security layers. If a customer wishes to leave UZIO, then upon request, all the data and account information or any other reference can be deleted within 30 business days. Snapshot of final data before deletion (in some export files) can also be shared upon request.
key performance indicator