Security & Infrastructure
Built for healthcare from day one.
Updated October 25, 2025
At Waitly.ai, patient data security is the foundation of our platform. We employ enterprise-grade encryption, defense-in-depth infrastructure design, and strict compliance with healthcare regulations to protect your patients’ information.
Compliance & Data Privacy
- Patient data used for AI-powered features is processed in isolated, secure environments.
- We do not use identifiable patient data to train public or generative AI models.
- AI processing occurs only within the context of your practice’s authorized workflows.
Cloud Infrastructure
Waitly is hosted on Google Cloud Platform, utilizing infrastructure that maintains the following certifications:
- ISO 27001 (Information Security Management)
- SOC 1, SOC 2, and SOC 3
- HIPAA Compliance (with BAA)
- All application services operate within an isolated private network.
- Database connections are restricted to internal traffic only — no public internet exposure.
- All public endpoints use managed SSL certificates with automatic renewal.
Encryption
All data transmission is encrypted using TLS 1.2+:
- API communications between your EHR and Waitly.
- Dashboard access for your staff.
- Patient-facing communications.
- All databases are encrypted using AES-256.
- Sensitive credentials (EHR API keys, integration secrets) are encrypted at the application level before storage.
- All backup data is encrypted.
EHR Integration Security
Our EHR integrations operate on a principle of least privilege. We request only the specific API scopes necessary for:
- Reading patient demographics and contact information.
- Reading and writing appointment schedules.
- Accessing provider availability.
Access Control & Monitoring
Data Backup & Disaster Recovery
- Recovery Point Objective (RPO): Minutes
- Recovery Time Objective (RTO): Hours
- Automatic failover for application services.
Incident Response
Vendor Security
All third-party services we integrate with maintain HIPAA-compliant status with executed BAAs where applicable, and SOC 2 Type II certification or equivalent.
Application Security
- Input validation on all API endpoints.
- Protection against common vulnerabilities (SQL injection, XSS, CSRF).
- Industry-standard HTTP security headers.
- All API endpoints require authentication.
- Rate limiting to prevent abuse.
We are committed to transparency and welcome questions about our security practices. Upon request, we can provide additional documentation including our HIPAA compliance attestation and Business Associate Agreement.