Designed to Support HIPAA Compliance from Day One

AWS HIPAA-eligible infrastructure, executed BAAs, TLS 1.3/AES-256 encryption, zero-retention AI policies, and audit-ready logging. Your compliance team can sign off without hesitation.

HIPAA-Compliant Architecture

Important: HIPAA Compliance

ClaireMed is designed to support HIPAA compliance with infrastructure, vendor governance, and operational controls that meet OCR requirements. HIPAA compliance depends on both technology (what we provide) and operational controls (how you deploy it). ClaireMed provides HIPAA-compliant architecture; your compliance team verifies operational controls before pilot.

AWS HIPAA-Eligible Services

ClaireMed infrastructure uses only AWS covered services under executed AWS Business Associate Agreement (BAA):

Storage

S3: Call recordings, transcripts, audit logs (encrypted at rest)

Database

RDS: Customer data, configuration (encrypted at rest)

Compute

Lambda/ECS in VPC: Isolated, encrypted network

Encryption

KMS: Key management for all encryption

Audit Logging

CloudTrail: AWS API activity, access logs

Monitoring

CloudWatch: Metrics, logs, alerts

Executed Business Associate Agreements (BAAs)

ClaireMed has executed BAAs with all subprocessors that handle PHI:

Subprocessor Service BAA Status
AWS Infrastructure ✓ Executed
Twilio Security Edition Telephony ✓ Executed
ElevenLabs Text-to-Speech (TTS) ✓ Executed
Deepgram Speech-to-Text (STT) ✓ Executed
OpenAI/Anthropic LLM (Conversational AI) ✓ Executed

BAA copies are available for your compliance review before pilot begins.

Enterprise-Grade Encryption

🔐

Encryption in Transit

TLS 1.3 for all network traffic:

  • Twilio telephony → ClaireMed platform
  • ClaireMed platform → AI services (Deepgram, OpenAI, ElevenLabs)
  • ClaireMed platform → AWS storage (S3, RDS)
  • Admin access → ClaireMed dashboard
🗄️

Encryption at Rest

AES-256 for all stored data:

  • Call recordings in AWS S3
  • Transcripts in AWS S3 or RDS
  • Audit logs in AWS S3
  • Customer configuration data in RDS

AWS KMS Key Management: Customer-managed keys optional, key rotation policies, access controls via IAM roles.

Your Data Will Never Train AI Models

All AI vendors operate under zero-retention agreements—no training on your patient data, no data retention beyond active call processing.

ElevenLabs (TTS)

Zero-Retention mode required for PHI; no voice data retained after synthesis

OpenAI/Anthropic (LLM)

Enterprise ZDR contracts, US-only processing, no training on customer data

Deepgram (STT)

Zero-retention transcription processing

Why This Matters: Without zero-retention policies, AI vendors could use your patient data to train future AI models, creating privacy and compliance risks. ClaireMed's vendor agreements contractually prohibit this.

Audit-Ready Logging for Compliance

ClaireMed maintains immutable audit logs with S3 Object Lock (write-once-read-many), ensuring traceability and tamper-proof logging for OCR audits.

What's Logged

CloudTrail

AWS API activity, access logs, configuration changes

Call Metadata

Caller ID, timestamp, intent detected, routing path, agents involved, duration

Transcripts

Full conversation transcripts (Deepgram STT)

Emergency Protocols

Emergency keyword detection events (for audit)

Retention Policies

Data Type Default Retention Configurable?
Call recordings ≤30 days Yes
Transcripts ≤30 days Yes
Security logs ≥1 year hot, ≥6 years archived No (compliance requirement)
Backups ≤90 days No

On Termination

Hard delete of all client data within 7 days of termination request. Security logs retained per regulatory requirements. Confirmation provided to client.

Secure Patient Identity Verification

Before discussing appointments, medical records, or PHI, ClaireMed agents request identity verification.

2-of Verification (Choose 2)

Date of Birth (DOB) ZIP Code Last Name Last 4 of MRN Phone on File Optional: OTP

Identity verification methods are configurable per your security posture.

Questions Your IT Team Should Ask

We believe transparency builds trust. Here are questions your IT/security team should ask any healthcare voice AI vendor (including ClaireMed):

Q: Are you built on AWS HIPAA-eligible services?

ClaireMed Answer: Yes—AWS HIPAA-eligible services only (S3, RDS, Lambda/ECS in VPC, KMS, CloudTrail)

Q: Can you provide copies of executed BAAs with all subprocessors?

ClaireMed Answer: Yes—BAA copies available for review before pilot (AWS, Twilio, ElevenLabs, OpenAI/Anthropic, Deepgram)

Q: Do your AI vendors train on our patient data?

ClaireMed Answer: No—zero-retention agreements with all AI vendors contractually prohibit training on PHI

Q: What encryption standards do you use?

ClaireMed Answer: TLS 1.3 in transit, AES-256 at rest, AWS KMS key management

Q: Are your audit logs immutable (tamper-proof)?

ClaireMed Answer: Yes—S3 Object Lock (write-once-read-many) with cross-account replication

Q: How do you verify patient identity before discussing PHI?

ClaireMed Answer: 2-of verification (DOB, ZIP, last name, last-4 MRN, phone on file), optional OTP

Q: Where is our data processed and stored? Is it US-only?

ClaireMed Answer: AWS US regions only; all AI vendors operate under US-only processing agreements

Request Security Architecture Documentation

Download our security architecture documentation, BAA templates, and encryption specifications. Your IT/compliance team can review before pilot begins.