Security & Privacy
This page summarises Aescia’s security posture for clinical evaluation contexts. Formal validation is expected to occur through standard public-sector procurement and security review processes.
Data residency
Aescia is intended to support Australian data residency for Australian public hospital evaluations.
Encryption
- Encryption in transit (e.g., Transport Layer Security)
- Encryption at rest
Access controls and auditability
- Role-based access control
- Audit logging of access and key actions
- Principle of least privilege for administrative access
Subprocessors
Aescia may use subprocessors to deliver functionality (e.g., messaging). Subprocessors and their roles should be disclosed and contractually controlled for any evaluation.
Incident response
Aescia maintains an incident response approach, including containment, investigation, notification, and remediation processes consistent with contractual and regulatory expectations.
Retention and deletion
Evaluation data retention periods and deletion processes should be defined per site requirements and contract terms.
Evaluation security documentation
For a paid evaluation, we expect to provide (at minimum):
- security overview and architecture summary
- subprocessor list and data flow description
- access control model and audit logging approach
- incident response summary and notification timeframes